Linux Identity

Pricing

Per-host. No per-seat tax.

You pay for the hosts you protect, not the engineers who access them. Open Source is free up to 5 hosts and self-hosted. Team starts at $25/host/mo with volume discounts that kick in past 25 hosts.

Open Source

$0forever

Self-hosted. Up to 5 hosts. Full SSH CA + audit log, no control plane dependency.

Includes

  • Up to 5 hosts
  • SSH CA (self-hosted)
  • Full audit log with hash chain
  • Sudo capture
  • SSO via your own OIDC IdP
  • Community Slack support

Not included

  • Hosted control plane
  • SSO enforcement policies
  • Email support
  • SAML / SCIM
Most teams start here

Team

$25/host/mo, billed annually

$30/host/mo monthly

Volume discounts apply — see below

Hosted control plane, SSO enforcement, full audit log, email support. No per-seat charge.

Includes

  • Unlimited hosts
  • Hosted control plane with KMS-backed CA
  • SSO enforcement — Okta, Google, Entra
  • Full audit log with hash chain
  • Sudo capture + policy enforcement
  • Email support (next business day)
  • SOC 2 evidence export
  • Cert TTL default 4h, configurable 1 min – 24h via admin portal

Not included

  • SAML / SCIM
  • Custom RBAC
  • On-prem control plane
  • Named SOC 2 contact
  • 24h SLA

Enterprise

Talk to us

SAML, custom RBAC, on-prem control plane option, named SOC 2 contact, 24-hour SLA.

Includes

  • Everything in Team
  • SAML 2.0 + SCIM provisioning
  • Custom RBAC (role-per-host-group)
  • On-prem control plane option
  • Named SOC 2 contact
  • 24-hour SLA (written in contract)
  • Custom audit retention
  • Private Slack channel

Volume discounts on Team

Applied per-tier, not per-host. Your blended rate falls as your fleet grows. The admin portal shows your effective rate live.

Fleet sizePer-host rateEffective
First 25 hosts$25 / host / moList rate
26 – 100 hosts$22 / host / mo12% off list
101 – 500 hosts$18 / host / mo28% off list
501 – 2,000 hosts$14 / host / mo44% off list
2,001+ hostsEnterpriseNegotiated, with per-host floor

Worked example: 200 hosts = 25 × $25 + 75 × $22 + 100 × $18 = $4,075 / mo blended ($20.38 / host).

Honest answers to pricing questions

No “contact sales for pricing” answers. If we don’t know yet, we say so.

Why per-host instead of per-user?
Because your blast radius is per-host. If one host is compromised, the audit log for that host is what your auditor wants. Per-user pricing penalises you for having small teams with many hosts, which is exactly the Series-A/B pattern. A 6-engineer team running 80 staging hosts shouldn’t pay 80x the price of a 6-engineer team running 10 hosts.
How do the volume discounts apply?
Automatically and per-tier, not per-host. If you run 200 hosts, your first 25 are billed at $25, the next 75 at $22, and the next 100 at $18 — a blended rate of about $20/host/mo. The admin portal shows your effective rate and projected next-tier savings.
Can I migrate from Teleport?
Yes. If you have an existing OpenSSH CA, we can read your CA private key into our managed KMS and rotate without re-trusting every host. The CLI ships a “linuxid migrate teleport” subcommand later this year. Until then, migration is a manual process we walk you through on a call — email saheed@linuxidentity.com.
What’s in the open-source tier exactly?
Everything the hosted tier has for the core SSH CA flow: short-lived cert issuance tied to your OIDC IdP, the host agent (sudo capture, audit upload), the append-only audit log with hash chain. What’s not included: the hosted control plane (you run it), hosted audit storage (you bring your own Postgres + object store), and email support. The open-source code is at github.com/aws-proj/Linux-Identity.
How does pricing scale to 10,000 hosts?
Through Enterprise. Above 2,000 hosts the volume brackets stop publishing and we negotiate a per-host floor in writing. Email us and we’ll send a sheet with break-even math before you have to talk to anyone.
Do you have an audit log retention add-on?
Not as a separate line item yet. Team includes 1 year of audit log retention in the hosted control plane. Enterprise customers can negotiate custom retention (e.g., 7 years for PCI). If you need longer than 1 year on Team, export the audit log to your own object store — the API supports that today.
Can I host the control plane in my own cloud account?
Yes, on Enterprise. We ship a Terraform module that deploys the full control plane into your cloud account: managed Postgres, the control plane binary on a container runtime, a KMS-equivalent key for the SSH CA, and edge delivery for the API. You own the infra; we provide the software and support. We support major clouds; talk to us about your target.

Still unsure which tier fits?

Email saheed@linuxidentity.com with your host count and current SSH setup. We reply within 24 hours with a specific recommendation — not a sales deck.