Node keys
Node keys are cryptographic keys that authenticate and identify devices on your Tailscale network (known as a tailnet). They are a fundamental component in Tailscale's security architecture, working alongside machine keys in a multi-layered approach to secure your network.
Tailscale uses node keys to authenticate devices, authorize access based on user identity and device status, and encrypt traffic between devices. When a device connects to Tailscale:
- The device generates a private node key (separate from the machine key).
- Tailscale sends the public component of the node key to the coordination server.
- You complete authentication through your identity provider (such as OAuth2 or SAML).
- After authentication, the coordination server links the node key to both the specific device (machine key) and the user identity.
- The coordination server validates the node key against your tailnet's access control policies to determine what resources your device can access.
- The coordination server then distributes the public node key to other devices in the tailnet (based on your access control policies).
- The device uses the key pair for encrypted connections with other devices.
When an Admin removes a device using the admin console, Tailscale immediately revokes its node key. Both authorization and revocation take effect almost instantly across your entire tailnet.
Machine keys vs. node keys
Tailscale uses machine keys and node keys to manage device identity and device authorization. Machine keys identify physical devices to the Tailscale coordination server. Node keys authorize network access and enable secure connections between devices.
Machine keys | Node keys |
---|---|
Generated when Tailscale is first installed | Generated each time a user authenticates |
Identify the physical device | Tie the device to a user identity |
Used for secure communication with the coordination server | Used for WireGuard connections between devices |
Cannot be rotated | Can be rotated regularly |
Pre-authorization can be required | Automatically validated against access control policies |