Skip to main content

teleport Reference

Report an Issue

This guide provides a comprehensive list of commands, arguments, and flags for teleport.

teleport is the CLI tool that supports the Teleport Infrastructure Identity Platform, and allows Teleport services to be managed over the command line.

teleport <command> [<args> ...]

teleport app start

Start application proxy service.

Usage:

teleport app start [<flags>]

Flags:

FlagDefaultDescription
--auth-servernoneAddress of the auth server [127.0.0.1:3025].
--ca-pinnoneCA pin to validate the auth server (can be repeated for multiple pins).
-c, --confignonePath to a configuration file [/etc/teleport.yaml].
--cloudnoneSet to one of [AWS Azure GCP] if application should proxy particular cloud API
--diag-addrnoneStart diagnostic prometheus and healthz endpoint.
-d, --[no-]debugfalseEnable verbose logging to stderr.
--labelsnoneComma-separated list of labels for this node, for example env=dev,app=web.
--namenoneName of the application to start.
--[no-]fipsfalseStart Teleport in FedRAMP/FIPS 140 mode.
--[no-]insecurefalseInsecure mode disables certificate validation
--[no-]mcp-demo-serverfalseEnables the Teleport demo MCP server that shows current user and session information.
--[no-]no-debug-servicefalseDisables debug service.
--[no-]skip-version-checkfalseSkip version checking between server and client.
--pid-filenoneFull path to the PID file. By default no PID file will be created.
--public-addrnonePublic address of the application to proxy.
--tokennoneInvitation token or path to file with token value to register with an auth server [none].
--urinoneInternal address of the application to proxy.

teleport backend clone

Clones data from a source to a destination backend.

Usage:

teleport backend clone

teleport backend edit

Modify a single item from the cluster state backend.

Usage:

teleport backend edit <key>

Arguments:

ArgumentDefaultDescription
keynone (required)The backend key to retrieve.

teleport backend get

Retrieves a single item from the cluster state backend.

Usage:

teleport backend get [<flags>] <key>

Flags:

FlagDefaultDescription
-f, --formattextFormat output (text, json, yaml).

Arguments:

ArgumentDefaultDescription
keynone (required)The backend key to retrieve.

teleport backend ls

Lists the keys in the cluster state backend.

Usage:

teleport backend ls [<flags>] [<prefix>]

Flags:

FlagDefaultDescription
-f, --formattextFormat output (text, json, yaml).

Arguments:

ArgumentDefaultDescription
prefixnone (optional)An optional key prefix to limit listing to.

teleport backend rm

Removes a single item from the cluster state backend.

Usage:

teleport backend rm <key>

Arguments:

ArgumentDefaultDescription
keynone (required)The backend key to remove.

teleport configure

Generate a simple config file to get started.

Usage:

teleport configure [<flags>]

Flags:

FlagDefaultDescription
--acme-emailnoneEmail to receive updates from Letsencrypt.org.
--app-namenoneName of the application to start when using app role.
--app-urinoneInternal address of the application to proxy.
--auth-servernoneAddress of the auth server.
--cert-filenonePath to a TLS certificate file for the proxy.
--cluster-namenoneUnique cluster name, e.g. example.com.
--data-dir/var/lib/teleportPath to a directory where Teleport keep its data.
--join-methodtokenMethod to use to join the cluster (azure, azure_devops, bitbucket, circleci, ec2, gcp, github, gitlab, iam, kubernetes, spacelift, token, tpm, terraform_cloud, oracle, bound_keypair, env0)
--key-filenonePath to a TLS key file for the proxy.
--[no-]acmefalseGet automatic certificate from Letsencrypt.org using ACME.
--node-labelsnoneComma-separated list of labels to add to newly created nodes, for example env=staging,cloud=aws.
--node-namenoneName for the Teleport node.
--[no-]mcp-demo-serverfalseEnables the Teleport demo MCP server that shows current user and session information.
-o, --outputstdoutWrite to stdout with "--output=stdout", default config file with "--output=file" or custom path with --output=file:///path
--proxynoneAddress of the proxy.
--public-addrnoneThe hostport that the proxy advertises for the HTTP endpoint.
--rolesnoneComma-separated list of roles to create config with.
--testnonePath to a configuration file to test.
--tokennoneInvitation token or path to file with token value to register with an auth server.
--versionv3Teleport configuration version.

teleport db configure aws create-iam

Generate, create and attach IAM policies.

