Teleport Connect 2023
Oct 25
San Francisco, CA
Register
Background image

Secretless SSH

The easiest, most secure way to SSH

Prevent phishing attacks, meet compliance requirements, maintain a live catalog of all trusted devices, and have complete visibility into live and past sessions.

Get Started

Trusted by Leading Security Teams Around the World

Logo for GoogleLogo for NASDAQLogo for Moody'sLogo for SamsungLogo for HPLogo for IBM

Eliminate Passwords

Ensure infrastructure remains secure with measures to prevent phishing attacks.

Short-Lived Certificates

Replace passwords, static credentials, and stale keys with short-lived certificates bound with proof of presence and device trust.

Trusted Device Enforcement

Prevent lateral movement by limiting access to trusted devices and requiring proof of presence.

Background image

Automate Access Requests

Streamline access management, reduce the attack surface, and enforce the principle of least privilege.

Automated User Provisioning

Automate provisioning of users and groups with Single-Sign-On IDP connectors.

Privilege Elevation Requests

Implement the principle of least privilege with Just-in-Time Access Requests for temporary elevated privileges.

Achieve Compliance

Achieve compliance with access controls and auditing tools tailored for SOC2, FedRAMP, HIPAA, ISO, PCI, and SOX.

Audit and Accountability

Continuously monitor with Teleport's Audit Logging and Session Recording capabilities, providing a complete record of all user activity.

Enforce Access Policies

Deploy Role-Based Access Controls (RBAC) with features like dual authorization, per-session MFA, moderated sessions, hardware key enforcement, and advanced session restrictions.

Background image

200%

risk reduction

Logo

Teleport's use of identity instead of credentials will, as demonstrated, reduce this risk by 200% compared to that posted by static credentials.

Gain Enhanced Visibility

Gain clear insights into user access and behavior to ensure compliance while proactively addressing security events.

Enhanced Session Recording with BPF

Kernel-level module for enhanced logging and capture of CLI user activities (obfuscation, shell scripts, and terminal controls).

Export Audit Events to Any SIEM

Leverage Teleport’s audit events in your SIEM. Export to DataDog, Elastic, Splunk, or any supported destination with our Fluentd plugin.

Access All Environments, Anywhere

Break free from restrictive network boundaries and manage devices irrespective of their location or network.

Zero Trust Networking

Direct and indirect network tunnels allow agents to access the Teleport Cluster from any internet-connected network securely.

Trusted and Federated Clusters

Enable secure SSH access across partitioned resources for remote management of multi-site deployments while protecting against lateral compromise movement.

Built for Engineers and Developers

Log in once, switch between environments, and avoid managing private keys or navigating multiple VPNs and access points.

Works With Everything You Have

Existing scripts and tools work seamlessly with the automatic provisioning of `.ssh/config` profiles.

Open Source APIs and SDKs

Integrate seamlessly with Terraform and Ansible. Extend capabilities using our gRPC API, or manage the cluster with our Go SDK.

Try Teleport today

In the cloud, self-hosted, or open source.
View developer docs

Get Started
pam

Features

SSO for SSH

Teleport can integrate with your SSO provider, or be an SSO provider itself.


Linux User Management

Teleport automatically creates users on Linux hosts and sets their permissions according to a central policy.


Device Trust

Restrict SSH access only to trusted laptops.


Session recording

Record interactive SSH sessions and watch them in YouTube-like interface


Session sharing

Moderated sessions require more than one person to join for highly privileged tasks.


RBAC for SSH

Restrict SSH access based on roles.


Machine to machine access

Issue and rotate SSH certificates for CI/CD automation with the Machine ID feature.


Access requests

Move away from privileged accounts with just-in-time temporary privilege escalation.


+ more

Works with everything you have

Teleport Server Access is open source and it relies on open standards such as X.509 certificates, HTTPS, SAML, OpenID connect and others. Deployed as a single-binary, it seamlessly integrates with the rest of your stack.

Logo for Amazon

Amazon

Logo for Google Cloud

Google Cloud

Logo for Azure

Azure

Logo for Linux

Linux

Logo for Windows

Windows

Logo for Chef

Chef

Logo for Okta

Okta

Logo for Active Directory

Active Directory

Logo for Puppet

Puppet

Logo for OneLogin

OneLogin

Logo for Kubernetes

Kubernetes

Logo for Ansible

Ansible

...and many more

Background image

SSH Demo

Try Teleport today

In the cloud, self-hosted, or open source.
View developer docs

Get Started
pam