# Teleport Identity Security

Identity Security is available only with Teleport Enterprise. [Start your free trial.](https://goteleport.com/signup/)

Teleport Identity Security centralizes access policy across your infrastructure, consolidates disparate identity audit logs, discovers shadow access, and alerts on access anomalies. It helps you quickly answer:

- What resources can a specific user access?
- What actions do users perform when connecting to systems?
- How are users, roles, and resources connected?
- Can users gain access to resources outside of defined RBAC policies?
- Can users interact with resources in ways that bypass audit logging?

[Teleport Identity Security](https://www.youtube.com/embed/JJftMAwMld8)

### [Self-Hosting Guide](https://goteleport.com/docs/identity-security/access-graph.md)

Deploy Identity Security in a self-hosted cluster (enabled by default for managed Enterprise customers)

### [Key Concepts](https://goteleport.com/docs/identity-security/usage.md)

Understand Access Graph visualization, Crown Jewels, and access relationships

## Use cases

- ### [Expose hidden access risks](https://goteleport.com/docs/identity-security/integrations/ssh-keys-scan.md)

  Scan for insecure SSH keys and access paths

- ### [Identify over-privileged users](https://goteleport.com/docs/identity-security/usage/dashboard.md)

  Identify users with excessive standing privileges

- ### [Monitor changes to critical resources](https://goteleport.com/docs/identity-security/usage/crown-jewels.md)

  Monitor, alert on, and visualize access changes

- ### [Alert on anomalous activity](https://goteleport.com/docs/identity-security/usage/alerts.md)

  AI alerting on risky access patterns in your infrastructure

- ### [Unify logs from key systems](https://goteleport.com/docs/identity-security/integrations.md)

  Unify logs from Okta, AWS, GitHub, and more

- ### [Query roles, groups, and permissions](https://goteleport.com/docs/identity-security/usage/sql-editor.md)

  Create custom-tailored queries w/the SQL Editor

## Visualize access relationships

Use Graph Explorer to explore real-time identity-to-resource paths, quickly spotting where access is allowed or denied. Run custom SQL queries using [SQL Editor](https://goteleport.com/docs/identity-security/usage/sql-editor.md) to analyze [connections](https://goteleport.com/docs/identity-security/usage/graph-explorer.md) (identities, user group, and actions).

**[View Standing Privileges](https://goteleport.com/docs/identity-security/usage/dashboard.md)**<br />**[Set up Crown Jewels](https://goteleport.com/docs/identity-security/usage/crown-jewels.md)**<br />**[Manage Audit Events](https://goteleport.com/docs/identity-security/integrations/teleport.md)**

[](/docs/assets/medias/identity-security-4f9e429c185ef6fc641ec4cbdaf2161e.mp4 "Visualize access relationships")

## Integrations

[View all Integrations](https://goteleport.com/docs/identity-security/integrations.md)

### [GitHub](https://goteleport.com/docs/identity-security/integrations/github.md)

Connect GitHub and stream audit logs, map permissions, and track user behavior to stay ahead of access issues.

### [Okta](https://goteleport.com/docs/identity-governance/integrations/okta.md)

Integrate your Okta account to visualize your access policies, user roles, and group memberships.

### [AWS](https://goteleport.com/docs/identity-security/integrations/aws-sync.md)

Leverage the power of Access Graph by connecting AWS account to visualize IAM roles, policies, and access relationships.

### [Teleport](https://goteleport.com/docs/identity-security/integrations/teleport.md)

Connect Teleport audit logs to trace the full identity chain from authentication through resource access, enabling ...
