An identity-aware access proxy that provides secure connectivity, authentication, and audit for SSH, Kubernetes, databases, and web apps.
Teleport is an open-source infrastructure access platform that provides secure connectivity, authentication, authorization, and audit logging for servers, Kubernetes clusters, databases, and internal applications. It replaces insecure practices like long-lived SSH keys, passwords, and VPNs with certificate-based authentication and a unified access proxy, enforcing zero-trust principles across hybrid and multi-cloud environments.
Platform engineers, DevOps teams, and security administrators managing access to distributed infrastructure across cloud and on-premises environments, particularly those seeking to eliminate credential sprawl and enforce least-privilege access.
Developers choose Teleport for its comprehensive protocol support (SSH, Kubernetes, databases, RDP), elimination of long-lived secrets, seamless SSO integration, and detailed session auditing—all packaged as a single, scalable binary that simplifies infrastructure security without sacrificing usability.
The easiest, and most secure way to access and protect all of your infrastructure.
Consolidates access for SSH, Kubernetes, databases, RDP, and web apps through a single proxy, eliminating tool sprawl as highlighted in the README's key features list.
Replaces long-lived passwords and SSH keys with short-lived, auto-expiring certificates for all protocols, enforcing zero-trust principles without credential rotation headaches.
Records and audits activity across SSH, Kubernetes, database, and web sessions, providing detailed logs for compliance and security investigations as described in the features.
Supports GitHub Auth, OpenID Connect, and SAML with providers like Okta, enabling single sign-on for all infrastructure resources without custom integration work.
Building from source requires multiple dependencies (Go, Rust, Node.js, libfido2) and careful configuration, making local development and deployment more involved than drop-in solutions.
Limited to supported protocols (e.g., no native SMB or legacy system access); custom or niche resources may require workarounds or fall outside Teleport's scope.
Running a self-hosted Teleport cluster adds management burden for updates, scaling, and troubleshooting compared to simpler access methods like SSH keys or managed VPNs.
Chat over SSH.
A ssh server that knows who you are. $ ssh whoami.filippo.io
:computer: Get seamless remote access to any Linux device. Centralized SSH for the edge and cloud computing
:tophat: simple, fun and transparent SSH (and telnet) bastion server
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.