Teleport Access Modules

Access Your Infrastructure

Teleport delivers phishing-proof zero trust for every engineer and service connected to your global infrastructure. Explore all the infrastructure resources you can protect with Teleport.

Fingerprint graphic
Access Module

Secure Shell SSH

Control SSH access into Linux and smart devices from a single source of truth using Teleport. With Teleport’s SSH Access Module you can:

  • See all live interactive SSH sessions across your entire infrastructure
  • Easily join another user’s session for pair programming or debugging
  • Enhanced session recordings based on BPF events so all system calls are captured for a complete audit trail
Access Module

Kubernetes

Centrally manage Kubernetes access using identity rather than shared secrets across all environments. With Teleport’s Kubernetes Access Module you can:

  • Move away from admin accounts with just-in-time Kubernetes privilege escalation for administrative tasks
  • Gain visibility on all actions performed and executed in a K8s pod with full session recordings
  • Works with popular K8s IDE providers like Lens and Rancher
Access Module

Databases

Move away from shared admin accounts with identity-based access to databases on prem or in the cloud. With Teleport’s Database Access Module you get:

  • Query level visibility for all database infrastructure on prem or in the cloud
  • Support for cloud databases such as Amazon RDS and Aurora, GCP Cloud SQL, and MongoDB Atlas as well as self-hosted databases. See a complete list of supported databases
  • Popular database client integrations like pgAdmin, DBeaver, Workbench, Compass and more
Access Module

Internal Applications

Easily provide controlled role-based access to your critical internal applications like AWS Management Console, CI/CD pipelines, monitoring dashboards, and other internal applications without relying on a VPN or secrets vault. With Teleport’s Application Access Module you can:

  • Instantly provision and deprovision access to internal DevOps tooling to new team members or new cloud environments
  • Puts the entire DevOps toolbox at your fingertips without having to deal with numerous login prompts for a better developer experience.
  • Easily implement unified role-based access controls (RBAC) across all internal web applications using JWT tokens.
Access Module

Windows

Manage access to one Windows system or hundreds with Teleport even if you don’t use Active Directory. With Teleport’s Windows Access Module you can:

  • Easily copy text between the clipboard on a client and a remote Windows machine
  • Instantly share directories and files from your local client with no manual upload or download and all from your browser
  • Control Windows sharing and access through RBAC
  • Teleport allows us to comply with the regulatory hurdles that come with running an international stock exchange. The use of bastion hosts, integration with our identity service and auditing capabilities give us a compliant way to access our internal infrastructure.

    Brendan Germain

    Systems Reliability Engineer, Nasdaq

  • Audit and recorded sessions in Teleport give us an understanding of exactly what was happening at any given moment. This is incredibly critical from a security and compliance perspective.

    Mario Loria

    Senior Site Reliability Engineer II, Carta

  • Teleport Access Requests changed the game in simplifying our infrastructure access for various compliances. It's led to more freedom and innovation by allowing us to move away from pre-defined root accounts. We have been extremely happy with the product.

    Erik Redding

    Director, Site Reliability Engineering, Elastic

  • Teleport has made obtaining a FedRAMP-Moderate ATO that much more achievable via their FIPS 140-2 endpoints, ease in integration with our SSO and MFA , and the view into audit logs of remote connection sessions provide the appropriate insight for Continuous Monitoring.

    Jeff Gill

    Senior Director of Engineering, SumoLogic

  • Speed is key to our business. But so is security. The Teleport Access Plane allows our engineers to securely access the infrastructure they need to do their jobs without getting in the way of productivity. Everybody wins.

    Luke Christopherson

    Software Engineer, DoorDash

Works with everything you have

Our vision for Teleport Terminal is to become the universal user interface for everything in the cloud. Below is the list of the resources it supports, and we’ll be adding new protocols quickly:

Amazon

Google Cloud

Azure

Linux

Windows

Chef

Okta

Active Directory

Puppet

OneLogin

Kubernetes

Ansible

...and many more

Terminal
# on a client$ tsh login --proxy=example.com
# on a server$ apt install teleport
# in a Kubernetes cluster$ helm install

Easy to get started

Teleport is easy to deploy and use. We believe that simplicity and good user experience are key to first-class security.

Teleport consists of just two binaries.

  1. The tsh client allows users to login to retrieve short-lived certificates.
  2. The teleport agent can be installed on any server or any Kubernetes cluster with a single command.
Download Teleport

Try Teleport today

In the cloud, self-hosted, or open source.
View developer docs

Get Started
pam