Teleport Access Platform protocols
SSH securely into Linux servers and smart devices with a complete audit trail
Access Kubernetes clusters securely with complete visibility to access and behavior
For PostgreSQL and MySQL databases behind NAT in multiple environments
Access web applications running behind NAT and firewalls with security and compliance
Securely access Windows servers and desktops in multiple environments.
An overview of Teleport Access Plane features, capabilities and more...
Learn how Financial Services companies use Teleport
Software-as-a-service (SaaS) Providers
Learn how SaaS providers use Teleport
E-commerce & Entertainment
Learn how E-commerce & Entertainment companies use Teleport
Infrastructure Access for AWS
Easily control who can provision and access your critical AWS resources
Privileged Access Management
Secure your critical infrastructure without slowing developers down
Machine ID delivers automated, identity-based access for your services
Teleport Connect improves UX and identity-based access for the cloud
Passwordless Infrastructure Access
Instantly login to all your computing infrastructure using Passwordless
Installation and Teleport user guides
How It Works
Learn the fundamentals of how Teleport works
Get hands on experience with Teleport
Ask us a setup question, post your tutorial, feedback or idea on our forum
Teleport Slack Channel
Need help with set-up? Ping us in Slack channel
View the open source repository on Github
Learn More About Teleport
Technical articles, news, and product announcements
Learn how companies use Teleport to secure their environments
A collection of whitepapers, webinars, demos, and more...
View our upcoming events
What is SSH?
Learn the basics of SSH and how it's used to Access Infrastructure
Our missions and vision for the future
View our available career opportunities
Featured publication from around the web
Sign in to Teleport
Teleport Cloud Login
Login to your Teleport Account
Legacy Login & Teleport Enterprise Downloads
Article & News
Articles by topic applications
Sep 27, 2022
By Victor Elezua
What Are JWTs?
In this blog post, we'll deep-dive into JSON web tokens (JWTs), how JWTs work and how to implement them securely.
Articles by topic