Get started
Login
© 2024

Setting up Okta to work with Tailscale

To activate Okta for your domain, follow the instructions below.

Contents

Supported Features

  • Single Sign-On (OpenID Connect) initiated via Okta

Requirements

Configuration Steps

We are actively working to make this process more automated. In the meantime, here are the steps you'll need to take to enable your domain for Okta authentication.

  1. On the Okta admin page, select the Tailscale application and navigate to the Sign On tab.
    1. Copy the values of Client ID and Client secret.
    2. Copy the issuer published in the OpenID Provider Metadata. Typically, this is the Okta URL. To find this URL, select OpenID Provider Metadata, look for a line that contains "issuer:", and then copy the URL listed on that line (without the quotes). For example, it will look like https://dev-123456.okta.com or similar.
  2. Fill out the Identity provider configuration or change section of the support form using the OpenID Connect details saved in the previous step. Note that the domain name used to log into Tailscale should match the email addresses of users assigned to this app

If this is the initial setup for your domain, after you submit this information, we will send you a custom link to finish activation. This may take up to two business days.

In the meantime, give users and/or groups access to the Tailscale app:

Assign access to users and/or groups.

Note that if you make changes to a domain already activated for Okta, or when you migrate an existing tailnet from another identity provider to Okta, no custom link is sent—your activation finishes without requiring this step.

If your organization has defined custom access policies, verify that the Tailscale app is authorized for the openid, email, and profile scopes.

Notes

After activation, check out our getting started guide.

For information about provisioning users and groups in Okta, see User & group provisioning in Okta.

Okta initiated login

Tailscale is currently not compatible with Identity Provider initiated login, and only provides service provider initiated login. This means users must start authentication from Tailscale's login page, rather than from inside their Okta instance. As a workaround, users who are interested in initializing login from the Okta instance can create a Tailscale Login bookmark chiclet by following the below steps.

  1. Open the Tailscale App in Okta, select the General tab, then select Edit.
  2. Check Do not display application icon to users and save.
  3. Open the Okta Integration Network, search for Bookmark App, and select it. Choose Add integration.
  4. Fill out the application label name as Tailscale Login, and set https://login.tailscale.com as the URL.
  5. Leave the Application Visibility setting unchecked, and choose Done.
  6. Choose Applications, and assign the new bookmark app to Tailscale users.