Compare commits
No commits in common. "d68669ffafda30ee5ab763922a0a9e4fb012c272" and "feac52df80da495219423c53627e24b7c939f780" have entirely different histories.
d68669ffaf
...
feac52df80
@ -1,76 +0,0 @@
|
|||||||
// Example/default ACLs for unrestricted connections.
|
|
||||||
{
|
|
||||||
// Define the tags which can be applied to devices and by which users.
|
|
||||||
"tagOwners": {
|
|
||||||
"tag:Host": ["autogroup:admin"],
|
|
||||||
"tag:Service": ["autogroup:admin"],
|
|
||||||
"tag:Bridge": ["autogroup:admin"],
|
|
||||||
"tag:Gate": ["autogroup:admin"],
|
|
||||||
"tag:Random": ["autogroup:admin"],
|
|
||||||
"tag:Hidden": ["autogroup:admin"],
|
|
||||||
},
|
|
||||||
|
|
||||||
// Define access control lists for users, groups, autogroups, tags,
|
|
||||||
// Tailscale IP addresses, and subnet ranges.
|
|
||||||
"acls": [
|
|
||||||
// Allow all connections.
|
|
||||||
// Comment this section out if you want to define specific restrictions.
|
|
||||||
// {"action": "accept", "src": ["*"], "dst": ["*:*"]},
|
|
||||||
|
|
||||||
// Random can
|
|
||||||
{"action": "accept", "src": ["tag:Random"], "dst": ["*:*"]},
|
|
||||||
|
|
||||||
// Host can
|
|
||||||
{"action": "accept", "src": ["tag:Host"], "dst": ["tag:Service":*]},
|
|
||||||
|
|
||||||
// Hidden serves
|
|
||||||
{"action": "accept", "src": ["*"], "dst": ["tag:Hidden:*"]},
|
|
||||||
|
|
||||||
],
|
|
||||||
|
|
||||||
// Define postures that will be applied to all rules without any specific
|
|
||||||
// srcPosture definition.
|
|
||||||
// "defaultSrcPosture": [
|
|
||||||
// "posture:anyMac",
|
|
||||||
// ],
|
|
||||||
|
|
||||||
// Define device posture rules requiring devices to meet
|
|
||||||
// certain criteria to access parts of your system.
|
|
||||||
// "postures": {
|
|
||||||
// // Require devices running macOS, a stable Tailscale
|
|
||||||
// // version and auto update enabled for Tailscale.
|
|
||||||
// "posture:autoUpdateMac": [
|
|
||||||
// "node:os == 'macos'",
|
|
||||||
// "node:tsReleaseTrack == 'stable'",
|
|
||||||
// "node:tsAutoUpdate",
|
|
||||||
// ],
|
|
||||||
// // Require devices running macOS and a stable
|
|
||||||
// // Tailscale version.
|
|
||||||
// "posture:anyMac": [
|
|
||||||
// "node:os == 'macos'",
|
|
||||||
// "node:tsReleaseTrack == 'stable'",
|
|
||||||
// ],
|
|
||||||
// },
|
|
||||||
|
|
||||||
// Define users and devices that can use Tailscale SSH.
|
|
||||||
"ssh": [
|
|
||||||
// Allow all users to SSH into their own devices in check mode.
|
|
||||||
// Comment this section out if you want to define specific restrictions.
|
|
||||||
{
|
|
||||||
"action": "check",
|
|
||||||
"src": ["autogroup:member"],
|
|
||||||
"dst": ["autogroup:self"],
|
|
||||||
"users": ["autogroup:nonroot", "root"],
|
|
||||||
},
|
|
||||||
],
|
|
||||||
|
|
||||||
// Test access rules every time they're saved.
|
|
||||||
// "tests": [
|
|
||||||
// {
|
|
||||||
// "src": "alice@example.com",
|
|
||||||
// "accept": ["tag:example"],
|
|
||||||
// "deny": ["100.101.102.103:443"],
|
|
||||||
// },
|
|
||||||
// ],
|
|
||||||
}
|
|
||||||
|
|
||||||
Loading…
x
Reference in New Issue
Block a user