Get started
© 2024

Supported SSO identity providers

Tailscale works on top of the identity provider (IdP) or single sign-on (SSO) provider that you already use.

Set up an identity provider

When you activate your domain name with Tailscale for the first time, you must choose which identity provider you want to use.

You need to be an Owner of a tailnet in order to set up an identity provider.

Supported native identity providers

Tailscale natively supports the following identity providers:

Supported custom identity providers

In addition to the natively supported identity providers, Tailscale also lets you authenticate with custom OpenID Connect (OIDC) providers. For the list of custom identity providers that Tailscale has successfully tested, see Additional provider configurations.

Support for passkeys

Tailscale supports the use of passkey authentication for any tailnet that you are authorized to join.

Signing up with an email address

Tailscale does not support sign-up with email addresses. By design, Tailscale is not an identity provider—there are no Tailscale passwords.

Identity providers build robust infrastructure to handle identity and authentication, which are core and complex aspects of security. Tailscale delegates user authentication to identity providers because of their expertise, which allows Tailscale to focus on areas like secure networking.

Using an identity provider is not only more secure than email and password, but it allows us to automatically rotate connection encryption keys, follow security policies set by your team such as multifactor authentication (MFA), and more.

For more information about why Tailscale is not an identity provider, refer to the Tailscale doesn't want your password and SSO tax, cut blog posts.

Support for 2FA and MFA

Tailscale supports two-factor and multifactor authentication.

Tailscale does not handle authentication itself. Instead, you can enable 2FA and MFA features in your single sign-on identity provider, and they will apply to all your apps, including Tailscale.

Changing identity providers

You need to be an Owner, Admin, or IT admin of a tailnet in order to change the identity provider configuration.

If you need to change identity providers, contact support.

Unfortunately, we cannot migrate your tailnet from/to GitHub or Apple as an identity provider.

What Tailscale accesses from identity providers

Tailscale uses OpenID Connect (OIDC) for authentication.

Tailscale requests the minimum access needed to function. When authenticating to Tailscale, you must share information about users' emails and their name. Some providers also share a user photo; in this case, Tailscale stores the photo URL but not the photo itself.

Tailscale only uses your organization's team membership to ensure users can join the tailnet for their organization. With the GitHub identity provider, Tailscale requests the minimum set of permissions needed to get team membership, which includes access to your repositories and project boards. Tailscale does not use any content in your repositories or project boards.

Tailscale requests the minimum number scopes required to operate, and the information on how we use your data can be found in our privacy policy.