Simplifying Zero Trust Security for AWS with Teleport
Jan 23
Virtual
Register Now
Teleport logo

Home - Teleport Blog - Three Little-Known Features in Teleport That I Wish Everyone Knew - Dec 30, 2021

Three Little-Known Features in Teleport That I Wish Everyone Knew

by Steven Martin

Three Little-Known Features in Teleport

As a solution architect at Teleport, I help potential customers get up and running with Teleport, but I am also a power user myself. In my time here, I have picked a few favorite features to help me be more efficient using Teleport, but they aren't as widely known as they should be. This article hopes to change that and give some love to three little-known features that can enhance your usage of Teleport. I use them every day and hope that after reading this blog, you will too.

Portable credentials

Do you only use one device to do your job? I don't. I am constantly accessing different machines. That might mean my laptop, a machine that I am not accessing via Teleport, or maybe a machine from which I want to execute an API call to a teleport ssh node.

How does this work with Teleport? Simple. The Teleport CLI tsh ssh does not have to be limited only to your dev machine. You can issue your own single certificate file to use on multiple machines for SSH and Kubernetes access from one login. On your desktop, Teleport will store your short-lived certificate files under the ~/.tsh folder. In addition to the command tsh login --proxy=xyz add the -o file.pem to store the single PEM file.

tsh login --proxy=teleport.example.com -o steven.pem

Now that same certificate you use locally can be copied to another machine and used directly as so.

tsh ssh -i steven.pem --proxy=teleport.example.com steven@mynode1
mynode1$

The same time-based and other restrictions apply as this is the same certificate-based approach. For tsh you can add the parameter --ttl=1h to limit the time of the credentials to an hour vs. the 8 hours your default might be. Any time-based cert is more secure than static keys that do not expire. So you're able to leverage Teleport where you need to — not just your desktop and web console.

Bookmarking session replays

You've probably heard of Teleport session recordings. Privileged session recording, or SSH session recording, means recording the user’s actual screen during their SSH session for real-time or later playback (we also log actions at the sys call level so a user can't mask commands). This is useful for both education/training purposes, or as part of an audit. Well, what if you want to come back to a session you have already watched? Sessions you play within the Teleport web console are bookmarkable, so they are easy to return to and share. When you play a session in Teleport, it uses the URL pattern:

https://<proxy address>/web/cluster/<clustername>/session/<session-id>/player

So if your proxy address is teleport.example.com, your clustername west, and a session-id 84b8a83e-061b-4388-97f1-c65ccd757618 that equates to:

https://teleport.example.com/web/cluster/west/session/84b8a83e-061b-4388-97f1-c65ccd757618/player

Teleport will enforce role-based access to sessions so you're not leaking sessions by sharing the URL. This URL pattern is helpful when using a SIEM where you can feed the Teleport Audit log to provide direct URLs to session playback.

session player
session player

One last tip: the session is replayable from the CLI via tsh play <sessionid>.

Multiple proxy addresses

In addition to having a Fully Qualified Domain Name (FQDN) like teleport.example.com you can enable multiple addresses like internal.example.com. That’s useful especially for connecting agents through another FQDN rather than authenticating as a different user. Or if you're transitioning from one proxy address to another, you can have both available.

To set multiple addresses, simply have your list of addresses instead of a single address. Note that you'll need TLS certs.

proxy_service:
  public_addr:
    - teleport.example.com:443
    - internal.example.com:443
  https_keypairs:
    - key_file: /var/lib/teleport/webproxy_key.pem
      cert_file: /var/lib/teleport/webproxy_cert.pem
    - key_file: /var/lib/internal/webproxy_key.pem
      cert_file: /var/lib/internal/webproxy_cert.pem

One related point here is that public addresses are not required to be available on the internet. Teleport can run seamlessly in private dnses and airgapped environments. The usage of the public tag in Teleport configurations as below can lead folks to think that Teleport requires being on the public internet. That's just the address for users and agents to connect to. Use your private DNS and TLS certificates as with any internal solution.

Teleport cybersecurity blog posts and tech news

Every other week we'll send a newsletter with the latest cybersecurity news and Teleport updates.

Conclusion

I hope these little-known features are helpful in enhancing your usage of Teleport. More useful tidbits are available in Teleport docs such as the CLI reference and the config file reference. You can download the free OSS version of Teleport here, join our community slack, or get involved on GitHub discussions.

Tags

Teleport Newsletter

Stay up-to-date with the newest Teleport releases by subscribing to our monthly updates.

background

Subscribe to our newsletter

PAM / Teleport