What is Teleport?
Teleport makes it easy for users to securely access infrastructure and meet the toughest compliance requirements. Teleport replaces shared credentials with short-lived certificates and is completely transparent to client-side tools.
Teleport is a tool in the Cloud Access Management category of a tech stack.
Who uses Teleport?
10 companies reportedly use Teleport in their tech stacks, including Buzzvil, Cozero, and Full Picture.
22 developers on StackShare have stated that they use Teleport.
- Isolate critical infrastructure and enforce 2FA when accessing SSH servers, Kubernetes clusters, databases, applications, and Windows desktops/servers
- Provide role-based access controls (RBAC) using short-lived certificates and your existing identity management service
- Log and record session activity for full auditability
- Forget about managing keys, VPNs, firewalls, jump boxes, or IPs
- Implement protocols such as SSH, RDP, HTTPS, Kubernetes API, MySQL, PostgreSQL, and others
- Supports SAML, OIDC
Teleport Alternatives & Comparisons
What are some alternatives to Teleport?
See all alternatives
warp lets you securely share your terminal with one simple command: warp open. When connected to your warp, clients can see your terminal exactly as if they were sitting next to you. You can also grant them write access, the equivalent of handing them your keyboard.
It enables you to manage access to AWS services and resources securely. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources.
Simple and secure remote access — to any system anywhere based on trusted identity. It enables practitioners and operators to securely access dynamic hosts and services with fine-grained authorization without requiring direct network access.
AWS Service Catalog
AWS Service Catalog allows IT administrators to create, manage, and distribute catalogs of approved products to end users, who can then access the products they need in a personalized portal. Administrators can control which users have access to each application or AWS resource to enforce compliance with organizational business policies. AWS Service Catalog allows your organization to benefit from increased agility and reduced costs because end users can find and launch only the products they need from a catalog that you control.
It provides enterprise identity governance solutions with on-premises and cloud-based identity management software for the most complex challenges.