Teleport is a modern system for managing privileged access for elastic clusters. It is designed for information security best practices, including short-lived certificates, role-based access control and logging of all activity.
click to replay
Why Use Teleport?
doneRemoves the hassles of key management completely.
doneImproves security through the use of time-based access.
doneAllows for fine grained role based access controls (RBAC).
Additional Benefits of Teleport
All events are logged and SSH sessions are recorded for auditing to meet the strictest compliance standards.
Teleport has simple integration points with your existing identity manager, like Okta, Active Directory, G-Suite and others.
Works with OpenSSH
There is no need to install Teleport on all your servers. Teleport will work with OpenSSH currently on your servers.
Pricing that scales with you
Teleport is priced based on number of nodes you connect to through the Teleport Proxy and scales as your server fleet size grows.
We also offer customized license structures and terms of service for enterprise customers.
Teleport delivers the following features, whether you are using it to manage access to your Kubernetes clusters or underlying servers through SSH