Usage:

teleport db configure aws create-iam [<flags>]

Flags:

FlagDefaultDescription
--assumes-rolesnoneComma-separated list of additional IAM roles that the IAM identity should be able to assume. Each role can be either an IAM role ARN or the name of a role in the identity's account.
--nameDatabaseAccessCreated policy name. Defaults to empty. Will be auto-generated if not provided.
--[no-]confirmfalseApply changes without confirmation prompt.
--rolenoneIAM role name to attach policy to. Mutually exclusive with --user
-r, --typesnoneComma-separated list of database types to include in the policy. Any of rds,rdsproxy,redshift,redshift-serverless,elasticache,elasticache-serverless,memorydb,keyspace,dynamodb,opensearch,docdb
--usernoneIAM user name to attach policy to. Mutually exclusive with --role

teleport db configure aws print-iam

Generate and show IAM policies.

Usage:

teleport db configure aws print-iam [<flags>]

Flags:

FlagDefaultDescription
--assumes-rolesnoneComma-separated list of additional IAM roles that the IAM identity should be able to assume. Each role can be either an IAM role ARN or the name of a role in the identity's account.
--[no-]policyfalseOnly print IAM policy document.
--policy-nameDatabaseAccessName of the Teleport Database agent policy. Default: "DatabaseAccess".
--rolenoneIAM role name to attach policy to. Mutually exclusive with --user
-r, --typesnoneComma-separated list of database types to include in the policy. Any of rds,rdsproxy,redshift,redshift-serverless,elasticache,elasticache-serverless,memorydb,keyspace,dynamodb,opensearch,docdb
--usernoneIAM user name to attach policy to. Mutually exclusive with --role

teleport db configure bootstrap

Bootstrap the necessary configuration for the database agent. It reads the provided agent configuration to determine what will be bootstrapped.

Usage:

teleport db configure bootstrap [<flags>]

Flags:

FlagDefaultDescription
--assumes-rolesnoneComma-separated list of additional IAM roles that the IAM identity should be able to assume. Each role can be either an IAM role ARN or the name of a role in the identity's account.
--attach-to-rolenoneRole name to attach policy to. Mutually exclusive with --attach-to-user. If none of the attach-to flags is provided, the command will try to attach the policy to the current user/role based on the credentials.
--attach-to-usernoneUser name to attach policy to. Mutually exclusive with --attach-to-role. If none of the attach-to flags is provided, the command will try to attach the policy to the current user/role based on the credentials.
-c, --config/etc/teleport.yamlPath to a configuration file [/etc/teleport.yaml].
--[no-]confirmfalseApply changes without confirmation prompt.
--[no-]manualfalseWhen executed in "manual" mode, it will print the instructions to complete the configuration instead of applying them directly.
--policy-nameDatabaseAccessName of the Teleport Database agent policy. Default: "DatabaseAccess".

teleport db configure create

Creates a sample Database Service configuration.

