pomerium/docs/docs
2022-03-10 12:29:15 -06:00
..
community ci: rename master to main (#3045) 2022-02-15 16:02:40 -05:00
identity-providers Docs: Update Okta Copy (#3074) 2022-03-08 15:07:00 -06:00
img Update cache to databroker (#2932) 2022-01-18 13:03:41 -06:00
install DOCS: keyword tag updates (#2922) 2022-01-11 12:36:47 -06:00
k8s Correct domain name (#3100) 2022-03-08 15:34:52 -06:00
tcp note assumed TCP route on all examples (#3127) 2022-03-10 12:29:15 -06:00
topics DOCS: Standardize Reference image paths in Enterprise Docs (#3080) 2022-02-25 09:38:35 -06:00
architecture.md Clarify configuration between modes (#3111) 2022-03-09 14:21:19 -06:00
background.md DOCS: keyword tag updates (#2922) 2022-01-11 12:36:47 -06:00
CHANGELOG.md docs: Update release notes and changelog for v0.17 (#3097) 2022-03-04 15:54:48 -05:00
glossary.md Docs: Rewrite Istio Guide for Ingress Controller (#2943) 2022-01-26 14:35:56 -06:00
readme.md DOCS: keyword tag updates (#2922) 2022-01-11 12:36:47 -06:00
releases.md ci: rename master to main (#3045) 2022-02-15 16:02:40 -05:00
troubleshooting.md DOCS: keyword tag updates (#2922) 2022-01-11 12:36:47 -06:00
upgrading.md docs: Update release notes and changelog for v0.17 (#3097) 2022-03-04 15:54:48 -05:00

title lang sidebarDepth meta
What is Pomerium? en-US 0
name content
keywords pomerium, overview, identity access proxy, beyondcorp, zero trust, reverse proxy, ztn, zero trust networks

What is Pomerium

Overview?

Pomerium is an identity-aware proxy that enables secure access to internal applications. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in. Pomerium gateways both internal and external requests, and can be used in situations where you'd typically reach for a VPN.

Pomerium can be used to:

  • provide a single-sign-on gateway to internal applications.
  • enforce dynamic access policy based on context, identity, and device identity.
  • aggregate access logs and telemetry data.
  • perform delegated user authorization for service-based authorization systems:
  • add unified access and identity to custom, on-prem, and hosted apps and services
  • serve as a VPN alternative.