This page is meant to be a general guide to learn about the different teams at Teleport to help candidates decide which may be the best fit for them.
The Teleport Core team is focused on design and development of the core product: Teleport. It is split into multiple sub-teams that work on specific areas of the product.
We use the following technologies to build Teleport.
- Go
- Rust
- Typescript, React, and Vite
- GitHub Actions
- Docker
The Performance and Scaling team is focused on scaling, performance, and robustness of Teleport in large deployments.
Recent projects:
- Add support for automatic agent upgrades
- Improve
tsh
connection latency - Optimize the connection process when per-session MFA is enabled #23865
The Platform Security team is focused on application security for the Teleport product. This team implements security controls and works with security researchers to find and fix security vulnerabilities.
Teleport Engineering also has a general Security team that focuses on holistic security across the organization.
Recent projects:
- Teleport Device Trust
- Add support for a new S3-based audit log
The Server and Kubernetes Access teams work on secure access using short-lived credentials to SSH servers and Kubernetes clusters.
Recent projects:
- Add support for headless login #21005
- Add agentless mode for OpenSSH nodes #19261
- Automatic discovery and enrollment of servers on Azure #21087
- Cache per-session MFA taps for Kubernetes Access users
The Application Access team works on providing access to web and console applications behind NATs and firewalls with security and compliance needs.
Recent projects:
- Teleport as a SAML Identity Provider
The Database Access team works on providing access to databases behind NATs and firewalls with security and compliance needs.
Recent projects:
- Added support Oracle databases #23227
- Added support for connecting to database resources across multiple AWS accounts
The Teleport Desktop Access team is focused on secure and user-friendly remote desktop access.
Recent projects:
- Add passwordless login for local users
- Add suppor for automatic user creation
- Optimize the desktop encoding process
The Machine ID team is focused on bringing all the advantages and convenience that Teleport provides for human users to machine use cases.
Recent projects:
- Added support for FIPS builds #23563
- Added support for securely joining bots running on Azure #23112
- Added support for securely joining bots running on GitLab CI #22705
The Access Provider team is focused on web applications that make Teleport easier to use and more secure.
Recent projects:
- Added support for joining moderated sessions from the UI
- Added support for session locking in the web UI
- Added a light theme to the Teleport web IU
The Teleport Connect team is focused on building a great desktop experience for users who prefer not to use CLI-driven workflows.
Recent projects:
- Allow users to customize terminal fonts and keyboard shortcuts
- Add a new cross-cluster search experience
The Access Manager team is focused on simplifying connecting and configuring Teleport.
Recent projects:
- Add a simplified onboarding flow for AWS RDS databases
The Integration team is focused on building strong integrations with tools like Kubernetes, Terraform, Ansible, and more.
Recent projects:
- Added support for Microsoft Teams to Access Requests
- Added Teleport Kubernetes Operator #13331
The Core Tooling team contributes force multiplication efforts to help engineers developing Teleport and across the org. This team is the backbone to ensuring the rest of the development team remains incredibly productive, and that we operate in the open, with an open source code base.
This team is responsible for the tooling necessary to build and release Teleport artifacts, including container images, AMIs, Helm Charts, and integration/distribution to package managers.
Recent projects:
- Create hardened container images
- Add universal binaries to our build infrastructure
The Teleport Cloud team develops and operates Teleport Cloud for customers as service. Cloud exists to help alleviate the burden of running and maintaining secure global low-latency access to infrastructure.
We use the following technologies to build Teleport Cloud:
- Go
- Typescript & React
- PostgreSQL
- Terraform and Packer
- Amazon Web Services (AWS)
- Kubernetes
- Prometheus/Alertmanager/Loki/Grafana
The team is focused on delivering a great user experience for Cloud users.
Recent projects:
- Add support for Upgrade Windows
- Simplify the Teleport Downloads page
- User journey tracking
The team is focused on scalability, security, and analytics of Teleport on our Cloud platform.
Recent projects:
- Reduce tenant on-boarding time
- Build reporting and analytics platform
The team is focused on release automation, observability, and developer experience.
Recent projects:
- CI/CD with GitHub Actions
- Develop more sophisticated resource growth alerts
- Automate manual processes
- Improve platform monitoring and alerting
The team is focused on building secure, reliable, and low latency infrastructure for the Cloud platform.
Recent projects:
- Reduce connection latency for geo-distributed infrastructure
- Build next-generation Cloud platform infrastructure
- Update disaster recovery and backups infrastructure
- Multi-region support for Kubernetes operator
At Teleport, each and every engineer is responsible for security of their work. In addition to this individual mandate and our Product Security team, we maintain a Security team focused on organization-wide efforts. We're currently working on the following areas:
- Software supply chain security. We ensure infrastructure and code is protected and auditable from developer to production.
- Teleport's bug bounty program.
- Working with consultants and independent experts to perform blackbox, whitebox, and red team validation of our code and security controls.
- Updating compliance documentation, internal controls, and our corporate policies.
The Product Security team works primarily in the Teleport codebase, developing new security features and fixing bugs for the next Teleport release. The Security team addresses all elements of information security, including cloud security, app security, IT security, GRC, policies, training, and our bug bounty.
To illustrate, you'd find a Product Security team member hacking on issues like #10375. You might find a Security team member improving our internal Okta terraform or improving the policies and infrastructure backing our promises at https://goteleport.com/security/.