Pomerium is an identity and context-aware access proxy.
Find a file
Cuong Manh Le 489cdd8b63
internal/controlplane: using envoy strip host port matching (#1126)
* internal/controlplane: using envoy strip host port matching

With envoy 1.15.0 release, strip host port matching setting allows
incoming request with Host "example:443" will match again route with
domains match set to "example".

Not that this is not standard HTTP behavior, but it's more convenient
for users.

Fixes #959

* docs/docs: add note about enable envoy strip host port matching
2020-07-22 23:51:57 +07:00
.github redis storage backend (#1082) 2020-07-22 03:07:20 +07:00
authenticate internal/frontend/assets/html: make timestamp human readable (#1107) 2020-07-20 13:35:57 +07:00
authorize custom rego in databroker (#1124) 2020-07-22 10:44:05 -06:00
cache config: allow setting directory sync interval and timeout (#1098) 2020-07-17 23:11:27 +07:00
cmd pomerium-cli k8s exec-credential (#1073) 2020-07-16 11:40:43 -06:00
config custom rego in databroker (#1124) 2020-07-22 10:44:05 -06:00
docs internal/controlplane: using envoy strip host port matching (#1126) 2020-07-22 23:51:57 +07:00
examples docs: Cloud Run / GCP Serverless (#1101) 2020-07-20 14:00:52 -04:00
integration integration: add dummy value for idp_service_account (#1009) 2020-06-26 12:32:51 -04:00
internal internal/controlplane: using envoy strip host port matching (#1126) 2020-07-22 23:51:57 +07:00
pkg custom rego in databroker (#1124) 2020-07-22 10:44:05 -06:00
proxy authorize,proxy: allow traefik forward auth without uri query (#1103) 2020-07-21 00:58:14 +07:00
scripts depedency: bump envoy to 1.15.0 (#1119) 2020-07-21 08:25:37 -07:00
.codecov.yml development: change codecov precision 2019-07-18 16:49:37 -07:00
.dockerignore Update build and release process for envoy embedding (#699) 2020-05-18 17:10:10 -04:00
.gitignore grpc: rename internal/grpc to pkg/grpc (#1010) 2020-06-26 09:17:02 -06:00
.golangci.yml identity: abstract identity providers by type (#560) 2020-04-23 10:36:24 -07:00
.pre-commit-config.yaml grpc: rename internal/grpc to pkg/grpc (#1010) 2020-06-26 09:17:02 -06:00
3RD-PARTY all: refactor handler logic 2019-09-16 18:01:14 -07:00
Dockerfile Update build and release process for envoy embedding (#699) 2020-05-18 17:10:10 -04:00
go.mod redis storage backend (#1082) 2020-07-22 03:07:20 +07:00
go.sum redis storage backend (#1082) 2020-07-22 03:07:20 +07:00
LICENSE initial release 2019-01-02 12:13:36 -08:00
Makefile Allow specify go executable in Makefile (#1008) 2020-06-26 23:53:47 +07:00
package.json chore(deps): update vuepress monorepo to v1.5.2 2020-06-15 08:29:40 +00:00
README.md docs: add visual studio code server 2019-08-08 10:04:56 -07:00
renovate.json Merge remote-tracking branch 'origin/master' into feature/envoy 2020-05-18 17:10:10 -04:00
VERSION deployment: prepare 0.9.0 (#798) 2020-05-30 18:07:57 -07:00

pomerium logo

pomerium chat Travis CI Go Report Card GoDoc LICENSE codecov Docker Pulls

Pomerium is an identity-aware proxy that enables secure access to internal applications. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in. Pomerium gateways both internal and external requests, and can be used in situations where you'd typically reach for a VPN.

Pomerium can be used to:

  • provide a single-sign-on gateway to internal applications.
  • enforce dynamic access policy based on context, identity, and device state.
  • aggregate access logs and telemetry data.
  • a VPN alternative.

Docs

For comprehensive docs, and tutorials see our documentation.