pomerium/docs/docs
Alex Fornuto 8c56d64f31
docs: rm broken link (#2215)
* docs: rm broken link

The was the only image on this page that was also a link to the image, which failed with a 404 (which is the default Nginx 404 page, BTW).

* fmt and typo

Signed-off-by: Bobby DeSimone <bobbydesimone@gmail.com>

Co-authored-by: Bobby DeSimone <bobbydesimone@gmail.com>
2021-05-20 21:13:41 -07:00
..
community proxy / controplane: use old upstream cipher suite (#2196) 2021-05-12 15:37:20 -07:00
identity-providers Updating Doc for Pomerium-Dex Exercise (#2018) 2021-03-30 07:24:58 -06:00
img docs: fix in-action video (#1268) 2020-08-12 19:34:50 -04:00
quick-start docs: replace httpbin with verify (#1702) 2020-12-22 09:53:08 -08:00
topics Update programmatic-access.md (#2190) 2021-05-16 20:54:32 -07:00
architecture.md docs: rm broken link (#2215) 2021-05-20 21:13:41 -07:00
background.md docs: fix links, fix upgrade guide (#1220) 2020-08-05 23:07:49 -07:00
CHANGELOG.md docs: v0.14.0 (#2174) 2021-05-04 17:39:16 -04:00
FAQ.md update docs (#1645) 2020-12-03 08:29:17 -08:00
installation.md deployment: Publish OS packages to cloudsmith (#2105) 2021-04-21 07:12:14 -04:00
readme.md match tenses (#2214) 2021-05-19 11:46:30 -07:00
upgrading.md docs: add v0.14 feature highlights (#2183) 2021-05-08 17:15:20 -04:00

title lang sidebarDepth meta
What is Pomerium? en-US 0
name content
keywords pomerium overview identity-access-proxy beyondcorp zero-trust reverse-proxy ztn zero-trust-networks

What is Pomerium

Overview?

Pomerium is an identity-aware proxy that enables secure access to internal applications. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in. Pomerium gateways both internal and external requests, and can be used in situations where you'd typically reach for a VPN.

Pomerium can be used to:

  • provide a single-sign-on gateway to internal applications.
  • enforce dynamic access policy based on context, identity, and device state.
  • aggregate access logs and telemetry data.
  • perform delegated user authorization for service-based authorization systems:
  • provide unified identity attestation for upstream services:
  • provide a VPN alternative.

Demo

To make this a bit more concrete, click the image thumbnail to see a short youtube demo:

demo

The above video shows the flow for both an unauthorized and authorized user.

  1. An unauthorized user authenticates with their corporate single-sign-on provider.
  2. The unauthorized user is blocked from a protected resource.
  3. The unauthorized user signs out from their session.
  4. An authorized user authenticates with their corporate single-sign-on provider.
  5. Pomerium delegates and grants access to the requested resource.
  6. The authorized user inspects their user details including group membership.