APERTURE IS NOW AVAILABLE - START BUILDING WITH AI SAFELY IN MINUTES, NO WAITLIST.Read more →
  • Blog
  • Docs
  • Download
  • Contact Sales
  • Meet Tailscale

    • How Tailscale Works
    • WireGuard® for Enterprises
    • Features
    • Integrations
    • Docs
    • Download
    • Compare Tailscale

    Products

    • Business VPN
    • PAM
    • CI/CD Connectivity
    • Secure Access to AI
    • Cloud Connectivity
    • Workload Connectivity
    • Edge & IoT
    • Homelab
    aperture dashboard

    Aperture by Tailscale

    Unified AI governance for AI agents and users.

    Tailscale Winter Update

    The latest improvements on Aperture, Peer Relays, Services, and more.

    Read more
  • Customer Stories

    • Instacart
    • Cribl
    • Mercury
    • Hugging Face
    • All Customer Stories
  • Join the Community

    • Tailscale Insiders
    • Community Projects
    • Bring Tailscale to Work

    Events

    • Events and Webinars
    • TailscaleUp

    Learn more

    • Docs
    • Blog
    • Changelog
    • Press

    Join us at TailscaleUp

    Tailscale’s conference for engineering, security, and IT leaders.

    Learn more
  • Partner Opportunities

    • Become a Partner
    • Community Projects
    • Integrations
    • Contact Partnerships Team
  • Pricing
  • Login
  • Get started - it's free!
  • Blog
  • Docs
  • Download
  • Contact Sales
Platform

Meet Tailscale

  • How Tailscale Works
  • WireGuard® for Enterprises
  • Features
  • Integrations
  • Docs
  • Download
  • Compare Tailscale

Products

  • Business VPN
  • PAM
  • CI/CD Connectivity
  • Secure Access to AI
  • Cloud Connectivity
  • Workload Connectivity
  • Edge & IoT
  • Homelab
Customer Stories

Customer Stories

  • Instacart
  • Cribl
  • Mercury
  • Hugging Face
  • All Customer Stories
Community

Join the Community

  • Tailscale Insiders
  • Community Projects
  • Bring Tailscale to Work

Events

  • Events and Webinars
  • TailscaleUp

Learn more

  • Docs
  • Blog
  • Changelog
  • Press
Partnerships

Partner Opportunities

  • Become a Partner
  • Community Projects
  • Integrations
  • Contact Partnerships Team
Pricing
  • Login
  • Get started - it's free!

Company

  • About Tailscale
  • Careers
  • Press
  • Open Source

Help & Support

  • Support
  • Sales
  • Partnerships
  • Security
  • Changelog
  • Tailscale Status

Legal

  • Terms of Service
  • Privacy Policy
  • California Notice
  • Cookie Notice
  • All Legal

Social

  • Discord
  • GitHub
  • LinkedIn
  • Mastodon
  • Reddit
  • YouTube
  • X (Twitter)
© 2026 Tailscale Inc.
Tailscale is a registered trademark of Tailscale Inc. | WireGuard is a registered trademark of Jason A. Donenfeld

CI/CD pipelines

Ship code faster with secure CI/CD connectivity

Get granular access to every workload, simplify Kubernetes cluster connectivity, and get clear network visibility.

Create a free accountContact us

Trusted by companies like these

  • Hugging face logo
  • Perplexity logo
  • Microsoft logo
  • Corelight logo
An imported list of engineering employees from a company's IDP alongside a laptop, and a list of network resources they can access.

Tailscale just works, even across clusters and across clouds

Cross-cluster communication works even in hybrid cloud region setups with zero public exposure.

A flowchart showing a user connecting to a runner via SSH, while the runner performs a job in response to a code change.
A CI/CD workflow with several jobs to build, test and deploy an app, showing their associated tagged runners.

Identity-based and fine-grained access control

Identity persists throughout Tailscale’s mesh network. By assigning runners identities with tags, Tailscale enables granular access control per repo and job. Define who can reach any given cluster or service.

Get startedContact us
A list of CI/CD runners securely connected to individual resources, while their actions are logged.

Traditional networking is ruining your workflows

Centralized networking adds complexity, lessens security, and increases your attack surface. Stop fumbling with firewalls, public IPs, extra servers, and exponentially increasing complexity with your workloads.

Get startedContact us

Tailscale is the platform for all your CI/CD connectivity needs

Upgrade to identity-based mesh networking to meet the needs of your modern workflows.