Usage:

teleport db configure create [<flags>]

Flags:

FlagDefaultDescription
--ad-domainnone(Only for SQL Server) Active Directory domain.
--ad-keytab-filenone(Only for SQL Server) Kerberos keytab file.
--ad-spnnone(Only for SQL Server) Service Principal Name for Active Directory auth.
--aws-account-idnone(Only for Keyspaces or DynamoDB) AWS Account ID.
--aws-assume-role-arnnoneOptional AWS IAM role to assume.
--aws-elasticache-group-idnone(Only for ElastiCache) ElastiCache replication group identifier.
--aws-elasticache-serverless-cache-namenone(Only for ElastiCache Serverless) ElastiCache Serverless cache name.
--aws-external-idnone(Only for AWS-hosted databases) Optional AWS external ID to use when assuming AWS roles.
--aws-memorydb-cluster-namenone(Only for MemoryDB) MemoryDB cluster name.
--aws-rds-cluster-idnone(Only for RDS Aurora) RDS Aurora database cluster identifier.
--aws-rds-instance-idnone(Only for RDS) RDS database instance identifier.
--aws-redshift-cluster-idnone(Only for Redshift) Redshift database cluster identifier.
--aws-regionnone(Only for AWS-hosted databases) AWS region RDS, Aurora, Redshift, Redshift Serverless, ElastiCache, OpenSearch or MemoryDB database instance is running in.
--aws-tagsnone(Only for AWS discoveries) Comma-separated list of AWS resource tags to match, for example env=dev,dept=it
--azure-mysql-discoverynoneList of Azure regions in which the agent will discover MySQL servers.
--azure-postgres-discoverynoneList of Azure regions in which the agent will discover PostgreSQL servers.
--azure-redis-discoverynoneList of Azure regions in which the agent will discover Azure Cache For Redis servers.
--azure-resource-group*List of Azure resource groups for Azure discoveries. Default is "*".
--azure-sqlserver-discoverynoneList of Azure regions in which the agent will discover Azure SQL Databases and Managed Instances.
--azure-subscription*List of Azure subscription IDs for Azure discoveries. Default is "*".
--azure-tagsnone(Only for Azure discoveries) Comma-separated list of Azure resource tags to match, for example env=dev,dept=it
--ca-cert-filenoneDatabase CA certificate path.
--ca-pinnoneCA pin to validate the auth server (can be repeated for multiple pins).
--dynamic-resources-labelsnoneComma-separated list(s) of labels to match dynamic resources, for example env=dev,dept=it. Required to enable dynamic resources matching.
--elasticache-discoverynoneList of AWS regions in which the agent will discover ElastiCache Valkey or Redis clusters.
--elasticache-serverless-discoverynoneList of AWS regions in which the agent will discover ElastiCache Serverless Valkey or Redis caches.
--gcp-instance-idnone(Only for Cloud SQL) GCP Cloud SQL instance identifier.
--gcp-project-idnone(Only for Cloud SQL) GCP Cloud SQL project identifier.
--labelsnoneComma-separated list of labels for the database, for example env=dev,dept=it
--memorydb-discoverynoneList of AWS regions in which the agent will discover MemoryDB clusters.
--namenoneName of the proxied database.
--[no-]trust-system-cert-poolfalseAllows Teleport to trust certificate authorities available on the host system for self-hosted databases.
-o, --outputstdoutWrite to stdout with "--output=stdout", default config file with "--output=file" or custom path with --output=file:///path
--opensearch-discoverynoneList of AWS regions in which the agent will discover OpenSearch domains.
--protocolnoneProxied database protocol. Supported are: [postgres mysql mongodb oracle cockroachdb redis snowflake sqlserver cassandra elasticsearch opensearch dynamodb clickhouse clickhouse-http spanner].
--proxy0.0.0.0:3080Teleport proxy address to connect to [0.0.0.0:3080].
--rds-discoverynoneList of AWS regions in which the agent will discover RDS/Aurora instances.
--rdsproxy-discoverynoneList of AWS regions in which the agent will discover RDS Proxies.
--redshift-discoverynoneList of AWS regions in which the agent will discover Redshift instances.
--redshift-serverless-discoverynoneList of AWS regions in which the agent will discover Redshift Serverless instances.
--token/tmp/tokenInvitation token or path to file with token value to register with an auth server [none].
--urinoneAddress the proxied database is reachable at.

teleport db start

Start database proxy service.

