The database will reject you unless your role says otherwise. HashiCorp Boundary makes that decision explicit.
Boundary is built to control access to sensitive systems like databases. Instead of scattering credentials across apps and teams, you define boundary roles that govern who can connect, and under what conditions. For databases, these roles are the enforcement layer between a user and the data.
What are HashiCorp Boundary database roles?
In Boundary, a role is a set of grants attached to identities. For databases, these grants define which targets—PostgreSQL, MySQL, or any other system you register—are accessible. Roles can be scoped to individual projects or organizations. They are fine‑grained. You can allow read access to one schema, write access to another, or block connections entirely. Everything is handled by Boundary’s central authorization service.
Why use Boundary for database access control?
Credentials never leave the secure environment. Boundary brokers the session between the user and the database. Roles determine if the session starts at all. This means you can rotate credentials, revoke access instantly, and ensure compliance. The role structure avoids the need to manage static usernames and passwords in multiple places.