pomerium/docs/docs
backport-actions-token[bot] 3568adec56
adjust sidebarDepths and document Desktop Client releases (#2643) (#2645)
Co-authored-by: Alex Fornuto <afornuto@pomerium.com>
2021-09-30 15:41:43 +00:00
..
community symlink security policy to root of project (#2396) 2021-07-26 10:42:21 -07:00
identity-providers small updates to Okta doc (#2623) (#2625) 2021-09-22 12:39:15 -05:00
img TCP Client Doc (#2561) (#2626) 2021-09-22 16:45:26 -05:00
install Docs/batch link fixes (#2621) (#2622) 2021-09-21 17:16:11 -05:00
topics adjust sidebarDepths and document Desktop Client releases (#2643) (#2645) 2021-09-30 15:41:43 +00:00
architecture.md docs: rm broken link (#2215) 2021-05-20 21:13:41 -07:00
background.md docs: fix links, fix upgrade guide (#1220) 2020-08-05 23:07:49 -07:00
CHANGELOG.md update v0.15 changelog (#2436) 2021-08-04 18:39:50 -07:00
client.md TCP Client Doc (#2561) (#2626) 2021-09-22 16:45:26 -05:00
FAQ.md update docs (#1645) 2020-12-03 08:29:17 -08:00
readme.md docs: update branding (#2435) (#2440) 2021-08-04 20:14:16 -07:00
releases.md adjust sidebarDepths and document Desktop Client releases (#2643) (#2645) 2021-09-30 15:41:43 +00:00
upgrading.md options: remove refresh_cooldown, add allow_spdy to proto (#2446) (#2448) 2021-08-06 16:08:27 +00:00

title lang sidebarDepth meta
What is Pomerium? en-US 0
name content
keywords pomerium overview identity-access-proxy beyondcorp zero-trust reverse-proxy ztn zero-trust-networks

What is Pomerium

Overview?

Pomerium is an identity-aware proxy that enables secure access to internal applications. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in. Pomerium gateways both internal and external requests, and can be used in situations where you'd typically reach for a VPN.

Pomerium can be used to:

  • provide a single-sign-on gateway to internal applications.
  • enforce dynamic access policy based on context, identity, and device identity.
  • aggregate access logs and telemetry data.
  • perform delegated user authorization for service-based authorization systems:
  • add unified access and identity to custom, on-prem, and hosted apps and services
  • serve as a VPN alternative.