DOCS: keyword tag updates (#2922)

* replace "zero-trust" with "zero trust"

* fix and update all keyword tags
This commit is contained in:
Alex Fornuto 2022-01-11 12:36:47 -06:00 committed by GitHub
parent 3c87751c41
commit 64d50613af
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
54 changed files with 86 additions and 75 deletions

View file

@ -4,7 +4,7 @@ lang: en-US
sidebarDepth: 0
meta:
- name: keywords
content: pomerium architecture
content: pomerium, architecture
---
# Architecture

View file

@ -3,7 +3,7 @@ title: Background
lang: en-US
meta:
- name: keywords
content: pomerium identity-access-proxy beyondcorp zero-trust reverse-proxy ztn zta
content: pomerium, identity access proxy, beyondcorp, zero trust, reverse proxy, ztn, zta
---
# Background
@ -41,9 +41,9 @@ In summary, perimeter based security suffers from the following shortcomings:
- Even just defining what the network perimeter is is an increasingly difficult proposition in a remote-work, BYOD, multi-cloud world. Most organizations are a heterogeneous mix of clouds, servers, devices, and organizational units.
- VPNs are often misused and exacerbate the issue by opening yet another door into your network organization.
### Zero-trust
### Zero Trust
[Zero-trust](https://ldapwiki.com/wiki/Zero%20Trust) instead attempts to mitigate these shortcomings by adopting the following principles:
[Zero trust](https://ldapwiki.com/wiki/Zero%20Trust) instead attempts to mitigate these shortcomings by adopting the following principles:
- Trust flows from identity, device-state, and context; not network location.
- Treat both internal and external networks as untrusted.
@ -51,11 +51,11 @@ In summary, perimeter based security suffers from the following shortcomings:
- Every device, user, and application's communication should be authenticated, authorized, and encrypted.
- Access policy should be dynamic, and built from multiple sources.
To be clear, _perimeter security is not defunct_, nor is zero-trust security a panacea or a single product. Many of the ideas and principles of perimeter security are still relevant and are part of a holistic, and wide-ranging security policy. After all, we still want our castles to have high walls.
To be clear, _perimeter security is not defunct_, nor is zero trust security a panacea or a single product. Many of the ideas and principles of perimeter security are still relevant and are part of a holistic, and wide-ranging security policy. After all, we still want our castles to have high walls.
## Further reading
The zero-trust security model was first articulated by [John Kindervag](http://www.virtualstarmedia.com/downloads/Forrester_zero_trust_DNA.pdf) in 2010, and by Google in 2011 as a result of the [Operation Aurora](https://en.wikipedia.org/wiki/Operation_Aurora) breach. What follows is a curated list of resources that covers the topic in more depth.
The zero trust security model was first articulated by [John Kindervag](http://www.virtualstarmedia.com/downloads/Forrester_zero_trust_DNA.pdf) in 2010, and by Google in 2011 as a result of the [Operation Aurora](https://en.wikipedia.org/wiki/Operation_Aurora) breach. What follows is a curated list of resources that covers the topic in more depth.
### Government Recommendations

View file

@ -4,7 +4,7 @@ lang: en-US
sidebarDepth: 0
meta:
- name: keywords
content: pomerium community contributing code-of-conduct
content: pomerium, community, contributing, code of conduct
---
# Contributor Covenant Code of Conduct

View file

@ -4,7 +4,7 @@ lang: en-US
sidebarDepth: 0
meta:
- name: keywords
content: pomerium community contributing pr code
content: pomerium, community, contributing, pr, code
description: >-
This document describes how you can find issues to work on, fix/add
documentation, and how setup Pomerium for local development.

View file

@ -4,7 +4,7 @@ lang: en-US
sidebarDepth: 0
meta:
- name: keywords
content: pomerium community help bugs updates features
content: pomerium, community, help, bugs, updates, features
description: >-
This document describes how you users can stay up to date with pomerium,

View file

@ -4,7 +4,7 @@ lang: en-US
sidebarDepth: 0
meta:
- name: keywords
content: pomerium security disclosure vulnerabilities
content: pomerium, security, disclosure, vulnerabilities
---
# Security Policy

View file

@ -4,7 +4,7 @@ lang: en-US
sidebarDepth: 0
meta:
- name: keywords
content: auth0
content: auth0, pomerium, identity provider, idp
---
# Auth0