Usage:

teleport db start [<flags>]

Flags:

FlagDefaultDescription
--ad-domainnone(Only for SQL Server) Active Directory domain.
--ad-keytab-filenone(Only for SQL Server) Kerberos keytab file.
--ad-krb5-file/etc/krb5.conf(Only for SQL Server) Kerberos krb5.conf file.
--ad-spnnone(Only for SQL Server) Service Principal Name for Active Directory auth.
--auth-servernoneAddress of the auth server [127.0.0.1:3025].
--aws-account-idnone(Only for Keyspaces or DynamoDB) AWS Account ID.
--aws-assume-role-arnnoneOptional AWS IAM role to assume.
--aws-external-idnoneOptional AWS external ID used when assuming an AWS role.
--aws-rds-cluster-idnone(Only for Aurora) Aurora cluster identifier.
--aws-rds-instance-idnone(Only for RDS) RDS instance identifier.
--aws-redshift-cluster-idnone(Only for Redshift) Redshift database cluster identifier.
--aws-regionnone(Only for RDS, Aurora, Redshift, ElastiCache or MemoryDB) AWS region AWS hosted database instance is running in.
--aws-session-tagsnone(Only for DynamoDB) List of STS tags.
--ca-certnoneDatabase CA certificate path.
--ca-pinnoneCA pin to validate the auth server (can be repeated for multiple pins).
-c, --confignonePath to a configuration file [/etc/teleport.yaml].
--descriptionnoneDescription of the proxied database.
--diag-addrnoneStart diagnostic prometheus and healthz endpoint.
-d, --[no-]debugfalseEnable verbose logging to stderr.
--gcp-alloydb-endpoint-typenone(Only for AlloyDB) Endpoint type. One of: [public private psc]
--gcp-instance-idnone(Only for Cloud SQL) Instance identifier.
--gcp-project-idnone(Only for Cloud SQL) Project identifier.
--labelsnoneComma-separated list of labels for this node, for example env=dev,app=web.
--namenoneName of the proxied database.
--[no-]fipsfalseStart Teleport in FedRAMP/FIPS 140 mode.
--[no-]insecurefalseInsecure mode disables certificate validation
--[no-]no-debug-servicefalseDisables debug service.
--[no-]skip-version-checkfalseSkip version checking between server and client.
--pid-filenoneFull path to the PID file. By default no PID file will be created.
--protocolnoneProxied database protocol. Supported are: [postgres mysql mongodb oracle cockroachdb redis snowflake sqlserver cassandra elasticsearch opensearch dynamodb clickhouse clickhouse-http spanner].
--tokennoneInvitation token or path to file with token value to register with an auth server [none].
--urinoneAddress the proxied database is reachable at.

teleport debug get-log-level

Fetches current log level.

Usage:

teleport debug get-log-level

teleport debug metrics

Fetches the cluster's Prometheus metrics.

Usage:

teleport debug metrics

teleport debug profile

Export the application profiles (pprof format). Outputs to stdout .tar.gz file contents.

Usage:

teleport debug profile [<flags>] [<PROFILES>]

Flags:

FlagDefaultDescription
-s, --seconds0For CPU and trace profiles, profile for the given duration (if set to 0, it returns a profile snapshot). For other profiles, return a delta profile. Default: 0

Arguments:

ArgumentDefaultDescription
PROFILESnone (optional)Comma-separated profile names to be exported. Supported profiles: allocs,block,cmdline,goroutine,mutex,trace,heap,profile,threadcreate. Default: goroutine,heap,profile

teleport debug readyz

Checks if the instance is ready to serve requests.

Usage:

teleport debug readyz

teleport debug set-log-level

Changes the log level.

Usage:

teleport debug set-log-level <LEVEL>

Arguments:

ArgumentDefaultDescription
LEVELnone (required)Log level (case-insensitive). Any of: TRACE,DEBUG,INFO,WARN,ERROR

teleport discovery bootstrap

Bootstrap the necessary configuration for the discovery agent. It reads the provided agent configuration to determine what will be bootstrapped.

