pomerium/docs/docs
backport-actions-token[bot] a3005bfe2d
New Topic Page: Original Request Context (#2569) (#2602)
* init original context doc

* copy edit

* init Service Account page

* update and expand user context article

* fix header name

* copy edit

* update response path through Pomerium

* clarify SA name is user in policy creation

Co-authored-by: Alex Fornuto <afornuto@pomerium.com>
2021-09-15 19:11:01 -04:00
..
community symlink security policy to root of project (#2396) 2021-07-26 10:42:21 -07:00
identity-providers Update Ping Identity IdP (#2537) (#2545) 2021-08-30 08:19:02 -06:00
img docs: update branding (#2435) (#2440) 2021-08-04 20:14:16 -07:00
install document binding service to 443 (#2487) (#2499) 2021-08-19 21:37:33 -07:00
topics New Topic Page: Original Request Context (#2569) (#2602) 2021-09-15 19:11:01 -04:00
architecture.md docs: rm broken link (#2215) 2021-05-20 21:13:41 -07:00
background.md
CHANGELOG.md update v0.15 changelog (#2436) 2021-08-04 18:39:50 -07:00
FAQ.md update docs (#1645) 2020-12-03 08:29:17 -08:00
readme.md docs: update branding (#2435) (#2440) 2021-08-04 20:14:16 -07:00
releases.md docs: update branding (#2435) (#2440) 2021-08-04 20:14:16 -07:00
upgrading.md options: remove refresh_cooldown, add allow_spdy to proto (#2446) (#2448) 2021-08-06 16:08:27 +00:00

title lang sidebarDepth meta
What is Pomerium? en-US 0
name content
keywords pomerium overview identity-access-proxy beyondcorp zero-trust reverse-proxy ztn zero-trust-networks

What is Pomerium

Overview?

Pomerium is an identity-aware proxy that enables secure access to internal applications. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in. Pomerium gateways both internal and external requests, and can be used in situations where you'd typically reach for a VPN.

Pomerium can be used to:

  • provide a single-sign-on gateway to internal applications.
  • enforce dynamic access policy based on context, identity, and device identity.
  • aggregate access logs and telemetry data.
  • perform delegated user authorization for service-based authorization systems:
  • add unified access and identity to custom, on-prem, and hosted apps and services
  • serve as a VPN alternative.