Pomerium logo

Pomerium

  •  0 ratings
In category: Proxy

About Pomerium

An identity-aware reverse proxy, successor to now obsolete oauth_proxy. It inserts an OAuth step before proxying your request to the backend, so that you can safely expose your self-hosted websites to public Internet.

  •   1700  
  •   0  
  •   0  
  •   0  
Github stats:
  •  Commits: 2,725  
  •   34,000  
  •   274  
  •  Latest commit: Feb 13, 2023  

Self-host this app for $0.99/mo only!

Languages/Platforms/Technologies:
Lincenses:

More about Pomerium

pomerium logo

pomerium chat GitHub Actions Go Report Card GoDoc LICENSE Docker Pulls

Pomerium is an identity and context-aware reverse proxy that brokers secure access to apps and services at scale. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in.

Pomerium can be used in situations where you'd typically reach for a VPN, but, unlike a VPN, does not require a client and uses identity and context, not network locality to determine access.

Pomerium can be used to:

  • provide a single-sign-on gateway to internal applications.
  • enforce dynamic access policy based on context, identity, and device identity.
  • aggregate access logs and telemetry data.
  • a VPN alternative.

Docs

For comprehensive docs, and tutorials see our documentation.

Integration Tests

To run the integration tests locally, first build a local development image:

./scripts/build-dev-docker.bash

Next go to the integration/clusters folder and pick a cluster, for example google-single, then use docker-compose to start the cluster. We use an environment variable to specify the dev docker image we built earlier:

cd integration/clusters/google-single
env POMERIUM_TAG=dev docker-compose up -V

Once that's up and running you can run the integration tests from another terminal:

go test -count=1 -v ./integration/...

If you need to make a change to the clusters themselves, there's a tpl folder that contains jsonnet files. Make a change and then rebuild the clusters by running:

go run ./integration/cmd/pomerium-integration-tests/ generate-configuration

Comments (0)

Please login to join the discussion on this project.

Pomerium Reviews (0)

Overall Rating

None

based on 0 ratings

Please login to review this project.

No reviews for this project yet.

↑ back to top

RackNerd Medium Rectangle Banner

Popular Projects

FluxBB

in Social Networks and Forums
 48k    0    0    0  

Nextcloud

in File Transfer & Synchronization
 44k    1    1    0  

Teddit

in Social Networks and Forums
 27k    0    0    0  

Libre Translate

in Miscellaneous
 19k    0    0    0  

RustDesk

in Remote Access
 16k    0    0    0  

Dashboard

in Personal Dashboards
 16k    0    0    0  

Audiobookshelf

in Audio Streaming
 15k    0    1    0  

Most Discussed

Nextcloud

in File Transfer & Synchronization
 44k    1    1    0  

Tube Archivist

in Automation
 8k    0    1    0  

OneDev

in Project Management
 6k    0    0    0  

iodine

in Proxy
 4k    0    0    0  

Alf.io

in Booking and Scheduling
 5k    0    0    0  

sysPass

in Password Managers
 3k    0    0    0  

Misskey

in Social Networks and Forums
 6k    0    0    0  
pCloud Lifetime

Top Rated Projects

Technitium DNS Server

 1 rating
in DNS

Pydio

 1 rating
in File Transfer & Synchronization

Bagisto

 1 rating
in E-commerce

LinkAce

 1 rating
in Bookmarks and Link Sharing

Gitea

 1 rating
in Project Management

Audiobookshelf

 1 rating
in Audio Streaming

Nextcloud

 1 rating
in File Transfer & Synchronization

Categories

You May Also Be Interested In

SWAG (Secure Web Application Gateway) logo
SWAG (Secure Web Application Gateway) cover

SWAG (Secure Web Application Gateway)

Nginx webserver and reverse proxy with PHP support, built-i…

inlets logo
inlets cover

inlets

Expose your local endpoints to the Internet - with a Kubern…

Privoxy logo
Privoxy cover

Privoxy

Non-caching web proxy with advanced filtering capabilities …