Opal + Teleport

Opal + Teleport Use cases

Protect against breaches with least privilege

  • Grant just-in-time access to Teleport roles that are auto-expiring and fully audited using Slack
  • Ensure that privileged roles have the appropriate identity governance and approval configurations, such as multi-stage approvals, max duration, custom fields, and more

Accelerate employee access on paved roads

  • Enable resource owners with the most context to approve access requests and provision access automatically via Slack
  • Accelerate employee onboarding by enabling managers to request on behalf of their reports or enabling self-service discovery of resource bundles
  • Automate on-call access by provisioning and deprovisioning access via on-call schedules

Simplify compliance without manual overhead

  • Automate user access reviews so compliance teams can snapshot user listings, assign reviewers to self-service reviews, propagate access changes, and generate an auditor-friendly access report
  • Review access of employees who have recently transferred roles or departments

Teleport Overview

Teleport focuses on identity-native infrastructure access. Teleport replaces the #1 source of data breaches — secrets — with true identity to deliver phishing-proof zero trust access for every engineer and service connected to your global infrastructure.


Teleport Integration Setup

Teleport can be integrated using Opal 'connector.

1. In the Apps sidebar, click on "Add App", and select Teleport

2. Create a service account for Opal and add service account credentials

Manage access with

Teleport

Interested in Opal?

Get in touch with our team to learn more!

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.