Pomerium is an identity and context-aware access proxy.
Find a file
Cuong Manh Le e8d3ce1a2e
authorize,proxy: allow traefik forward auth without uri query (#1103)
In #1030, the fix was done without aware of the context that traefik
forward auth mode did allow request without the "?uri=". Previosuly,
this is done in proxy, and by converting the forward auth request to
actual request. The fix is #1030 prevent this conversion, to makre
authorize service aware of which is forward auth request.

But that causes traefik forward auth without "?uri" stop working. Fixing
it by making the authorize service also honor the forwarded uri header,
too.

Fixes #1096
2020-07-21 00:58:14 +07:00
.github deployment: fix pomerium-cli release (#1104) 2020-07-17 12:45:16 -07:00
authenticate internal/frontend/assets/html: make timestamp human readable (#1107) 2020-07-20 13:35:57 +07:00
authorize authorize,proxy: allow traefik forward auth without uri query (#1103) 2020-07-21 00:58:14 +07:00
cache config: allow setting directory sync interval and timeout (#1098) 2020-07-17 23:11:27 +07:00
cmd pomerium-cli k8s exec-credential (#1073) 2020-07-16 11:40:43 -06:00
config config: add support for policies stored in the databroker (#1099) 2020-07-17 10:35:29 -06:00
docs config: allow setting directory sync interval and timeout (#1098) 2020-07-17 23:11:27 +07:00
examples Move examples repo into main repo (#1102) 2020-07-17 14:23:06 -04:00
integration integration: add dummy value for idp_service_account (#1009) 2020-06-26 12:32:51 -04:00
internal internal/frontend/assets/html: make timestamp human readable (#1107) 2020-07-20 13:35:57 +07:00
pkg grpc: use relative paths in codegen (#1106) 2020-07-20 06:40:11 -07:00
proxy authorize,proxy: allow traefik forward auth without uri query (#1103) 2020-07-21 00:58:14 +07:00
scripts use custom binary for arm64 linux release (#1065) 2020-07-14 07:59:26 -06:00
.codecov.yml development: change codecov precision 2019-07-18 16:49:37 -07:00
.dockerignore Update build and release process for envoy embedding (#699) 2020-05-18 17:10:10 -04:00
.gitignore grpc: rename internal/grpc to pkg/grpc (#1010) 2020-06-26 09:17:02 -06:00
.golangci.yml identity: abstract identity providers by type (#560) 2020-04-23 10:36:24 -07:00
.pre-commit-config.yaml grpc: rename internal/grpc to pkg/grpc (#1010) 2020-06-26 09:17:02 -06:00
3RD-PARTY all: refactor handler logic 2019-09-16 18:01:14 -07:00
Dockerfile Update build and release process for envoy embedding (#699) 2020-05-18 17:10:10 -04:00
go.mod chore(deps): update google.golang.org/genproto commit hash to 11fb19a 2020-07-20 08:00:29 +00:00
go.sum chore(deps): update google.golang.org/genproto commit hash to 11fb19a 2020-07-20 08:00:29 +00:00
LICENSE
Makefile Allow specify go executable in Makefile (#1008) 2020-06-26 23:53:47 +07:00
package.json chore(deps): update vuepress monorepo to v1.5.2 2020-06-15 08:29:40 +00:00
README.md docs: add visual studio code server 2019-08-08 10:04:56 -07:00
renovate.json Merge remote-tracking branch 'origin/master' into feature/envoy 2020-05-18 17:10:10 -04:00
VERSION deployment: prepare 0.9.0 (#798) 2020-05-30 18:07:57 -07:00

pomerium logo

pomerium chat Travis CI Go Report Card GoDoc LICENSE codecov Docker Pulls

Pomerium is an identity-aware proxy that enables secure access to internal applications. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in. Pomerium gateways both internal and external requests, and can be used in situations where you'd typically reach for a VPN.

Pomerium can be used to:

  • provide a single-sign-on gateway to internal applications.
  • enforce dynamic access policy based on context, identity, and device state.
  • aggregate access logs and telemetry data.
  • a VPN alternative.

Docs

For comprehensive docs, and tutorials see our documentation.