Skip to main content
Teleport Identity Security - Introducing Teleport Identity Activity Center
Teleport Identity Security - Introducing Teleport Identity Activity Center

Length: 03:18

Teleport Identity Security

Teleport Identity Security

Teleport Identity Security centralizes access policy across your infrastructure, consolidates disparate identity audit logs, discovers shadow access, and alerts on access anomalies. It helps you quickly answer:

  • What resources can a specific user access?
  • What actions do users perform when connecting to systems?
  • How are users, roles, and resources connected?
  • Can users gain access to resources outside of defined RBAC policies?
  • Can users interact with resources in ways that bypass audit logging?
Teleport Identity Security

Visualize access relationships

Use Graph Explorer to explore real-time identity-to-resource paths, quickly spotting where access is allowed or denied. Run custom SQL queries using SQL Editor to analyze connections (identities, user group, and actions).

View Standing Privileges
Set up Crown Jewels
Manage Audit Events