Fork me on GitHub


Protect Applications with Teleport


Teleport is designed to provide secure access to cloud provider APIs and internal applications. Examples include:

  • The AWS management console.
  • The aws, gcloud, gsutil, and az CLIs.
  • Internal control panels.
  • Tools, such as wikis, that are available only when connected to a VPN.
  • Infrastructure dashboards, such as Kubernetes or Grafana.
  • Developer tools, such as Jenkins, GitLab, or Opsgenie.


Getting started

Learn how to register an application with Teleport in our getting started guide.

Protect cloud provider APIs

You can use Teleport to provide secure access to your cloud provider's APIs. This means that you can prevent unauthorized usage of management consoles and CLI tools with the same RBAC system you use to protect your infrastructure.

Protect internal applications

You can use Teleport to enable secure access to internal applications. For example, a load balancer might display network telemetry through a control panel but might lack the ability to authenticate with and be accessed by resources outside your private network.

Teleport lets team members access these resources securely, even outside a private network, with no shared secrets.

These guides explain how to protect internal applications with Teleport:

Use Teleport-signed JSON Web Tokens

These guides explain how web apps registered with Teleport can use Teleport-signed JSON web tokens to implement authentication and authorization.

  • Introduction: Introduction to JWT tokens with application access.
  • Elasticsearch: How to use JWT authentication with Elasticsearch.