pomerium/docs/docs
2021-01-08 17:48:22 -05:00
..
community docs: replace httpbin with verify (#1702) 2020-12-22 09:53:08 -08:00
identity-providers update google docs (#1738) 2021-01-07 10:17:16 -07:00
img docs: fix in-action video (#1268) 2020-08-12 19:34:50 -04:00
quick-start docs: replace httpbin with verify (#1702) 2020-12-22 09:53:08 -08:00
topics authenticate: oidc frontchannel-logout endpoint (#1586) 2020-12-24 14:30:48 -08:00
architecture.md update docs (#1645) 2020-12-03 08:29:17 -08:00
background.md docs: fix links, fix upgrade guide (#1220) 2020-08-05 23:07:49 -07:00
CHANGELOG.md docs: v0.12 upgrade notes and changelog (#1753) 2021-01-08 17:48:22 -05:00
FAQ.md update docs (#1645) 2020-12-03 08:29:17 -08:00
installation.md cli: add version command (#1726) 2020-12-29 20:04:32 -08:00
readme.md update docs (#1645) 2020-12-03 08:29:17 -08:00
upgrading.md docs: v0.12 upgrade notes and changelog (#1753) 2021-01-08 17:48:22 -05:00

title lang sidebarDepth meta
What is Pomerium? en-US 0
name content
keywords pomerium overview identity-access-proxy beyondcorp zero-trust reverse-proxy ztn zero-trust-networks

What is Pomerium

Overview?

Pomerium is an identity-aware proxy that enables secure access to internal applications. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in. Pomerium gateways both internal and external requests, and can be used in situations where you'd typically reach for a VPN.

Pomerium can be used to:

  • provide a single-sign-on gateway to internal applications.
  • enforce dynamic access policy based on context, identity, and device state.
  • aggregate access logs and telemetry data.
  • perform delegated user authorization for service-based authorization systems:
  • provide unified identity attestation for upstream services:
  • provide a VPN alternative.

Demo

To make this a bit more concrete, click the image thumbnail to see a short youtube demo:

demo

The above video shows the flow for both an unauthorized and authorized user.

  1. An unauthorized user authenticates with their corporate single-sign-on provider.
  2. The unauthorized user is blocked from a protected resource.
  3. The unauthorized user signs out from their session.
  4. An authorized user authenticates with their corporate single-sign-on provider.
  5. Pomerium delegating and granting access to the requested resource.
  6. The authorized user inspecting their user details including group membership.