An inside look at how we designed a discovery protocol for Teleport.
How are some big, well-known companies approaching SSH? We took a look at three who are setting an example for others to follow.
Secure Shell (SSH) is a widely used Transport Layer Protocol to secure connections between clients and servers. SSH is also the underlying protocol that Teleport uses to secure connections between clients and servers. In this article, we walk through how SSH really works.
Auth0 selected Teleport by Gravitational to provide secure access to their customers’ infrastructure, whether it’s hosted in a public or private environment.
This new release of Teleport brings support for EKS. Now Teleport can act as a single authentication gateway for Kubernetes clusters running on EKS
Given our experience with SSH we are often asked about restricted shells. In this article we cover some common ways so-called 'secure restricted shells' are implemented to show what works and what doesn't work.
An overview of Teleport's SSH certificate authority pinning capability and discussion of how HTTP public key pinning (HPKP) can be used to improve SSH CA user experience.
The recently discovered xterm.js vulnerability shows how bugs are hard to kill as technology evolves.
Today we are announcing the new release of Teleport. This version adds support for Kubernetes protocol, becoming a universal security gateway for both SSH and Kubernetes clusters.
This release of Teleport adds support for scp protocol via a Web UI, brings performance improvements for large clusters and adds more flexibility in configuring your infrastructure for PCI, SOC2, GDPR and other SSH compliance/audit use cases.
This post discusses the different approaches that can be taken to gracefully restart an application and provides a working sample that can be used to dig into the details. This post should be interesting to developers and SREs who build and maintain services written in Go.
Cyber security researches from Cure53 have completed a full security audit of Gravitational's privileged access management layer for SSH and Kubernetes. Here is a brief summary of their findings and links to the full source-assisted penetration test report.
We are happy to announce the release of v2.6 of Teleport. This is a major release which delivers several important new features. The source code of this release has also gone through a security audit performed by Cure53.
This post is the first of an ongoing series about interesting issues and bugs that the Teleport team has worked on. This post, about missing SIGINTs and SSH, should be interesting for developers who leverage signal handling in terminal-based applications written in Go.
A customer recently asked how to utilize Teleport's RBAC mechanism to restrict access to critical nodes within an OpenSSH cluster. This blog post explains how to do this.
This release of Teleport brings easier AWS deployments at scale and includes several usability enhancements.
The Teleport Proxy requires a valid x509 certificate to serve content like the Web UI via HTTPS. In this post we show how to configure the Teleport Proxy to use Let's Encrypt for this.
There are many strategies and products to help you manage SSH keys. This blog post argues that instead of managing SSH keys one should switch to short-lived SSH certificates instead.
In this post we show you how to use Github as an identity manager to control who has access to your server infrastructure through SSH
In this blog post we show how to record SSH sessions with OpenSSH sshd using Teleport as a recording proxy
We cover the difference between OpenSSH servers and Teleport SSH node service for Teleport clusters.
Announcing the new version of Teleport SSH server. Two major new features of this release are recording of OpenSSH sesssions for audit purposes and authentication via Github OAuth2.
We are happy to announce the release of v2.3 of Teleport. This release focuses on making Teleport much easier to configure and use.
This post covers the new features and improvements that made it into 2.2 release.
How we use Teleport to manage Kubernetes clusters across multiple teams, regions or organizations.
Teleport 2.0.5 Security Fixes
How do you let your employees access company AWS infrastructure using their Github credentials? How do you restrict parts of your infrastructure to certain Github teams? How do you configure SSH to use Github credentials? This blog post covers it all.
We review the Vendor Security Alliance's security questionnaire to look at the security related costs of running SaaS vs On-prem.
Announcing the official 2.0 version of Teleport
We talk about a new feature in Teleconsole: you can turn any laptop into a secure and publicly accessible SSH server wich uses Github SSH keys for authentication.
This tutorial covers aggregating SSH access logs from your server fleet into SumoLogic using Teleport
We are excited to announce that Teleport now supports Universal 2nd Factor out of the box.
Part 1 of the series of articles about managing Kubernetes clusters across multiple teams, regions or organizations.
Announcing the release of Teleconsole 0.3.1 with a nice list of improvements. For example you can instantly (and securely!) SSH into a laptop of any Github user who trusts you.
We are announcing the official 1.0 version of Teleport: SSH server with built-in bastion and audit!
We are excited to announce the new open source project: Gravitational Teleport, which in some cases can be a great replacement for OpenSSH.
This site uses cookies to improve service. By using this site, you agree to our use of cookies. More info.