In this video, we demo Teleport 3.0 and its new support for acting as a privileged access management gateway for Kubernetes.
In this talk, we'll review legacy SSH patterns relative to new way teams manage, deploy, and troubleshoot their applications running on elastic infrastructure. Along the way, Kevin will demo Teleport (https://github.com/gravitational/teleport), an open source re-implementation of SSH using Google's golang crypto and show how to cross the chasm from traditional SSH anti-patterns into fancy new orchestrated worlds with automatically expiring access certificates.
In this guide we go through the basics of SSH access management and discuss the best practices for managing access to modern, elastic infrastructure environments.
Infosec and systems engineers can secure SSH access to their infrastructure, meet compliance requirements, reduce operational overhead, and have complete visibility into access and behavior.
This report documents the findings of a second-run, source-assisted penetration test against the Teleport software maintained by Gravitational. Specifically in scope were all three editions of Gravitational, namely Open-Source, Professional and Enterprise.
This is a quick 2 minute demo of how to use Teleport to access servers behind firewalls through its Trusted Clusters feature.
This report documents the findings of a penetration test and source code audit against the Teleport software maintained by Gravitational.
This is a demo of Gravitational Teleport, the SSH infrastructure for clusters created by Gravitational Inc.