Teleport — Secure Infrastructure Access Platform
Teleport provides identity-based, zero-trust access to servers, Kubernetes clusters, databases, and web applications. It replaces VPNs and shared credentials with certificate-based authentication, session recording, and unified access controls.
What it is
Teleport is an open-source platform that provides identity-based access to servers, Kubernetes clusters, databases, and internal web applications. It replaces traditional VPNs and SSH key management with short-lived certificates, session recording, and role-based access control.
Teleport targets DevOps teams and security engineers who need auditable access to production infrastructure without distributing static credentials. It supports SSH, Kubernetes, PostgreSQL, MySQL, MongoDB, Redis, and web app proxying.
How it saves time or tokens
Without Teleport, onboarding a new engineer means distributing SSH keys, configuring VPN credentials, managing jump hosts, and hoping nobody leaks a private key. Teleport centralizes all access through a single identity provider. Certificate-based auth means credentials auto-expire -- no more rotating SSH keys manually.
For compliance, every session is recorded and searchable. Audit logs show who accessed what, when, and what commands they ran.
How to use
- Install and start a Teleport cluster:
# Install Teleport
curl https://goteleport.com/static/install.sh | bash
# Configure and start
sudo teleport configure --cluster-name=my-cluster -o /etc/teleport.yaml
sudo teleport start
- Add nodes (servers) to the cluster:
# On each server
teleport node configure --token=<join-token> --proxy=teleport.example.com
teleport start
- Access via the web UI or CLI:
# Login
tsh login --proxy=teleport.example.com
# SSH to a node
tsh ssh user@node-name
# Access Kubernetes
tsh kube login my-cluster
kubectl get pods
Example
# List available servers
tsh ls
# Node Name Address Labels
# ---------- ---------- -------
# web-prod-01 10.0.1.5:3022 env=prod,role=web
# db-staging-01 10.0.2.8:3022 env=staging,role=db
# SSH with session recording
tsh ssh admin@web-prod-01
# Session is automatically recorded and auditable
# Access a database through Teleport
tsh db connect --db-name=mydb postgres-prod
# Kubernetes access
tsh kube login prod-cluster
kubectl get deployments
Related on TokRepo
- AI Tools for DevOps -- Infrastructure automation tools for modern teams
- AI Tools for Security -- Security-focused tools and frameworks
Common pitfalls
- Teleport requires a running auth server (the cluster). If the auth server goes down, new connections cannot be established. Run it in HA mode for production.
- Certificate TTLs default to 12 hours. Adjust this in the role configuration if your workflows need longer sessions.
- Database access requires configuring Teleport as a database proxy. Each database type (Postgres, MySQL, MongoDB) has its own setup steps.
Frequently Asked Questions
Yes, for infrastructure access. Teleport provides identity-aware access to SSH, Kubernetes, databases, and web apps without a VPN tunnel. Users authenticate once and get short-lived certificates for each resource.
Yes. Teleport integrates with SAML and OIDC identity providers including Okta, Azure AD, Google Workspace, and GitHub. Users authenticate through their existing SSO and receive Teleport certificates.
Teleport has a Community Edition (open-source, Apache 2.0) and commercial editions (Team and Enterprise) with additional features like FedRAMP compliance, Hardware Security Modules, and premium support.
Every SSH and Kubernetes session is recorded as a structured event log. Recordings can be replayed in the web UI or exported for compliance. Database queries are logged as audit events.
Yes. Teleport can proxy connections to AWS RDS, Azure Database, and GCP Cloud SQL instances. It adds certificate-based auth and audit logging on top of cloud-managed databases.
Citations (3)
- Teleport GitHub Repository— Teleport provides certificate-based access to infrastructure
- Teleport Documentation— Supports SSH, Kubernetes, databases, and web app access
- Teleport Access Controls— Session recording and audit logging for compliance
Related on TokRepo
Discussion
Related Assets
Hugging Face Datasets — Access and Process ML Datasets at Scale
Hugging Face Datasets is a Python library for efficiently loading, processing, and sharing machine learning datasets with Apache Arrow-backed memory mapping, streaming support, and access to thousands of community datasets on the Hub.
OpenVoice — Instant Voice Cloning with Tone and Style Control
OpenVoice is an open-source voice cloning framework from MyShell AI that reproduces a speaker's voice from a short audio sample while giving independent control over emotion, accent, rhythm, and language.
Segment Anything (SAM) — Foundation Model for Image Segmentation
Segment Anything Model by Meta AI provides a promptable segmentation system that can isolate any object in an image given points, boxes, or text prompts, enabling zero-shot transfer to new visual domains.