Releases: gravitational/teleport
Teleport 1.0 Release
The first official release of Teleport!
The biggest reason that was preventing us from placing "Production ready v1.0" label on Teleport has been our desire to have it professionally audited and tested by security professionals. We have completed the audit and happy to report that Teleport now earns our approval for production use.
Warning
Teleport security has been improved since this release. It is highly recommended to upgrade to the latest production-recommended version.
New Features:
- Support for
logging out
which clears temporary session keys - Support for connecting Teleport clusters together: see "Trusted Clusters" section in the documentation.
- Account lock after N unsuccessful attempts
Other Changes:
- Simplified build system: default source tarballs from Github are trivial to build.
- Lots of minor bugfixes
- Friendlier error messages
Compatibility with Beta Versions
Teleport YAML configuration format has changed slightly. Also, the format of key and session storage has evolved as well. We recommend beta users to wipe out /var/lib/teleport
directory on servers and ~/.tsh
directory on client machines.
Moving forward we are committed to backwards compatibility with configuration files and on-disk data.
NetAddr YAML marshaling and session env vars
Since the previous release:
- NetAddr can be successfully marshaled to / unmarshaled from YAML.
- Can set environment variables when opening a session.
Bring back AuthIdentityEvent
Merge pull request #448 from gravitational/sasha/identity recover back AuthIdentityEvent
Skip reading local agent keys if SkipLocalAuth=true
Merge pull request #446 from gravitational/ev/445 No need to read local agent keys if SkipLocalAuth=true
Properly report an error on reverse tunnel startup
This release fixes an issue with the error not being logged in case of a failure in creating a reverse tunnel.
Provisioning tokens, user lookup and reconnecting logic
This release features:
- Provisioning tokens to quickly spin up clusters
- Advanced user shell lookup fixes
- Reverse tunnels reconnecting logic
Audit Logs and OpenID Connect Authentication
This release includes:
- Support for OpenID/OAuth2 connectors, enabling external authentication with Google Apps
- Refactored and improved audit logging, session management and playback
- Numerous fixes across Teleport's code base
v0.2.0-alpha.0
This release includes:
- Support for OpenID/OAuth2 connectors, enabling external authentication with Google Apps
- Refactored and improved audit logging, session management and playback
- Numeruous fixes across Teleport's code base
v0.1.0-alpha.7
SSH for Clusters and Teams
Check out documentation for details
http://gravitational.com/teleport/
Security note
At this time Teleport is NOT recommended for production use, but the code is open and available for your security team to inspect. Currently Teleport is undergoing an independent security review. We will be more comfortable recommending it for production use once the review will have completed.