View file

@ -4,7 +4,7 @@ lang: en-US
sidebarDepth: 0
meta:
- name: keywords
content: azure active-directory active directory ad microsoft
content: azure, active directory, ad, microsoft, identity provider, idp
---
# Azure Active Directory

View file

@ -4,7 +4,7 @@ lang: en-US
# sidebarDepth: 0
meta:
- name: keywords
content: amazon aws cognito open-id oidc
content: amazon, aws, cognito, openid, oidc, identity provider, idp
---
# Cognito

View file

@ -4,7 +4,7 @@ lang: en-US
# sidebarDepth: 0
meta:
- name: keywords
content: github oauth2 provider identity-provider
content: github, oauth2, provider, identity provider, idp
---
# GitHub

View file

@ -4,7 +4,7 @@ lang: en-US
sidebarDepth: 0
meta:
- name: keywords
content: gitlab oidc openid-connect identity-provider
content: gitlab, oidc, openid connect, identity provider, idp
---
# GitLab

View file

@ -4,7 +4,7 @@ lang: en-US
sidebarDepth: 0
meta:
- name: keywords
content: google gsuite gmail oidc openid-connect workspaces
content: google, gsuite, gmail, oidc, openid connect, workspaces, identity provider, idp
---
# Google Workspace (formerly known as G Suite)

View file

@ -4,7 +4,7 @@ lang: en-US
sidebarDepth: 0
meta:
- name: keywords
content: okta oidc
content: okta oidc, identity provider, idp
---
# Okta

View file

@ -4,7 +4,7 @@ lang: en-US
sidebarDepth: 0
meta:
- name: keywords
content: ping oidc
content: ping, oidc, identity provider, idp
---
# Ping Identity

View file

@ -3,7 +3,7 @@ title: Binaries
lang: en-US
meta:
- name: keywords
content: pomerium identity-access-proxy oidc reverse-proxy
content: pomerium, identity access proxy, oidc, reverse proxy, identity aware proxy
---
# Binaries

View file

@ -3,7 +3,7 @@ title: From Source
lang: en-US
meta:
- name: keywords
content: pomerium identity-access-proxy oidc reverse-proxy from-source
content: pomerium, identity access proxy, oidc, reverse proxy, from source, identity aware proxy
---
# From Source

View file

@ -4,7 +4,7 @@ lang: en-US
description: Get Pomerium up and running quickly with Docker.
meta:
- name: keywords
content: pomerium identity-access-proxy oidc docker reverse-proxy containers
content: pomerium, identity access proxy, oidc, docker, reverse proxy, containers, identity aware proxy
---
# Pomerium using Docker

View file

@ -3,7 +3,7 @@ title: Helm
lang: en-US
meta:
- name: keywords
content: pomerium identity-access-proxy oidc kubernetes Helm reverse-proxy
content: pomerium, identity access proxy, oidc, kubernetes, helm, reverse proxy, ingress controller
---
# Install Pomerium using Helm

View file

@ -4,7 +4,7 @@ lang: en-US
sidebarDepth: 1
meta:
- name: keywords
content: pomerium identity-access-proxy oidc kubernetes Ingress reverse-proxy
content: pomerium, identity access proxy, oidc, kubernetes, ingress, ingress controller, reverse proxy
---
# Kubernetes Ingress Controller

View file

@ -5,8 +5,8 @@ sidebarDepth: 0
meta:
- name: keywords
content: >-
pomerium overview identity-access-proxy beyondcorp zero-trust
reverse-proxy ztn zero-trust-networks
pomerium, overview, identity access proxy, beyondcorp, zero trust,
reverse proxy, ztn, zero trust networks
---
# What is Pomerium

View file

@ -4,7 +4,7 @@ description: >-
This article describes how to leverage pomerium for TCP proxying
meta:
- name: keywords
content: pomerium pomerium-cli proxy identity-access-proxy ssh tcp postgres database redis mysql application non-http
content: pomerium, pomerium-cli, proxy, identity access proxy, ssh, tcp, postgres, database, redis, mysql, application, non http, tunnel
---
# TCP Support

