Pomerium is an identity and context-aware access proxy.
Find a file
2019-01-04 18:57:45 -08:00
authenticate Added gif to the readme. 2019-01-04 18:25:03 -08:00
authorize initial release 2019-01-02 12:13:36 -08:00
cmd/pomerium Added gif to the readme. 2019-01-04 18:25:03 -08:00
docs Update docs and readme 2019-01-04 18:57:45 -08:00
internal Added gif to the readme. 2019-01-04 18:25:03 -08:00
proxy Added gif to the readme. 2019-01-04 18:25:03 -08:00
scripts Added gif to the readme. 2019-01-04 18:25:03 -08:00
.gitignore Update docs and readme 2019-01-04 18:57:45 -08:00
.travis.yml Add code coverage with codecov.io 2019-01-02 12:16:44 -08:00
3RD-PARTY initial release 2019-01-02 12:13:36 -08:00
Dockerfile initial release 2019-01-02 12:13:36 -08:00
env.example Added gif to the readme. 2019-01-04 18:25:03 -08:00
go.mod initial release 2019-01-02 12:13:36 -08:00
go.sum initial release 2019-01-02 12:13:36 -08:00
LICENSE initial release 2019-01-02 12:13:36 -08:00
Makefile initial release 2019-01-02 12:13:36 -08:00
package.json Update docs and readme 2019-01-04 18:57:45 -08:00
README.md Update docs and readme 2019-01-04 18:57:45 -08:00
VERSION initial release 2019-01-02 12:13:36 -08:00

logo

Pomerium

Travis CI Go Report Card LICENSE

Pomerium is a tool for managing secure access to internal applications and resources

Use Pomerium to:

  • provide a unified gateway to internal corporate applications.
  • enforce dynamic access policies based on context, identity, and device state.
  • deploy mutual authenticated encryption (mTLS).
  • aggregate logging and telemetry data.

To learn more about zero-trust / BeyondCorp, check out awesome-zero-trust.

Get started

For instructions on getting started using Pomerium, see our docs.

Start developing

Assuming you have a working Go environment.

$ go get -d github.com/pomerium/pomerium
$ cd $GOPATH/src/github.com/pomerium/pomerium
$ make
$ source ./env # see env.example
$ ./bin/pomerium -debug