mirror of
https://github.com/pomerium/pomerium.git
synced 2025-06-04 20:03:18 +02:00
Pomerium is an identity and context-aware access proxy.
* pkg/storage/redis: use SANs cert Since go1.15, X.509 CommonName is deprecated, switch to a SANs certificate for test redis TLS. While at it, add instruction to genearte cert and build test image. See: https://golang.org/doc/go1.15#commonname * config: do not test for exact route id Different go version can genearte different route id, due to the fact that we are relying on xxhash. * internal/controlplane: mocking policy name in test We don't have to test for exact policy name, as it does not make sense and force us to change test every new go release. Co-authored-by: Cuong Manh Le <cuong.manhle.vn@gmail.com> |
||
---|---|---|
.github | ||
authenticate | ||
authorize | ||
cache | ||
cmd | ||
config | ||
docs | ||
examples | ||
integration | ||
internal | ||
pkg | ||
proxy | ||
scripts | ||
.codecov.yml | ||
.dockerignore | ||
.gitignore | ||
.golangci.yml | ||
.pre-commit-config.yaml | ||
3RD-PARTY | ||
Dockerfile | ||
go.mod | ||
go.sum | ||
LICENSE | ||
Makefile | ||
package.json | ||
README.md | ||
renovate.json | ||
VERSION |
Pomerium is an identity-aware proxy that enables secure access to internal applications. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in. Pomerium gateways both internal and external requests, and can be used in situations where you'd typically reach for a VPN.
Pomerium can be used to:
- provide a single-sign-on gateway to internal applications.
- enforce dynamic access policy based on context, identity, and device state.
- aggregate access logs and telemetry data.
- a VPN alternative.
Docs
For comprehensive docs, and tutorials see our documentation.