Take the friction out of GenAI workflows with Aperture by Tailscale.Here's how →
Get started - it's free!
Log in
WireGuard is a registered trademark of Jason A. Donenfeld.
© 2026 Tailscale Inc. All rights reserved. Tailscale is a registered trademark of Tailscale Inc.
Blog|productFebruary 19, 2026

Workload identity federation is generally available

"Winter Update Day 4" in upper-left corner, warm mug made of purple shapes (same colors as square-patch background). In the center: diagram showing three objects: Tailscale, flowing back and forth to Cloud Workload. Cloud Workload is flowing to Cloud platform, and through Cloud platform to Tailscale.

Today, we’re excited to announce that workload identity federation is generally available. Since launching in beta last fall, we’ve expanded support across the Tailscale platform, including API and Terraform support for managing federated identities, automatic cloud token exchange, tsnet integration, and beta support for the Kubernetes operator. Together, these updates make it easier to authenticate infrastructure workloads—including CI systems, cloud services, and Kubernetes clusters—without relying on long-lived, hard-coded secrets.

If you’re new to workload identity federation, it allows CI/CD pipelines and cloud workloads to authenticate to Tailscale using their cloud provider’s federated OpenID Connect (OIDC) identities instead of static API keys, auth keys, or OAuth clients. Rather than relying on long-lived secrets that are difficult to manage and scale, workloads can authenticate using signed, short-lived tokens issued by the cloud provider’s identity system.

Diagram: 3 boxes, Cloud workload, Cloud platform, Tailscale. From Cloud workload, 1 - request OIDC JWT, to Cloud platform, to 2 - Signed OIDC JWT - to Cloud workload, to 3 - Exchange OIDC JWT for short-lived API token - to Tailscale, to 4 - Scope short-lived API token - to Cloud workload, to 5 - Join or manage tailnet with API token - to Tailscale (ending.

Secure automation at scale

The Tailscale API now supports creating, reading, updating, and deleting federated identities. This lets you programmatically establish trust between Tailscale and cloud providers like GitHub, Google Cloud, and AWS, without manual setup in the admin console. You can define and manage trust configurations across dozens or hundreds of environments entirely through code.

Using the API, you can grant a new GitHub runner access to your tailnet, adjust scopes for an AWS service account, or update credential details as your infrastructure changes. You can also modify scopes and credentials after they’re created, making it easier to debug configurations or refine permissions without needing to delete and recreate identities.

The Tailscale Terraform provider also newly supports creating and managing federated identities, allowing you to define trust relationships as IaC (infrastructure as code). Teams can store these configurations in version control, making changes auditable, peer-reviewed, and easy to reproduce. Using Terraform, you can define OIDC issuers and claims directly in your .tf files. This includes specifying which GitHub repositories, cloud service accounts, or workloads can authenticate to your tailnet, along with their scopes and claim-matching rules.

The Terraform provider itself can also authenticate to Tailscale using workload identity federation. This allows a CI/CD runner, such as a GitHub Action, to use its own OIDC token to manage your tailnet, without storing static API keys or OAuth secrets.

Automatic cloud token discovery and exchange

Tailscale now supports automatic token discovery and exchange through a new --audience flag on the tailscale up command. This enables automatic generation of ID tokens for workload identity. When enabled, the Tailscale client can detect supported cloud and CI environments and retrieve a native identity token from the platform it’s running on. The client then uses this token to authenticate the node to your tailnet via workload identity federation—without requiring you to manually configure the token exchange with Tailscale.

tsnet support for authentication

The tsnet library for Go now supports workload identity federation, allowing your Go applications to join your tailnet without any hardcoded credentials. Applications running in a cloud environment can request a native OIDC token from their platform and use it to authenticate to your tailnet, without ever handling a static ts_authkey environment variable.

Support for the Tailscale Kubernetes Operator

Workload identity federation is also now available in beta for the Tailscale Kubernetes operator. This allows the operator to authenticate to your tailnet using the cluster’s native workload identity, rather than a hard-coded secret. As a result, you can connect Kubernetes clusters to Tailscale without managing static credentials, reducing operational overhead and improving security.

Get started

Workload identity federation is production-ready and available today on all Tailscale plans. Whether you’re connecting a single CI runner or automating access for a fleet of cloud workloads, you can eliminate static credentials and build more secure infrastructure.

To get started, see the workload identity federation documentation, or explore the API reference and Terraform provider guide to automate your setup.

Share

Authors

Smriti Sharma headshotSmriti Sharma
Sam LinvilleSam Linville

Contributors

Matt Provost
Sam Linville
Walter Poupore
Sarah Wolfsont
Mario Minardi
Danni Popova
Loading...

Try Tailscale for free

Schedule a demo
Contact sales
cta phone
mercury
instacrt
Retool
duolingo
Hugging Face