
Teleport Device Trust
by Teleport
Jamf + Teleport | Better Together
Teleport's Device Trust Jamf Pro integration lets you automatically sync your Jamf Pro computer inventory into Teleport. This distinct Teleport process periodically reads your computer inventory from Jamf Pro and syncs it to Teleport. It performs both incremental (called "partial") and full syncs, as well as removals from Teleport if a computer is removed from Jamf Pro.
Discover Hidden SSH Keys with Teleport Policy
With Teleport Policy Access Graph, you can gain insights on how SSH keys are used within your environment. By scanning all SSH authorized keys present on your servers and SSH Private Keys present on company managed laptops, Teleport Policy can provide a visual representation of the access patterns and help you enhance the security of your environment.
Learn more about Discover Insecure SSH Access with Teleport Policy
What is Teleport?
Teleport is the open infrastructure access platform, providing access to servers, Kubernetes clusters, apps, databases and Windows Desktops. Teleport Device trust bridges one of the gaps to provide a full BeyondCorp solution. It gives Teleport admins guarantees about the provenance of the machines accessing your infrastructure and establishes a foundation for more sophisticated, device posture-based access controls.
What is Device Trust?
Device Trust makes sure that only devices registered and enrolled by Teleport may access sensitive resources. The certificate private key is created and stored in a secure hardware store which it can never be exfiltrated from (for example, Apple's Secure Enclave or a TPM - Trusted Platform Module). Device Trust is available with Teleport Enterprise.