[Closed] Tailscale Improvements (Certificates, Per App Deployment, Taildrop)

Problem/Justification

The current tailscale setup certainly works and is great to have yet i would describe it somewhat bare-bones. Some additional features have been introduced to tailscale and some additional use cases can be achieved with a somewhat deeper integration of tailscale into the app catalogue. I want to use this request to allow for a collection of app and integration improvements.

  • Improve Device and App Accessibility through the Tailnet.
  • Remove Issues relating to SSL certificates across all devices/services
  • Potential to provide OpenID connect provider for all apps through Tailnet

Impact/User Stories

SSL encryption by default

Allow the tailscale app to provision and manage SSL certificates for the truenas hardware.

  • Home users benefit from the removal of ssl warnings
  • Business don’t need to deploy the certificates themselves or the allow list of the self signed certs.

Taildrop

Allows users to upload files from each of their endpoints to the NAS from the share sheet.

  • All home users will be able to easily send files from any phone to the NAS Airdrop style.
  • Business or Enterprise use cases are likely somewhat limited for that due to the destination of Taildrop being a simple folder on the pool. If tailscale would introduce a “send to users home directory” setting this would be much cooler tho :wink:

Tailscale in Applications*

Add a checkbox to each app to also deploy a Tailscale container into the Application and allow an application specific subdomain to be exposed to the tailnet.

  • Home and business users can easily check one checkbox and provide an auth key or oauth client id in each app and have automatic ssl encryption to appname.tailnet.ts.net without needing to remember ports.
  • Businesses can configure app access through the tailnet acl including private and public access (Tailscale Funnel) rather than simply device level access.

*with a pointer on how to contribute to the app catalogue and a bit of collaboration i could create a pull request to enable this for all apps in the catalogue @HoneyBadger?! I looked at the repo already but the yamls there go a bit beyond my own usual setups.

OpenID connect (experimental as of 2025-07-14)

Use Tailscale as the OpenID provider to replace other openID connect providers.

  • Home users can configure tailscale as their ID provider for smb shares and apps.
  • Business users who sign into tailscale with an identity provider that either doesn’t support oid connect (apple/github) or don’t want to setup apps accessed only inside the tailnet to work with their external oid connect account can use tailscale to sign into their applications and smb shares. Access federation through tailscales openid connect provider enables automatic sso signins through the already limited tailscale.
    see also proof of concept: Using Tailscale as an OpenID Connect provider for homelab authentication

golink app*

*same here i can create that as a pr

  • go/links are a fun little utility to generate internal only short links that allow you to only remember or share a word or a phrase after the go/ part of the url and the server redirects you to the more complex url in your system.

For everyone who’s like me and is loving to play around with some other cool experiments the tailscale team is cooking up here is the section in their repo: tailscale/cmd at main · tailscale/tailscale · GitHub

1 Like

This is a related request: New app catalogue request: Caddy (reverse proxy)

You can do certificate automation, and HTTP/3 and TLS for the TrueNAS GUI, TrueNAS apps and your own custom apps while staying within the TrueNAS design by deploying a caddy-tailscale container that reverse proxies for your applications (including TrueNAS if you so wish) and for those apps that support it can pass authentication details in headers. I agree that it would be nicer if there was an option to deploy caddy-tailscale sidecar containers along with apps. A neat feature is that the services are only available via Tailscale, and you can turn off the GUI accessibility in the TrueNAS app. It is low-resource; 1 Caddy container serving 6 applications is using 75MB.

If you are happy with the caddy-tailscale container it is published by Tailscale directly. If you want extra caddy modules not included in Tailscale’s version, credit goes to @sfatula for posting this how-to on making a custom Caddy container with any additional modules you want: Electric Eel - How I am using Dockerfile, .env files, compose files

Tailscale for OIDC sounds nice! I will try! :slight_smile: For file sharing, SMB and NFS don’t support OAuth, but plenty of apps do. The only trouble is my Tailscale userid is an Apple Private Relay address that I will never remember. :slight_smile:

1 Like

I just SSO’d into Immich from my laptop and phone – nice! Thank you for sharing this!

The TrueNAS web interface needs OAuth support. Another feature request!

1 Like

I’ve seen that this is supposed to be coming in the next major release or two.

1 Like

+1000 for taildrop support. Tailscale officially supports Synology and QNAP. I can help if someone can point me to the start place.

1 Like

There are several feature requests within this single item, recommend raising these as separate requests, closing at this stage.