Teleport Launches Identity Governance and Security
Read More
Background image

Secretless Database Access

The easiest, most secure way to access data

Secure, compliant, and effortless Database Access for all DBs from Amazon Aurora to Snowflake

Get Started
Logo for GoogleLogo for NASDAQLogo for Moody'sLogo for SamsungLogo for HPLogo for IBM

Prevent phishing attacks

Move away from vulnerable keys and passwords towards auto-expiring certificates for users and service accounts to access databases.

Meet compliance requirements

Continuously maintain compliance and pass audits with minimal effort. The supported standards include SOC 2, FedRAMP, HIPAA, ISO 27001, PCI and more.

Complete visibility into access and behavior

See what’s happening and who is responsible with the live session view, and the consolidated audit log across all databases.

Free yourself from network boundaries

You can access databases running anywhere. From clouds and data centers to third party private networks behind NAT and firewalls.

Access that doesn't get in the way

Login once and easily switch between environments. No need to juggle passwords or hop between VPNs.

Break access silos

Reduce overhead by consolidating database access permissions in one place. Easily enforce policy for engineers and service accounts across all environments.


SSO for all databases

SSO lets you quickly onboard and off-board your team. Teleport works with any SAML or OIDC SSO Provider.

FIPS mode

Avoid human errors by enforcing only configuration options that are compliant with FIPS 140-2

Service accounts

Automatically issue and rotate certificates for CI/CD automation with the Machine ID feature.

Access requests

Move away from privileged accounts with just-in-time temporary privilege escalation.

Session controls

Moderated sessions, concurrent session restrictions, proactive session termination, and identity locking.

Trusted devices catalog

Automatic live catalog of trusted servers, trusted laptops and workstations.

Auto discovery

Automatically discover and enroll unprotected databases across all cloud environments.

Developer friendly

Support for all GUIs: pgAdmin, PopSQL, DBeaver, MySQL Workbench, MS SQL Management Studio and more.

Query visibility

Native query logging provides a way to inspect and audit queries, enabling complete query visibility.

Cloud & Self-hosted

Support for cloud databases on AWS, Azure or GCP, as well as popular self-hosted databases.

Works with everything you have

Teleport supports most popular databases: MySQL, PostgreSQL, MongoDB, Oracle, ElasticSearch, AWS RedShift, AWS DynamoDB, and more.





Amazon RDS

Amazon Aurora

Amazon Redshift


MongoDB Atlas








...and many more

How it works

Teleport is a certificate authority and identity-aware, multi-protocol access proxy which implements protocols such as SSH, RDP, HTTPS, Kubernetes API, and a variety of SQL and NoSQL databases. It is completely transparent to client-side tools and designed to work with everything in today's DevSecOps ecosystem.

Teleport Components

  • Teleport Auth Service: The certificate authority of the cluster. It issues certificates to clients and maintains the audit log.
  • Teleport Proxy Service: The proxy allows access to cluster resources from the outside. Typically it is the only service available from the public network.
  • Teleport Agents: A Teleport agent runs in the same network as a target resource and speaks its native protocol, such as the SSH, Kubernetes API, HTTPS, PostgreSQL, and MySQL wire protocols. Think of a "smart sidecar" that routes user requests to its target resource.
Background image

Database Demo

Background image

Try Teleport today

In the cloud, self-hosted, or open source.
View developer docs

Get Started