A single sign-on allows discovery and instant access to all layers of your tech stack behind NAT across clouds, data centers, or on the edge. There is no more juggling of shared secrets, SSH keys, or hopping between VPNs and multiple access points.
# use your favorite programming language to customize access: def access_request_callback(req): is_admin = 'admin' in req.roles jira_ticket = jira.get_ticket(req.id) team_name = req.attributes['team'] # Only allow users with an 'admin' role if not is_admin: raise AccessDenied("Not a member of 'admin' role.") # Contractors must provide a valid Jira ticket if team_name == "contractor" and not jira_ticket: raise AccessDenied("Please provide an active JIRA ticket.")
Use Teleport to adopt industry best practices for access across all protocols and all environments with minimal configuration. Easily enforce MFA, RBAC, and SSO using identity-based short-lived certificates.
Teleport records interactive sessions, filesystem changes, data transfers, command executions and other security events across all environments into a structured audit log, making it easy to see what’s happening and who is responsible.
Teleport is open source and it relies on open standards such as X.509 certificates, HTTPS, SAML, OpenID connect and others. Deployed as a single-binary, it seamlessly integrates with the rest of your stack.
Teleport is easy to deploy and use. We believe that simplicity and good user experience are key to first-class security.
tshclient allows users to login to retrieve short-lived certificates.
teleportagent can be installed on any server or any Kubernetes cluster with a single command.
# on a client $ tsh login --proxy=example.com # on a server $ apt install teleport # in a Kubernetes cluster $ helm install
We are trying to solve the problem every company has - how to run and access software running anywhere in a secure and compliant manner. We call this environment-free computing.Learn more
In the cloud, self-hosted, or open source