resolved
Tailscale
tailscale.com/admin
landed in 38msBookSlash for Tailscale · IT
Tailscale URLs are short but unmemorable. The admin console, device list, ACL JSON editor, and DNS settings each get a flat name your IT and platform teams type.
resolved
Tailscale
tailscale.com/admin
landed in 38msother shortcuts you might save
Suggested slug patterns
Battle-tested shortcut conventions for Tailscale, with notes on why each one survives the URL changes that break personal bookmarks.
Tailscale admin home.
IT and platform engineers reach it daily.
Device list / Machines view.
IT reaches it during onboarding to authorise new machines.
ACL JSON editor.
Platform engineers edit network ACLs here; the slug skips the menu navigation.
Tailnet DNS settings.
Platform teams configure MagicDNS and split DNS; saving as a slug skips the navigation.
Auth keys for automated provisioning.
Engineers reach it for CI/CD and automation setup.
Tailnet logs / audit log.
Security incident response uses this URL.
Common workflows
When a new machine joins the tailnet, IT reaches b/devices to authorise. The slug ends the daily navigation friction.
Platform engineers reach b/acl for every ACL change. BookSlash audit logs prove who changed the URL and when, providing the change-control evidence the JSON editor itself doesn’t track.
b/tailscale-logs lands the security analyst on the audit log filtered to the incident window. Pairs with b/devices for affected-machine context.
With and without
Without shortcuts
IT keeps Tailscale URLs in a private Notion doc. Each platform engineer bookmarks the ACL editor separately.
With BookSlash
b/tailscale, b/devices, b/acl, b/tailnet-dns, b/keys, b/tailscale-logs. Six slugs cover Tailscale for IT, platform, and security.
Related integrations
Frequently asked
No. Slugs are URL → URL redirects. Tailscale’s peer-to-peer encryption is unaffected; BookSlash routes only the admin URL.
Namespace per tailnet: b/tailscale-corp, b/tailscale-customer. The b/ stays constant; the segment after disambiguates.
No. Slug routing is URL-only. Automated device provisioning uses Tailscale’s API directly.
Tailscale supports SAML SSO via Okta. b/tailscale points at the admin URL; Okta handles auth at the destination.
Start with one team. Roll out when it sticks.
2,400+ teams reach every important destination in their stack with a single keystroke. Save the first slug in 30 seconds.
Free for personal use · No credit card · 14-day team trial