Simplifying Zero Trust Security for AWS with Teleport
Jan 23
Virtual
Register Now
Teleport logoTry For Free
Teleport Machine ID

Secure Machine Identity & Access with Teleport Machine ID

Enhance your IT infrastructure with Teleport Machine ID, offering secure identity-based access for microservices, CI/CD pipelines, databases, Kubernetes clusters, and servers. Simplify X.509 and SSH certificate management for efficient machine-to-machine communication.
machine id
Logo for NASDAQLogo for HPLogo for Moody'sLogo for IBM

Challenges securing machine-to-machine access at scale

Managing machine-to-machine access at scale is time-consuming and complex. And most solutions leave security holes that make you susceptible to supply chain attacks.
Challenges securing machine-to-machine access at scale illustration
Certificate issuance & rotation

Running a highly available, global CA for all your infrastructure is not easy.

Standardizing access controls

You have roles defined for engineers. But how do you apply those roles to a microservice or CI/CD pipeline?

Managing dynamic environments

Many machine-to-machine use cases are ephemeral, putting importance on full automation.

Background image
Background image

Why customers big and small trust Teleport

By providing a unified identity-native access solution for engineers and the applications they write, Teleport Machine ID enables organizations to easily implement security and compliance without worrying about backdoors that outmoded solutions encourage.

Manage machine users at scale with minimal overhead.

Teleport Machine ID vastly simplifies certificate management for IT infrastructure and applications just like Let’s Encrypt simplified TLS certificate management for websites. First, Machine ID provides a certificate-based identity to CI/CD workers, configuration management playbooks, microservices, service accounts, databases, servers or any other machine user. Next, these machine users automatically inherit the security and audit capabilities of Teleport, dramatically reducing operational overhead and increasing compliance.
Manage machine users at scale with minimal overhead. illustration
Automated CA for machines

Machine ID has a Certificate Authority (CA) that automatically issues and renews SSH and X.509 certificates to facilitate machine-to-machine access, enabling security best practices such as frequent certificate rotations and the use of shorter TTLs.

Simple user experience

It only takes two commands to create a machine user and generate a certificate. Or, you can fully automate the process so machine users can securely come and go as often as you need.

Unified access policy

Define, implement and update access policies for developers and machines all in one place. This simplicity reduces room for error and increases security and compliance.

The same identity-based access for engineers and applications

Teleport Machine ID unifies access policies for engineers and the applications they write, reducing operational overhead and increasing security and compliance. All Teleport capabilities like audit logs, session recordings, user revocation and more are automatically available to machine users.
The same identity-based access for engineers and applications illustration
Audit logs

Achieve unprecedented visibility into infrastructure access for machine users so you can meet and exceed compliance objectives.

Session recordings

Machine-initiated sessions across your entire infrastructure are recorded and stored in a storage solution of your choice. Session recordings are useful for forensic or educational purposes.

Access termination

Instantly revoke machine user access any time with ease using a single command or automate revocation through integration with your SIEM.

Reduce blast radius of supply chain attacks

Automation is key to delivering software quickly, but it also opens up the threat of supply chain attacks that quickly go from compromised dependency to account takeover. By automatically implementing least privilege for all infrastructure resources and applications, Teleport Machine ID enables you to leverage heavy automation for speed without having to worry about a compromised CI/CD worker taking over your infrastructure.
Reduce blast radius of supply chain attacks illustration
Role-based access

Every machine session is protected with the same granular role-based access controls (RBAC) that apply to engineers. An intern shouldn’t have access to production. Neither should a hacked CI/CD worker.

Configurable TTL and expiration

All machine users are assigned certificates with a configurable time-to-live (TTL) that automatically expires — no more forgetting to offboard a service.

IP-based certificate validation (coming soon)

Further harden your security posture by curating a list of IPs that can issue and use certificates.

Machine ID Demo

Short demo video highlighting the benefits of Teleport Machine ID. Providing access and short lived credentials to a Microservice and Ansible control node.

Works with everything you have

Teleport is open source and relies on open standards such as X.509 certificates, HTTPS, SAML, OpenID connect and others. Deployed as a single binary, it seamlessly integrates with the rest of your stack.

Amazon

Google Cloud

Azure

Linux

Jenkins

Bamboo

Drone

Ansible

Chef

Puppet

SaltStack

Kubernetes

...and many more

Background image

Easy to get started

Teleport is easy to deploy and use. We believe that simplicity and good user experience are key to first-class security.

Teleport consists of just two binaries.
  1. The tsh client allows users to login to retrieve short-lived certificates.
  2. The teleport agent can be installed on any server or any Kubernetes cluster with a single command.
Download Teleport
Terminal
# on a client
$ tsh login --proxy=example.com

# on a server

$ apt install teleport

# in a Kubernetes cluster

$ helm install

Background image

Try Teleport today

In the cloud, self-hosted, or open source
Get StartedView developer docs