Use Tailscale tags to authenticate and identify non-user devices, such as a server.| Tailscale
Prevent unnecessary re-authentication when you disable key expiry. Avoid disruptions in network connectivity and still keep your Tailscale network secure.| Tailscale
Manage and troubleshoot your tailnet with the Tailscale command-line interface (Tailscale CLI).| Tailscale
Learn how you can verify that no node is added to your tailnet without being signed by trusted nodes in your tailnet.| Tailscale
Learn how to use roles for restricting access to the admin console.| Tailscale
Learn how to use OAuth clients to provide ongoing access to the Tailscale API.| Tailscale
Use Tailscale auth keys to authenticate devices, automate device provisioning, and enhance security. Create and manage auth keys for streamlined network access and control.| Tailscale
Plans that work for everyone. Free for personal use. Starter for $6 per user/month, Premium $18 per user/month. Contact us for Enterprise pricing.| tailscale.com