Usage:

teleport discovery bootstrap [<flags>]

Flags:

FlagDefaultDescription
--assume-role-arnnoneOptional AWS IAM role to assume while bootstrapping.
--assumes-rolesnoneComma-separated list of additional IAM roles that the IAM identity should be able to assume. Each role can be either an IAM role ARN or the name of a role in the identity's account.
--attach-to-rolenoneRole name to attach policy to. Mutually exclusive with --attach-to-user. If none of the attach-to flags is provided, the command will try to attach the policy to the current user/role based on the credentials.
--attach-to-usernoneUser name to attach policy to. Mutually exclusive with --attach-to-role. If none of the attach-to flags is provided, the command will try to attach the policy to the current user/role based on the credentials.
-c, --config/etc/teleport.yamlPath to a configuration file [/etc/teleport.yaml].
--database-service-policy-nameDatabaseAccessName of the policy for bootstrapping database service when database-service-role is provided.
--database-service-rolenoneRole name to attach database access policies to. If specified, bootstrap for the database service that accesses the databases discovered by this discovery service.
--external-idnoneOptional AWS external ID used when assuming an AWS role.
--[no-]confirmfalseApply changes without confirmation prompt.
--[no-]manualfalseWhen executed in "manual" mode, it will print the instructions to complete the configuration instead of applying them directly.
--policy-nameTeleportEC2DiscoveryName of the Teleport Discovery service policy. Default: "TeleportEC2Discovery".
--proxynoneTeleport proxy address to connect to

teleport help

Show help.

Usage:

teleport help [<command>...]

Arguments:

ArgumentDefaultDescription
commandnone (optional)Show help on command.

teleport install systemd

Creates a systemd unit file configuration.

Usage:

teleport install systemd [<flags>]

Flags:

FlagDefaultDescription
--env-file/etc/default/teleportFull path to the environment file.
--fd-limit524288Maximum number of open file descriptors.
-o, --outputstdoutWrite to stdout with "--output=stdout" or custom path with --output=file:///path
--pid-file/run/teleport.pidFull path to the PID file.
--teleport-pathnoneFull path to the Teleport binary.

teleport integration configure access-graph aws-iam

Adds required AWS IAM permissions for syncing AWS resources into Access Graph service.

Usage:

teleport integration configure access-graph aws-iam --role=ROLE [<flags>]

Flags:

FlagDefaultDescription
--aws-account-idnoneThe AWS account ID.
--cloud-trail-bucketnoneARN of the S3 bucket where CloudTrail writes events to.
--kms-keynoneList of KMS Keys used to decrypt SQS and S3 bucket data.
--[no-]confirmfalseApply changes without confirmation prompt.
--[no-]eks-audit-logsfalseEnable collection of EKS audit logs
--rolenoneThe AWS Role used by the AWS OIDC Integration.
--sqs-queue-urlnoneSQS Queue URL used to receive notifications from CloudTrail.

teleport integration configure access-graph azure

Adds required Azure permissions for syncing Azure resources into Access Graph service.

Usage:

teleport integration configure access-graph azure --managed-identity=MANAGED-IDENTITY --role-name=ROLE-NAME [<flags>]

Flags:

FlagDefaultDescription
--managed-identitynoneThe ID of the managed identity to run the Discovery service.
--[no-]confirmfalseApply changes without confirmation prompt.
--role-namenoneThe name of the Azure Role to create and assign to the managed identity
--subscription-idnoneThe subscription ID in which to discovery resources.

teleport integration configure aws-app-access-iam

Adds required IAM permissions to connect to AWS using App Access.

Usage:

teleport integration configure aws-app-access-iam --role=ROLE [<flags>]

Flags:

FlagDefaultDescription
--aws-account-idnoneThe AWS account ID.
--[no-]confirmfalseApply changes without confirmation prompt.
--rolenoneThe AWS Role name used by the AWS OIDC Integration.

teleport integration configure awsoidc-idp

Creates an IAM IdP (OIDC) in your AWS account to allow the AWS OIDC Integration to access AWS APIs.

