Teleport Feature Matrix
The Teleport feature matrix lists capabilities of the Teleport Infrastructure Identity Platform, organized by product.
The Teleport Identity Infrastructure Platform modernizes identity, access, and policy for infrastructure, for both human and non-human identities. Products include:
- Teleport Zero Trust Access
- Teleport Machine & Workload Identity
- Teleport Identity Governance
- Teleport Identity Security
Teleport Zero Trust Access
Teleport Zero Trust Access provides engineers with least privileged access to applications, servers, databases, Kubernetes clusters, and other resources across distributed infrastructures.
Enterprise (Cloud) | Enterprise (Self-Hosted) | Community Edition | |
---|---|---|---|
User identity. Authenticate users without passwords: | |||
Single Sign-On | GitHub, Google Workspace, Microsoft Entra ID, Okta, SailPoint, OIDC, SAML, Teleport | GitHub, Google Workspace, Microsoft Entra ID, Okta, SailPoint, OIDC, SAML, Teleport | GitHub |
User & Group Provisioning & Deprovisioning (SCIM & Custom Protocols), including Okta, Microsoft Entra ID, and SailPoint | Available In Teleport Identity Governance | Available In Teleport Identity Governance | ✖ |
Hardware Private Key Support (e.g., via YubiKey) | ✔ (External-connected HSM/KMS coming soon) | ✔ | ✖ |
Per-Session MFA | ✔ | ✔ | ✔ |
Resource identity. Assign a cryptographic identity to every Teleport Protected Resource: | |||
Protecting: MCP Servers, Applications, Databases, Kubernetes Clusters, Linux Servers, Windows Servers, Windows Desktops, Cloud Consoles & Resources (AWS, Azure, GCP), GitHub | ✔ | ✔ | ✔ (does not include Oracle support) |
Secure remote access. Zero-trust, auditable access to your infrastructure: | |||
Dynamic, self-updating inventory | ✔ | ✔ | ✔ |
Supports MCP servers, SSH, RDP, Kubernetes, Databases, AWS, Azure, GCP API and CLI, Web applications and services, TCP endpoints for Linux, Windows and MacOS. | ✔ | ✔ | ✔ |
Machines and workloads | Available in Teleport Machine & Workload Identity | Available in Teleport Machine & Workload Identity | Available in Teleport Machine & Workload Identity |
Agentless Integration with OpenSSH Servers | ✔ | ✔ | ✔ |
IP-Based Restrictions | ✔ | ✔ | ✖ |
Teleport VNet | ✔ | ✔ | ✔ |
Short-lived privileges. Ephemeral authorization granted through short-lived certificates: | |||
Role-Based Access Control | ✔ | ✔ | ✔ |
Just-in-Time Access Requests & Reviews | Available in Teleport Identity Governance | Available in Teleport Identity Governance | Only can request roles through CLI |
Session recording and interactive controls. Record, replay, join, and moderate interactive sessions: | |||
Session Recording with Playback | ✔ | ✔ | ✔ |
Enhanced Session Recording | ✔ | ✔ | ✔ |
Recording Proxy Mode | ✖ | ✔ | ✔ |
Live Sessions View | SSH, Kubernetes, Desktops, Databases | SSH, Kubernetes, Desktops, Databases | SSH, Kubernetes, Desktops, Databases |
Protocol-Level Events, for all supported resources | ✔ | ✔ | ✔ |
Dual Authorization | ✔ | ✔ | ✖ |
Session Sharing & Moderation | ✔ | ✔ | ✖ |
Identity-based audit events: | |||
Structured Audit Logs | ✔ | ✔ | ✔ |
Export to SIEM | ✔ | ✔ | ✔ |
Regulatory standards and frameworks: | |||
FedRAMP Control | ✖ | ✔ | ✖ |
FIPS-compliant binaries for FedRAMP (Low, Moderate, High) | ✖ | ✔ | ✖ |
DORA, SOX, ISO, NIS2, PCI DSS, SOC 2, HIPAA, NIST | ✔ | ✔ | Limited |
Teleport Machine & Workload Identity
Teleport Machine & Workload Identity is a non-human identity management solution that secures machine-to-machine communication with short-lived certificates, access control, and auditability.
