The 2026 Infrastructure Identity Survey: State of AI Adoption
Read Survey
Teleport logoGet a Demo
Background image

TELEPORT MACHINE & WORKLOAD IDENTITY

Secure Every Machine,
Workload, and Agent

Issue cryptographic identities to every bot, CI job, container, VM, and service for short-lived, zero-trust access and inter-service authentication across your infrastructure.

TRUSTED BY LEADERS

Nasdaq logo
Nasdaq logo
Nasdaq logo
Nasdaq logo

THE NON-HUMAN IDENTITY CHALLENGE 

Traditional Credentials Fail Modern Infrastructure

Modern infrastructure is automated. Servers, pipelines, containers, AI agents, and microservices now power most workloads — not humans. In these environments, traditional credentials create unmanaged attack surface, operational burden, and compliance headaches.

Static credentials, keys, and tokens pile up and are left unrotated and over-privileged.

Secrets sprawl across CI/CD pipelines, clouds, and beyond, increasing risk.

Inter-service communication lacks identity accountability, logs, and control.

Agentic AI introduces autonomous actors without identity and guardrails.

Teleport Machine & Workload Identity

Prevent the agentic identity crisis. Teleport Machine & Workload Identity brings identity-based security to non-human actors. It transforms every machine into a first-class identity, governed by policy and issued dynamically. Bring unique, delegated, and visible identity to your AI agents.

Eliminate static credentials like long-lived keys, tokens, or secrets.

Secure inter-service and cross-cloud authentication with mutual TLS (mTLS), SPIFFE-compatible IDs, JWTs, and role-based cloud authentication.

Enforce least privilege and zero trust to grant only the access each workload needs, when it needs it.

Unlock full audit & compliance visibility with every identity issuance, access, and renewal logged and traceable.

Secure Non-Human Identities (NHIs) Across Your Infrastructure

Protect Your Environment — On Your Terms

Teleport supports complementary architectural patterns, letting you adopt identity-based security in the method that fits your use case best.

Secure Access

For workflows that need access to protected infrastructure (CI/CD, SSH, databases, Kubernetes, MCP, etc.) with RBAC, session auditing, and enforced policies.

Learn More

Universal Identity

For workloads that need identity across clouds and services (service-to-service mTLS, cloud APIs, service meshes), using open standards like SPIFFE, JWT, and X.509.

Learn More

How It Works

  1. 1

    Deploy tbot agent
    Deploy on machines, containers, or in your orchestration environment.

  2. 2

    Request identity at runtime
    tbot authenticates using a join method (token, metadata, cloud-federation, etc.) and is issued a short-lived certificate or token.

  3. 3

    Access resources or communicate securely
    Workloads use the identity to access infrastructure or authenticate to internal or external services andAPIs via mTLS, JWT, or SPIFFE.

  4. 4

    Automatic renewal and rotation

    Identities are renewed automatically and certificates expire automatically without manual secret rotation.

  5. 5

    Full audit and traceability
    Every issuance, access, and session is logged for identity-aware compliance and forensic visibility.

Unify Identity & Eliminate Secrets at Scale

Unified infrastructure identity

Unified infrastructure identity

Manage human and non-human identities together from a single platform without vaults or secrets.

Ephemeral by design

Ephemeral by design

Issue short-lived certificates and tokens that expire quickly to prevent credential exhaustion and reduce exposure.

Audit & compliance ready

Audit & compliance ready

Sessions, identity issuance, and access events are logged to simplify compliance for SOC 2, HIPAA, PCI, and more.

Scales with your infrastructure

Scales with your infrastructure

Secure servers, containers, cloud VMs, Kubernetes clusters, CI/CD, and service-mesh workloads across multi-cloud/hybrid environments without redesigning your stack.

Supports Open Standards (SPIFFE, JWT, X.509)

Teleport Machine & Workload Identity is compatible with the open-source Secure Production Identity Framework for Everyone (SPIFFE) standards and open standards like JWT and X.509 certificates to secure communication across clouds, runtimes, and vendors

SPIFFE

Provides out-of-the-box tooling for the SPIFFE ecosystem, pairing SPIFFE benefits with RBAC, MFA, device trust, audit logging, and more.

Developer Tooling

Supports open-source policy agents and developer tool APIs, making a wealth of off-the-shelf tools and SDKs accessible to simplify integrations.

Bootstrapping Trust

Supports bootstrapping trust by grounding root of trust in secure hardware environments.

AUTOMATION IS THE NEW ATTACK SURFACE

Securing Non-Human Identities (NHIs) at the Infrastructure Layer

Modern infrastructure moves fast. Automation now powers nearly every critical system — from provisioning environments with code, to deploying software through pipelines, to scaling workloads across distributed services and AI agents.

But beneath that velocity lies an expanding layer of risk that’s often invisible: non-human identities (NHI). Download this paper to learn more.

automation is the new attack surface -whitepaper cover

What Our Customers Say

  • Teleport is a strategic technology partner as they help our joint customers to scale their AWS resources in a secure manner. With Teleport’s Identity-Native Infrastructure Access solution, DevOps Engineers get a frictionless experience managing infrastructure that doesn’t require secrets while implementing zero trust architecture in AWS.

