Description
Pomerium is a tool for managing secure access to internal applications and resources.
Pomerium alternatives and similar tools
Based on the "Identity Management" category.
Alternatively, view Pomerium alternatives based on common mentions on social networks and blogs.
-
Samba
https://gitlab.com/samba-team/samba is the Official GitLab mirror of https://git.samba.org/samba.git -- Merge requests should be made on GitLab (not on GitHub) -
OpenID
OpenID Certified™ OpenID Connect Relying Party implementation for Apache HTTP Server 2.x -
FreeIPA
Mirror of FreeIPA, an integrated security information management solution -
OSIAM
Secure identity management solution providing REST based services for authentication and authorization. -
Indieauth
This service is being discontinued in favor of indielogin.com -
BounCA
BounCA is a web tool to generate self-signed SSL certificates and setup a key infrastructure -
Smallstep Certificates
A private certificate authority (X.509 & SSH) and related tools for secure automated certificate management. -
ZITADEL
Cloud-native Identity & Access Management solution providing a platform for secure authentication, authorization and identity management. -
KeyCloak
Open Source Identity and Access Management (Source Code) Apache-2.0 Java
Clean code begins in your IDE with SonarLint
* Code Quality Rankings and insights are calculated and provided by Lumnify.
They vary from L1 to L5 with "L5" being the highest.
Do you think we are missing an alternative of Pomerium or a related project?
README
Pomerium is an identity and context-aware reverse proxy that brokers secure access to apps and services at scale. Pomerium provides a standardized interface to add access control to applications regardless of whether the application itself has authorization or authentication baked-in.
Pomerium can be used in situations where you'd typically reach for a VPN, but, unlike a VPN, does not require a client and uses identity and context, not network locality to determine access.
Pomerium can be used to:
- provide a single-sign-on gateway to internal applications.
- enforce dynamic access policy based on context, identity, and device identity.
- aggregate access logs and telemetry data.
- a VPN alternative.
Docs
For comprehensive docs, and tutorials see our documentation.
Integration Tests
To run the integration tests locally, first build a local development image:
./scripts/build-dev-docker.bash
Next go to the integration/clusters
folder and pick a cluster, for example google-single
, then use docker-compose to start the cluster. We use an environment variable to specify the dev
docker image we built earlier:
cd integration/clusters/google-single
env POMERIUM_TAG=dev docker-compose up -V
Once that's up and running you can run the integration tests from another terminal:
go test -count=1 -v ./integration/...
If you need to make a change to the clusters themselves, there's a tpl
folder that contains jsonnet
files. Make a change and then rebuild the clusters by running:
go run ./integration/cmd/pomerium-integration-tests/ generate-configuration
*Note that all licence references and agreements mentioned in the Pomerium README section above
are relevant to that project's source code only.