Gravitational Teleport is a gateway for managing access to clusters of Linux servers via SSH or the Kubernetes API. It is intended to be used instead of traditional OpenSSH for organizations that need to secure their infrastructure and comply with security best-practices and regulatory requirements. It helps in having complete visibility into activity happening across org infrastructure while reducing the operational overhead of privileged access management across both traditional and cloud-native infrastructure. Teleport aims to be a cloud-native SSH solution, i.e. it makes it natural to think of environments, not servers. Below is a list of the most popular Teleport features: -Single SSH/Kubernetes access gateway for an entire organization. -SSH certificate based authentication instead of static keys. -Avoid key distribution and trust on first use issues by using auto-expiring keys signed by a -cluster certificate authority (CA). -Enforce 2nd factor authentication. -Connect to clusters located behind firewalls without direct Internet access via SSH bastions. -Collaboratively troubleshoot issues through session sharing. -Discover online servers and Docker containers within a cluster with dynamic node labels. -The ability to manage trust between teams, organizations and data centers. -SSH/Kubernetes access into behind-firewall environments without any open ports. -Role-based access control (RBAC) for SSH. -A single tool ("pane of glass") to manage RBAC for both SSH and Kubernetes. -Audit log with session recording/replay. -Kubernetes audit log, including the recording of interactive commands executed via kubectl. -The same workflows and ease of use that devs get with familiar ssh / kubectl commands. -Ability to run in "agentless" mode, i.e. most Teleport features are available on clusters with pre-existing SSH daemons, usually sshd. -Teleport is available through the free, open source edition ("Teleport Community Edition") or a commercial edition ("Teleport Enterprise Edition").