Access Plane

Teleport Features

Nearly all Teleport features are available in the open source package.

Certificate Auth for SSH and K8s

Teleport: Certificate Auth for K8s

Managing static SSH keys can lead to increased operational overhead and may lead to security vulnerabilities. The industry best practice is to use certificate-based authentication for SSH and Kubernetes. Learn more about certificate-based authentication.

Single Sign-On (SSO)

Teleport: Single Sign-On SSO

Teleport integrates into an existing company identity management. This allows DevOps, developers and other end-users to access computing infrastructure via the same SSO policy. Learn more about SSO for all computing resources.

Kubernetes Access Management

Teleport: Kubernetes Access Management

Teleport works by being a unified gateway for both Kubernetes and SSH sessions. This allows to synchronize SSO, role-based access controls and audit logging for both protocols. Learn more about managing access to Kubernetes.

Audit Log

Audit Log

Restricting access and granting specific permissions through role-based access controls is the first step to securing your infrastructure. The next step is to log all activity across your infrastructure. Learn more about unified audit logging for all computing resources.

IoT and Edge Connectivity

Iot and Edge Connectivity

Teleport provides access to SSH servers and Kubernetes clusters anywhere in the world, behind NAT. From restaurants to autonomous vehicles, no VPN required. Learn more about SSH and Kubernetes edge access

Session Recording

Teleport Session Recording

Privileged session recording, or SSH session recording, means recording the user’s actual screen during their SSH session for real-time or later playback. Learn more about session recording for SSH and kubectl.

Trust Federation

Teleport Trust Federation

Teleport’s “Trusted Clusters” capability allows organizations to partition their infrastructure and grant access to each other. Managed service providers and contract-based DevOps teams take advantage of Teleport’s Trusted Clusters to manage servers for their clients.

Role-Based Access Controls (RBAC)

Teleport Enterprise Features

Role-Based Access Control (RBAC) is the practice of managing privileged access to infrastructure through a central directory of users, roles, and teams. Authorization is granted to groups (or roles) within a company directory. Learn more about Role-Based Access Controls.

Pro and Enterprise Features

Enterprise Single Sign-On (SSO)

Teleport Enterprise Single Sign-On SSO

Teleport integrates into a company's existing company directory and SSO system. Enterprise Teleport supports all major SSO providers, including Okta, Sailpoint, Active Directory, OneLogin, G Suite, Auth0 and many others.

FedRamp & Soc 2

Teleport FedRAMP

Teleport can help implement common compliance standards such as SOC2 or FedRAMP for SSH and Kubernetes access. Learn more about FedRAMP comliance for SSH and Kubernetes

Access Workflows

Teleport Access Workflows

Teleport allows users to request elevated privileges in the middle of their command-line sessions. Privilege elevation requests can be approved or denied via ChatOps in Slack & PagerDuty or anywhere else via flexible Authorization Workflow API.

Try Teleport today

In the cloud, self-hosted, or open source

View developer docs

This site uses cookies to improve service. By using this site, you agree to our use of cookies. More info.