Get started
Login
© 2024

Set up servers

Set up a server in your tailnet, and use Tailscale SSH to manage authentication for those servers.

Tailscale tags let you authenticate and identify non-user devices. This guide explains tags, their purpose, and how to group your devices with tags.

Explore how to use Tailscale auth keys to simplify device authentication, automate device provisioning, and enhance security. Learn how to create and manage auth keys for streamlined network access and control.

This guide explains how key expiry works, how to disable it for uninterrupted device access, and how to avoid disruptions in network connectivity. Explore best practices to keep your tailnet secure while preventing unnecessary re-authentication.

This guide explains how to use Tailscale SSH to manage the authentication and authorization of SSH connections in your tailnet.

Use Tailscale SSH Console to start an SSH session directly from the admin console.

Use Tailscale SSH session recording to collect end-to-end encrypted recordings of Tailscale SSH sessions.

Learn how to configure HTTPS for devices in your Tailscale network.

Learn how to use ephemeral nodes in Tailscale for managing short-lived devices like containers and CI/CD systems. Discover setup steps, ephemeral auth keys, and how to streamline network cleanup with auto-removal and restricted access.

Learn how or whether your device can run Tailscale even when no users are logged in.

Advanced topics

This guide explains how to secure Windows RDP access over the internet using Tailscale by setting up encrypted, authorized connections to Windows RDP servers without the need to open firewall ports.

Last updated Dec 20, 2024