Get started - it's free!
Login
© 2025

What devices can connect to or see mine?

This topic explains how Tailscale manages device visibility and connections between devices in your Tailscale network (known as a tailnet). Understanding these concepts helps you control which devices can connect to each other and what resources they can access.

Device visibility in Tailscale

Tailscale creates secure private networks (called tailnets) that connect your devices. By default, Tailscale organizes devices into tailnets based on identity provider domains. This creates natural boundaries between different organizations:

These boundaries ensure that your organization's devices remain private and inaccessible to users in other organizations, even if they also use Tailscale.

When you create a Tailscale account using an identity provider with a domain that you own or through a GitHub organization, Tailscale recognizes users as belonging to the same organization. As a result, they will be added to the same tailnet.

The visibility of devices within a tailnet is governed by the tailnet policy file, which defines access controls determining which devices can communicate with each other. This follows a deny-by-defauly security model, meaning that two devices can only connect if an access rule explicitly allows it.

Although access control policies in Tailscale follow a deny-by-default security model, the default access control policy is to allow all devices within a tailnet to connect to each other.

Device visibility principles

Tailscale implements a concept called netmap trimming that determines which devices appear in your Tailscale client. This mechanism helps keep larger tailnets manageable and enhances privacy by showing you only the devices relevant to your work. Your device's visible network map includes:

  • Devices that your device can connect to as permitted by the tailnet policy file. This includes both devices in your tailnet and devices shared with you from other tailnets.
  • Exit nodes that your device can use, as permitted by your tailnet policy file.
  • All devices authenticated with the same user identity as your current device, even if the tailnet policy file doesn't permit you to connect to them. This allows for the use of Taildrop if it's enabled in your tailnet.
  • All devices that can connect to your device, even if you aren't permitted to connect to them. This visibility enables Tailscale to establish direct connections in as many environments as possible.

Manage device access

By default, Tailscale organizes devices into tailnets based on identity provider domains. When you create a Tailscale account using an identity provider with a domain you own or through a GitHub organization, Tailscale recognizes users as belonging to the same organization and adds them to the same tailnet.

Access control between devices

The tailnet policy file controls access between devices using either grants (the preferred approach) or legacy access control lists (access control policies). Both mechanisms follow the "default deny" principle, meaning:

  • Connections between devices are denied by default.
  • Connections are only allowed when explicitly permitted by a rule in the tailnet policy file.
  • Access control policies define which users, groups, or tags can access specific resources.

Cross-organization visibility

If you use Tailscale on your work device, your personal devices won't be visible to coworkers unless you've explicitly shared them. Device visibility follows these principles:

  • Coworkers who use a different tailnet than yours cannot connect to or see your devices.
  • Coworkers on the same tailnet can see and connect to your devices if allowed by the tailnet policy file.
  • Personal devices on a separate tailnet remain private unless explicitly shared.

Restrict access to your devices

There are two primary approaches to restricting which devices can connect to yours in a tailnet: access control policies through the tailnet policy file and individual device restrictions through the Tailscale client preferences.

Access control policies

Tailnet Admins can restrict which devices can connect to each other by defining appropriate access control policies (such as grants) in the tailnet policy file. This is the primary method for controlling access between devices and should be your first approach for managing device visibility.

For example, if a grant policy allows device-a to connect to device-b, that means:

  • device-a can see device-b.
  • device-b can see device-a.

Likewise, if there there's no grant rule that allows device-a to access device-b, that means:

  • device-a cannot see device-b.
  • device-b cannot see device-a.

Individual device restrictions

You can also restrict incoming connections from Tailscale to your specific device through the Tailscale client preferences. This provides an additional layer of control for situations where you need more granular restrictions beyond what the tailnet policy file provides.

Last updated May 2, 2025