title | description | videoBanner |
---|---|---|
Server Access Getting Started Guide |
Getting started with Teleport server access. |
LnaRP0xKWRI |
You can protect a server with Teleport by running the Teleport SSH Service on the server and enrolling it in your Teleport cluster. Once the server has joined your cluster, the Teleport RBAC system enforces secure access to the server, and administrators can identify security threats using the Teleport audit log.
The Teleport SSH Service opens a reverse SSH tunnel to the Teleport Proxy Service, and SSH client traffic uses this tunnel to connect to a server. This setup is similar to the bastion pattern.
This guides shows you how to:
- Enroll a server in your Teleport cluster.
- SSH into a server using Teleport.
- Inspect server resources in the cluster using Teleport commands.
You can use Teleport to enable secure access to a Kubernetes node. To do so, modify your node's machine image to install and run the Teleport SSH Service as per the instructions in this guide. Do not run the SSH Service as a Kubernetes pod, as there is no guarantee that the SSH Service pod is running on a server that a user intends to access.
(!docs/pages/includes/edition-prereqs-tabs.mdx!)
- One host running a Linux environment (such as Ubuntu 20.04, CentOS 8.0, or Debian 10). This will serve as a Teleport Node.
- (!docs/pages/includes/tctl.mdx!)
(!docs/pages/includes/permission-warning.mdx!)
-
Your Linux host will be a private resource. Open port 22 so you can initially access, configure, and provision your instance.
We'll configure and launch our instance, then demonstrate how to use the
tsh
tool and Teleport in SSH mode. -
On the host where you will run the Teleport SSH Service, follow the instructions for your environment to install Teleport.
(!docs/pages/includes/install-linux.mdx!)
Next, we'll create a join token so you can start the Teleport SSH Service and add it to your cluster.
On your local workstation, create a join token so you can add the server to your Teleport cluster:
Let's save the token to a file
$ tctl tokens add --type=node --format=text > token.file
--type=node
specifies that the Teleport process will act and join as an SSH
server.
> token.file
indicates that you'd like to save the output to a file name token.file
.
On your server, save token.file
to an appropriate, secure, directory you have
the rights and access to read. Next, generate a configuration file enabling
Teleport's SSH Service.
Change tele.example.com
to the address of your Teleport Proxy Service. Assign
the --token
flag to the path where you saved token.file
.
# Generate config
$ sudo teleport node configure \
--output=file:///etc/teleport.yaml \
--token=/path/to/token.file \
--proxy=tele.example.com:443
Change mytenant.teleport.sh
to your Teleport Cloud tenant address. Assign the
--token
flag to the path where you saved token.file
.
# Generate config
$ sudo teleport node configure \
--output=file:///etc/teleport.yaml \
--token=/path/to/token.file \
--proxy=mytenant.teleport.sh:443
The teleport node configure
command above placed a configuration file at
/etc/teleport.yaml
. The last step is to start Teleport, pointing it at this
configuration:
(!docs/pages/includes/start-teleport.mdx service="the Teleport SSH Service"!)
Run the following command to create a local user that can access the Teleport Web UI:
$ tctl users add myuser --roles=editor,access --logins=root,ubuntu,ec2-user
This will generate an initial login link where you can create a password and set
up multi-factor authentication for myuser
.
You should now be able to view your server in the Teleport Web UI after
logging in as myuser
:
Now that we've got our cluster up and running, let's see how easy it is to connect to our server.
We can use tsh
to SSH into the cluster:
On your local machine, log in to your cluster through tsh
, assigning the
--proxy
flag to the address of your Teleport Proxy Service:
# Log in through tsh
$ tsh login --proxy=tele.example.com --user=myuser
On your local machine, log in to your cluster through tsh
, assigning the
--proxy
flag to the address of your Teleport Cloud tenant:
# Log in through tsh
$ tsh login --proxy=mytenant.teleport.sh:443 --user=myuser
You'll be prompted to supply the password and authentication factor we set up previously.
myuser
will now see something similar to:
> Profile URL: https://tele.example.com:443
Logged in as: myuser
Cluster: tele.example.com
Roles: access, editor
Logins: root, ubuntu, ec2-user
Kubernetes: disabled
Valid until: 2021-04-30 06:39:13 -0500 CDT [valid for 12h0m0s]
Extensions: permit-agent-forwarding, permit-port-forwarding, permit-pty
In this example, myuser
is now logged into the tele.example.com
cluster
through Teleport SSH.
