Supported SSO identity providers
Tailscale works on top of the identity provider (IdP) or single sign-on (SSO) provider that you already use.
Set up an identity provider
When you activate your domain name with Tailscale for the first time, you must choose which identity provider you want to use.
You need to be an Owner of a tailnet in order to set up an identity provider.
Supported native identity providers
Tailscale natively supports the following identity providers:
- Apple
- Google, including Gmail and Google Workspace (G Suite)
- GitHub
- Microsoft, including Microsoft Accounts, Office365, Active Directory, and Microsoft Entra ID
- Okta
- OneLogin
Supported custom identity providers
In addition to the natively supported identity providers, Tailscale also lets you authenticate with custom OpenID Connect (OIDC) providers. For the list of custom identity providers that Tailscale has successfully tested, see Additional provider configurations.
Support for passkeys
Tailscale supports the use of passkey authentication for any tailnet that you are authorized to join.
Signing up with an email address
Tailscale does not support sign-up with email addresses. By design, Tailscale is not an identity provider—there are no Tailscale passwords.
Identity providers build robust infrastructure to handle identity and authentication, which are core and complex aspects of security. Tailscale delegates user authentication to identity providers because of their expertise, which allows Tailscale to focus on areas like secure networking.
Using an identity provider is not only more secure than email and password, but it allows us to automatically rotate connection encryption keys, follow security policies set by your team such as multifactor authentication (MFA), and more.
For more information about why Tailscale is not an identity provider, refer to the Tailscale doesn't want your password and SSO tax, cut blog posts.
Support for 2FA and MFA
Tailscale supports two-factor and multifactor authentication.
Tailscale does not handle authentication itself. Instead, you can enable 2FA and MFA features in your single sign-on identity provider, and they will apply to all your apps, including Tailscale.
Changing identity providers
You need to be an Owner, Admin, or IT admin of a tailnet in order to change the identity provider configuration.
If you need to change identity providers, contact support.
What Tailscale accesses from identity providers
Tailscale uses OpenID Connect (OIDC) for authentication.
Tailscale requests the minimum access needed to function. When authenticating to Tailscale, you must share information about users' emails and their name. Some providers also share a user photo; in this case, Tailscale stores the photo URL but not the photo itself.
Tailscale only uses your organization's team membership to ensure users can join the tailnet for their organization. With the GitHub identity provider, Tailscale requests the minimum set of permissions needed to get team membership, which includes access to your repositories and project boards. Tailscale does not use any content in your repositories or project boards.
Tailscale requests the minimum number scopes required to operate, and the information on how we use your data can be found in our privacy policy.