Teleport Access Platform protocols
SSH securely into Linux servers and smart devices with a complete audit trail
Access Kubernetes clusters securely with complete visibility to access and behavior
For SQL and NoSQL databases across multi-environments
Access web applications running behind NAT and firewalls with security and compliance
Securely access Windows servers and desktops in multiple environments.
An overview of Teleport Access Plane features, capabilities and more...
Learn how Financial Services companies use Teleport
Software-as-a-service (SaaS) Providers
Learn how SaaS providers use Teleport
E-commerce & Entertainment
Learn how E-commerce & Entertainment companies use Teleport
Infrastructure Access for AWS
Easily control who can provision and access your critical AWS resources
Privileged Access Management
Secure your critical infrastructure without slowing developers down
Machine ID delivers automated, identity-based access for your services
Teleport Connect improves UX and identity-based access for the cloud
Passwordless Infrastructure Access
Instantly login to all your computing infrastructure using Passwordless
Installation and Teleport user guides
How It Works
Learn the fundamentals of how Teleport works
Get hands on experience with Teleport
Ask us a setup question, post your tutorial, feedback or idea on our forum
Teleport Slack Channel
Need help with set-up? Ping us in Slack channel
View the open source repository on Github
Learn More About Teleport
Technical articles, news, and product announcements
Learn how companies use Teleport to secure their environments
A collection of whitepapers, webinars, demos, and more...
View our upcoming events
What is SSH?
Learn the basics of SSH and how it's used to Access Infrastructure
Our missions and vision for the future
View our available career opportunities
Featured publication from around the web
Sign in to Teleport
Teleport Cloud Login
Login to your Teleport Account
Legacy Login & Teleport Enterprise Downloads
Try out Teleport
Deploy a Cluster
Manage your Cluster
Upgrading the Teleport Binary
Run Teleport as a Daemon
Run Teleport with Self-Signed Certificates
Upgrading a Cluster
Backup and Restore
Cert Authority Rotation
TLS Routing Migration
Proxy Peering Migration
Reducing the Blast Radius of Attacks
Kubernetes Operator (Preview)
Monitor Audit Events with the Elastic Stack
Joining Nodes via AWS IAM
Joining Nodes via AWS EC2
Using Teleport's CA with GitHub
Connect your Client
Monitoring your Cluster
: How to monitor the health of a Teleport instance.
: How to enable exporting Prometheus metrics.
: How to collect runtime profiling data from a Teleport instance.
: How to enable distributed tracing for a Teleport instance.
Have a suggestion or can’t find something?
IMPROVE THE DOCS