mirror of
https://github.com/pomerium/pomerium.git
synced 2025-08-03 08:50:42 +02:00
Pomerium is an identity and context-aware access proxy.
* internal/directory/okta: add limiter to query okta API Okta only allows 100 requests per minute, so apply the default rate limit 1 QPS for it. Fixes #1256 * internal/directory/okta: use okta filter to get updated groups Okta API supports filter to get updated groups only, we can adopt that to reduce number of requests to okta API, hence reduce chance that we reach the rate limit. Updates #1256 * internal/directory/okta: fix wrong API query filter Okta uses space " " instead of plus sign "+" in query filter. See https://developer.okta.com/docs/reference/api-overview/#filtering * internal/directory: use default QPS setting for backport Co-authored-by: Cuong Manh Le <cuong.manhle.vn@gmail.com> |
||
---|---|---|
.github | ||
authenticate | ||
authorize | ||
cache | ||
cmd | ||
config | ||
docs | ||
examples | ||
integration | ||
internal | ||
pkg | ||
proxy | ||
scripts | ||
.codecov.yml | ||
.dockerignore | ||
.gitignore | ||
.golangci.yml | ||
.pre-commit-config.yaml | ||
3RD-PARTY | ||
Dockerfile | ||
go.mod | ||
go.sum | ||
LICENSE | ||
Makefile | ||
package.json | ||
README.md | ||
renovate.json | ||
VERSION |
Pomerium is an identity-aware proxy that enables secure access to internal applications. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in. Pomerium gateways both internal and external requests, and can be used in situations where you'd typically reach for a VPN.
Pomerium can be used to:
- provide a single-sign-on gateway to internal applications.
- enforce dynamic access policy based on context, identity, and device state.
- aggregate access logs and telemetry data.
- a VPN alternative.
Docs
For comprehensive docs, and tutorials see our documentation.