Securing Infrastructure Access at Scale in Large Enterprises
Dec 12
Virtual
Register Now
Teleport logoTry For Free
Background image
Access Platform

Teleport Features

Teleport Access Platform capabilities enable organizations like NASDAQ, IBM and Snowflake to implement security, enforce compliance and reduce operational overhead.
Enterprise Features
Background image
Enterprise Single Sign-On (SSO)
Enterprise Single Sign-On (SSO)

Teleport integrates into a company's existing company directory and SSO system. Enterprise Teleport supports all major SSO providers, including Okta, Sailpoint, Active Directory, OneLogin, G Suite, Auth0 and many others.

Learn More
Background image
Just In Time Access Requests
Just In Time Access Requests

Teleport allows users to request elevated privileges in the middle of their command-line sessions. Requests can be approved or denied via ChatOps in Slack & PagerDuty or anywhere else via flexible Authorization Workflow API.

Learn More
Background image
Device Trust
Device Trust

Secure clients accessing your infrastructure with Teleport Device Trust. Device Trust integrates with endpoint management systems like Jamf and Microsoft Intune to ensure that access is only performed from an authenticated and trusted device.

Learn More
Background image
FedRAMP & SOC 2
FedRAMP & SOC 2

Teleport can help implement common compliance standards such as SOC 2 or FedRAMP for SSH and Kubernetes access.

Learn More
Background image
Moderated Sessions
Moderated Sessions

Moderated Sessions allow two people to be part of a session: a moderator and an operator. In order to prevent mistakes or acts of malice, the moderator can observe the session in real time, participate in the session, and terminate the session at will.

Learn More
Background image
Passwordless Windows Access for local users
Passwordless Windows Access for local users

Get RBAC for Windows Server and Desktops without a reliance on Active Directory. Easily copy text between the clipboard on a client and a remote Windows machine and instantly share directories and files from your local client with no manual upload or download.

Learn More
Background image
IP-based restrictions
IP-based restrictions

Add an additional layer of protection to your infrastructure with IP-based restrictions. In addition to role-based access controls, Teleport can bind short-lived SSH certificates to a client IP and validate the IP on every connection to prevent pivot attacks.

Background image
Proxy Peering
Proxy Peering

Easily scale unified access to your entire infrastructure for your entire team. Teleport Proxy Peering reduces network congestion and latency for large-scale deployments of more than 15,000 nodes.

Core Features
Background image
Certificate Auth for SSH & K8s
Certificate Auth for SSH & K8s

Managing static SSH keys can lead to increased operational overhead and may lead to security vulnerabilities. The industry best practice is to use certificate-based authentication for SSH and Kubernetes.

Learn More
Background image
Audit Log
Audit Log

Restricting access and granting specific permissions through role-based access controls is the first step to securing your infrastructure. The next step is to log all activity across your infrastructure.

Learn More
Background image
Session Recording
Session Recording

Privileged session recording, or SSH session recording, means recording the user’s actual screen during their SSH session for real-time or later playback.

Learn More
Background image
Trust Federation
Trust Federation

Teleport’s “Trusted Clusters” capability allows organizations to partition their infrastructure and grant access to each other. Managed service providers and contract-based DevOps teams take advantage of Teleport’s Trusted Clusters to manage servers for their clients.

Background image
Kubernetes Access Management
Kubernetes Access Management

Teleport works by being a unified gateway for both Kubernetes and SSH sessions. This allows to synchronize SSO, role-based access controls and audit logging for both protocols.

Learn More
Background image
Single Sign-On (SSO)
Single Sign-On (SSO)

Teleport integrates into an existing company identity management. This allows DevOps, developers and other end-users to access computing infrastructure via the same SSO policy.

Learn More
Background image
Role-Based Access Controls (RBAC)
Role-Based Access Controls (RBAC)

Role-Based Access Control (RBAC) is the practice of managing privileged access to infrastructure through a central directory of users, roles, and teams. Authorization is granted to groups (or roles) within a company directory.

Learn More
Background image
IoT and Edge Connectivity
IoT and Edge Connectivity

Teleport provides access to SSH servers and Kubernetes clusters anywhere in the world, behind NAT. From restaurants to autonomous vehicles, no VPN required.

Learn More
Background image
Machine ID
Machine ID

Extend identity-based access to IT Infrastructure and applications. Teleport Machine ID is the easiest way to issue, renew and manage X.509 and SSH certificates for your services.

Learn More
Background image
Teleport Connect
Teleport Connect

Traditional terminals are optimized for accessing localhost. Teleport Connect offers enhanced user experience and identity-based access for engineers who work in the cloud.

Learn More
Background image
Per-Session Multi-Factor Authentication
Per-Session Multi-Factor Authentication

Easily implement Multi-Factor Authentication across your organization without relying on device management systems. Teleport MFA is designed for distributed teams and comes with a self-enrollment MFA portal.

Learn More
Background image
Passwordless Access
Passwordless Access

Teleport removes passwords, private keys and other secrets that can be shared, leaked, or stolen from your infrastructure and replaces them with more secure biometrics. Improve productivity and security with Passwordless Access.

Learn More

How Teleport Works

Teleport is a single binary which enables secure access to SSH nodes, Kubernetes clusters, web apps, PostgreSQL and MySQL databases behind NAT. Teleport is trivial to setup as a Linux daemon or in a Kubernetes pod. Learn more about how Teleport works.

a diagram of Teleport's security functionality
Background image

Try Teleport today

In the cloud, self-hosted, or open source
Get StartedView developer docs