Manage multiple tailnets
Tailscale lets you create multiple tailnets under a single organization, using a common identity provider and domain.
To create multiple tailnets for your organization, contact our sales team.

All additional tailnets must use the same domain and identity provider as your existing tailnet. At a future date, Tailscale will allow arbitrary combinations of identity providers and domains in your organization.
Create additional tailnets
Currently, users are not able to create additional tailnets in a self-serve manner. Contact your Account Executive or Solutions Engineer to create an additional tailnet on your behalf. You will need to provide:
- The desired name for your additional tailnet, subject to the following rules:
- Additional tailnet names must begin with a
_character, and can use any alphabet character or underscore. For example,_additional_tailnetis a valid name, but_additional-tailnet2is not. At a future date, Tailscale will remove the underscore prefix requirement, expand the valid character set, and allow tailnet names to be changed.
- Additional tailnet names must begin with a
- The email address of the user who should be designated as the Owner of the additional tailnet. This must be an existing user in your current tailnet.
- Whether the tailnet should be listed for users that have not joined it.
Access the admin console of additional tailnets
All users in your organization will be able to join additional tailnets that are created. If you want to restrict who is able to join an additional tailnet, you must turn on User approval for that tailnet. At a future date, Tailscale will introduce granular access rules to determine which users are allowed to join additional tailnets.
Select an additional tailnet during sign-in

In this example, Amelie has access to three tailnets in total, but has only joined example.com and _example_dev_tailnet.
When signing in to Tailscale, if your organization has multiple tailnets, you're directed to a tailnet selector that lets you choose the tailnet you wish to sign in to.
Additional tailnets that you have not joined display at the bottom of this selector unless marked as unlisted.
Switch to an additional tailnet from the admin console

To switch between admin consoles for your organization's tailnets, select your profile picture in the top right corner of the admin console, and choose the correct tailnet from the dropdown.
Only tailnets you have joined display. To join additional tailnets, select Join additional tailnets.
Add devices to your additional tailnet
Authenticate devices through your identity provider
When you create an additional tailnet for your organization, it will appear as an option during the authentication flow for devices. Select the tailnet to which you'd like to add the device.
Authenticate devices with auth keys
The steps to add a device to an additional tailnet with an auth key have not changed. Sign into the tailnet's admin console or switch to that tailnet's console, and then follow the standard steps for creating an auth key.
User & group provisioning
If you enable group syncing in any tailnet in your organization, you can reference those groups in access control policies in each of your organization's tailnets.
If you need to make any changes to your provisioning settings, you can do so only from the original tailnet that enabled provisioning. All other tailnets will have a read-only access for the groups which they can reference in their access control policies.
Provisioned users are not yet synced across all your organization's tailnets. Users who are automatically provisioned to the original tailnet must still manually join other tailnets, and users suspended via provisioning sync will only be marked suspended in the original tailnet.
Access control policy example
Control which groups can access which resources in each of your tailnet's policy files tailnet-by-tailnet. Here's an example:
-
In tailnet 1 allow
group1@example.comto accesstag:staging:443resources, but notgroup2@example.com, with a test to enforce this:{ "grants": [ { // allow `group1` to access `tag:staging:443` "src": ["group1@example.com"], "dst": ["tag:staging"], "ip": ["443"] } ], "tests": [ { // deny `group2` access to `tag:staging:443` "src": "group2@example.com", "deny": ["tag:staging:443"] } ] }
You can use the visual policy editor to manage your tailnet policy file. Refer to the visual editor reference for guidance on using the visual editor.
-
In tailnet 2 allow
group2@example.comto accesstag:production:443resources, but notgroup1@example.com, with a test to enforce this:{ "grants": [ { // allow `group2` to access `tag:production:443` "src": ["group2@example.com"], "dst": ["tag:production"], "ip": ["443"] } ], "tests": [ { // deny `group1` access to `tag:production:443` "src": "group1@example.com", "deny": ["tag:production:443"] } ] }
You can use the visual policy editor to manage your tailnet policy file. Refer to the visual editor reference for guidance on using the visual editor.
Unlist tailnets
If your organization has multiple tailnets, you may want to prevent users from seeing the tailnets that they have not joined. Unlisting a tailnet will hide it from users who have not joined it in the tailnet selector during login, though users can still join the tailnet by referencing it as a query parameter in the tailnet selector URL. To unlist a tailnet, contact your Account Executive or Solutions Engineer.
Give users access to an unlisted tailnet
Users may still join an unlisted tailnet by adding the tailnet query parameter with the tailnet's name in a link to the tailnet selector. This will cause the unlisted tailnet to display in the tailnet selector UI.
For example, if you have an unlisted tailnet "_example_prod_tailnet", a user can join the tailnet by adding the tailnet query parameter to the tailnet selector URI:
https://login.tailscale.com/welcome?tailnet=_example_prod_tailnet
Limitations
-
All users in your organization will be able to join additional tailnets that are created. If you want to restrict who is able to join an additional tailnet, you must turn on User approval for that tailnet. At a future date, Tailscale will introduce granular access rules to determine which users are allowed to join additional tailnets.
-
All additional tailnets must use the same domain and identity provider as your existing tailnet. At a future date, Tailscale will allow arbitrary combinations of identity providers and domains in your organization.
- Allow Everyone to join external tailnets to let users join additional tailnets. You can still use User and group provisioning to control which groups and users can access resources within each tailnet.
