The 2026 Infrastructure Identity Survey: State of AI Adoption
Read Survey
Get a Demo
Background image

TELEPORT IDENTITY GOVERNANCE

Implement task-based access requests

Short-lived privileges reduce complexity and harden security

Trusted by Market Leaders

Background image

Teleport Access Requests changed the game in simplifying our infrastructure access for various compliances. It's led to more freedom and innovation by allowing us to move away from pre-defined root accounts.

Erik Redding, Director, Site Reliability Engineering, Elastic

company logo

Why Adopt Access Requests?

Engineering velocity suffers when teams wait for access approvals, yet standing privileges and overprivileged accounts create dangerous attack vectors. Task-based, short-lived privileges unlock access quickly when needed while reducing your attack surface.

 

Reduce attack vectors

Lock down standing privileges targeted by threat actors as breach and pivot vectors.

Control service accounts

Replace high-privilege service accounts with JIT access that is activated only when needed.

Secure contractor access

Grant access with temporary permissions that automatically expire, reducing complexity and security risks.

Accelerate incident response

Remediate outages with immediate access to infrastructure without compromising security.

Streamline compliance

Eliminate anonymity from your user and service accounts, improving speed and accuracy of audit data.

Automate workflows

Automate request approvals based on role or other attributes and context.

FOR SECURITY LEADERS

Transform Security Model

Make standing and stale privileges, as well as privileges elevation and revocation, a thing of the past. Authorize short-lived access based on roles, attributes, or context, simplifying operational management for both engineers and contractors.

Short-Lived Authorisation

Fine-grained access policies and ephemeral privileges based on short-lived certificates eliminate static credentials and standing privileges as attack vectors.

Least-Privileged Access

Limit access only to when tasks need to be completed, based on roles, attributes and context such as time window or device, hardening infrastructure from threat actors seeking to exploit overprivileged access pathways.

FOR ENGINEERING LEADERS

Eliminate Operational Complexity

Streamline approval workflows, with automation for access that can be granted based on role or other attributes, and oversight for more sensitive operations.

Pre-Defined Workflows

Approval workflows can be present or automated based on role coupled with other attributes such as device trust, reducing administrative overhead.

Session Moderation (with Dual Authorization)

Sensitive tasks can be configure to require a session moderator (or two session moderators) to join for approval

FOR ENGINEERS

A Dev-Friendly User Experience

Don’t miss a beat, with access requested through the tools you use, all from one central location, eliminating problematic context-switching from your engineering tasks.

Integration with Developer Tools

Requests and approvals that require manual authorisation are routed through the tools that developers use, such as Slack, PagerDuty, and more.

Unified, Dynamic Access

Resources are surfaced in a unified dashboard, eliminating the need to jump between systems or remember access paths to request access.

SUPPORT FOR PREFERRED DEVELOPER TOOLS

Dev Tool Integrations

Pair access requests with the developer tools that your team prefers.

Slack

Centralize access controls within your team’s collaboration hub—when a user requests elevated infrastructure access, Teleport sends a Slack notification to designated channels or reviewers. Approvers can click through to the Teleport UI to approve or deny the request, with results reflected back in Slack (via emoji reactions), and all decisions logged for audit and compliance. 

Learn More

Microsoft Teams

Integrate access management into your Microsoft ecosystem by handling approvals through Teams channels, leveraging existing organizational structures and enabling secure collaboration across distributed teams.

Discord

Perfect for gaming and tech-focused teams, Discord's integration lets you manage access requests through dedicated servers and channels, with rich formatting and threaded discussions for complex approval scenarios.

Mattermost

Keep privileged access workflows within your team’s self‑hosted messaging stack—Teleport sends access request alerts into Mattermost channels or direct messages. Reviewers click through to join the request in Teleport’s UI, where they can approve or deny it; every action syncs back and appears in audit logs for compliance.

PagerDuty

Seamlessly combine incident response and access management by automatically granting elevated permissions to on-call engineers, with intelligent routing based on escalation policies and service ownership.

OpsGenie

Transform access management into your alert workflow with automatic approvals tied to on-call schedules, team assignments, and service ownership - perfect for organizations with complex rotation patterns and service dependencies.

Background image

Ready to get started?

Delight your engineers. Protect your infrastructure.

LEARN MORE

Additional Resources

Demo Video

Teleport & Jira Access Request Video

Watch this demo of how Teleport integrates with Jira to streamline access requests. See how engineers can request access via the CLI or web UI, and how approvals or denials are handled simply by dragging Jira cards—no manual permissions or delays.

Watch Video

On-Demand Webinar

Experience Frictionless Access Without Sacrificing Security

Watch this webinar hosted by Teleport and DZone to learn how to deliver frictionless engineer access without compromising security. Discover how to replace static credentials with ephemeral access, enforce zero-trust principles, and streamline access across your entire infrastructure.

Watch Webinar

Documentation

Teleport JIT Access Requests Documentation

Learn how to manage just-in-time access with Teleport’s Access Requests. This guide walks you through configuring access workflows, integrating with tools like Slack and Jira, and granting temporary access without persistent permissions—all while maintaining full audit visibility.

Read Docs