Identity-based access

Identity persists end-to-end with Tailscale, simplifying authentication and connectivity for both developers and runners.

Access management made easy

Least-privilege is automatic and default, ensuring compliance throughout onboarding and offboarding.

No long-lived secrets

With federated OIDC identity, you can stop worrying about long-lived SSH keys, API tokens, and secrets in CI/CD pipelines.

No more self-hosted runners

Secure access to managed runners means no more self-hosting.

Runners work everywhere

Whether it’s cloud, SaaS, self-hosted, or across multiple locations, Tailscale connects all your runners.

Granular access to dev and prod

Tailscale provides secure connectivity from your runners to your code and package repositories, and to your test infrastructure.

Connect runners to your Kubernetes control plane

Runners can access the control plane securely through the Tailscale API Server Proxy.

Get rid of platform engineering roadblocks

No more complex networking setups, automate access through grants, and always be up to date on compliance.

Production infrastructure access

Grant your developers least-privilege, just-in-time access to production when needed.

Least-privilege access for CI workflows

Allow precise segmentation of workloads and temporary runners with Grants. Once a job is done, access is gone.

Get complete visibility and recording for audits

Route network flow logs to monitoring tools and capture kubectl sessions through the Tailscale API server proxy.

Reduce your Kubernetes attack surface

Manage clusters securely, access your control plane with the Tailscale API server proxy.

What our customers are saying about Tailscale

Hugging face logo

“One of my favorite things about Tailscale was how fast I could start building out our networks. Provisioning resources manually can be very time-consuming, and the ability to fit into existing IaC workflows made deploying our network infrastructure easy.”

Guillaume Legendre

DevOps Engineer

Corelight logo

“Our product teams can give themselves direct SSH access into bastion hosts without a public IP attached to it. That way, they can manage these large fleets of Kubernetes or otherwise container-based hosts that run the cloud products we offer.”

Louis Gardner

Principal Security Infrastructure Engineer

Instacart logo

“Because of its simplicity, both in architecture and end user experience, we can solve our acute problems quickly and easily. With Tailscale we don’t have to think about VPNs any more.”

Mike Deeks

Senior Staff Software Engineer

Questions and answers

Tailscale uses Zero Trust networking with end-to-end encryption powered by WireGuard. Every runner gets a unique identity, and connections are authenticated individually rather than relying on network perimeter security. Your CI/CD traffic is encrypted point-to-point, and Tailscale cannot (and does not) inspect it. This cloud network security model means your runners stay secure whether they're running in GitHub Actions, GitLab, or your own infrastructure.

Zero Trust means never trusting a connection by default, even inside your network. For CI/CD pipelines, this is critical because runners are often ephemeral and spin up in different environments. Instead of assuming "inside the network equals safe," Tailscale verifies every runner's identity before granting access. You get cloud access control that works across multi-cloud and hybrid cloud environments without managing firewall rules or VPNs.

Yes. Tailscale works with any managed runner service. Install Tailscale in your CI workflow (usually one or two lines), and your ephemeral runners can securely access private resources like databases, staging environments, or production infrastructure. No need to expose services publicly or configure complex VPN setups. It just works with GitHub Actions, GitLab CI, CircleCI, Jenkins, or any CI/CD platform.

Nope. Tailscale uses NAT traversal to establish direct connections between your runners and resources without requiring firewall configuration or port forwarding. Your runners can connect to private services across different clouds, on-premises data centers, or hybrid cloud networking setups without touching network infrastructure. This is especially useful for ephemeral CI runners that need quick, secure access without manual network setup.

Tailscale uses identity-based access control with tags and ACLs (Access Control Lists). Tag your runners by repository, team, or job type, then define granular policies in your tailnet. For example, you can give production deployment runners access to production databases while limiting test runners to staging only. This least-privilege cloud access control works automatically as runners spin up and down, with no manual credential management or network reconfiguration.

Pricing that works for everyone

Personal

For individuals who want to securely connect personal devices, for free.

$0per active user/month
Get started free
Starter

For teams or organizations looking for an easy-to-use, secure, legacy VPN replacement.

$6per active user/month
Get started free
Premium

For companies who need service and resource level authentication and access control.

$18per active user/month
Get started free
Enterprise

For companies who need advanced integrations, compliance and support for access control at scale.

Custom
Contact sales

Drop your VPN,
Not your standards.

Get startedContact us