Edge & IoT Deployments
Secure, manage, and monitor IoT & edge devices
Reliably connect to thousands of devices with Tailscale’s zero trust network overlay.
Manage remote access to devices in the field, from a unified control plane
Connect thousands of devices across the world, just like that
Small binaries for embedded devices and wide OS support
Works across networks: Satellite, LTE, 5G, WiFi, etc.
Easy NAT traversal with minimal firewall changes
Tailscale SSH
Peer-to-peer connections with end-to-end encryption
ACLs (access control lists)
Everything needed to build a secure network across every device
Users
SSO with IDP
Users can authenticate using one of our supported identity providers to access the tailnet.
User & group provisioning (SCIM)
Sync users and group settings from one of our supported IdPs to keep ACLs up-to-date.
On-demand access
Partner integrations allow administrators to provide time-bound, elevated privileges for users.
Devices
Device Approval
Require devices to be approved by an administrator before joining the tailnet.
Device posture management
Collect device attributes and use them as part of connectivity rules within your Tailnet to limit access for devices that do not meet security requirements.
Policies
Access controls lists (ACLs)
Create RBAC policies to determine which users, roles, or groups can access, which nodes on your tailnet.
ACL Tests
Verify ACLs provide sufficient coverage against unnecessary exposure.
Tailnet Lock Alpha
A predetermined trusted node must verify the trusted keys of any nodes attempting to join your tailnet.
Logging
Configuration audit logging
Surface what configuration-based actions occurred, by whom, and when.
Network flow logging
Surface what node-to-node interaction occurred, and when.
Log streaming
Natively stream configuration or network flow logs to our SIEM integration partners.
SSH session recording
Store any Tailscale SSH session recording long-term in any S3-compatible service or local disk.