pomerium/docs/docs
bobby 5813487cfc
docs: google gcp / workspace instructions (#2272)
Deferential to Google's own docs since they keep changing the screens.

Signed-off-by: Bobby DeSimone <bobbydesimone@gmail.com>
2021-06-10 05:01:11 -06:00
..
community proxy / controplane: use old upstream cipher suite (#2196) 2021-05-12 15:37:20 -07:00
identity-providers docs: google gcp / workspace instructions (#2272) 2021-06-10 05:01:11 -06:00
img docs: fix in-action video (#1268) 2020-08-12 19:34:50 -04:00
quick-start docs: replace httpbin with verify (#1702) 2020-12-22 09:53:08 -08:00
topics config: warn about unrecognized keys (#2256) 2021-05-31 23:35:38 -04:00
architecture.md docs: rm broken link (#2215) 2021-05-20 21:13:41 -07:00
background.md docs: fix links, fix upgrade guide (#1220) 2020-08-05 23:07:49 -07:00
CHANGELOG.md docs: v0.14.0 (#2174) 2021-05-04 17:39:16 -04:00
FAQ.md update docs (#1645) 2020-12-03 08:29:17 -08:00
installation.md deployment: Publish OS packages to cloudsmith (#2105) 2021-04-21 07:12:14 -04:00
readme.md match tenses (#2214) 2021-05-19 11:46:30 -07:00
upgrading.md docs: add v0.14 feature highlights (#2183) 2021-05-08 17:15:20 -04:00

title lang sidebarDepth meta
What is Pomerium? en-US 0
name content
keywords pomerium overview identity-access-proxy beyondcorp zero-trust reverse-proxy ztn zero-trust-networks

What is Pomerium

Overview?

Pomerium is an identity-aware proxy that enables secure access to internal applications. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in. Pomerium gateways both internal and external requests, and can be used in situations where you'd typically reach for a VPN.

Pomerium can be used to:

  • provide a single-sign-on gateway to internal applications.
  • enforce dynamic access policy based on context, identity, and device state.
  • aggregate access logs and telemetry data.
  • perform delegated user authorization for service-based authorization systems:
  • provide unified identity attestation for upstream services:
  • provide a VPN alternative.

Demo

To make this a bit more concrete, click the image thumbnail to see a short youtube demo:

demo

The above video shows the flow for both an unauthorized and authorized user.

  1. An unauthorized user authenticates with their corporate single-sign-on provider.
  2. The unauthorized user is blocked from a protected resource.
  3. The unauthorized user signs out from their session.
  4. An authorized user authenticates with their corporate single-sign-on provider.
  5. Pomerium delegates and grants access to the requested resource.
  6. The authorized user inspects their user details including group membership.