We recently launched Teleport 4.3 and received an overwhelming response from newer members of the community. They have requested that we go back and explain from the start what Teleport is and why it is better than using the built-in SSH machinery that comes with every Linux or BSD distribution.
What is Teleport?
Teleport is an open source Linux server that allows you to easily implement SSH best practices. We have covered SSH best practices using OpenSSH on our blog before. And while OpenSSH is the de-facto standard, it requires significant expertise and time commitment to do the following:
- Move away from SSH keys to SSH certificates - the benefits of SSH certificates are hard to ignore, especially as your infrastructure and your team continue to grow
- Set up SSH bastions, AKA jump hosts
- Single sign-on (SSO) with an identity provider like Github, Google or Active Directory
- Centralized audit log with SSH session recording
- Synchronize SSH access with Kubernetes access because you do not want users to bypass K8s security simply by using SSH
- Connect to edge devices via SSH
Teleport does all of the above out of the box, by default, and with minimal configuration. We have recorded a 5-minute demo video to show how this works.
Teleport cybersecurity blog posts and tech news
Every other week we'll send a newsletter with the latest cybersecurity news and Teleport updates.
Teleport 4.3 demo
In the video below, you will see how to:
- Download Teleport
- Receive an SSH certificate using Github as an authentication provider
- Get SSH access using the command line
- Get SSH access via the browser
- Explore the audit log, including the recorded sessions
- SSH into a Raspberry Pi which is running on a cellular network
You can just hit “play” or proceed to the Quick Start Guide and do all of the above yourself. It only takes 30 minutes to get up and running:
Download Teleport and try it for yourself!
TLS Routing Support for Teleport Behind an AWS Application Load Balancer
By Steve Huang
What’s New in Teleport 11
By Kenneth DuMez
A Simple Overview of Authentication Methods for Kubernetes Clusters
By Tiago Silva