pomerium/docs/docs
cmo-pomerium 90f2b00bb6
Docs: Update Community Page (#2713)
* Update readme.md

* bulleted list for updates

* copy edits

* add mailchimp plugin

* Update readme.md

* invoke custom component

* style custom mailchimp form

* List Discourse for support

Co-authored-by: alexfornuto <alex@fornuto.com>
2021-11-01 09:10:58 -05:00
..
community Docs: Update Community Page (#2713) 2021-11-01 09:10:58 -05:00
identity-providers small updates to Okta doc (#2623) 2021-09-22 12:37:58 -05:00
img Refresh and Update TCP documentation (#2627) 2021-10-14 09:35:31 -05:00
install Update create TLS command to quote strings. (#2694) 2021-10-22 10:55:35 -05:00
tcp Refresh and Update TCP documentation (#2627) 2021-10-14 09:35:31 -05:00
topics Refresh and Update TCP documentation (#2627) 2021-10-14 09:35:31 -05:00
architecture.md Update architecture.md (#2701) 2021-10-25 14:07:44 -07:00
background.md docs: fix links, fix upgrade guide (#1220) 2020-08-05 23:07:49 -07:00
CHANGELOG.md update v0.15 changelog (#2436) 2021-08-04 18:39:50 -07:00
FAQ.md update docs (#1645) 2020-12-03 08:29:17 -08:00
readme.md docs: update branding (#2435) 2021-08-04 22:43:10 -04:00
releases.md fixed typo on kubectl (#2673) 2021-10-14 09:37:25 -05:00
upgrading.md github: use GraphQL API to reduce number of API calls for directory sync (#2715) 2021-10-27 11:50:48 -06:00

title lang sidebarDepth meta
What is Pomerium? en-US 0
name content
keywords pomerium overview identity-access-proxy beyondcorp zero-trust reverse-proxy ztn zero-trust-networks

What is Pomerium

Overview?

Pomerium is an identity-aware proxy that enables secure access to internal applications. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in. Pomerium gateways both internal and external requests, and can be used in situations where you'd typically reach for a VPN.

Pomerium can be used to:

  • provide a single-sign-on gateway to internal applications.
  • enforce dynamic access policy based on context, identity, and device identity.
  • aggregate access logs and telemetry data.
  • perform delegated user authorization for service-based authorization systems:
  • add unified access and identity to custom, on-prem, and hosted apps and services
  • serve as a VPN alternative.