    Benjamin GardinerSenior Partner Solutions Architect AWS Startups
    Benjamin Gardiner
  • We use Teleport Access Requests in combination with Auth0 to easily manage access to our infrastructure. Prior to Teleport, we manually managed SSH keys and a bastion machine and it was an organizational nightmare.

    Dylan StamatCTO
    Dylan Stamat
  • We used to go through multiple steps just to access cloud resources, and now it happens almost instantly. Our engineers are really happy with the significant improvement in their workflow.

    Pradithya Aria PuraPrincipal Software Engineer
    Pradithya Aria Pura
  • Teleport’s vision for Infrastructure Identity is a game-changer for securing hybrid infrastructure.

    Steven DickensHyperFRAME
    Steven Dickens
  • Teleport is a strategic technology partner as they help our joint customers to scale their AWS resources in a secure manner. With Teleport’s Identity-Native Infrastructure Access solution, DevOps Engineers get a frictionless experience managing infrastructure that doesn’t require secrets while implementing zero trust architecture in AWS.

    Benjamin GardinerSenior Partner Solutions Architect AWS Startups
    Benjamin Gardiner
  • We use Teleport Access Requests in combination with Auth0 to easily manage access to our infrastructure. Prior to Teleport, we manually managed SSH keys and a bastion machine and it was an organizational nightmare.

    Dylan StamatCTO
    Dylan Stamat
  • We used to go through multiple steps just to access cloud resources, and now it happens almost instantly. Our engineers are really happy with the significant improvement in their workflow.

    Pradithya Aria PuraPrincipal Software Engineer
    Pradithya Aria Pura
  • Teleport’s vision for Infrastructure Identity is a game-changer for securing hybrid infrastructure.

    Steven DickensHyperFRAME
    Steven Dickens
  • With Teleport, we were even able to close the Kubernetes API without losing access for our engineers or automation tools. That alone was a huge win.

    Olga DaminovaInfrastructure Security Engineer, Rush Street Interactive
    Olga Daminova
  • Teleport allows us to comply with the regulatory hurdles that come with running an international stock exchange. The use of bastion hosts, integration with our identity service and auditing capabilities give us a compliant way to access our internal infrastructure.

    Brendan GermainSystems Reliability Engineer
    Brendan Germain
  • The Infrastructure Identity solution from Teleport offers a glimpse into the future of more secure, more resilient, and higher-velocity enterprise computing.

    Dr. Ed Amoroso
CEO & Lead Analyst
    Dr. Ed Amoroso

  • Teleport has made obtaining a FedRAMP-Moderate ATO that much more achievable via their FIPS 140-2 endpoints, ease in integration with our SSO and MFA , and the view into audit logs of remote connection sessions provide the appropriate insight for Continuous Monitoring.

    Jeff GillSenior Director of Engineering
    Jeff Gill
  • Over the many years of using Teleport, it's been an essential piece of my infrastructure to help secure access, and centralize my infrastructure into one dashboard, without having to jump around… I'm not sure how I could go without it.

  • With Teleport, we were even able to close the Kubernetes API without losing access for our engineers or automation tools. That alone was a huge win.

    Olga DaminovaInfrastructure Security Engineer, Rush Street Interactive
    Olga Daminova
  • Teleport allows us to comply with the regulatory hurdles that come with running an international stock exchange. The use of bastion hosts, integration with our identity service and auditing capabilities give us a compliant way to access our internal infrastructure.

    Brendan GermainSystems Reliability Engineer
    Brendan Germain
  • The Infrastructure Identity solution from Teleport offers a glimpse into the future of more secure, more resilient, and higher-velocity enterprise computing.

    Dr. Ed Amoroso
CEO & Lead Analyst
    Dr. Ed Amoroso

  • Teleport has made obtaining a FedRAMP-Moderate ATO that much more achievable via their FIPS 140-2 endpoints, ease in integration with our SSO and MFA , and the view into audit logs of remote connection sessions provide the appropriate insight for Continuous Monitoring.

    Jeff GillSenior Director of Engineering
    Jeff Gill
  • Over the many years of using Teleport, it's been an essential piece of my infrastructure to help secure access, and centralize my infrastructure into one dashboard, without having to jump around… I'm not sure how I could go without it.

Background image

Frequently Asked Questions

What is Teleport Machine & Workload Identity?

Teleport Machine & Workload Identity uses the tbot agent to issue and renew short-lived certificates and tokens for machines and workloads so they can authenticate to infrastructure and cloud providers without static secrets.

tbot runs alongside your CI/CD jobs and services, continuously writing short-lived credentials to use instead of hard-coded API keys or passwords to access Kubernetes, AWS, Azure, Bitbucket, CircleCI, GCP, GitLab, GitHub Actions, Jenkins, Linux, and more.

Rather than storing long-lived credentials like a vault, Teleport Machine & Workload Identity replaces them with dynamically issued, short-lived X.509 certificates and JWTs that workloads use directly for authentication.

Teleport issues SPIFFE-compatible workload identities as JWT and X.509 SVIDs, following SPIFFE standards for encoding and validating these documents to secure service-to-service communication.