You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/ref/acls.md
+7-1
Original file line number
Diff line number
Diff line change
@@ -52,7 +52,13 @@ tags to a server they can register, the check of the tags is done on headscale
52
52
server and only valid tags are applied. A tag is valid if the user that is
53
53
registering it is allowed to do it.
54
54
55
-
To use ACLs in headscale, you must edit your `config.yaml` file. In there you will find a `policy.path` parameter. This will need to point to your ACL file. More info on how these policies are written can be found [here](https://tailscale.com/kb/1018/acls/).
55
+
To use ACLs in headscale, you must edit your `config.yaml` file. In there you will find a `policy.path` parameter. This
56
+
will need to point to your ACL file. More info on how these policies are written can be found
57
+
[here](https://tailscale.com/kb/1018/acls/).
58
+
59
+
Please reload or restart Headscale after updating the ACL file. Headscale may be reloaded either via its systemd service
60
+
(`sudo systemctl reload headscale`) or by sending a SIGHUP signal (`sudo kill -HUP $(pidof headscale)`) to the main
61
+
process. Headscale logs the result of ACL policy processing after each reload.
56
62
57
63
Here are the ACL's to implement the same permissions as above:
0 commit comments