Specialization: Infrastructure Access Management (IAM) & Zero Trust Access
Why Teleport Today: The disclosed Ivanti vulnerabilities highlight the critical risks associated with authentication bypass in traditional endpoint managers and legacy access gateways. Teleport is specifically relevant as a modern alternative that replaces these vulnerable access points with an identity-aware, certificate-based access plane, eliminating the static credentials that attackers often exploit following an auth bypass.
Key Capability: Issuance of short-lived certificates for SSH, Kubernetes, Database, and RDP access to eliminate static credentials.
Recommended Actions:
1. Navigate to Web Console → Management → Auth Connectors → New/Edit Connector
2. Navigate to Web Console → Management → Roles → [Select User Role] → Options → Edit JSON/YAML
3. Navigate to Web Console → Management → Roles → [Select User Role] → Options → Max Session TTL
Verification Steps:
- Initiate a terminal session via 'tsh ssh user@node' or the Web UI terminal
- Inspect the issued certificate via 'tsh status' or by decoding the ~/.tsh/keys certificate
This guidance assumes Teleport Enterprise or Cloud edition. UI paths may vary slightly between versions (e.g., v13 vs v15). Ensure you have 'editor' permissions for Auth Connectors and Roles.
Learn More About Teleport ↗