104 Teleport Reviews
Overall Review Sentiment for Teleport
Log in to view review sentiment.

Teleport is a well-rounded solution, with specific high points in the number and type of resources it can manage, the product's scalability, the vast number of plugins it can use for user access control, and the product's modularity.
The CLI experience is fantastic, and the UI - including the http server, the access control rules, and the simple configuration files, make the initial setup simple. Review collected by and hosted on G2.com.
When using the on-prem solution - which is ideal from an end compliance perspective - It works best when you have a team with a dedicated resource or resources to manage the teleport infrastructure and user access. While this is well documented, the solution's modularity means it's also a bit complicated to get up and running. Maintenance requires someone at least familiar with the product, and there's a steep learning curve.
The OSS product has also gotten less powerful as Teleport has reduced its scope to add more value to the enterprise product. This is understandable, but my team has slowly reduced our Teleport footprint as we don't want to invest the money in the enterprise solution for small-scale solutions more efficiently served by in-house solutions or VPN based access control. Review collected by and hosted on G2.com.

My organization really appreciates that we can have very straightforward authn/authz with RBAC in front of our cloud and on-prem resources using Teleport. Deployment on Kubernetes using the official helm chart is a breeze. Setting up agents on Kubernetes using the helm chart is a breeze. Setting up agents on ordinary Linux machines is a breeze. The guided setup for resources like RDS is phenomenal. It's all so easy!
We love having access to the audit logs and controlling access to internal systems, especially databases, without needing to poke holes in firewalls/security groups. The user experience is pretty fantastic when Teleport Connect is used. It's much more straightforward than having a business user generate an SSH key, keep it secure, and remember to set up a tunnel through a bastion host whenever they want to connect to internal resources.
The frequency of meaningful updates to Teleport is excellent. The Teleport team works diligently to stay on top of the security concerns around a platform such as this. I also appreciate that the Teleport web UI indicates when a new version is available, making security updates particularly noticeable. Review collected by and hosted on G2.com.
Honestly, I don't have anything bad to say about Teleport. We have been using the self-hosted open-source version for a few months on Kubernetes, and it has been rock solid. We don't have it configured for high availability, so when we apply updates, our users can experience a brief interruption in access. However, that is certainly not a problem with Teleport itself. We haven't taken the time to meet the requirements for a proper highly available cluster. Review collected by and hosted on G2.com.
The ability to shield our infra through a single, secure jump box is a great feature. Having the option to audit users in such a precise way has the greatest potential benefits for our business. The documentation is really well put together and I am confident the team at Teleport will continue to develop new useful features in the future. Review collected by and hosted on G2.com.
The platform requires tremendous buy-in from your stakeholders. This can't really be helped, but some supporting literature to help nudge key people would be great. Review collected by and hosted on G2.com.
- Access Request Mechanisms
- Infra as coded roles management
- Multiple targets support Review collected by and hosted on G2.com.
- Not being plugged to AWS SSO directly to manage AWS Access Request Review collected by and hosted on G2.com.
Teleport helped me to connect from anywhere and one can connect to remote devices on different networks. it also helped me to identify any security incidents and threats with the help of audit logs. great tool for access management. Review collected by and hosted on G2.com.
We haven't faced any issues with Teleport and we only used their community /freemium version. We found the price on the higher side and thats why we couldn't continue. Hopefully, they will keep updating the tool which would eliminate any downsides and keeps on improving it. Review collected by and hosted on G2.com.
The best in teleport is its easy use—no need to do any workshops for your co-workers, whether an application or a node. The second thing I like is the excellent, responsive support willing to help. What is also remarkable is that users don't store any keys and passwords on their disk, just short-lived certificates. Review collected by and hosted on G2.com.
The documentation may be more organized; sometimes, it needs to visit a few pages until I find what I need. The information is in the docs, but I must search for it. Review collected by and hosted on G2.com.



It was Super easy to get started with teleport. We followed their guide and got our bastion host set up in a day. We added the ability to sign in with github which makes our workflow for securing our hosts super easy. We now only have to remove access to github and the ability for someone to deploy has been removed. Really cool for an open source project. Review collected by and hosted on G2.com.
Setting up github actions didn't work for us. Everything in the guide worked when we started a brand new repo, but in the end we had to bail on using this feature because there was no way we could figure out how to debug teleport on the bastian host. That being said, I think it would have worked if we had started from scratch on a brand new repo. Review collected by and hosted on G2.com.

The product has good flexibility with regards to the control and creation of users, roles, etc.
It helps the access of resources in the infrastructure and has the ability to automate which is really good
It is easy to configure, maintain and debug with a good audit log capability. Review collected by and hosted on G2.com.
We do not have anyhting bad to say about it, we are not long using it but it works well for us so far Review collected by and hosted on G2.com.