pomerium/docs
Bobby DeSimone 8d1732582e
authorize: use jwt insead of state struct (#514)
authenticate: unmarshal and verify state from jwt, instead of middleware
authorize: embed opa policy using statik
authorize: have IsAuthorized handle authorization for all routes
authorize: if no signing key is provided, one is generated
authorize: remove IsAdmin grpc endpoint
authorize/client: return authorize decision struct
cmd/pomerium: main logger no longer contains email and group
cryptutil: add ECDSA signing methods
dashboard: have impersonate form show up for all users, but have api gated by authz
docs: fix typo in signed jwt header
encoding/jws: remove unused es256 signer
frontend: namespace static web assets
internal/sessions: remove leeway to match authz policy
proxy:  move signing functionality to authz
proxy: remove jwt attestation from proxy (authZ does now)
proxy: remove non-signed headers from headers
proxy: remove special handling of x-forwarded-host
sessions: do not verify state in middleware
sessions: remove leeway from state to match authz
sessions/{all}: store jwt directly instead of state

Signed-off-by: Bobby DeSimone <bobbydesimone@gmail.com>
2020-03-10 11:19:26 -07:00
..
.vuepress authorize: use jwt insead of state struct (#514) 2020-03-10 11:19:26 -07:00
configuration authorize: use jwt insead of state struct (#514) 2020-03-10 11:19:26 -07:00
docs authorize: use jwt insead of state struct (#514) 2020-03-10 11:19:26 -07:00
enterprise docs: add enterprise contact page (#371) 2019-10-20 10:48:08 -07:00
recipes docs: fix tpos in dashboard recipe (#504) 2020-02-16 09:58:24 -08:00
readme.md docs: various fixes (#478) 2020-02-02 11:08:34 -08:00

home heroImage heroText tagline search triples features
true /pomerium-in-action-800-600.mp4 Secure Application Access Authenticate, authorize, monitor, and secure user access to any application without a VPN. false
title text src alt
Security in-depth Stop depending on the unblemished security of the corporate perimeter. Pomerium can mutually authenticate, and encrypt every request. /security-in-depth.svg Security in-depth key icon
title text src alt
Simpler for end-users No more clunky VPNs. Both remote and on-premise users can just use their browser to access the resources they need. /remote.svg Simpler for end-users business traveler remote worker
title text src alt
Easier to implement Pomerium is quicker to configure, and is easier to manage than network segmentation policies needed for a VPN. /easier-to-manage.svg Sysadmin managing remote connection
src title text
/account.svg Access driven by identity and context. Use your existing identity provider, such as Okta, Active Directory, Google, Gsuite, or OneLogin to add single-sign-on authentication to any application with Pomerium.
src title text
/pomerium-diagram.svg Add access control to any app. Pomerium provides a standardized interface to add access control whether an application itself has authorization or authentication baked-in. Let developers focus on their apps, not reinventing access control.
src title text
/secure-server.svg Your apps. Your data. Deployed anywhere. BeyondCorp-style access shouldn't come at the cost of cloud vendor lock-in or control over data tenancy. Pomerium supports a wide array of deployment options. Whether you are on-prem, hybrid, or multi-cloud, weve got you covered.