Zero-trust, zero-ingressNo public endpoints. Access is gated by your Tailscale ACLs, identity, and devices — and nothing else.
Ephemeral credentials, by defaultAll kubeconfigs are short-lived and auto-expiring. You get access when you need it, and not a second longer.
Kubernetes-native RBACGrants are mapped to native ClusterRoles, and credentials are provisioned as real Kubernetes ServiceAccounts.
Declarative grant-to-role mappingUse a CRD to define how Tailscale users, groups, or tags map to Kubernetes roles — GitOps ready.
No complex proxies or auth chainsSay goodbye to reverse proxies and auth headers. Access is handled with direct, secure API calls inside the tailnet.
Built for ephemeral clustersGreat for dev/test environments that spin up and down frequently — join the tailnet, register, and go.
Central login API, federation-readySupports a central login cluster with other clusters registering dynamically — ideal for multi-cluster orgs.
Tiny footprint, hackable coreLightweight Go components designed to be extended, embedded, or scripted into your own workflows.