pomerium/docs/docs
2021-04-29 15:38:58 -04:00
..
community docs: add threat model to security page (#2097) 2021-04-19 09:15:41 -07:00
identity-providers Updating Doc for Pomerium-Dex Exercise (#2018) 2021-03-30 07:24:58 -06:00
img docs: fix in-action video (#1268) 2020-08-12 19:34:50 -04:00
quick-start docs: replace httpbin with verify (#1702) 2020-12-22 09:53:08 -08:00
topics docs: mention alternative bearer token header format (#2155) 2021-04-29 15:38:58 -04:00
architecture.md databroker: rename cache service (#1790) 2021-01-21 08:41:22 -07:00
background.md docs: fix links, fix upgrade guide (#1220) 2020-08-05 23:07:49 -07:00
CHANGELOG.md docs: misc upgrade notes and changelog (#1884) 2021-02-17 12:23:38 -05:00
FAQ.md update docs (#1645) 2020-12-03 08:29:17 -08:00
installation.md deployment: Publish OS packages to cloudsmith (#2105) 2021-04-21 07:12:14 -04:00
readme.md update docs (#1645) 2020-12-03 08:29:17 -08:00
upgrading.md docs: upgrade notes on allowed_users by ID (#2133) 2021-04-27 07:37:01 -04:00

title lang sidebarDepth meta
What is Pomerium? en-US 0
name content
keywords pomerium overview identity-access-proxy beyondcorp zero-trust reverse-proxy ztn zero-trust-networks

What is Pomerium

Overview?

Pomerium is an identity-aware proxy that enables secure access to internal applications. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in. Pomerium gateways both internal and external requests, and can be used in situations where you'd typically reach for a VPN.

Pomerium can be used to:

  • provide a single-sign-on gateway to internal applications.
  • enforce dynamic access policy based on context, identity, and device state.
  • aggregate access logs and telemetry data.
  • perform delegated user authorization for service-based authorization systems:
  • provide unified identity attestation for upstream services:
  • provide a VPN alternative.

Demo

To make this a bit more concrete, click the image thumbnail to see a short youtube demo:

demo

The above video shows the flow for both an unauthorized and authorized user.

  1. An unauthorized user authenticates with their corporate single-sign-on provider.
  2. The unauthorized user is blocked from a protected resource.
  3. The unauthorized user signs out from their session.
  4. An authorized user authenticates with their corporate single-sign-on provider.
  5. Pomerium delegating and granting access to the requested resource.
  6. The authorized user inspecting their user details including group membership.