Teleport (software)
Teleport is an open-source tool that provides zero trust access to servers and cloud applications using SSH, Kubernetes, Database, Remote Desktop Protocol and HTTPS.[2][3] It can eliminate the need for VPNs by providing a single gateway to access computing infrastructure via SSH, Kubernetes clusters, and cloud applications via a built-in proxy.[4] Teleport started as an open source library used by the Gravity project [5] to enable secure software deployments into restricted and regulated environments. Teleport was open sourced as a standalone tool by Gravitational Inc. in 2016.[6] It is currently deployed in production by Samsung, NASDAQ, IBM, Ticketmaster, Epic Games and others.[7][8] It has been publicly audited by technology security companies like Cure 53[9] and Doyensec.[10][11] HistoryTeleport was built by Gravitational Inc, a company that specializes in Kubernetes-based application deployment and compliance. The security gateway protocol that became Teleport originated within a remote application management platform also built by Gravitational, called Gravity. Gravitational was a member of the 2015 Y Combinator cohort,[12] and Teleport was originally released in June 2016.[13] Teleport 3.0 was released in October 2018 and introduced Kubernetes integration.[14] Version 4.0 was released in 2019 and included support for IoT infrastructure and products.[15]
The open-source version of Teleport is known as Teleport Community and is available for download on GitHub. Gravitational Inc also offers a commercial version of Teleport (Teleport Enterprise) that includes features like role-based access control (RBAC).[17] FeaturesTeleport provides the following features, as detailed on GitHub:[2] Access ProxyTeleport proxy provides SSH and HTTPs access to servers, applications, and Kubernetes clusters across multiple data centers, cloud providers, and edge devices. Teleport proxy is identity-aware, i.e. it only allows certificate-based authentication by integrating with an identity manager such as GitHub, Google Apps, Okta or Active Directory, and others. Audit LogTeleport collects system events across all servers it is installed on and stores them in an audit log for compliance purposes. Auditable events include authentication attempts, file transfers, network connections, and file system changes made during an SSH session. The audit log can be stored on an encrypted file system, in Amazon DynamoDB and other cloud data stores. Session RecordingTeleport records interactive user sessions for SSH and Kubernetes protocols and stores them in the audit log. Stored sessions can be replayed via a built-in session player. Teleport uses eBPF for the low latency kernel level session recording. [18] IoT AccessServers running Teleport can be accessed by clients regardless of their physical location, even when they are using a cellular connection. Dynamic AuthorizationTeleport users can request a one-time elevation of permissions to complete a privileged task. Such requests can be approved or denied via chat ops tools such as Slack, Mattermost, or a custom workflow, implemented via Teleport API. Web UITeleport Proxy offers a web-based client for configuration, accessing servers via SSH and Kubernetes and for accessing the audit log. Teleport requires at least 1GB of virtual memory to be built and compiled. ArchitectureTeleport is written in Go programming language, and runs on UNIX-compatible operating systems, including Linux, macOS, and several BSD variants.[19] Teleport consists of two executables: The
References
|