Usage:

teleport integration configure awsoidc-idp --cluster=CLUSTER --name=NAME --role=ROLE --proxy-public-url=PROXY-PUBLIC-URL [<flags>]

Flags:

FlagDefaultDescription
--clusternoneTeleport Cluster name.
--namenoneIntegration name.
--[no-]confirmfalseApply changes without confirmation prompt.
--[no-]insecurefalseInsecure mode disables certificate validation.
--policy-presetnonePolicy that will be applied to the AWS OIDC integration role.
--proxy-public-urlnoneProxy Public URL (eg https://mytenant.teleport.sh).
--rolenoneThe AWS Role used by the AWS OIDC Integration.

teleport integration configure awsra-trust-anchor

Configure AWS IAM Roles Anywhere Integration by creating resources in AWS.

Usage:

teleport integration configure awsra-trust-anchor --cluster=CLUSTER --name=NAME --trust-anchor=TRUST-ANCHOR --trust-anchor-cert-b64=TRUST-ANCHOR-CERT-B64 --sync-profile=SYNC-PROFILE --sync-role=SYNC-ROLE [<flags>]

Flags:

FlagDefaultDescription
--clusternoneTeleport Cluster's name.
--namenoneIntegration name.
--[no-]confirmfalseApply changes without confirmation prompt.
--sync-profilenoneThe AWS IAM Roles Anywhere Profile name to create, which will be used to sync profiles as apps.
--sync-rolenoneThe AWS IAM Role name to create, which will be used to sync profiles as apps.
--trust-anchornoneAWS Roles Anywhere Trust Anchor name.
--trust-anchor-cert-b64noneAWS Roles Anywhere Trust Anchor's certificate, encoded in base64.

teleport integration configure azure-oidc

Configures Azure / Entra ID OIDC integration.

Usage:

teleport integration configure azure-oidc --proxy-public-addr=PROXY-PUBLIC-ADDR --auth-connector-name=AUTH-CONNECTOR-NAME [<flags>]

Flags:

FlagDefaultDescription
--auth-connector-namenoneThe name of Entra ID SAML Auth connector in Teleport.
--[no-]access-graphfalseEnable Access Graph integration.
--[no-]skip-oidc-integrationfalseSkip OIDC integration.
--proxy-public-addrnoneThe public address of Teleport Proxy Service

teleport integration configure deployservice-iam

Create the required IAM Roles for the AWS OIDC Deploy Service.

Usage:

teleport integration configure deployservice-iam --cluster=CLUSTER --name=NAME --aws-region=AWS-REGION --role=ROLE --task-role=TASK-ROLE [<flags>]

Flags:

FlagDefaultDescription
--aws-account-idnoneThe AWS account ID.
--aws-regionnoneAWS Region.
--clusternoneTeleport Cluster's name.
--namenoneIntegration name.
--[no-]confirmfalseApply changes without confirmation prompt.
--rolenoneThe AWS Role used by the AWS OIDC Integration.
--task-rolenoneThe AWS Role to be used by the deployed service.

teleport integration configure ec2-ssm-iam

Adds required IAM permissions and SSM Document to enable EC2 Auto Discover using SSM.

Usage:

teleport integration configure ec2-ssm-iam --role=ROLE --aws-region=AWS-REGION --cluster=CLUSTER --name=NAME [<flags>]

Flags:

FlagDefaultDescription
--aws-account-idnoneThe AWS account ID.
--aws-regionnoneAWS Region.
--clusternoneTeleport Cluster's name.
--namenoneIntegration name.
--[no-]confirmfalseApply changes without confirmation prompt.
--proxy-public-urlnoneProxy Public URL (eg https://mytenant.teleport.sh).
--rolenoneThe AWS Role name used by the AWS OIDC Integration.
--ssm-document-namenoneThe AWS SSM Document name to create that will be used to install teleport.

teleport integration configure eks-iam

Adds required IAM permissions for enrollment of EKS clusters to Teleport.

