Access Plane

Teleport Database Access

Consolidate access to PostgreSQL and MySQL databases running behind NAT, prevent data exfiltration, meet compliance requirements, and have complete visibility into access and behavior.

Get Started

terminal

Loading...

For DevSecOps

Secure your databases and meet compliance requirements

Implement industry best practices for database access with unified access plane: identity-based single sign-on, short-lived certificates, multi-factor authentication, RBAC and audit for all databases across all environments.

Secure your Infrastructure and Meet Compliance Requirements

Access Controls

Teleport offers all required access controls to implement compliance standards such as SOC2, PCI, and FedRAMP. This includes end-to-end encryption, idle session controls, RBAC, and others.

Access Workflows

Users can request elevated privileges to complete sensitive tasks. Their requests can be approved or denied via Slack, PagerDuty, or customized workflow via the programmable API.

Consolidate access to all environments

For Developers

Access that doesn't get in the way

A single sign-on gives developers access to all databases behind NAT across all environments. There is no need to juggle multiple authentication methods across cloud providers or for jumping between VPNs.

Delightful Experience

A single login gives engineers instant secure access to all databases they need, ending the hassle of juggling multiple VPNs or rotating shared passwords.

Unified Database Catalog

Teleport allows developers to list all databases they have access to, across all environments, with a single CLI command or via a live view in a browser.

Unified Connectivity

Teleport automatically routes client connections to databases behind NAT, cloud VPCs, edge networks, even to mobile IoT platforms!

Audit Log

Complete visibility into access and behavior

Teleport Database Access keeps an audit log of database access events across all environments, making it easy to see what is happening and who is responsible.

Database Access

Audit Log

Commands executed within session are to user identities and sent to a centralized destination of choice such as SIEM solutions.

Live Session View

Administrators can see all live client sessions across all databases, getting an instant picture of what is happening.

Demo Video

Demo Video

Works with everything you have

Teleport Database Access is open source and it relies on open standards such as X.509 certificates, HTTPS, SAML, OpenID connect and others. Deployed as a single-binary it seamlessly integrates with the rest of your stack.

Puppet
Puppet
Google Cloud
Google Cloud
AWS
Amazon
Linux
Linux
Azure
Azure
Chef
Chef
Okta
Okta
Free BSD
Ansible
One Login
One Login
Auth0
Auth0
Windows
Active Directory
Kubernetes
Kubernetes

Easy to get started

Teleport is easy to deploy and use. We believe that simplicity and good user experience are key to first-class security.

Teleport consists of just two binaries.

  1. The tsh client allows users to login to retrieve short-lived certificates.
  2. The teleport agent can be installed on any server or any Kubernetes cluster with a single command.
# on a client
$ tsh login --proxy=example.com

# on a server
$ apt install teleport

# in a Kubernetes cluster
$ helm install

Trusted by leading organizations

Our vision for the future

We are trying to solve the problem every company has - how to run and access software running anywhere in a secure and compliant manner. We call this environment-free computing.

Learn more

Try Teleport today

In the cloud, self-hosted, or open source

View developer docs

This site uses cookies to improve service. By using this site, you agree to our use of cookies. More info.