> Profile URL: https://mytenant.teleport.sh:443
Logged in as: myuser
Cluster: mytenant.teleport.sh
Roles: access, editor
Logins: root, ubuntu, ec2-user
Kubernetes: disabled
Valid until: 2021-04-30 06:39:13 -0500 CDT [valid for 12h0m0s]
Extensions: permit-agent-forwarding, permit-port-forwarding, permit-pty
In this example, myuser
is now logged into the mytenant.teleport.sh
cluster through Teleport SSH.
myuser
can now execute the following to find the cluster's server names,
which are used for establishing SSH connections:
# Display cluster resources
$ tsh ls
In this example, the bastion host is located on the bottom line below:
Node Name Address Labels
---------------- -------------- --------------------------------------
ip-172-31-35-170 ⟵ Tunnel
ip-172-31-41-144 127.0.0.1:3022 env=example, hostname=ip-172-31-41-144
myuser
can SSH into the bastion host server by running the following command locally:
# Use tsh to ssh into a server
$ tsh ssh root@ip-172-31-41-144
Now, they can:
- Connect to other servers in the cluster by using the appropriate IP address in
the
tsh ssh
command. - Traverse the Linux file system.
- Execute desired commands.
All commands executed by myuser
are recorded and can be replayed in the
Teleport Web UI.
The tsh ssh
command allows users to do anything they could if they were to SSH
into a server using a third-party tool. Compare the two equivalent commands:
```code
$ tsh ssh root@ip-172-31-41-144
```
To use the ssh
client generate a SSH configuration file and postfix
the cluster name after the node name.
```code
$ tsh config > ssh_config_teleport
$ ssh -F ssh_config_teleport root@ip-172-31-41-144.example.teleport.sh
```
Now, myuser
has the ability to SSH into other servers within the cluster,
traverse the Linux file system, and execute commands.
- They have visibility into all resources within the cluster due to their defined and assigned roles.
- They can also quickly view any server or grouping of servers that have been assigned a particular label.
Execute the following command within your bastion host console:
# List servers
$ tctl nodes ls
This displays the unified resource catalog with all queried resources in one view:
Nodename UUID Address Labels
---------------- ------------------------------------ -------------- -------------------------------------
ip-172-31-35-170 4980899c-d260-414f-9aea-874feef71747
ip-172-31-41-144 f3d2a65f-3fa7-451d-b516-68d189ff9ae5 127.0.0.1:3022 env=example,hostname=ip-172-31-41-144
Note the "Labels" column on the farthest side. myuser
can query all
resources with a shared label using the command:
# Query all servers with a label
$ tsh ls env=example
Customized labels can be defined in your teleport.yaml
configuration file or
during server creation.
This is a convenient feature that allows for more advanced queries. If an IP address changes, for example, an admin can quickly find the current server with that label since it remains unchanged.
myuser
can also execute commands on all servers that share a label, vastly
simplifying repeated operations. For example, the following command will execute
the ls
command on each server and display the results in your terminal:
# Run the ls command on all servers with a label
$ tsh ssh root@env=example ls
We previously configured our Linux instance to leave port 22
open to easily
configure and install Teleport. Feel free to compare Teleport SSH to your usual
ssh
commands.
To harden your Teleport server:
- Close port
22
on your private Linux instance now that your Teleport server is configured and running. - For self-hosted deployments, optionally close port
22
on your Proxy Service host. - You'll be able to fully connect to the private instance and, for self-hosted
deployments, the Proxy Service host, using
tsh ssh
.
To recap, this guide described:
- How to set up and add an SSH server to a cluster.
- Connect to the cluster using
tsh
to manage and introspect resources.
Feel free to shut down, clean up, and delete your resources, or use them in further Getting Started exercises.
- While this guide shows you how to create a local user in order to access a server, you can also enable Teleport users to authenticate through a single sign-on provider. Read the documentation to learn more.
- Learn more about Teleport
tsh
through the reference documentation. - For a complete list of ports used by Teleport, read the Networking Guide.
- Setting Up an SSH Bastion Host
- Announcing Teleport SSH Server
- How to SSH properly
- Consider whether OpenSSH or Teleport SSH is right for you.
- Labels