Zero Trust Networking
Authorize, authenticate, and verify every interaction on your network
Identity-based, zero-trust access controls ensure your critical infrastructure is always protected.
Tying identity to network connections
Bolster your organization’s security posture
End-to-end encryption
Microsegmentation
Visibility into your network
Dynamic access controls to meet the needs of any organization
Users
SSO with IDP
Users can authenticate using one of our supported identity providers to access the tailnet.
User & group provisioning (SCIM)
Sync users and group settings from one of our supported IdPs to keep ACLs up-to-date.
On-demand access
Partner integrations allow administrators to provide time-bound, elevated privileges for users.
Policies
Access controls lists (ACLs)
Create RBAC policies to determine which users, roles, or groups can access, which nodes on your tailnet.
ACL tests
Verify ACLs provide sufficient coverage against unnecessary exposure.
Tailnet lock
A predetermined trusted node must verify the trusted keys of any nodes attempting to join your tailnet.
Logging
Configuration audit logging
Surface what configuration-based actions occurred, by whom, and when.
Network flow logging
Surface what node-to-node interaction occurred, and when.
Log streaming
Natively stream configuration or network flow logs to our SIEM integration partners.
SSH session recording
Store any Tailscale SSH session recording long-term in any S3-compatible service or local disk.