Hello Teleport Community,
For the last week, our American and American-located employees celebrated Thanksgiving. As an Englishman, this is a holiday I’ve come to embrace. Thanksgiving can be an opportunity to reconnect with friends and family, but after a slice of pumpkin pie, this question will pop up: What do you do, and what is Teleport?
This is why I’ve decided, for this week’s newsletter, to boil Teleport into an ELI5 (ELI Explain Like I’m Five) format. Hopefully, this will help you better share what Teleport is to your organization, team or developer mate.
ELI5: Teleport
When you access an app or website, you’ll use the front door or a client. Behind the scenes, there are a bunch of computers that send data to your client. You can think of it as a window at a drive-through — the staff quickly serves up the thing you ordered. Behind the window staff, there is a range of special machines that create your order, with people overseeing the process. Sometimes the ice cream machine will break, and a specialist will need to come to fix it. When the mechanic arrives, he has a special identity badge that the team automatically knows he’s here to fix the problem. Teleport is the software tool that authenticated him, let him into the store, and will keep track of all of these relevant fixes. Instead of thinking about a physical store, imagine all of the drive-through is in a computer in the cloud without physical access. The Teleport Access Platform provides a centralized place to fix, debug and access global infrastructure securely.
At this point, I’ll often regret bringing up ice cream with a five-year old, and I will often use this for my tech-savvy uncle.
ELI30: For the uncle in IT!
Teleport is the first identity-native infrastructure access platform for engineers and machines. By replacing insecure secrets with true identity, Teleport delivers phishing-proof zero trust for every engineer and service connected to your global infrastructure. The open-source Teleport Access Platform provides a frictionless developer experience and a single source of truth for infrastructure access.
Check out our new video on 5 tips for securing a default Kubernetes cluster: