Pomerium

Pomerium

Pomerium is an open-source identity-aware proxy that enables secure access and control to internal applications and resources. It acts as a reverse proxy to authenticate requests, enforce access policies, and encrypt communication.
Pomerium image
identity authentication authorization access-control reverse-proxy

Pomerium: Open-Source Identity-Aware Reverse Proxy

Pomerium enables secure access and control to internal applications and resources with identity-aware proxy features, authenticating requests, enforcing access policies, and encrypting communication.

What is Pomerium?

Pomerium is an open-source identity-aware proxy developed by Pomerium Inc. that provides secure access to internal applications and resources. It acts as a reverse proxy situated between users and applications to handle authentication, authorization, auditing, and encryption.

Some key features of Pomerium include:

  • Centralized access control policies to secure internal apps and resources
  • Integration with identity providers like Google/OAuth, Active Directory, Okta for authentication
  • TLS encryption between Pomerium and internal services to protect data in transit
  • Detailed access logs and analytics for auditing and troubleshooting
  • Support for headers and claims to convey identity across services
  • Cross platform support including Kubernetes, cloud providers, and on-premise

Pomerium focuses on providing zero trust security by verifying user identity and device health before granting the least privileged access. It can help organizations consolidate access management, reduce attack surface, gain visibility, and simplify authentication flows for internal applications. With its identity-centric approach, Pomerium is well suited as a secure front door to internal apps and resources.

Pomerium Features

Features

  1. Single Sign-On (SSO)
  2. Access Proxy
  3. Policy Enforcement
  4. Identity-Aware Proxy
  5. Centralized Authentication
  6. Reverse Proxy

Pricing

  • Open Source

Pros

Open source and free

Secure access control for internal apps

Centralized authentication system

Granular access policies

Encrypts communication

Cons

Complex setup and configuration

Limited documentation and support

Requires expertise to manage and maintain


The Best Pomerium Alternatives

Top Security & Privacy and Access Control and other similar apps like Pomerium


Keycloak icon

Keycloak

Keycloak is an open source identity and access management solution aimed at modern applications and services. It makes it easy to secure applications and services with little to no code. Features include:Single sign-on - Log in once to access multiple applicationsIdentity brokering - Social login, LDAP, Active Directory supportUser federation...
Keycloak image
Auth0 icon

Auth0

Auth0 is an identity and access management platform designed to make managing user identities and securing access to applications and APIs simple for developers. It handles many of the complexities of user authentication and authorization including:Login, signup, password reset, and account management workflowsSupport for social identity providers like Google, Facebook,...
Auth0 image
Authelia icon

Authelia

Authelia is an open-source authentication and authorization server designed to centralize authentication and authorization for web applications and services. It acts as a proxy that sits in front of web apps and requires users to authenticate before allowing access.Some key features of Authelia include:Single sign-on - Users only need to...
Authelia image
Clerk Authentication icon

Clerk Authentication

Clerk Authentication is a user management and authentication software designed to help developers quickly add robust user infrastructure to web and mobile applications. It provides an easy-to-integrate API and UI components to handle common authentication flows like signup, login, social login, password reset, account verification, and more.Key features include:Ready-made authentication...
Clerk Authentication image
AWS Identity and Access Management icon

AWS Identity and Access Management

AWS Identity and Access Management (IAM) is a web service that helps AWS customers securely control access to AWS resources. With IAM, you can centrally manage users, security credentials such as access keys, and permissions that control which AWS resources users can access.Some key capabilities of IAM include:Centralized control of...
AWS Identity and Access Management image
LoginRadius icon

LoginRadius

LoginRadius is a customer identity and access management (CIAM) platform designed to secure, manage and control access to web, mobile and IoT applications. It provides a unified interface to handle user registration, authentication, single sign-on (SSO), user management, analytics and more across devices and platforms.Key features of LoginRadius CIAM include:Support...
LoginRadius image