Page cover image

Tailscale: Managing Access to ACLs

In this tutorial, you'll learn how to configure Grant Kits to automate access requests to a Tailscale ACL. This use case allows you to lock down your Tailscale VPN.

We will be using the Tailscale Starter Kit as a base and replace configuration stubs for our use case.

Before you start

  1. Make sure you have:

  2. Make sure you setup:

    1. A Connection to a repo by following Connect a Repo

Step 1: Configure Your Grant Kit

Configure Output

Grant Kits rely on your GitHub account and repository name to output access changes, which we'll set through Terraform local variables. Update the locals block in main.tf with your account_name and repo_name

main.tf
 locals {
  account_name = "" #CHANGEME
  repo_name = "" #CHANGEME
  ...
}

Configure Reviewers

Workflow defines who should approve an access request.

Let's update the reviewers block by adding yourself as the reviewer by switching [email protected] with the email address you use to sign into Abbey.

main.tf
 resource "abbey_grant_kit" "..." {
   ...
   workflow = {
     steps = [
       {
         reviewers = {
-          one_of = ["[email protected]"] # CHANGEME
+          one_of = ["[email protected]"]

Step 2: Deploy Your Starter Kit

First, add your GitHub-related secrets to your repo:

  • TAILSCALE_API_KEY

  • TAILNET

You can find this information in your GitHub account.

What should it look like?

To deploy your Starter Kit, follow instructions from Deploy Your Grant Kit.

Step 3: Automate Access Management

🎉 Congratulations! Abbey is now managing permissions to your Resource for you. 🎉

You can now start requesting and approving access by following the Request Access and Approve or Deny Access Requests guides.

Next Steps

To learn more about what Resources you can configure, try one of our Step-by-Step Tutorials.

Last updated