Teleport Identity Security
Teleport Identity Security centralizes access policy across your infrastructure, consolidates disparate identity audit logs, discovers shadow access, and alerts on access anomalies. It helps you quickly answer:
- What resources can a specific user access?
- What actions do users perform when connecting to systems?
- How are users, roles, and resources connected?
- Can users gain access to resources outside of defined RBAC policies?
- Can users interact with resources in ways that bypass audit logging?

Use cases
Expose hidden access risks
Scan for insecure SSH keys and access paths
Identify over-privileged users
Identify users with excessive standing privileges
Monitor changes to critical resources
Monitor, alert on, and visualize access changes
Alert on anomalous activity
AI alerting on risky access patterns in your infrastructure
Unify logs from key systems
Unify logs from Okta, AWS, GitHub, and more
Query roles, groups, and permissions
Create custom-tailored queries w/the SQL Editor
Visualize access relationships
Use Graph Explorer to explore real-time identity-to-resource paths, quickly spotting where access is allowed or denied. Run custom SQL queries using SQL Editor to analyze connections (identities, user group, and actions).
View Standing Privileges
Set up Crown Jewels
Manage Audit Events
Integrations
GitHub
Connect GitHub and stream audit logs, map permissions, and track user behavior to stay ahead of access issues.
Okta
Integrate your Okta account to visualize your access policies, user roles, and group memberships.
AWS
Leverage the power of Access Graph by connecting AWS account to visualize IAM roles, policies, and access relationships.
Teleport
Connect Teleport audit logs to trace the full identity chain from authentication through resource access, enabling ...