# Teleport Identity Security

- [How to use Teleport Identity Security](https://goteleport.com/docs/ver/17.x/identity-security/policy-how-to-use.md): Using Access Graph with Identity Security.
- [See permission changes with Access Graph Crown Jewels](https://goteleport.com/docs/ver/17.x/identity-security/crown-jewels.md): Describes how to use Access Graph Crown Jewels to see permission changes in Teleport.
- [Self-Hosting Teleport Access Graph (section)](https://goteleport.com/docs/ver/17.x/identity-security/access-graph.md): Explains how to deploy Access Graph alongside a self-hosted Teleport cluster.
- [Teleport Identity Security](https://goteleport.com/docs/ver/17.x/identity-security/teleport-policy.md): A reference for Access Graph with Identity Security.
- [Teleport Identity Security Connections](https://goteleport.com/docs/ver/17.x/identity-security/policy-connections.md): Connections in Access Graph with Identity Security.
- [Teleport Identity Security Integrations (section)](https://goteleport.com/docs/ver/17.x/identity-security/integrations.md): Integrations in Access Graph with Identity Security.
