Agentic AI
MCP bridges LLMs with your databases, internal APIs, and business systems. Teleport provides the access control and audit you need to govern those connections.
WHY UNSECURED MCP IS A DATA GOVERNANCE EMERGENCY
MCP has activated innovation centered on LLM interaction with data sources. Without proper controls, companies risk data exposure to unauthorized users. Teleport secures MCP as one of its many governed protocols.
Capability | ![]() | Without Teleport |
|---|---|---|
LLM-to-database access | Short-lived privileges issued per request. Every query attributed to an identity and logged. | Shared database credentials. No identity attribution. No way to distinguish queries by model or user. |
MCP server access | Teleport governs developer and LLM access to MCP servers — RBAC, JIT elevation, full session capture | MCP servers exposed internally with no authentication or access controls |
Private model access | Zero trust access to self-hosted inference endpoints. No public exposure. No static API keys in config. | Inference APIs on shared endpoints or exposed publicly. Static keys stored in configuration. |
Audit and compliance | Every query written to a structured tamper-resistant audit log. Session recordings and identity attribution satisfy regulatory requirements. Exportable to any SIEM. | No identity on record. No structured audit record. No defensible evidence for AI data access. |

OUTCOMES
Control AI Data Access
100%
of LLM queries to internal databases and APIs governed by access controls
0
unaudited AI queries reaching your production data
Eliminate Credential Risk
0
API keys or shared credentials required to connect LLMs to your infrastructure
0
static credentials exposed in LLM context or MCP config
Accelerate Compliance
80%
reduction in time spent preparing audit evidence for AI data access workflows
0
manual steps to capture and export AI session audit records
SECURE PRIVATE LLMS
Before an LLM can reach your databases or MCP servers, it needs a governed access path. Teleport secures self-hosted private models — from Ollama proof-of-concepts to production Kubernetes NVIDIA NIM deployments — without exposing the LLM API publicly.
Zero trust access to self-hosted LLMs — no public exposure, no API keys in config
Supports Ollama, NVIDIA NIM, and any OpenAI-compatible inference endpoint
Access via Teleport VNet — no DNS reconfiguration, no port forwarding
Every request is authenticated, authorized, and logged
SECURE MCP TO DATABASES AND APIS
The most sensitive business data lives in internal databases. Teleport secures MCP access to those databases and APIs — applying the same role-based access control (RBAC), just-in-time (JIT), and session recording used for human engineers to every LLM query.
RBAC and ABAC enforced on every LLM-to-database query
JIT elevation for access to sensitive or production data stores
Full query-level audit logs that capture successful and failed requests
Supports PostgreSQL, MySQL, MongoDB, and all Teleport-supported database protocols
SECURE ACCESS TO MCP SERVERS
MCP servers give LLMs access to your internal APIs and business functions, making them high-value targets. Teleport governs both developer access to MCP servers and LLM-to-MCP server queries through a single identity control layer. Discover what MCP servers exist, enforce policy, and capture everything.
Unified access control for developer and LLM access to MCP servers
Auto-discovery of MCP servers across your infrastructure
Session recordings for every MCP interaction that are playback and export ready
WEBINAR SPOTLIGHT
Securing AI and Infrastructure with Teleport + Anthropic's Model Context Protocol
Featuring Stephanie Walter, Analyst in Residence, HyperFRAME Research