Skip to content
Open
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
6 changes: 3 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@

<img alt="Boundary" src="boundary.png" alt="Image" width="500px"/>

Boundary is an identity-aware proxy that provides a simple, secure way to access hosts and critical systems on your network.
Boundary is an identity-aware proxy that provides a simple and secure way to access hosts and critical systems on your network.

With Boundary you can:

Expand All @@ -34,7 +34,7 @@ For more information, refer to "[What is Boundary?](https://developer.hashicorp.

Boundary consists of two server components:

* **Controller**, which serves the API and coordinate session requests
* **Controller**, which serves the API and coordinates session requests
* **Workers**, which perform session handling

A real-world Boundary installation will likely consist of one or more
Expand All @@ -46,7 +46,7 @@ authorized sessions to resources across a network.

<img src="boundary_desktop_example.gif" alt="Boundary Desktop GIF" width="66%" height="66%" loop="true">

Boundary does _not_ require software to be installed on your hosts and services.
Boundary does _not_ require any software to be installed on your hosts and services.

## Requirements

Expand Down