Teleport Demo Video - Modern SSH
Jul 16, 2020 by
We recently launched Teleport 4.3 and received an overwhelming response from newer members of the community. They have requested that we go back and explain from the start what Teleport is and why it is better than using the built-in SSH machinery that comes with every Linux or BSD distribution.
What is Teleport?
Teleport is an open source Linux server that allows you to easily implement SSH best practices. We have covered SSH best practices using OpenSSH on our blog before. And while OpenSSH is the de-facto standard, it requires significant expertise and time commitment to do the following:
- Move away from SSH keys to SSH certificates - the benefits of SSH certificates are hard to ignore, especially as your infrastructure and your team continue to grow
- Set up SSH bastions, AKA jump hosts
- Single sign-on (SSO) with an identity provider like Github, Google or Active Directory
- Centralized audit log with SSH session recording
- Synchronize SSH access with Kubernetes access because you do not want users to bypass K8s security simply by using SSH
- Connect to edge devices via SSH
Teleport does all of the above out of the box, by default, and with minimal configuration. We have recorded a 5-minute demo video to show how this works.
Teleport cybersecurity blog posts and tech news
Every other week we'll send a newsletter with the latest cybersecurity news and Teleport updates.
Teleport 4.3 demo
In the video below, you will see how to:
- Download Teleport
- Receive an SSH certificate using Github as an authentication provider
- Get SSH access using the command line
- Get SSH access via the browser
- Explore the audit log, including the recorded sessions
- SSH into a Raspberry Pi which is running on a cellular network
You can just hit “play” or proceed to the Quick Start Guide and do all of the above yourself. It only takes 30 minutes to get up and running:
Download Teleport and try it for yourself!
Teleport at KubeCon + CloudNativeCon Europe 2023
By Travis Rodgers
Going Beyond Network Perimeter Security by Adopting Device Trust
By Alan Parra
Getting Rid of Shared Secrets: The Major Design Flaw of All CI Systems
By Noah Stride