Usage:

teleport integration configure eks-iam --aws-region=AWS-REGION --role=ROLE [<flags>]

Flags:

FlagDefaultDescription
--aws-account-idnoneThe AWS account ID.
--aws-regionnoneAWS Region.
--[no-]confirmfalseApply changes without confirmation prompt.
--rolenoneThe AWS Role used by the AWS OIDC Integration.

teleport integration configure externalauditstorage

Bootstraps required infrastructure and adds required IAM permissions for External Audit Storage logs.

Usage:

teleport integration configure externalauditstorage --aws-region=AWS-REGION --cluster-name=CLUSTER-NAME --integration=INTEGRATION --role=ROLE --policy=POLICY --session-recordings=SESSION-RECORDINGS --audit-events=AUDIT-EVENTS --athena-results=ATHENA-RESULTS --athena-workgroup=ATHENA-WORKGROUP --glue-database=GLUE-DATABASE --glue-table=GLUE-TABLE [<flags>]

Flags:

FlagDefaultDescription
--athena-resultsnoneThe S3 URI where athena results are stored.
--athena-workgroupnoneThe name of the Athena workgroup used.
--audit-eventsnoneThe S3 URI where audit events are stored.
--aws-account-idnoneThe AWS account ID.
--aws-partitionawsAWS partition (default: aws).
--aws-regionnoneAWS region.
--cluster-namenoneTeleport Cluster name.
--glue-databasenoneThe name of the Glue database used.
--glue-tablenoneThe name of the Glue table used.
--integrationnoneAWS OIDC Integration name.
--[no-]bootstrapfalseBootstrap required infrastructure.
--policynoneThe name for the Policy to attach to the IAM role.
--rolenoneThe IAM Role used by the AWS OIDC Integration.
--session-recordingsnoneThe S3 URI where session recordings are stored.

teleport integration configure listdatabases-iam

Adds required IAM permissions to List RDS Databases (Instances and Clusters).

Usage:

teleport integration configure listdatabases-iam --aws-region=AWS-REGION --role=ROLE [<flags>]

Flags:

FlagDefaultDescription
--aws-account-idnoneThe AWS account ID.
--aws-regionnoneAWS Region.
--[no-]confirmfalseApply changes without confirmation prompt.
--rolenoneThe AWS Role used by the AWS OIDC Integration.

teleport integration configure samlidp gcp-workforce

Configures GCP Workforce Identity Federation pool and SAML provider.

Usage:

teleport integration configure samlidp gcp-workforce --org-id=ORG-ID --pool-name=POOL-NAME --pool-provider-name=POOL-PROVIDER-NAME --idp-metadata-url=IDP-METADATA-URL

Flags:

FlagDefaultDescription
--idp-metadata-urlnoneTeleport SAML IdP metadata endpoint.
--org-idnoneGCP organization ID.
--pool-namenoneName for the new workforce identity pool.
--pool-provider-namenoneName for the new workforce identity pool provider.

teleport join openssh

Join an SSH server to a Teleport cluster.

Usage:

teleport join openssh [<flags>]

Flags:

FlagDefaultDescription
--additional-principalsnoneAdditional principal to include, can be specified multiple times.
--addressnoneHostname or IP address of this OpenSSH node.
--data-dir/var/lib/teleportPath to directory to store teleport data [/var/lib/teleport].
-d, --[no-]debugfalseEnable verbose logging to stderr.
--join-methodnoneMethod to use to join the cluster (token, iam, ec2).
--labelsnoneComma-separated list of labels for this OpenSSH node, for example env=dev,app=web.
--[no-]insecurefalseInsecure mode disables certificate validation.
--[no-]restart-sshdtrueRestart OpenSSH.
--openssh-config/etc/ssh/sshd_configPath to the OpenSSH config file [/etc/ssh/sshd_config].
--proxy-servernoneAddress of the proxy server.
--sshd-check-commandsshd -t -fCommand to use when checking OpenSSH config for validity. (sshd -t -f <sshd_config>)
--sshd-restart-commandsystemctl restart sshdCommand to use when restarting openssh.
--tokennoneInvitation token or path to file with token value to register with an auth server.

teleport node configure

Generate a configuration file for an SSH node.

