Analyze and Correlate GitHub Audit Logs and Access Paths
Describes how to import and correlate GitHub Audit Logs and Access Paths using Identity Security.
These guides explain capabilities of the Identity Security product.
View all tagsDescribes how to import and correlate GitHub Audit Logs and Access Paths using Identity Security.
Describes how to import and correlate Teleport Audit Logs using Identity Security.
Describes how to import and visualize Entra ID policies using Identity Security and Graph Explorer.
Describes how to import and visualize AWS accounts access patterns using Identity Security.
Describes how to import and visualize Azure subscription access patterns using Identity Security.
Describes how to synchronize GitLab access patterns using Identity Security.
Describes how to enable SSH Key Scanning using Identity Security to identity access patterns that use long-lived SSH keys.
Describes how to synchronize OpenTex NetIQ access patterns using Identity Security.
Explore identity risks and access pathways with dashboards, graph visualization, and SQL queries.
Describes the SQL Editor view of Teleport Access Graph.
Describes the Investigate view, which helps you explore identity-related activity from across your infrastructure.
Describes how to deploy Access Graph on self-hosted clusters.
How to deploy Access Graph on self-hosted clusters using Helm.
Describes how to use Access Graph Crown Jewels to see permission changes in Teleport.
Explains how to enable Identity Activity Center.
Explains how to deploy Access Graph alongside a self-hosted Teleport cluster.
An overview of Teleport Identity Security.
The detailed guide and reference documentation for configuring Teleport Identity Security.
Integrations in Teleport Identity Security.
Values that can be set using the teleport-access-graph Helm chart
Describes the Standing Privileges Dashboard feature of Teleport Identity Security
Describes the Graph Explorer view of Teleport Access Graph.