

Turo is the world’s largest peer-to-peer car-sharing marketplace, enabling millions of hosts and guests to connect through a trusted mobility platform. Following the company’s expansion across North America and Europe, its engineering organization now operates a complex environment spanning Amazon Web Services (AWS), Kubernetes, databases, internal tools, and developer-facing services.
To continue scaling reliably and securely, Turo’s platform engineering group focused on improving developer experience, optimizing costs, and strengthening security posture while ensuring engineers could access critical infrastructure quickly and safely.
Teleport became a key enabler of this strategy: providing identity-first, Zero Trust access to Turo’s internal databases and laying the foundation for unified access across the company’s infrastructure.
Turo faced an urgent infrastructure access challenge when its previous provider, Cyral, was acquired and scheduled for shutdown. Platform engineering needed to replace Cyral’s database access flow before the service went offline.
At the same time, Turo was pursuing broader goals:
Before Teleport, database access required managing tokens, copying connection strings from a web portal, and configuring each database individually — creating inconsistency and slowing engineers down. With a hard September cutoff from Cyral, the team needed a secure, quick-to-deploy replacement that aligned with Zero Trust principles.
Our goal was to give engineers secure, easy access to what they need daily — without friction.
After evaluating several solutions, Turo selected Teleport’s Infrastructure Identity Platform based on three factors:
1. Rapid, Seamless Deployment
During the proof of concept, Teleport was fully deployed and connected to Turo’s MySQL environments in under two hours. Teleport’s fast time to value stood in stark contrast to prior tools that required complex configuration and maintenance.
Everything was up and running in two hours. From setup to permissions to on-call integrations — the experience was very smooth.
2. Zero Trust, Identity-First Access
Teleport replaced static database credentials with cryptographic identity and ephemeral privileges governed by short-lived certificates, eliminating the need for passwords, tokens, and long-lived secrets. This approach is the foundation
3. Seamless Integration with Existing Infrastructure
Teleport integrated cleanly with Turo’s environment:
Turo also built tagging and group-based policies in Teleport to ensure engineers received correct permissions without manual intervention.
Faster, Simpler Access for Developers
Teleport drastically simplified how engineers connect to MySQL databases:
This eliminated time-consuming token workflows and reduced friction across teams.
It’s much easier to connect now. You authenticate once in Teleport, and your IDE just works.
Operational Efficiency Through Identity-First Access
Teleport allowed Turo to centralize access logic using Okta groups, resource tagging, and auto-provisioned permissions. On-call engineers now receive instant, temporary access via PagerDuty — without manual approvals. This shift aligns to Teleport’s core principles of ephemeral privileges, unified access control, and zero credentials.
It was very easy to plug in almost any application. Permissions and access requests are much easier to manage.
Improved Visibility and Auditability
Teleport provides identity-linked visibility into access activity. While Turo is early in its audit cycles, Teleport already supports its compliance workflows through centralized audit logs, session metadata, and integration with existing log pipelines.
With Teleport successfully powering MySQL access, Turo now plans to extend Zero Trust
access to more infrastructure. Turo is expanding Teleport across additional infrastructure
systems to strengthen security and simplify access end-to-end:
As Turo continues to scale globally, Teleport’s Infrastructure Identity Platform will serve
as a foundation for secure, efficient engineering operations.
HQ
Industry