Set up servers
Setting up a server on your Tailscale network
Set up a server in your tailnet, and use Tailscale SSH to manage authentication for those servers.
Group devices with tags
Tailscale tags let you authenticate and identify non-user devices. This guide explains tags, their purpose, and how to group your devices with tags.
Auth keys
Explore how to use Tailscale auth keys to simplify device authentication, automate device provisioning, and enhance security. Learn how to create and manage auth keys for streamlined network access and control.
Key expiry
This guide explains how key expiry works, how to disable it for uninterrupted device access, and how to avoid disruptions in network connectivity. Explore best practices to keep your tailnet secure while preventing unnecessary re-authentication.
Tailscale SSH
This guide explains how to use Tailscale SSH to manage the authentication and authorization of SSH connections in your tailnet.
Tailscale SSH Console
Use Tailscale SSH Console to start an SSH session directly from the admin console.
Tailscale SSH session recording
Use Tailscale SSH session recording to collect end-to-end encrypted recordings of Tailscale SSH sessions.
Enabling HTTPS
Learn how to configure HTTPS for devices in your Tailscale network.
Ephemeral nodes
Learn how to use ephemeral nodes in Tailscale for managing short-lived devices like containers and CI/CD systems. Discover setup steps, ephemeral auth keys, and how to streamline network cleanup with auto-removal and restricted access.
Keep Tailscale running when I'm not logged in to my computer
Learn how or whether your device can run Tailscale even when no users are logged in.
Advanced topics
Secure a Windows RDP server
This guide explains how to secure Windows RDP access over the internet using Tailscale by setting up encrypted, authorized connections to Windows RDP servers without the need to open firewall ports.