We introduce a protocol for authenticated teleportation, which can be proven secure even when the receiver does not trust their measurement devices, and is experimentally accessible. We use the technique of self-testing from the device-independent approach to quantum information, where we can characterise quantum states and measurements from the exhibited classical correlations alone. First, we derive self-testing bounds for the Bell state and Pauli σX , σZ measurements, that are robust enough to be implemented in the lab. Then, we use these to determine a lower bound on the fidelity of an untested entangled state to be used for teleportation. Finally, we apply our results to propose an experimentally feasible protocol for one-sided device-independent authenticated teleportation. This can be interpreted as a first practical authentication of a quantum channel, with additional one-sided device-independence.Quantum teleportation is well-established as a cornerstone of the field of quantum information, allowing the transfer of a qubit from one party to another using an entangled pair and a classical communication channel [1]. While interesting in its own right, it is also a key ingredient in many protocols, such as secret sharing [2,3], anonymous transmission [4] and multiparty computation [5], and is an important tool across quantum information.From a cryptographic point of view, it is then vital to study the security of teleportation. We consider authenticated teleportation, where we wish to verify that the teleportation has succeeded even when we do not trust the entangled pair being used. This authenticates its application as a quantum channel between the two parties. Previous schemes for authentication of a quantum channel, such as [6], rely on generating large entangled states or performing entangling measurements. In order to guarantee high security of such protocols, one would need levels of entanglement that are, in practice, unfeasible. We solve this problem and go one step further: allowing Alice and Bob to authenticate their quantum channel even when their devices may not be trusted.Device-independence has become a highly desirable feature of quantum communication and computation protocols, from its early applications to quantum key distribution [7-9] and quantum random number generation [10,11]. This approach addresses the situation where the untrusted components may have been obtained from, or be in the control of, an adversary. In the two party setting, one can consider two trust settings: one-sided device-independent (1sDI), where Alice trusts her device but Bob does not (or vice versa), and fully deviceindependent (DI), where neither party trusts their devices. One-sided trust should allow for a much simpler experimental implementation as in [12][13][14]. This scenario is particularly relevant when one party is naturally trusted, for example, a trusted client but untrusted server, or simply if the channel and local measurement device are untrusted when one may wish to receive a resource (for example...