HashiCorp identity-based access management.
## Boundary MCP Server: Zero Trust Access Management The **Boundary MCP Server** integrates HashiCorp Boundary into Google Antigravity, enabling secure access to hosts and services across any environment without exposing credentials or requiring VPNs. ### Why Boundary MCP? - **Zero Trust Security**: Authenticate and authorize every access request individually - **Credential-Free Access**: Users never handle or see credentials for target systems - **Session Recording**: Record all sessions for security audit and compliance - **Dynamic Catalogs**: Automatically discover and catalog available targets - **Identity-Based Access**: Leverage existing identity providers for authentication ### Key Features #### 1. Target Access ```python # Connect to a target session = await mcp.connect( target_id="ttcp_1234567890", scope_id="o_1234567890" ) # Get connection details print(f"Local address: {session['address']}") print(f"Local port: {session['port']}") print(f"Session ID: {session['session_id']}") ``` #### 2. Target Discovery ```python # List available targets targets = await mcp.list_targets(scope_id="o_production") for target in targets: print(f"Target: {target['name']}") print(f" Type: {target['type']}") print(f" Address: {target['address']}") print(f" Port: {target['default_port']}") ``` #### 3. Session Management ```python # List active sessions sessions = await mcp.list_sessions(status="active") for session in sessions: print(f"Session {session['id']} - {session['target_name']}") print(f" Started: {session['created_time']}") print(f" User: {session['user_id']}") # Cancel a session await mcp.cancel_session(session_id="s_1234567890") ``` #### 4. Host Catalogs ```python # Browse host catalogs catalogs = await mcp.list_host_catalogs(scope_id="p_engineering") for catalog in catalogs: hosts = await mcp.list_hosts(host_catalog_id=catalog["id"]) print(f"Catalog: {catalog['name']} ({len(hosts)} hosts)") for host in hosts: print(f" - {host['name']}: {host['address']}") ``` ### Configuration ```json { "mcpServers": { "boundary": { "command": "npx", "args": ["-y", "@anthropic/mcp-boundary"], "env": { "BOUNDARY_ADDR": "https://boundary.yourcompany.com", "BOUNDARY_AUTH_METHOD_ID": "ampw_1234567890", "BOUNDARY_TOKEN": "your-auth-token" } } } } ``` ### Use Cases **Database Access**: Provide developers secure, audited access to production databases without exposing credentials or connection strings. **SSH Gateway**: Replace traditional bastion hosts with identity-aware SSH access that logs all sessions and commands. **Kubernetes Access**: Enable secure kubectl access to clusters without distributing kubeconfig files or certificates. **Third-Party Access**: Grant contractors and partners temporary, scoped access to specific resources with automatic expiration. The Boundary MCP enables zero-trust infrastructure access management directly within your development environment.
{
"mcpServers": {
"boundary": {}
}
}