explaingit

gravitational/teleport

📈 Trending20,345GoAudience · ops devopsComplexity · 4/5ActiveLicenseSetup · hard

TLDR

Unified access platform that replaces SSH keys and scattered credentials with short-lived certificates, SSO, and full audit logging for servers, databases, Kubernetes, and internal apps.

Mindmap

mindmap
  root((Teleport))
    What it does
      Replaces SSH keys
      Issues short-lived certs
      Unified audit trail
      Session recording
    Access control
      Single sign-on
      Role-based permissions
      Two-factor auth
      Automatic revocation
    Infrastructure
      Works behind firewalls
      Encrypted tunnels
      Kubernetes compatible
      Standard SSH tools
    Use cases
      Production access
      Compliance logging
      Team onboarding
      Multi-cloud setup

Things people build with this

USE CASE 1

Replace scattered SSH keys and database passwords with a single certificate authority that your team logs into via GitHub or Okta.

USE CASE 2

Record and replay every database query, server command, and Kubernetes action for compliance audits and incident investigation.

USE CASE 3

Let engineers access production servers inside private networks without opening inbound firewall ports or managing bastion hosts.

USE CASE 4

Enforce role-based access policies so junior developers can only reach staging, while senior engineers can access production.

Tech stack

GoSSHKubernetesLinuxSSOTLS

Getting it running

Difficulty · hard Time to first run · 1day+

Requires running a certificate authority service, configuring SSO integration, and setting up multiple infrastructure components (auth server, agent, audit logging) before any credential access works.

Use freely for any purpose, including commercial use, as long as you keep the copyright notice and license text.

In plain English

Teleport is an open-source infrastructure access platform that centralizes and secures how teams connect to servers, databases, Kubernetes clusters, internal web applications, and Windows desktops. The problem it solves is the operational and security complexity of managing access to infrastructure: in a typical company, different tools handle SSH keys for servers, separate credentials for databases, and yet more tokens for Kubernetes, with no unified audit trail and inconsistent security enforcement. Teleport replaces all of that with a single system. Instead of distributing long-lived SSH keys or passwords, it acts as a certificate authority that issues short-lived, time-limited certificates for every connection. When a certificate expires, access is automatically revoked, no manual key rotation required. Every session is authenticated via single sign-on (SSO) through providers like GitHub, Okta, or Active Directory, with two-factor authentication enforced across all resource types. Role-based access control determines who can reach what, and every connection is logged with full session recording that can be replayed later for compliance or troubleshooting. Teleport also solves the problem of accessing resources behind firewalls and NAT gateways: it sets up encrypted tunnels so that servers inside private networks can register with a central Teleport cluster without opening inbound firewall ports. The whole system is distributed as a single Go binary that acts as different components depending on how it is configured. It runs on Linux, can be deployed on Kubernetes, and is fully compatible with standard SSH clients and tools. It is primarily used by engineering and DevOps teams at companies that need auditable, policy-enforced access to their production infrastructure.

Copy-paste prompts

Prompt 1
How do I set up Teleport as a certificate authority to replace SSH keys for my team's servers?
Prompt 2
Show me how to configure Teleport to log in via GitHub SSO and enforce two-factor authentication for all database access.
Prompt 3
What's the simplest way to deploy Teleport on Kubernetes so my cluster can use it for access control?
Prompt 4
How do I use Teleport to let my team access servers behind a NAT gateway without opening inbound firewall rules?
Prompt 5
Can I use Teleport with my existing SSH clients and tools, or do I need to rewrite my scripts?
Open on GitHub → Explain another repo

Generated 2026-05-18 · Model: sonnet-4-6 · Verify against the repo before relying on details.