View file

@ -4,12 +4,12 @@ sidebarDepth: 1
lang: en-US
meta:
- name: keywords
content: x509 certificates tls mtls letsencrypt lets encrypt
content: x509, certificates, tls, mtls, letsencrypt, lets encrypt
---
# Certificates
[Certificates](https://en.wikipedia.org/wiki/X.509) and [TLS](https://en.wikipedia.org/wiki/Transport_Layer_Security) play a vital role in [zero-trust][principles] networks, and in Pomerium.
[Certificates](https://en.wikipedia.org/wiki/X.509) and [TLS](https://en.wikipedia.org/wiki/Transport_Layer_Security) play a vital role in [zero trust][principles] networks, and in Pomerium.
This document covers a few options in how to generate and set up TLS certificates suitable for working with pomerium.
@ -124,4 +124,4 @@ Certificates, TLS, and Public Key Cryptography is a vast subject we cannot adequ
[certificate_key]: ../../reference/readme.md#certificates
[override_certificate_name]: ../../reference/readme.md#override-certificate-name
[principles]: ../background.md#history
[zero-trust]: ../background.md#zero-trust
[zero trust]: ../background.md#zero-trust

View file

@ -7,7 +7,7 @@ sidebarDepth: 1
# Device Identity
One of the core components of the zero-trust security model is **device identity**, which is the ability for a device to have a unique, unclonable identity string that can be authenticated and factored into access control decisions. This topic page covers the concept of device identity, and how it applies to the zero-trust model.
One of the core components of the zero trust security model is **device identity**, which is the ability for a device to have a unique, unclonable identity string that can be authenticated and factored into access control decisions. This topic page covers the concept of device identity, and how it applies to the zero trust model.
## Why Device Identity Is Important
@ -25,7 +25,7 @@ Device identity is similar but unique to MFA. Where MFA is an additional layer o
## What Is Device Identity
> When you remove "[the perimeter]" as the source of trust to your infrastructure, you must replace it with a level of trust for every person, **device**, and hop in the communication path. Where the other, more commonly implemented facets of zero-trust validates the user and traffic, device identity (through WebAuthn) validates the end user's device.
> When you remove "[the perimeter]" as the source of trust to your infrastructure, you must replace it with a level of trust for every person, **device**, and hop in the communication path. Where the other, more commonly implemented facets of zero trust validates the user and traffic, device identity (through WebAuthn) validates the end user's device.
Device ID is a unique identifying key that can only be created by the specific combination of hardware and software present on a specific device. How this is accomplished is largely dependent on the tools available on the user hardware, which we've detailed below.

View file

@ -4,14 +4,14 @@ lang: en-US
sidebarDepth: 1
meta:
- name: keywords
content: pomerium identity-access-proxy mutual authentication jwt jwks mtls
content: pomerium, identity access proxy, mutual authentication, jwt, jwks, mtls
description: >-
This page describes the concept of mutual authentication and why it's important.
---
# Mutual Authentication: A Component of Zero-Trust
# Mutual Authentication: A Component of Zero Trust
Pomerium provides a good layer of security out of the box, but it's not (and can't be) configured for complete [zero trust] right out of the box. This page explains several methods of achieving mutual authentication — a big part of the zero-trust model — with practical examples.
Pomerium provides a good layer of security out of the box, but it's not (and can't be) configured for complete [zero trust] right out of the box. This page explains several methods of achieving mutual authentication — a big part of the zero trust model — with practical examples.
This is a nuanced topic that dives into several specific security practices that provide mutual authentication. You can use the table of contents below to narrow down to the specific tools you're interested in or read the entire doc for a deeper understanding of how these tools work together to support strong infrastructure security.
@ -122,7 +122,7 @@ C-.-A
E[/Hacker/] --x B
```
In this way, we've applied a zero-trust security model to the application layer of our infrastructure's network model. You can see JWT verification in practice with our [Grafana] integration guide.
In this way, we've applied a zero trust security model to the application layer of our infrastructure's network model. You can see JWT verification in practice with our [Grafana] integration guide.
## mTLS: Protocol-based Mutual Authentication
@ -191,7 +191,7 @@ flowchart LR
B---xD
```
In this way, we've applied a zero-trust security model to the protocol layer of our infrastructure's network model.
In this way, we've applied a zero trust security model to the protocol layer of our infrastructure's network model.
## Mutual Authentication With a Sidecar

View file

@ -6,7 +6,7 @@ sidebarDepth: 0
lang: en-US
meta:
- name: keywords
content: pomerium troubleshooting faq frequently asked questions
content: pomerium, troubleshooting, faq, frequently asked questions
---
# Troubleshooting