Skip to main content

Applications

The guides in this section explain how to protect applications with Teleport by deploying the Teleport Application Service.

It is also possible to enroll applications in your cluster by deploying the Teleport SAML identity provider and configuring the applications as service providers. For more information, read Configure Teleport as an identity provider.

Getting started

Guides

Configuration & management

Troubleshooting & support

  • Troubleshooting: Describes common issues and solutions for access to applications protected by Teleport.