Once you assimilated the teleport learning curve, Teleport is quite easy to deploy and maintain.
It offers very efficient bastion solution to access your systems wherever they are, including demilitarized zones (as long as there is a gateway to go out of course).
The trusted cluster feature is also a killer feature in our use-case as it allows to connect different clusters and control them in an unified way.
Also, the ability to reverse-proxy web apps and access them through Teleport allow us to provide a fully secured, 0-trusted access to internal apps not necessarily designed with best-practices regarding cyber security (if you know what I mean...). It's even possible to delegate authn & authz to Teleport using JWT tokens and so on ! Review collected by and hosted on G2.com.
The role managment, which is a central feature in Teleport, can be touchy to manage, especially while roles and cluster size is growing. The WebUI also miss some customization features. For example I'd like to configure hwo much assets are displayed in a page, or some customized views with specific filters... Review collected by and hosted on G2.com.
103 out of 104 Total Reviews for Teleport
Overall Review Sentiment for Teleport
Log in to view review sentiment.

Teleport allowed my organization to provide secure and manageable access (the only access) to a heterogenous group of resources. We have some k8s clusters, some cloud DB and some apps.
The very good SSO implementation (with roles mapping) was a decisive winner. It allow us to have team roles schema on our IDP and that was a highly sucessful and transformational change in our organization.
Our development and operations teams now have access to all they need and offboarding/onboardings within the teams are straightforward.
In addition, because roles can by highly configured, it allow us to have very good and proper security adequate resource access. Review collected by and hosted on G2.com.
What I believe that still need improvement is the DB setup. Each DB type with a diferenciate setup makes it difficult to add new DB types.
Also, some UI changes, were not liked by our guys. Review collected by and hosted on G2.com.
The tool itself was great for access management. Review collected by and hosted on G2.com.
Teleport has decided to end support for its community edition after pushing users to adopt it and build their ecosystem. See: https://goteleport.com/blog/teleport-community-license/
Anyone self-hosting CE Teleport now just got completely screwed over as they have been locked into a surprise ~$70/seat bill for enterprise edition (plus implementation fee, even though you're already hosting it and just need a license key now)! Or, you could rebuild your entire network identiy management system on short notice instead!
This is a huge middle finger to anyone who adopted their solution early on and helped build their ecosystem. There's clearly immense revenue pressure at Gravitational right now and I would absolutely expect to be continuouly screwed over by them in any business relationship after this move. Review collected by and hosted on G2.com.

Teleport allows us to control access to infrastructure in a secure and easy to use platform. It's very versatile as far as the variety of infrastructure it integrates with. The community Slack has been invaluable for finding solutions/assistance, and the Teleport team is quick to respond in Slack, patient, and willing to follow through with their support. We're using a self-hosted instance of the Community version. Review collected by and hosted on G2.com.
The documentation can be slightly lacking at times and some of the configuration must be done manually, even through the UI. Review collected by and hosted on G2.com.
Over the many years of using Teleport, it's been an essential piece of my infrastructure to help secure access, and centralize my infrastructure into one dashboard, without having to jump around. I can also classify resources using custom labels (which can use the output of commands or be a static value) which can directly feed into ACL's, I'm not sure how I could go without it. Review collected by and hosted on G2.com.
Sometimes the UI doesn't show all the level of detail you'd expect, but on the other hand the docs are very detailed so more often than not, what I'm looking for is explained there, just means I need to do a bit of hunting around. Regrettably, I'm still stuck on the Community Edition as Enterprise edition is cost prohibitive for my use case. Review collected by and hosted on G2.com.

The whole philosophy of zero trust approach in combination with delightful user experience for both the security team auditing the perimeter and the end user the devops engineer who uses the tool on a regular basis Review collected by and hosted on G2.com.
Nothing, the best option on the market for modern startups running cloud workload! Review collected by and hosted on G2.com.

- Unified access across all Infrastructure
- Zero trust Security Model
- Ease of Use
- Comprehensive Auditing and Logging
- Wide range of Integrations
- Customer Support Review collected by and hosted on G2.com.
- Learning Curve
- Mobile Experience
- Customization Review collected by and hosted on G2.com.

It is well thought out from a use and security standpoint. They have covered all teh baes. Of particular interest to us i steh Aadi capabiloities as we plan to have contractors monitor certain aspects of our production clusters. and can record and peer observe their activity, all bundled under a short lived access token. Review collected by and hosted on G2.com.
Very LIttle, the only issue for us is to figure out our OAuth integrations, we are unable to do this without deploying the enterprise version .. The OS version does allow github for oauth, however the roles do not map. Our user models will be very complex and managed via keycloak. To be able to test and try various scenarios with a limited dev team user base (say 10 members) before deploying enterprise woudl be a huge advantage to us .. Teleport has many options and we would want to try the best aporach that worked for us, as well as looking at how we can integrate all or tooling with the roles driven from Keycloak. Review collected by and hosted on G2.com.

Generally speaking, it just works. They are actively maintaining and developing new features.
It makes securely accessing systems and apps inside (many) private network sites WAY easier and with a really nice user interface ( not just the Web UI). Review collected by and hosted on G2.com.
Documentation is sometimes a challenge to find, but their Slack channel is quite active and supportive (both official Teleport and the user community). Review collected by and hosted on G2.com.
I am running this self hosted. The setup is easy, the product is actively developed and just works.
The support forums are awsome and the help is always on the money.
I use the product daily and only use a fraction of its features at the moment but will be increasing that over time. It works so well with all of my infrastructure. Review collected by and hosted on G2.com.
The release cycles can be quick, but that's OK. Review collected by and hosted on G2.com.

I've been using Teleport mainly for servers, applications, and databases. It's very easy to setup and I no longer need to explicitly add every user's ssh key into the servers for them to ssh into it. Now it's done through role access and permissions. The applications and databases feature is something I value as well since I no longer need to grant them direct access to the applications and dbs .. and now it all goes through Teleport with auditing enabled. Review collected by and hosted on G2.com.
Too many teleport instances could be hard to manage and I had some challenges trying to setup trusted clusters for various teleport instances. Review collected by and hosted on G2.com.