With the new capability, Teleport hopes to replace usernames, passwords, private keys, and other secrets with more secure physical identity solutions such as Touch ID, Windows Hello and Trusted Platform Module hardware. Credit: reklamlar / Getty Images Teleport, an open source platform designed to provide zero trust access management applications, has announced the latest version of its unified access plane, Teleport 10, which features passwordless access as a single sign-on (SSO) infrastructure access solution.Teleport’s unified access plane is an open source identity-based infrastructure access platform that unifies secure access to servers, Kubernetes clusters, applications and databases.With the new capability, Teleport hopes to eliminate the need for usernames, passwords, private keys, and other secrets by integrating biometric solutions such as Touch ID, Windows Hello, Yubikey Bio, and Trusted Platform Module (TPM) hardware.“Stolen credentials, like passwords, are the number one cause of data breaches,” said Ev Kontsevoy, CEO and co-founder of Teleport. “With passwordless access, organizations can dramatically reduce risk of breaches while improving the user experience for their engineers.” Teleport passwordless access is based on the company’s partnership with Fast Identity Online (FIDO) Alliance, an open industry association designed to develop and promote authentication standards that help reduce over-reliance on passwords.Teleport 10 combines human and machine identities Existing access solutions use identity management (IDM) passwords or multifactor authentication, and browser cookies for an integrated SSO to work, both of which are vulnerable to exploitations, according to Kontsevoy. Teleport will combine human IDs (like fingerprints, face ID) and Machine IDs to provide a more secure SSO access. Teleport 10’s passwordless access authenticates by combining both human and machine identities. It uses biometrics such as fingerprints instead of a password, allowing users to access protected resources like Linux or Windows servers, databases, Kubernetes clusters, and internal private applications without remembering multiple passwords. Teleport 10 also will need to authenticate the user’s machine. The required machine identities will generally include the trusted platform module (TPM), Windows Hello, or Yubikey Bio.“I like Teleport’s effort at combining biometric authentication with protected machine identities,” said Liz Miller, an analyst at Constellation Research. “This is not intended to be a single path to authentication, which so often can also be a single point of identity failure.”Instead of cookies used by the IDM solutions, Teleport will use certificates for passwordless access that can also be tied to TPMs and have metadata with access role and expiry details.“All modern infrastructure protocols support certificates. A certificate can expire after a few hours, or even seconds, or be revoked on demand. This makes certificates less vulnerable to loss or theft,” said Kontsevoy.Teleport 10 is available immediately and can be accessed by users by upgrading to the latest version, the company said. Related content news Almost 50% of organizations plan to reduce cybersecurity headcounts: Survey While organizations are realizing the need for knowledgeable teams to address unknown threats, they are also looking to reduce their security headcount and infrastructure spending. By Gagandeep Kaur Dec 06, 2023 4 mins IT Jobs Security Practices feature 20 years of Patch Tuesday: it’s time to look outside the Windows when fixing vulnerabilities After two decades of regular and indispensable updates, it’s clear that security teams need take a more holistic approach to applying fixes far beyond the Microsoft ecosystem. By Susan Bradley Dec 06, 2023 6 mins Patch Management Software Threat and Vulnerability Management Windows Security feature What should be in a company-wide policy on low-code/no-code development Low-code/no-code development could bridge the gulf of development backlogs that exists between great ideas and great execution of digital innovation. But not without security policies around areas like access control, code quality, and application vi By Ericka Chickowski Dec 06, 2023 15 mins Application Security Security Practices news analysis Cisco unveils AI-powered assistants to level up security defenses New AI-driven tools aim to simplify and bolster policies, alerts and prevention to reduce complexity when setting security policies and assess traffic without decryption. By Rosalyn Page Dec 05, 2023 5 mins Encryption Cloud Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe