Open-Awesome
CategoriesAlternativesStacksSelf-HostedExplore
Open-Awesome

© 2026 Open-Awesome. Curated for the developer elite.

TermsPrivacyAboutGitHubRSS
  1. Home
  2. SSH
  3. teleport

teleport

AGPL-3.0Gov18.7.2Self-Hosted

An identity-aware access proxy that provides secure connectivity, authentication, and audit for SSH, Kubernetes, databases, and web apps.

Visit WebsiteGitHubGitHub
20.2k stars2.0k forks0 contributors

What is teleport?

Teleport is an open-source infrastructure access platform that provides secure connectivity, authentication, authorization, and audit logging for servers, Kubernetes clusters, databases, and internal applications. It replaces insecure practices like long-lived SSH keys, passwords, and VPNs with certificate-based authentication and a unified access proxy, enforcing zero-trust principles across hybrid and multi-cloud environments.

Target Audience

Platform engineers, DevOps teams, and security administrators managing access to distributed infrastructure across cloud and on-premises environments, particularly those seeking to eliminate credential sprawl and enforce least-privilege access.

Value Proposition

Developers choose Teleport for its comprehensive protocol support (SSH, Kubernetes, databases, RDP), elimination of long-lived secrets, seamless SSO integration, and detailed session auditing—all packaged as a single, scalable binary that simplifies infrastructure security without sacrificing usability.

Overview

The easiest, and most secure way to access and protect all of your infrastructure.

Use Cases

Best For

  • Replacing traditional SSH bastion hosts and VPNs with identity-aware access
  • Enforcing least-privilege and Just-in-Time (JIT) access for Kubernetes clusters
  • Securing database access (PostgreSQL, MySQL, MongoDB) without password sprawl
  • Centralizing audit logs for SSH, Kubernetes, and database sessions
  • Implementing single sign-on (SSO) for all infrastructure resources
  • Providing secure access to internal web applications behind firewalls

Not Ideal For

  • Teams relying exclusively on cloud provider IAM with no need for cross-protocol access unification
  • Organizations with simple, static infrastructure where SSH key management suffices and audit requirements are minimal
  • Environments requiring real-time, low-latency access without any proxy overhead (e.g., high-frequency trading systems)
  • Projects heavily invested in legacy PAM solutions with strict regulatory compliance that Teleport may not fully replace

Pros & Cons

Pros

Unified Protocol Support

Consolidates access for SSH, Kubernetes, databases, RDP, and web apps through a single proxy, eliminating tool sprawl as highlighted in the README's key features list.

Certificate-Based Authentication

Replaces long-lived passwords and SSH keys with short-lived, auto-expiring certificates for all protocols, enforcing zero-trust principles without credential rotation headaches.

Comprehensive Audit Logging

Records and audits activity across SSH, Kubernetes, database, and web sessions, providing detailed logs for compliance and security investigations as described in the features.

Seamless SSO Integration

Supports GitHub Auth, OpenID Connect, and SAML with providers like Okta, enabling single sign-on for all infrastructure resources without custom integration work.

Cons

Complex Initial Setup

Building from source requires multiple dependencies (Go, Rust, Node.js, libfido2) and careful configuration, making local development and deployment more involved than drop-in solutions.

Protocol and Ecosystem Gaps

Limited to supported protocols (e.g., no native SMB or legacy system access); custom or niche resources may require workarounds or fall outside Teleport's scope.

Operational Overhead

Running a self-hosted Teleport cluster adds management burden for updates, scaling, and troubleshooting compared to simpler access methods like SSH keys or managed VPNs.

Frequently Asked Questions

Quick Stats

Stars20,171
Forks2,044
Contributors0
Open Issues2,629
Last commit1 day ago
CreatedSince 2015

Tags

#database-access#zero-trust#bastion#security#firewall#cluster#identity-management#golang#certificate#kubernetes-security#go#self-hosted#ssh

Built With

G
Go
K
Kubernetes
T
TypeScript
R
Rust
N
Node.js
D
Docker

Links & Resources

Website

Included in

SSH2.8k
Auto-fetched 1 day ago

Related Projects

ssh chatssh chat

Chat over SSH.

Stars5,879
Forks429
Last commit3 months ago
whostherewhosthere

A ssh server that knows who you are. $ ssh whoami.filippo.io

Stars2,345
Forks109
Last commit8 days ago
ShellHubShellHub

:computer: Get seamless remote access to any Linux device. Centralized SSH for the edge and cloud computing

Stars1,993
Forks178
Last commit1 day ago
sshportalsshportal

:tophat: simple, fun and transparent SSH (and telnet) bastion server

Stars1,926
Forks139
Last commit9 days ago
Community-curated · Updated weekly · 100% open source

Found a gem we're missing?

Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.

Submit a projectStar on GitHub