Tailscale at Work
Bring Tailscale to Work
From Pi-holes to production clusters, Tailscale connects your critical infrastructure securely.
Get the magic of Tailscale at work
Simplify enterprise security management
Seamless identity lifecycle management
Manage access policies at DevOps speeds
From K3s to K8s, our operator connects them
Secure SaaS & devices with Tailscale ZTNA
Gain visibility into your network activity
Scale protection from small, human-sized tailnets to distributed corporate ones spanning geo-locations.
Users Management
SSO & MFA with IdP
Users can authenticate using one of our supported identity providers to access the tailnet.
User & group provisioning (SCIM)
Sync users and group settings from one of our supported IdPs to keep ACLs up-to-date.
On-demand access
Partner integrations allow administrators to provide time-bound, elevated privileges for users.
Devices
Device approval
Require devices to be approved by an administrator before joining the tailnet.
Device Posture
Continuously verify posture rules to determine device access to your tailnet.
Policies
Access controls lists (ACLs)
Create RBAC policies to determine which users, roles, or groups can access, which nodes on your tailnet.
ACL tests
Verify ACLs provide sufficient coverage against unnecessary exposure.
Tailnet lock
A predetermined trusted node must verify the trusted keys of any nodes attempting to join your tailnet.
Network Access
App Connectors
Secure third-party SaaS applications by restricting access to authorized users.
Kubernetes Operator
Connect services and encrypt communications across heterogeneous environments.
Regional Routing
Increase performance with high availability across complex networks.
Exit nodes
Route all traffic through a designated egress point, similar to a privacy VPN.
End-to-end encryption
Tailscale uses WireGuard protocols for end-to-end encryption.
Logging
Configuration audit logging
Surface what configuration-based actions occurred, by whom, and when.
Network flow logging
Surface what node-to-node interaction occurred, and when.
Log streaming
Natively stream configuration or network flow logs to our SIEM integration partners.
SSH session recording
Store any Tailscale SSH session recording long-term in any S3-compatible service or local disk.