ProficientNowTechRFCs

3. Architecture

RFC-PAM-0001                                                    Section 3
Category: Standards Track                                    Architecture

3. Architecture

← Previous: Requirements | Index | Next: Components →


3.1 System Overview

The Privileged Access Management architecture positions Teleport as the centralized access broker for all human-to-infrastructure access. Teleport integrates with:

  • Keycloak for user identity (per RFC-IAM-0001)
  • Vault for credential authority (per RFC-SECOPS-0001)
  • Target resources through Teleport agents

3.2 Zero Direct Access Model

3.2.1 Model Definition

The zero direct access model enforces that all privileged access transits through Teleport. No direct connections are permitted from user workstations to target resources.

3.2.2 Enforcement Mechanisms

Resource TypeEnforcement Method
SSHNetwork policies block port 22; sshd accepts only Teleport CA certificates
DatabaseDatabase credentials only issued through Teleport; network policies block direct ports
KubernetesAPI server accessible only through Teleport proxy for exec/attach
RDPNetwork policies block port 3389; RDP gateway through Teleport

3.2.3 Benefits

BenefitDescription
Single audit pointAll access logged in one system
Consistent policySame RBAC applies to all resources
Simplified revocationDisable Teleport access = disable all access
Session recordingAll sessions captured automatically

3.3 Trust Hierarchy

3.3.1 Trust Model

Trust flows from enterprise identity through platform identity to resource access:

3.3.2 Trust Assertions

AssertionMeaning
Azure AD asserts user identityUser is who they claim to be
Azure AD asserts group membershipUser belongs to these organizational groups
Keycloak asserts platform rolesUser has these platform permissions
Teleport asserts access rightsUser can access these resources
Vault asserts credential validityThese credentials are authentic and current

3.3.3 Trust Verification

At each layer, trust is verified before proceeding:

LayerVerification
Keycloak → Azure ADOIDC token signature, issuer, audience
Teleport → KeycloakOIDC token signature, group claims
Agent → TeleportTeleport CA certificate chain
Resource → AgentAgent certificate, Teleport session token

3.4 Authority Domains

3.4.1 Domain Responsibilities

DomainAuthorityController
User IdentityWho is this person?Azure AD (via HR)
Group MembershipWhat teams do they belong to?Azure AD (via HR)
Platform RolesWhat platform permissions do they have?Keycloak (via Platform Team)
Access PoliciesWhat resources can they access?Teleport (via Platform Team)
CredentialsWhat are their authentication credentials?Vault (via Platform Team)
Resource EnrollmentWhat resources are managed?Teleport Agents (via Resource Owners)

3.4.2 Authority Ceiling

The authorization ceiling principle from RFC-IAM-0001 extends to PAM:

Example: A user in Azure AD group Developers can be granted Teleport role developer which permits SSH to development servers. They cannot be granted Teleport role sre-production (which requires Azure AD group SRE-Team) even if an administrator attempts to assign it.

3.4.3 Separation of Concerns

ConcernManaged BySystem
User lifecycleHR/ManagementAzure AD
Team assignmentHR/ManagementAzure AD Groups
Platform role definitionsPlatform TeamKeycloak + Teleport
Role-to-group mappingPlatform TeamKeycloak + Teleport
Resource enrollmentResource OwnersTeleport Agents
Access policiesPlatform TeamTeleport Roles

3.5 Trust Boundaries

3.5.1 Boundary Definitions

3.5.2 Boundary 1: Enterprise to Platform

AspectSpecification
ProtocolOIDC
DirectionAzure AD → Keycloak
Trust basisOIDC token validation
CrossingUser authenticates, groups synchronized

3.5.3 Boundary 2: Identity to Access Broker

AspectSpecification
ProtocolOIDC
DirectionKeycloak → Teleport
Trust basisOIDC token with group claims
CrossingUser identity established, roles assigned

3.5.4 Boundary 3: Access Broker to Credential Authority

AspectSpecification
ProtocolVault API (HTTPS)
DirectionTeleport → Vault
Trust basisVault token (Kubernetes auth)
CrossingCredentials requested and issued

3.5.5 Boundary 4: Access Broker to Target Resource

AspectSpecification
ProtocolmTLS (Teleport protocol)
DirectionTeleport ↔ Agent
Trust basisTeleport CA certificates
CrossingSession established, commands proxied

3.6 Data Flow Model

3.6.1 Authentication Flow

3.6.2 SSH Access Flow

3.6.3 Database Access Flow

3.6.4 Kubernetes Exec Flow


Document Navigation


End of Section 3