Enterprise (Cloud) | Enterprise (Self-Hosted) | Community Edition | |
---|---|---|---|
Service Discovery: Live inventory of machine and workload identities for CI/CD jobs, microservices, and others | ✔ | ✔ | ✔ |
Issuance: Provisions cryptographic identities for machines and workloads, eliminating anonymous computing and the need for static over-privileged users and automating certificate rotation | ✔ | ✔ | ✔ |
Secretless Authentication: Eliminates the need for API keys and long-term secrets with short-lived certificates. | ✔ | ✔ | ✔ |
Ephemeral Authorization: With granular ABAC/RBAC for workload interactions | ✔ | ✔ | ✔ |
Auditability: Audit data, exportable to SIEMs, for compliance reporting & reviews | ✔ | ✔ | ✔ |
Integration: Supports open-source policy agents, dev tool APIs, and Cloud IAM. Others include Jenkins, Github actions, Terraform Cloud, AWS Roles anywhere and more. | ✔ | ✔ | ✔ |
HSM and TPM support for bootstrapping, joining, and encryption | ✔ | ✔ | ✖ |
Open Standards - JWT, SPIFFE, x509 and others to avoid vendor lock-in | ✔ | ✔ | ✔ |
External PKI integration: Configure an external PKI hierarchy to use for issuing SPIFFE SVIDs | ✔ | ✔ | ✖ |
Sigstore attestation: Enforce validation of container supply-chain security when issuing SPIFFE SVIDs | ✔ | ✔ | ✖ |
Teleport Identity Governance
Teleport Identity Governance hardens and monitors identities for both human and non-human identities.
Enterprise (Cloud) | Enterprise (Self-Hosted) | Community Edition | |
---|---|---|---|
JIT Access Requests: Grant only those privileges necessary to complete the task at hand. Remove the need for super-privileged accounts. | ✔ | ✔ | Only can request roles through CLI |
Automatic Access Requests & Approvals: Automate pre-defined workflows based on RBAC, ABAC, or context-based authorization. | ✔ | ✔ | ✖ |
Access Lists & Access Reviews: Review access requests using Slack, PagerDuty, Microsoft Teams, Jira and ServiceNow. Assign managers, automate mandatory reviews, and implement custom review logic using our API and Go SDK. Integrates with AWS Identity Center. | ✔ | ✔ | ✖ |
Session & Identity Locks: Lock suspicious or compromised identities and stop all their activity across all protocols and services. | ✔ | ✔ | ✖ |
Device Trust: Require an up-to-date, registered device for each authentication. Teleport uses TPMs and secure enclaves to give every device a cryptographic identity. Restrict further by resource or MDM-authorization. | ✔ | ✔ | ✖ |
User & Group Provisioning & Deprovisioning (SCIM & Custom Protocols), including Okta, Microsoft Entra ID, and SailPoint | ✔ | ✔ | ✖ |
Access Monitoring & Response: Detect overly broad privileges and inspect sessions that are not using strong protection, such as multi-factor authentication or device trust. Alert on access violations and purge unused permissions with automated access rules. | ✔ | ✔ | ✖ |
Okta integration: Configure Teleport to import and grant access to Okta applications and user groups. | ✔ | ✔ | ✖ |
Microsoft Entra ID directory synchronization and SSO integration | ✔ | ✔ | ✖ |
Teleport Identity Security
Teleport Identity Security identifies & mitigates risk in access paths.
Enterprise (Cloud) | Enterprise (Self-Hosted) | Community Edition | |
---|---|---|---|
Access Graph: Import and analysis of AWS, Azure, Okta, Microsoft Entra, GitLab and AWS IAM roles | ✔ | ✔ | ✖ |
Discover secrets, SSH Key Scanning | ✔ | ✔ | ✖ |
Discover standing privileges | ✔ | ✔ | ✖ |
Analyze shadow access and drift of security posture | ✔ | ✔ | ✖ |
Investigate identity vulnerabilities and potential exposures | ✔ | ✔ | ✖ |
Monitor critical assets with Crown Jewel Alerting | ✔ | ✔ | ✖ |
Session Recording Summaries | ✖ | ✔ | ✖ |
Identity Activity Center | ✖ | ✔ | ✖ |
Platform integrations, management, licensing, and deployment
Enterprise (Cloud) | Enterprise (Self-Hosted) | Community Edition | |
---|---|---|---|
Integrations: | |||
Infrastructure as Code (IaC): Terraform, K8s Operator | ✔ | ✔ | ✔ |
Cloud Providers: AWS, Azure, GCP |