Skip to content

Self-Hosted Feature Parity

NetBird Self-Hosted vs Cloud Feature Parity

Section titled “NetBird Self-Hosted vs Cloud Feature Parity”

Self-hosted NetBird is genuinely free for unlimited users/peers with no license fees. However, it is not feature-equivalent to the cloud version. Eight specific capabilities are unavailable, the most operationally significant being: (1) background IdP-Sync (self-hosted uses JWT-at-login group sync instead), (2) SCIM provisioning (requires commercial license), (3) peer approval (cloud-only), (4) traffic event logging and SIEM streaming (cloud-only), and (5) device posture checks (cloud-only). For GSISG’s 100-user deployment, the JWT group sync workaround is adequate but not identical to cloud IdP-Sync, and single-management-server risk is the primary operational concern.


FeatureFree (Cloud)Team ($5/user/mo)Business ($10/user/mo)Self-Hosted (Free)
Users5UnlimitedUnlimitedUnlimited
Machines100100 + 10/user100 + 10/userUnlimited
P2P WireGuard encryptionYesYesYesYes
Access controls (policies)YesYesYesYes
Network Routes / NetworksYesYesYesYes
Private DNSYesYesYesYes
Enterprise IdP SSO/MFANoYesYesYes (via external OIDC)
IdP-Sync (background)NoYesYesNO (JWT sync only)
SCIM provisioningNoYesYesEnterprise license
User invites (email)NoYesYesNO
Peer approvalNoNoYesNO
Audit events loggingNoYesYesNO
Traffic events / SIEM streamingNoNoYesNO
MDM & EDR integrationNoNoYesNO
Device posture checksNoNoYesNO
Geo-distributed relaysYes (managed)Yes (managed)Yes (managed)DIY
High availabilityYes (managed)Yes (managed)Yes (managed)DIY / Enterprise
SupportCommunityTicketingPriorityCommunity only

AspectDetail
How it worksNetBird polls Entra ID via Microsoft Graph API continuously
Sync timingBackground, automatic, continuous
User provisioningUsers appear in NetBird before they log in
User deprovisioningAutomatic — access revoked at next sync
Group namesDisplay names (“Engineering”)
Group limitNo 200-group JWT limit
AspectDetail
How it worksGroups embedded in JWT ID token during OIDC authentication
Sync timingAt login time only
User provisioningUsers appear only after first login
User deprovisioningNOT automatic — sessions persist until expiry
Group namesGUIDs by default (unless Azure AD Premium)
Group limit200 groups per JWT token

Practical Differences for GSISG:

ScenarioCloud IdP-SyncSelf-Hosted JWT Sync
New employee startsAppears in minutesMust log in first
Employee terminatedRemoved at next syncSessions persist until timeout
Group membership changedUpdated within minutesUpdated at next user login
200+ groups per userWorksBreaks (JWT limit)

The biggest operational gap is deprovisioning. There is no automatic revocation when a user is disabled in Entra ID. Users must be manually removed from NetBird or their setup keys revoked. For a 100-user org, this is manageable with a documented offboarding procedure.


The NetBird scaling documentation states:

“If you are looking for a high-availability setup for the Management and Signal services, this is available through an enterprise commercial license.”

What you CAN do without enterprise license:

ComponentHA Possible?How
Relay serversYesDeploy multiple relay servers
DatabaseYesMigrate to PostgreSQL for replication
Management serverNoSingle instance only
Signal serverNoSingle instance only
DashboardYes (stateless)Load-balanced nginx

When the management server goes down: Existing WireGuard tunnels continue working (data plane is independent). New peer connections cannot be established. Policy changes cannot be applied. Setup-key peers remain connected indefinitely; SSO-authenticated peers expire per login expiration setting (default 24 hours).

Practical Mitigation: Docker restart policies, monitoring (Uptime Kuma/Prometheus), regular SQLite backups, separated relay servers. Blast radius is limited to control plane; data plane is unaffected.


Since v0.53.0 (August 2025), server components (management, relay, signal) are AGPLv3. Client applications remain BSD-3.

For GSISG self-hosting internally: absolutely nothing changes. AGPL obligations trigger ONLY when you modify the server code AND offer the modified version as a service to external users/organizations. Internal use — even with modifications — is fully permitted.

ConcernRisk Level
Internal deployment without modificationsZERO
Internal deployment with modificationsZERO
Corporate policy prohibiting AGPL on devicesLOW — client is BSD-3, not AGPL
Legal reviewLOW-MEDIUM — brief review of client/server split recommended

NetBird offers a Commercial License for self-hosted deployments with enterprise needs:

FeatureFree Self-HostedEnterprise Self-Hosted
Management + Signal HASingle instanceMultiple instances + load balancer
SCIM provisioningNot availableAvailable
SupportCommunity onlyCustom SLA
Installation assistanceNoneIncluded

Pricing is custom (contact sales@netbird.io). Not publicly listed.


Since v0.62, NetBird supports embedded Dex IdP with local user management AND multiple external OIDC providers simultaneously:

  1. Deploy self-hosted NetBird (creates embedded IdP with local users)
  2. Create admin account via Dashboard setup wizard (local email/password)
  3. Add Microsoft Entra ID as external provider (client ID, secret, issuer)
  4. Users see both login options: “Continue with Email” (local) AND Microsoft button
  5. Each user’s provider is tracked with a badge in the Users list

This gives GSISG SSO through Entra ID without needing the cloud Team plan. 2-3 local break-glass admin accounts provide emergency access if Entra ID has an outage.


#FeatureCloud PlanImpact for GSISGWorkaround
1IdP-Sync (background)Team+MEDIUM — no auto-deprovisionJWT sync at login; manual offboarding
2SCIM provisioningTeam+ / EnterpriseLOWJWT sync; or purchase enterprise license
3Peer approvalBusiness+LOWRestrict setup key distribution
4Traffic events loggingBusiness+LOWWireGuard packet captures; API for peer status
5Audit & traffic streamingBusiness+LOWManual log aggregation
6MDM & EDR integrationBusiness+LOWEnforce compliance through Intune separately
7Device posture checksBusiness+LOWManual policy enforcement
8User invitesTeam+LOWShare setup keys or login URL directly

All core networking features are retained: P2P WireGuard, access controls, network routes, networks, private DNS, split DNS, SSH, setup keys, SSO/OIDC, local user management, reverse proxy (beta), unlimited users and machines.


PrioritySelf-Hosted FreeCloud Team ($500/mo)Self-Hosted Enterprise
Cost minimizationBestModerateUnknown
Data sovereigntyBestModerateBest
Auto-deprovisioningManual workaroundBestGood (SCIM)
Management HAWeakestBestGood
Operational simplicityModerateBestModerate

Recommended starting point: Self-hosted free. Upgrade to Cloud Team ($6,000/year) only if automatic deprovisioning or managed HA becomes critical. Contact sales@netbird.io for enterprise self-hosted pricing if SCIM or management HA is needed while retaining data sovereignty.


Official: netbird.io/pricing, docs.netbird.io (self-hosted-vs-cloud, identity-providers, local users, plans-and-billing, scaling guide)

Community: netbird.io/knowledge-hub (AGPL announcement, v0.62 local users), GitHub #2073, #5335, Reddit, NetBird Forum