teleport/docs/4.0/index.md
2020-11-19 10:22:48 -08:00

6.6 KiB

Introduction

What is Teleport?

Gravitational Teleport is a gateway for managing access to clusters of Linux servers via SSH or the Kubernetes API. It is intended to be used instead of traditional OpenSSH for organizations that need to:

  • Secure their infrastructure and comply with security best-practices and regulatory requirements.
  • Have complete visibility into activity happening across their infrastructure.
  • Reduce the operational overhead of privileged access management across both traditional and cloud-native infrastructure.

Teleport aims to be a cloud-native SSH solution, i.e. it makes it natural to think of environments, not servers. Below is the list of most popular Teleport features:

  • Single SSH/Kubernetes access gateway for an entire organization.
  • SSH certificate based authentication instead of static keys.
  • The ability to manage trust between teams, organizations and data centers.
  • SSH/Kubernetes access into behind-firewall environments without any open ports.
  • Role-based access control (RBAC) for SSH.
  • A single tool ("pane of glass") to manage RBAC for both SSH and Kubernetes.
  • Audit log with session recording/replay.
  • Kubernetes audit log, including the recording of interactive commands executed via kubectl.
  • The same workflows and ease of that they get with familiar ssh / kubectl commands.
  • Ability to run in "agentless" mode, i.e. most of Teleport features are available on clusters with pre-existing SSH daemons, usually sshd.

Teleport is available through the free, open source edition ("Teleport Community Edition") or a commercial edition ("Teleport Enterprise Edition").

Operating System Support

Teleport is officially supported on the platforms listed below, it is worth noting that the open source community has been successful building and running Teleport on UNIX variants other than Linux [2].

Operating System Teleport Client Teleport Server
Linux v2.6+ yes yes
MacOS v10.12+ yes yes
Windows [1] yes [1] no

[1] Teleport server does not run on Windows yet, but tsh (the Teleport client) can be used on Windows to execute tsh login to retrieve a user's SSH certificate and use it with ssh, the OpenSSH client, running on a Windows client machine.

[2] Teleport is written in Go and it is theoretically possible to build it on any OS supported by the Golang toolchain.

Teleport Community

The Community Edition is on Github if you want to dive into the code. This documentation is also available in the Github repository, so feel free to create an issue or pull request if you have comments.

  • Quickstart Guide - A quick tutorial to show off the basic capabilities of Teleport. A good place to start if you want to jump right in.
  • Teleport Architecture - This section covers the underlying design principles of Teleport and a detailed description of Teleport architecture. A good place to learn about Teleport's design and how it works.
  • User Manual - This manual expands on the Quickstart and provides end users with all they need to know about how to use Teleport.
  • Admin Manual - This manual covers installation and configuration of Teleport and the ongoing management of Teleport.
  • FAQ - Common questions about Teleport.

Teleport Enterprise

Teleport Enterprise is built around the open-source core in Teleport Community, with the added benefits of role-based access control (RBAC) and easy integration with identity managers for single sign-on (SSO). Because the majority of documentation between the Community and Enterprise Editions overlap, we have separated out the documentation that is specific to Teleport Enterprise.

  • Teleport Enterprise Introduction - Overview of the additional capabilities of Teleport Enterprise.
  • Teleport Enterprise Quick Start - A quick tutorial to show off the basic capabilities of Teleport Enterprise. A good place to start if you want to jump right in.
  • RBAC for SSH - Details on how Teleport Enterprise provides Role-based Access Controls (RBAC) for SSH.
  • SSO for SSH - Overview on how Teleport Enterprise works with external identity providers for single sign-on (SSO).

Guides

We also have several guides that go through the most typical configurations and integrations.

  • Okta Integration - How to integrate Teleport Enterprise with Okta.
  • ADFS Integration - How to integrate Teleport Enterprise with Active Directory.
  • One Login Integration - How to integrate Teleport Enterprise with One Login.
  • OIDC Integration - How to integrate Teleport Enterprise with identity providers using OIDC/OAuth2.
  • Kubernetes Integration - How to configure Teleport to serve as a unified gateway for Kubernetes clusters and clusters of regular SSH nodes.

Support and Contributing

We offer a few different options for support. First of all, we try to provide clear and comprehensive documentation. documentation is also available in the Github repository, so feel free to create a PR or file an issue if you think improvements can be made.

If you still have questions after reviewing our docs, you can also:

  • Join the Teleport Community to ask questions. Our engineers are available there to help you.
  • If you want to contribute to Teleport or file a bug report/issue, you can do so by creating an issue in Github.
  • If you are interested in Teleport Enterprise or more responsive support during a POC, we can also create a dedicated Slack channel for you during your POC. You can reach out to us through our website to arrange for a POC.

Teleport is made by Gravitational. We hope you enjoy using Teleport. If you have comments or questions, feel free to reach out to the Gravitational Team: info@gravitational.com.