Loading controls...
Control: Customize node key expiration
Description
Require users to rotate keys by re-authenticating their devices to the network regularly. Devices connect to your tailnet using a public key which expires automatically after a period of time, forcing keys to rotate.
Usage
Run the control in your terminal:
steampipe check tailscale_compliance.control.security_best_practices_device_node_key_expire
Snapshot and share results via Steampipe Cloud:
steampipe loginsteampipe check --share tailscale_compliance.control.security_best_practices_device_node_key_expire
Plugins & Tables
SQL
select id as resource, case when key_expiry_disabled then 'alarm' else 'ok' end as status, case when key_expiry_disabled then name || ' key expiration disabled.' else name || ' key expiration enabled.' end as reason, tailnet_namefrom tailscale_device;