Pomerium is an identity and context-aware access proxy.
Find a file
Alex Fornuto 46a1426925
DOCS: Standardize Relative Links (#2651) (#2654)
* standardize relative links

* make img refs very relative
2021-10-05 09:04:55 -07:00
.devcontainer
.github Add docs team as a code owner of packages.json (#2605) (#2607) 2021-09-16 18:13:16 -07:00
.vscode
authenticate
authorize authorize: use session.user_id in headers (#2571) (#2572) 2021-09-03 14:56:22 -06:00
cmd cli: update tcp log output format (#2586) (#2587) 2021-09-10 11:26:43 -04:00
config ppl: use session.user_id instead of user.id for user criterion (#2562) (#2563) 2021-09-03 07:58:18 -06:00
databroker
docs DOCS: Standardize Relative Links (#2651) (#2654) 2021-10-05 09:04:55 -07:00
examples
integration
internal backport 2593 and 2594 to 0.15 (#2598) 2021-09-15 10:21:40 -06:00
ospkg
pkg ppl: use session.user_id instead of user.id for user criterion (#2562) (#2563) 2021-09-03 07:58:18 -06:00
proxy
scripts
.codecov.yml
.dockerignore
.fossa.yml
.gitattributes
.gitignore
.golangci.yml
.pre-commit-config.yaml
3RD-PARTY
DEBUG.MD
Dockerfile
Dockerfile.debug
go.mod cli: update tcp log output format (#2586) (#2587) 2021-09-10 11:26:43 -04:00
go.sum cli: update tcp log output format (#2586) (#2587) 2021-09-10 11:26:43 -04:00
LICENSE
Makefile
package.json add copy button to code snippets (#2597) (#2600) 2021-09-15 18:12:06 -07:00
README.md docs: grammar-change/link update (#2638) (#2639) 2021-09-28 20:59:11 -05:00
RELEASING.md
SECURITY.md
tools.go

pomerium logo

pomerium chat GitHub Actions Go Report Card GoDoc LICENSE Docker Pulls

Pomerium is an identity-aware proxy that enables secure access to internal applications. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in. Pomerium gateways both internal and external requests, and can be used in situations where you'd typically reach for a VPN.

Pomerium can be used to:

  • provide a single-sign-on gateway to internal applications.
  • enforce dynamic access policy based on context, identity, and device identity.
  • aggregate access logs and telemetry data.
  • a VPN alternative.

Docs

For comprehensive docs, and tutorials see our documentation.