Teleport Access Plane capabilities enable organizations like NASDAQ, IBM and Snowflake to implement security, enforce compliance and reduce operational overhead.
Teleport allows users to request elevated privileges in the middle of their command-line sessions. Requests can be approved or denied via ChatOps in Slack & PagerDuty or anywhere else via flexible Authorization Workflow API.Learn More
FedRAMP & SOC2
Teleport can help implement common compliance standards such as SOC2 or FedRAMP for SSH and Kubernetes access.Learn More
Per-Session Multi-Factor Authentication
Easily implement Multi-Factor Authentication across your organization without relying on device management systems. Teleport MFA is designed for distributed teams and comes with a self-enrollment MFA portal.Learn More
Enterprise Single Sign-On (SSO)
Teleport integrates into a company's existing company directory and SSO system. Enterprise Teleport supports all major SSO providers, including Okta, Sailpoint, Active Directory, OneLogin, G Suite, Auth0 and many others.Learn More
Certificate Auth for SSH & K8s
Managing static SSH keys can lead to increased operational overhead and may lead to security vulnerabilities. The industry best practice is to use certificate-based authentication for SSH and Kubernetes.Learn More
Restricting access and granting specific permissions through role-based access controls is the first step to securing your infrastructure. The next step is to log all activity across your infrastructure.Learn More
Privileged session recording, or SSH session recording, means recording the user’s actual screen during their SSH session for real-time or later playback.Learn More
Teleport’s “Trusted Clusters” capability allows organizations to partition their infrastructure and grant access to each other. Managed service providers and contract-based DevOps teams take advantage of Teleport’s Trusted Clusters to manage servers for their clients.
Kubernetes Access Management
Teleport works by being a unified gateway for both Kubernetes and SSH sessions. This allows to synchronize SSO, role-based access controls and audit logging for both protocols.Learn More
Single Sign-On (SSO)
Teleport integrates into an existing company identity management. This allows DevOps, developers and other end-users to access computing infrastructure via the same SSO policy.Learn More
Role-Based Access Controls (RBAC)
Role-Based Access Control (RBAC) is the practice of managing privileged access to infrastructure through a central directory of users, roles, and teams. Authorization is granted to groups (or roles) within a company directory.Learn More
IoT and Edge Connectivity
Teleport provides access to SSH servers and Kubernetes clusters anywhere in the world, behind NAT. From restaurants to autonomous vehicles, no VPN required.Learn More
How Teleport Works
Teleport is a single binary which enables secure access to SSH nodes, Kubernetes clusters, web apps, PostgreSQL and MySQL databases behind NAT. Teleport is trivial to setup as a Linux daemon or in a Kubernetes pod. Learn more about how Teleport works.