pomerium/docs/docs
backport-actions-token[bot] 629f1aa5cd
add link to background page (#2883) (#2885)
Co-authored-by: Alex Fornuto <afornuto@pomerium.com>
2021-12-31 22:00:35 +00:00
..
community Rephrase Discussion around Discuss (#2870) (#2871) 2021-12-29 12:37:28 -06:00
identity-providers fixes broken links, adds checker workarounds (#2878) (#2879) 2021-12-30 16:03:03 -06:00
img DOCS: Create Consolidated Troubleshooting Guide and Replace FAQ (#2797) 2021-12-21 12:33:01 -06:00
install Docs: Ingress Controller (#2667) 2021-11-04 12:59:51 -05:00
k8s add docs for ingress regex path (#2822) 2021-12-16 16:33:24 -05:00
tcp DOCS: Create Consolidated Troubleshooting Guide and Replace FAQ (#2797) 2021-12-21 12:33:01 -06:00
topics add link to background page (#2883) (#2885) 2021-12-31 22:00:35 +00:00
architecture.md Update architecture.md (#2701) 2021-10-25 14:07:44 -07:00
background.md docs: fix links, fix upgrade guide (#1220) 2020-08-05 23:07:49 -07:00
CHANGELOG.md docs: v0.16 release (#2845) 2021-12-22 18:04:43 -05:00
readme.md docs: update branding (#2435) 2021-08-04 22:43:10 -04:00
releases.md docs: update pomerium-cli location (#2790) 2021-12-01 15:00:11 -05:00
troubleshooting.md DOCS: Create Consolidated Troubleshooting Guide and Replace FAQ (#2797) 2021-12-21 12:33:01 -06:00
upgrading.md fixes broken links, adds checker workarounds (#2878) (#2879) 2021-12-30 16:03:03 -06:00

title lang sidebarDepth meta
What is Pomerium? en-US 0
name content
keywords pomerium overview identity-access-proxy beyondcorp zero-trust reverse-proxy ztn zero-trust-networks

What is Pomerium

Overview?

Pomerium is an identity-aware proxy that enables secure access to internal applications. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in. Pomerium gateways both internal and external requests, and can be used in situations where you'd typically reach for a VPN.

Pomerium can be used to:

  • provide a single-sign-on gateway to internal applications.
  • enforce dynamic access policy based on context, identity, and device identity.
  • aggregate access logs and telemetry data.
  • perform delegated user authorization for service-based authorization systems:
  • add unified access and identity to custom, on-prem, and hosted apps and services
  • serve as a VPN alternative.