pomerium/docs/docs
Bobby DeSimone b18a462681
internal/log: fix setting log level (#74)
- POMERIUM_DEBUG no longer sets log level.
- LOG_LEVEL now responsible for setting global log level.
2019-03-28 11:40:36 -07:00
..
examples docs: update changelog, documentaiton, and helm configurations. (#63) 2019-03-19 10:55:41 -07:00
gitlab docs: add kubernetes (#33) 2019-01-27 22:22:14 -08:00
google authenticator: support groups (#57) 2019-02-28 19:34:22 -08:00
microsoft authenticator: support groups (#57) 2019-02-28 19:34:22 -08:00
okta authenticator: support groups (#57) 2019-02-28 19:34:22 -08:00
one-login authenticator: support groups (#57) 2019-02-28 19:34:22 -08:00
signed-headers docs: add kubernetes (#33) 2019-01-27 22:22:14 -08:00
config-reference.md internal/log: fix setting log level (#74) 2019-03-28 11:40:36 -07:00
examples.md docs: update changelog, documentaiton, and helm configurations. (#63) 2019-03-19 10:55:41 -07:00
identity-providers.md authorize: add authorization (#59) 2019-03-07 12:47:07 -08:00
readme.md authorize: add authorization (#59) 2019-03-07 12:47:07 -08:00
signed-headers.md authenticator: support groups (#57) 2019-02-28 19:34:22 -08:00

Overview

What

Pomerium is an open-source, identity-aware access proxy.

Why

Traditional perimeter security has some shortcomings, namely:

  • Insider threat is not well addressed and 28% of breaches are by internal actors.
  • Impenetrable fortress in theory falls in practice; multiple entry points (like VPNs), lots of firewall rules, network segmentation creep.
  • Failure to encapsulate a heterogeneous mix of cloud, on-premise, cloud, and multi-cloud environments.
  • User's don't like VPNs.

Pomerium attempts to mitigate these shortcomings by adopting the following principles.

  • Trust flows from user, device, and context.
  • Network location does not impart trust. Treat both internal and external networks as completely untrusted.
  • Act like you are already breached, because your probably are.
  • Every device, user, and application's communication should be authenticated, authorized, and encrypted.
  • Policy should be dynamic, and built from multiple sources.

Resources

Books

Papers

Posts

Videos