Usage:

teleport node configure [<flags>]

Flags:

FlagDefaultDescription
--auth-servernoneAddress of the auth server.
--azure-client-idnoneSets the client ID of the managed identity to join with. Only applies to the 'azure' join method.
--ca-pinnoneComma-separated list of SKPI hashes for the CA used to verify the auth server.
--cluster-namenoneUnique cluster name, e.g. example.com.
--data-dir/var/lib/teleportPath to a directory where Teleport keep its data.
--join-methodtokenMethod to use to join the cluster (azure, azure_devops, bitbucket, circleci, ec2, gcp, github, gitlab, iam, kubernetes, spacelift, token, tpm, terraform_cloud, oracle, bound_keypair, env0)
--labelsnoneComma-separated list of labels to add to newly created nodes ex) env=staging,cloud=aws.
--node-namenoneName for the Teleport node.
--[no-]silentfalseSuppress user hint message.
-o, --outputstdoutWrite to stdout with "--output=stdout", default config file with "--output=file" or custom path with --output=file:///path
--proxynoneAddress of the proxy server.
--public-addrnoneThe hostport that the node advertises for the SSH endpoint.
--tokennoneInvitation token or path to file with token value to register with an auth server.
--versionv3Teleport configuration version.

teleport start

Starts the Teleport service.

Usage:

teleport start [<flags>]

Flags:

FlagDefaultDescription
--advertise-ipnoneIP to advertise to clients if running behind NAT
--apply-on-startupnonePath to a non-empty YAML file containing resources to apply on startup. Works on initialized clusters, unlike --bootstrap. Only supports the following kinds: [token cluster_networking_config cluster_auth_preference bot role user].
--auth-servernoneAddress of the auth server [127.0.0.1:3025]
--bootstrapnonePath to a non-empty YAML file containing bootstrap resources (ignored if already initialized)
--ca-pinnoneCA pin to validate the Auth Server (can be repeated for multiple pins)
-c, --confignonePath to a configuration file [/etc/teleport.yaml]
--diag-addrnoneStart diagnostic prometheus and healthz endpoint.
-d, --[no-]debugfalseEnable verbose logging to stderr
--labelsnoneComma-separated list of labels for this node, for example env=dev,app=web
-l, --listen-ipnoneIP address to bind to [0.0.0.0]
--nodenamenoneName of this node, defaults to hostname
--[no-]fipsfalseStart Teleport in FedRAMP/FIPS 140 mode.
--[no-]insecurefalseInsecure mode disables certificate validation
--[no-]insecure-no-tlsfalseDisable TLS for the web socket
--[no-]no-debug-servicefalseDisables debug service.
--[no-]permit-user-envfalseEnables reading of ~/.tsh/environment when creating a session
--[no-]skip-version-checkfalseSkip version checking between server and client.
--pid-filenoneFull path to the PID file. By default no PID file will be created
-r, --rolesnoneComma-separated list of roles to start with [proxy,node,auth,app,db]
--tokennoneInvitation token or path to file with token value. Used to register with an auth server [none]
--token-secretnoneInvitation token secret or path to file with secret value. Used to register with an auth server [none]

teleport status

Print the status of the current SSH session.

Usage:

teleport status

teleport tpm identify

Output identifying information related to the TPM detected on the system.

Usage:

teleport tpm identify

teleport version

Print the version of your teleport binary.

Usage:

teleport version [<flags>]

Flags:

FlagDefaultDescription
--[no-]rawfalsePrint the raw teleport version string.