Pomerium is an identity and context-aware access proxy.
Find a file
Arend Lagendijk fe27b79b81 Don't force consent screen for every Azure AD login
Signed-off-by: Arend Lagendijk <a.lagendijk@minddistrict.com>
2019-08-07 10:49:57 +02:00
.github docs: update PR template 2019-06-12 15:02:24 -07:00
authenticate config: fix url type regression (#253) 2019-08-03 12:08:26 -07:00
authorize Restore info metrics (#252) 2019-08-03 12:58:21 -04:00
cmd/pomerium config: fix url type regression (#253) 2019-08-03 12:08:26 -07:00
docs cllarify release branches and timeline 2019-08-05 13:37:20 -07:00
internal Don't force consent screen for every Azure AD login 2019-08-07 10:49:57 +02:00
proto authenticate/proxy: add user impersonation, refresh, dashboard (#123) 2019-05-26 12:33:00 -07:00
proxy config: fix url type regression (#253) 2019-08-03 12:08:26 -07:00
scripts docs: update site ui 2019-08-03 22:28:18 -07:00
.codecov.yml development: change codecov precision 2019-07-18 16:49:37 -07:00
.gitignore docs: update site ui 2019-08-03 22:28:18 -07:00
.golangci.yml development: use golangci-lint 2019-07-13 18:28:51 -07:00
.travis.yml deployment: remove unused linteres from travis 2019-07-16 00:02:06 -07:00
3RD-PARTY authenticate: use gRPC for service endpoints (#39) 2019-02-08 10:10:38 -08:00
Dockerfile Make dockerfiles consistent between archs 2019-07-07 17:13:50 -04:00
Dockerfile.arm32v6 Add config handling to dockerfiles and update documentation 2019-05-26 22:28:51 -04:00
Dockerfile.arm32v7 Add config handling to dockerfiles and update documentation 2019-05-26 22:28:51 -04:00
Dockerfile.arm64v8 Add config handling to dockerfiles and update documentation 2019-05-26 22:28:51 -04:00
go.mod telemetry: add tracing 2019-07-24 09:20:16 -07:00
go.sum telemetry: add tracing 2019-07-24 09:20:16 -07:00
LICENSE initial release 2019-01-02 12:13:36 -08:00
Makefile internal/config: pass urls by value 2019-08-02 15:46:18 -07:00
package.json docs: update site ui 2019-08-03 22:28:18 -07:00
README.md docs: update site ui 2019-08-03 22:28:18 -07:00
VERSION v0.2.0 2019-08-03 18:14:09 -07:00

pomerium logo

pomerium chat Travis CI Go Report Card GoDoc LICENSE codecov Docker Pulls

Pomerium is an identity-aware proxy that enables secure access to internal applications. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in. Pomerium gateways both internal and external requests, and can be used in situations where you'd typically reach for a VPN.

Pomerium can be used to:

  • provide a single-sign-on gateway to internal applications.
  • enforce dynamic access policy based on context, identity, and device state.
  • aggregate access logs and telemetry data.
  • a VPN alternative.

Architecture

pomerium architecture diagram

Demo

To make this a bit more concrete, see the following:

  1. An unauthorized user authenticating with their corporate single-sign-on provider (in this case Google)
  2. The unauthorized user being blocked from a protected resource.
  3. The unauthorized user signing out from their session.
  4. An authorized user authenticating with their corporate single-sign-on provider.
  5. Pomerium delegating and grating access to the requested resource.
  6. The authorized user inspecting their user details including group membership.

Docs

For comprehensive docs, and tutorials see our documentation.