Teleport logo

Teleport

Provides secure and audited access to Linux servers and Kubernetes clusters through SSH or browser-based SSH.

Made by Teleport

  • Chat

What is Teleport?

Teleport Assist is a powerful GPT-4-powered DevOps assistant that simplifies infrastructure management. It offers a comprehensive suite of features designed to streamline and secure access to your global infrastructure

Highlights

  • Identity-based Access: Teleport replaces insecure secrets like passwords, keys, and tokens with biometric and security module-based identity authentication, delivering phishing-proof zero-trust access for all engineers and services
  • Unified Access Platform: Teleport consolidates connectivity, authentication, authorization, and audit into a single source of truth for access policy across your entire infrastructure, replacing traditional VPNs, shared credentials, secrets vaults, and legacy PAM solutions
  • Open-source Transparency: Teleport is an open-source solution, allowing you to view the source code and contribute to the community, ensuring the best security practices are built-in
  • Compliance-ready: Teleport offers a self-hosted version that keeps access and data within corporate networks, enabling organizations to achieve compliance with standards such as FedRAMP and SOC2
  • Secretless Architecture: Teleport eliminates the use of passwords and keys, which are common security vulnerabilities, by replacing them with secure, short-lived certificates based on human and machine identity
  • Advanced Security and Compliance Features: Teleport provides a range of sophisticated capabilities, including dual authorization, session moderation, device verification, kernel-level logging, SSO support, session locking, and per-session MFA, to meet the stringent requirements of regulated environments.

Platforms

  • Web
  • Web-based

Languages

  • English

Social

Features

    • Log and record session activity for full

    • Provide role-based access controls (RBAC) using

    • Isolate critical infrastructure and enforce 2FA

    • Implement protocols such as SSH, RDP, HTTPS,

    • Forget about managing keys, VPNs, firewalls,

    • Supports SAML, OIDC