Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Backport of docs: Update meta content - Overview into release/0.18.x #5237

Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 2 additions & 1 deletion website/content/docs/overview/use-cases.mdx
Original file line number Diff line number Diff line change
@@ -1,7 +1,8 @@
---
layout: docs
page_title: Use cases
description: A list of Boundary use cases
description: >-
Learn how HashiCorp Boundary can help you with zero trust access, multi-cloud access, single-sign on with integrated secrets management, and session monitoring.
---

# Use cases
Expand Down
3 changes: 2 additions & 1 deletion website/content/docs/overview/vs/bastion-hosts.mdx
Original file line number Diff line number Diff line change
@@ -1,7 +1,8 @@
---
layout: docs
page_title: Boundary vs. bastion hosts
description: Compares Boundary to bastion hosts
description: >-
Learn how Boundary compares to bastion hosts by providing tightly controlled, just-in-time access to infrastructure using role-based access controls (RBAC).
---

# Boundary vs. bastion hosts
Expand Down
3 changes: 2 additions & 1 deletion website/content/docs/overview/vs/other-software.mdx
Original file line number Diff line number Diff line change
@@ -1,7 +1,8 @@
---
layout: docs
page_title: Boundary vs. other software
description: Compares Boundary to other security technologies
description: >-
Learn how HashiCorp Boundary compares to other security technologies.
---

# Boundary vs. other software
Expand Down
3 changes: 2 additions & 1 deletion website/content/docs/overview/vs/pam.mdx
Original file line number Diff line number Diff line change
@@ -1,7 +1,8 @@
---
layout: docs
page_title: Boundary vs. privileged access management
description: Compares Boundary to using a privileged access management (PAM) solution
description: >-
Learn how Boundary compares to privileged access management (PAM) solutions by providing automation for user and credential management and service discovery.
---

# Boundary vs. privileged access management
Expand Down
3 changes: 2 additions & 1 deletion website/content/docs/overview/vs/sdp.mdx
Original file line number Diff line number Diff line change
@@ -1,7 +1,8 @@
---
layout: docs
page_title: Boundary vs. software-defined perimeter
description: Compares Boundary to using a software-defined perimeter solution
description: >-
Learn how Boundary compares to software-defined perimeter (SDP) tools using dynamic credentials, context-based access, automated host discovery, and auditing.
---

# Boundary vs. software-defined perimeter
Expand Down
3 changes: 2 additions & 1 deletion website/content/docs/overview/vs/secrets-management.mdx
Original file line number Diff line number Diff line change
@@ -1,7 +1,8 @@
---
layout: docs
page_title: Boundary vs. secrets management tools (HashiCorp Vault, AWS Secrets Manager, Azure Key Vault, etc.)
description: Compares Boundary to using secrets management tools (HashiCorp Vault, AWS Secrets Manager, Azure Key Vault, etc.)
description: >-
Learn how Boundary compares to secrets management tools and how it can compliment them to provide identity-based access, automated host discovery, and auditing.
---

# Boundary vs. secrets management tools (HashiCorp Vault, AWS Secrets Manager, Azure Key Vault, etc.)
Expand Down
3 changes: 2 additions & 1 deletion website/content/docs/overview/vs/vpn.mdx
Original file line number Diff line number Diff line change
@@ -1,7 +1,8 @@
---
layout: docs
page_title: Boundary vs. VPNs
description: Compares Boundary to using a virtual private network (VPN)
description: >-
Learn how Boundary compares to VPNs by using an Identity Provider (IdP) to grant users remote access to specific permitted services, but not the entire network.
---

# Boundary vs. VPNs
Expand Down
3 changes: 2 additions & 1 deletion website/content/docs/overview/vs/zero-trust.mdx
Original file line number Diff line number Diff line change
@@ -1,7 +1,8 @@
---
layout: docs
page_title: Boundary and zero trust
description: Describes how Boundary applies to a zero trust security approach
description: >-
Learn how Boundary enables a zero trust approach to security in which all access transactions are authenticated and authorized based on trusted identity.
---

# Boundary and zero trust
Expand Down
3 changes: 2 additions & 1 deletion website/content/docs/overview/what-is-boundary.mdx
Original file line number Diff line number Diff line change
@@ -1,7 +1,8 @@
---
layout: docs
page_title: What is Boundary?
description: An introduction to Boundary
description: >-
HashiCorp Boundary is a secure remote access solution that you can use to configure least-privileged, just-in-time access to systems, services, and applications.
---

# What is Boundary?
Expand Down
Loading