ConfigsApr 13, 2026·3 min read

Teleport — Secure Infrastructure Access Platform

Teleport provides identity-based, zero-trust access to servers, Kubernetes clusters, databases, and web applications. It replaces VPNs and shared credentials with certificate-based authentication, session recording, and unified access controls.

TL;DR
Teleport replaces VPNs and shared credentials with certificate-based, zero-trust access to your infrastructure.
§01

What it is

Teleport is an open-source platform that provides identity-based access to servers, Kubernetes clusters, databases, and internal web applications. It replaces traditional VPNs and SSH key management with short-lived certificates, session recording, and role-based access control.

Teleport targets DevOps teams and security engineers who need auditable access to production infrastructure without distributing static credentials. It supports SSH, Kubernetes, PostgreSQL, MySQL, MongoDB, Redis, and web app proxying.

§02

How it saves time or tokens

Without Teleport, onboarding a new engineer means distributing SSH keys, configuring VPN credentials, managing jump hosts, and hoping nobody leaks a private key. Teleport centralizes all access through a single identity provider. Certificate-based auth means credentials auto-expire -- no more rotating SSH keys manually.

For compliance, every session is recorded and searchable. Audit logs show who accessed what, when, and what commands they ran.

§03

How to use

  1. Install and start a Teleport cluster:
# Install Teleport
curl https://goteleport.com/static/install.sh | bash

# Configure and start
sudo teleport configure --cluster-name=my-cluster -o /etc/teleport.yaml
sudo teleport start
  1. Add nodes (servers) to the cluster:
# On each server
teleport node configure --token=<join-token> --proxy=teleport.example.com
teleport start
  1. Access via the web UI or CLI:
# Login
tsh login --proxy=teleport.example.com

# SSH to a node
tsh ssh user@node-name

# Access Kubernetes
tsh kube login my-cluster
kubectl get pods
§04

Example

# List available servers
tsh ls
# Node Name       Address        Labels
# ----------      ----------     -------
# web-prod-01     10.0.1.5:3022  env=prod,role=web
# db-staging-01   10.0.2.8:3022  env=staging,role=db

# SSH with session recording
tsh ssh admin@web-prod-01
# Session is automatically recorded and auditable

# Access a database through Teleport
tsh db connect --db-name=mydb postgres-prod

# Kubernetes access
tsh kube login prod-cluster
kubectl get deployments
§05

Related on TokRepo

§06

Common pitfalls

  • Teleport requires a running auth server (the cluster). If the auth server goes down, new connections cannot be established. Run it in HA mode for production.
  • Certificate TTLs default to 12 hours. Adjust this in the role configuration if your workflows need longer sessions.
  • Database access requires configuring Teleport as a database proxy. Each database type (Postgres, MySQL, MongoDB) has its own setup steps.

Frequently Asked Questions

Is Teleport a VPN replacement?+

Yes, for infrastructure access. Teleport provides identity-aware access to SSH, Kubernetes, databases, and web apps without a VPN tunnel. Users authenticate once and get short-lived certificates for each resource.

Does Teleport support SSO?+

Yes. Teleport integrates with SAML and OIDC identity providers including Okta, Azure AD, Google Workspace, and GitHub. Users authenticate through their existing SSO and receive Teleport certificates.

Is Teleport free?+

Teleport has a Community Edition (open-source, Apache 2.0) and commercial editions (Team and Enterprise) with additional features like FedRAMP compliance, Hardware Security Modules, and premium support.

How does session recording work?+

Every SSH and Kubernetes session is recorded as a structured event log. Recordings can be replayed in the web UI or exported for compliance. Database queries are logged as audit events.

Can Teleport manage access to cloud-hosted databases?+

Yes. Teleport can proxy connections to AWS RDS, Azure Database, and GCP Cloud SQL instances. It adds certificate-based auth and audit logging on top of cloud-managed databases.

Citations (3)

Discussion

Sign in to join the discussion.
No comments yet. Be the first to share your thoughts.

Related Assets