Get granular access to every workload, simplify Kubernetes cluster connectivity, and get clear network visibility.
Trusted by companies like these
Cross-cluster communication works even in hybrid cloud region setups with zero public exposure.
Identity persists throughout Tailscale’s mesh network. By assigning runners identities with tags, Tailscale enables granular access control per repo and job. Define who can reach any given cluster or service.
Centralized networking adds complexity, lessens security, and increases your attack surface. Stop fumbling with firewalls, public IPs, extra servers, and exponentially increasing complexity with your workloads.
Upgrade to identity-based mesh networking to meet the needs of your modern workflows.
Identity persists end-to-end with Tailscale, simplifying authentication and connectivity for both developers and runners.
Least-privilege is automatic and default, ensuring compliance throughout onboarding and offboarding.
With federated OIDC identity, you can stop worrying about long-lived SSH keys, API tokens, and secrets in CI/CD pipelines.
Secure access to managed runners means no more self-hosting.
Whether it’s cloud, SaaS, self-hosted, or across multiple locations, Tailscale connects all your runners.
Tailscale provides secure connectivity from your runners to your code and package repositories, and to your test infrastructure.
Runners can access the control plane securely through the Tailscale API Server Proxy.
No more complex networking setups, automate access through grants, and always be up to date on compliance.
Grant your developers least-privilege, just-in-time access to production when needed.
Allow precise segmentation of workloads and temporary runners with Grants. Once a job is done, access is gone.
Route network flow logs to monitoring tools and capture kubectl sessions through the Tailscale API server proxy.
Manage clusters securely, access your control plane with the Tailscale API server proxy.
“One of my favorite things about Tailscale was how fast I could start building out our networks. Provisioning resources manually can be very time-consuming, and the ability to fit into existing IaC workflows made deploying our network infrastructure easy.”
Guillaume Legendre
DevOps Engineer
“Our product teams can give themselves direct SSH access into bastion hosts without a public IP attached to it. That way, they can manage these large fleets of Kubernetes or otherwise container-based hosts that run the cloud products we offer.”
Louis Gardner
Principal Security Infrastructure Engineer
“Because of its simplicity, both in architecture and end user experience, we can solve our acute problems quickly and easily. With Tailscale we don’t have to think about VPNs any more.”
Mike Deeks
Senior Staff Software Engineer
Tailscale uses Zero Trust networking with end-to-end encryption powered by WireGuard. Every runner gets a unique identity, and connections are authenticated individually rather than relying on network perimeter security. Your CI/CD traffic is encrypted point-to-point, and Tailscale cannot (and does not) inspect it. This cloud network security model means your runners stay secure whether they're running in GitHub Actions, GitLab, or your own infrastructure.
Zero Trust means never trusting a connection by default, even inside your network. For CI/CD pipelines, this is critical because runners are often ephemeral and spin up in different environments. Instead of assuming "inside the network equals safe," Tailscale verifies every runner's identity before granting access. You get cloud access control that works across multi-cloud and hybrid cloud environments without managing firewall rules or VPNs.
Yes. Tailscale works with any managed runner service. Install Tailscale in your CI workflow (usually one or two lines), and your ephemeral runners can securely access private resources like databases, staging environments, or production infrastructure. No need to expose services publicly or configure complex VPN setups. It just works with GitHub Actions, GitLab CI, CircleCI, Jenkins, or any CI/CD platform.
Nope. Tailscale uses NAT traversal to establish direct connections between your runners and resources without requiring firewall configuration or port forwarding. Your runners can connect to private services across different clouds, on-premises data centers, or hybrid cloud networking setups without touching network infrastructure. This is especially useful for ephemeral CI runners that need quick, secure access without manual network setup.
Tailscale uses identity-based access control with tags and ACLs (Access Control Lists). Tag your runners by repository, team, or job type, then define granular policies in your tailnet. For example, you can give production deployment runners access to production databases while limiting test runners to staging only. This least-privilege cloud access control works automatically as runners spin up and down, with no manual credential management or network reconfiguration.
For individuals who want to securely connect personal devices, for free.
For teams or organizations looking for an easy-to-use, secure, legacy VPN replacement.
For companies who need service and resource level authentication and access control.
For companies who need advanced integrations, compliance and support for access control at scale.