-
Notifications
You must be signed in to change notification settings - Fork 1.8k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'master' into smallinsky/aws-ic-instal-plugin
- Loading branch information
Showing
62 changed files
with
2,199 additions
and
334 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,50 @@ | ||
--- | ||
title: Notifications | ||
description: Provides a detailed breakdown of Teleport's notification system. | ||
--- | ||
|
||
Teleport's notification system allows users to be notified of various events, updates, and warnings in real time. | ||
|
||
This guide explains how to interact with notifications in the Web UI and how cluster administrators can create custom notifications for their users. | ||
|
||
## Interacting with notifications in the Web UI | ||
|
||
In the Web UI, you can list all your notifications by clicking on the bell icon in the top right of the navigation bar. | ||
|
||
Clicking on a notification will redirect you to the relevant page, or in the case of a custom notification generated by an administrator, open a dialog containing its text content. | ||
You can mark the notification as read to acknowledge it, or hide it to have it never be shown to you again. | ||
|
||
Some notifications may include quick action buttons which allow you perform actions directly from the notification, such as assuming granted roles from an approved access request notification. | ||
|
||
![Notification in the WebUI](../../img/notification.png) | ||
|
||
## Creating and managing notifications | ||
|
||
Cluster administrators with `create` permissions for the `notification` resource can create and manage custom notifications using the `tctl notifications` command. These notifications | ||
contain custom text content and can be configured to target either all users, a specific user, or users with certain roles. | ||
|
||
Please note that custom notifications are stored in the backend in plaintext, and should therefore not include any sensitive information or be used for security-critical purposes. | ||
|
||
### Examples | ||
|
||
```code | ||
# Create a notification for a specific user. | ||
# Only user alice will see this notification. | ||
$ tctl notifications create --user=alice --title="Upcoming Database Maintenance" \ | ||
--content="We will be conducting a database upgrade tomorrow at 2AM UTC" | ||
# Create a notification for users with the `engineer` role that expires in 2 days | ||
$ tctl notifications create --roles=engineer --title="Reminder" \ | ||
--content="Please use access requests to request access to production servers" --ttl=2d | ||
# List notifications. | ||
$ tctl notifications ls | ||
ID Created Expires Title Labels | ||
------------------------------------ ------------------- ------------------- -------------------- ------ | ||
0194d8b2-5a38-7858-88fe-5fcee3ff1ceb 06 Feb 25 00:39 UTC 08 Mar 25 00:39 UTC Example notification | ||
# Delete a notification. | ||
$ tctl notifications rm 3b8eb3d6-da9a-5353-aece-cbc885ecbf73 | ||
``` | ||
|
||
For more detailed information on this family of commands, please refer to the [CLI Reference](../reference/cli/tctl.mdx#tctl-notifications-create). |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,54 @@ | ||
--- | ||
title: Device Trust | ||
description: How Teleport Device Trust works. | ||
--- | ||
|
||
Device Trust leverages the macOS Secure Enclave, or TPM 2.0 on Linux and Windows | ||
devices, to establish and validate device identity. | ||
|
||
There are three main steps in a device's lifecycle: registration, enrollment and | ||
authentication. | ||
|
||
**Registration** informs Teleport about a known device. At this stage the device | ||
is not yet trusted, but is part of the **device inventory**. For example, a | ||
device created using `tctl devices add` or synced via Jamf is registered. | ||
|
||
**Enrollment** transforms a registered device into a trusted device by creating | ||
and verifying a secure private key. | ||
|
||
![macOS enrollment](../../../img/architecture/device-trust-enrollment-macos.png) | ||
|
||
The collected device data above includes the serial number, model, OS | ||
information, etc. (You can inspect it by running `tsh device collect`). | ||
|
||
A safe enrollment ceremony is paramount, as the identity established here | ||
(through the device's key) is the basis for future authentications. Options | ||
range from [auto-enrollment][] to manually distributed [device enrollment | ||
tokens][]. | ||
|
||
**Authentication** follows a similar pattern. It challenges the device to prove | ||
itself using the previously established device key and, if successful, issues | ||
new user certificates augmented with device extensions. The presence of device | ||
extensions is what unlocks [device enforcement][] | ||
|
||
Device authentication happens after the initial user authentication, requiring | ||
the user to be authenticated beforehand. | ||
|
||
![device authentication](../../../img/architecture/device-trust-authentication.png) | ||
|
||
These are the basics of device trust. TPM ceremonies are slightly different in | ||
implementation but equivalent in functionality and security properties | ||
(enrollment attests the EKCert, EK and AK; authentication verifies possession of | ||
the AK). | ||
|
||
Web UI support is underpinned by the same ceremonies described above, which are | ||
delegated to Teleport Connect for technical reasons. Our [device trust for the | ||
web][] blog post describes the implementation challenges in detail. | ||
|
||
For practical use see the [device trust section][]. | ||
|
||
[auto-enrollment]: ../../admin-guides/access-controls/device-trust/device-management.mdx#auto-enrollment | ||
[device enrollment tokens]: ../../admin-guides/access-controls/device-trust/device-management.mdx#create-a-device-enrollment-token | ||
[device enforcement]: ../../admin-guides/access-controls/device-trust/enforcing-device-trust.mdx | ||
[device trust for the web]: https://goteleport.com/blog/device-trust-for-web-challenges-and-solutions/ | ||
[device trust section]: ../../admin-guides/access-controls/device-trust/device-trust.mdx |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Submodule e
updated
from b86b34 to 74c84c
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Oops, something went wrong.