According to a quick start tutorial on Hashicorp's gituhb page a demo postgres database target is deployed. Vault server is then configured using the database secrets engine and policies allowing Boundary to request credentials for two roles, a DBA and an "analyst". Boundary DBA and analyst targets are configured using a credential store that contains credential libraries for both targets. This enables credential brokering via Vault, which is demonstrated using the boundary connect postgres command.
Instead of running the commands imperatively use Ansible, Docker-Compose, and Terraform to do the Job for You.
According to a quick start tutorial on Hashicorp's gituhb page a demo postgres database target is deployed. Vault server is then configured using the database secrets engine and policies allowing Boundary to request credentials for two roles, a DBA and an "analyst". Boundary DBA and analyst targets are configured using a credential store that contains credential libraries for both targets. This enables credential brokering via Vault, which is demonstrated using the boundary connect postgres command.
Instead of running the commands imperatively use Ansible, Docker-Compose, and Terraform to do the Job for You.