pomerium/docs/guides/readme.md
Alex Fornuto f65041ebd1
DOCS: Document webauthn with device ID (#2830)
* init device identity topic page

* add device options to PPL

* init device enrollment guide

* adjust for #2835 and crosslink

* tooltip in PPL on finding device ID

* sort and link matchers

* adjust terminology and crosslink

* standardize new topic name

* Apply suggestions from code review

Co-authored-by: bobby <1544881+desimone@users.noreply.github.com>

* rewrite device identity topic page

* rebase cleanup

* Apply suggestions from code review

Co-authored-by: bobby <1544881+desimone@users.noreply.github.com>

* add links from review with footer refs

* Apply suggestions from code review

Co-authored-by: bobby <1544881+desimone@users.noreply.github.com>

* rm errant newlines

Co-authored-by: bobby <1544881+desimone@users.noreply.github.com>
2021-12-29 11:19:21 -06:00

2.7 KiB

Overview

This section contains applications, and scenario specific guides for Pomerium.

  • The ad-guard recipe demonstrates how Pomerium can be used to augment web applications that only support simplistic authorization mechanisms like basic-auth with single-sign-on driven access policy.
  • The argo guide demonstrates how Pomerium can be used to add access control to Argo.
  • The Client-Side mTLS guide demonstrates how Pomerium can be used to add mutual authentication to end-user connections using client certificates and a custom certificate authority.
  • The Cloud Run recipe demonstrates deploying Pomerium to Google Cloud Run as well as using it to Authorize users to protected Cloud Run endpoints.
  • The code-server guide demonstrates how Pomerium can be used to add access control to third-party applications that don't ship with fine-grained access control. code-server is a tool to run Visual Studio code as a web application.
  • See Enroll a Device to learn how to register a security device (TPM, Yubikey, etc) to access routes requiring a device ID.
  • Our Grafana guide explains how to secure Grafana with Pomerium and integrate user sign-in using our JWT.
  • The JWT Verification guide demonstrates how to verify the Pomerium JWT assertion header using Envoy.
  • The Kubernetes Dashboard guide covers how to secure Kubernetes dashboard using Pomerium.
  • The kubernetes guide covers how to add authentication and authorization to kubernetes dashboard using helm, and letsencrypt certificates. This guide also shows how third party reverse-proxies like nginx/traefik can be used in conjunction with Pomerium using forward-auth.
  • The local OIDC guide demonstrates how Pomerium can be used with local OIDC server for dev/testing.
  • Our Synology guide demonstrates how lightweight Pomerium is by installing it on a Synology NAS or similar low-resource product.
  • The TiddlyWiki guide demonstrates how Pomerium can be used to add authentication and authorization to web application using authenticated header.
  • The Transmission guide demonstrates how Pomerium can act as an authentication and authorization proxy for your Transmission daemon's RPC interface, which only provides unencrypted HTTP auth out of the box.
  • Upstream mTLS With Pomerium explains how to provide a client certificate (mTLS) from Pomerium to an upstream service.