📄️ AdGuard
This guide covers how to add authentication and authorization to a hosted, fully online instance of Adguard.
📄️ Argo
This guide covers how to add authentication and authorization to an instance of argo.
📄️ Cloud Run
This guide covers how to deploy Pomerium to Cloud Run and use it to protect other endpoints via Authorization Headers.
📄️ Cockpit
Learn how to secure Cockpit, a web GUI for Linux servers, behind Pomerium
📄️ Code-server
Learn how to add authentication and authorization to a hosted, online instance of Visual Studio Code using code-server.
📄️ Cross-Origin Configuration
This guide covers how to configure Pomerium for Cross-Origin setups.
📄️ GitLab
This guide covers how to secure self-hosted GitLab behind Pomerium, providing authentication and authorization through your IdP.
📄️ Grafana
This guide covers how to use Pomerium to authenticate and authorize users of Grafana.
📄️ HedgeDoc
This guide covers how to use Pomerium to authenticate and authorize users of HedgeDoc.
📄️ Helm
This guide will show you how to deploy Pomerium with [Helm] on [Kubernetes].
📄️ Istio
Integrate the Pomerium Ingress controller with an Istio service mesh for full mutual authentication in your cluster.
📄️ Jenkins
Secure Jenkins by adding JWT authentication with Pomerium.
📄️ JavaScript SDK
Learn how to verify and parse Pomerium JWTs with Pomerium's JavaScript SDK.
📄️ JWT Verification
This example demonstrates how to verify the Pomerium JWT assertion header using Envoy.
📄️ Kubernetes Dashboard
This guide covers how to add authentication and authorization to kubernetes dashboard using single-sing-on, pomerium, helm, and letsencrypt certificates.
📄️ Kubernetes API / Kubectl
This guide covers how to add authentication and authorization to kubernetes api server using single-sign-on and Pomerium.
📄️ Local OIDC Provider
This guide covers how to use Pomerium with a local OIDC provider using [qlik/simple-oidc-provider].
📄️ Nginx
This guide covers how to use Pomerium to protect services behind an nginx proxy.
📄️ Securing TCP based services
This guide covers how to use Pomerium to protect TCP services such as SSH, Postgres and Redis.
📄️ Synology
Pomerium can be used to enable secure access to services on your Synology home server or network attached storage (NAS) device. Pomerium acting as an identity aware access proxy is particularly useful as many [self-hosted apps] lack or have insufficient built-in authentication mechanisms.
📄️ TiddlyWiki
This guide covers how to add authentication and authorization to a hosted online instance of TiddlyWiki.
📄️ Traefik Ingress
This guide covers how to use Pomerium to secure Traefik when used as a Kubernetes Ingress Controller
📄️ Transmission
Learn how to use Pomerium as an authentication and authorization proxy for a Transmission torrent daemon.