Pomerium logo

Pomerium

Identity and Access Management (IAM)

Open Source
Free Tier
E
Enterprise
Self-hosted
OpenMSP Score
62
49
Reddit Impact Score
Github Score
39M
4KStars
322Forks
4KCommits
Apache License 2.0License
Mar 21, 2026Last commit
Pomerium is an open source identity-aware proxy built on BeyondCorp and zero trust principles, providing secure, clientless access to internal applications and services without requiring traditional VPN infrastructure. The platform continuously verifies user identity, device state, and request context before granting access to protected resources. Unlike VPN solutions that establish tunnels, Pomerium acts as a reverse proxy with OAuth authentication, intercepting and routing user traffic through an identity-aware access layer. Every request is authenticated and authorized against configured identity providers, policies, and contextual factors including user location, device posture, time of access, and role-based permissions. Key features include support for multiple identity providers (Google Workspace, Azure AD, Okta, GitHub, OIDC), granular policy enforcement, comprehensive audit logging, and extensive integration capabilities. The platform supports both self-hosted deployments and Pomerium Zero (managed cloud service), with pricing starting at $10/month for managed services. Pomerium is particularly valuable for organizations implementing zero trust architectures, remote work scenarios, and securing internal applications that lack built-in authentication. The solution eliminates the complexity of client-based VPN deployments while providing superior security through continuous verification and contextual access controls. Recent developments include enhanced Kubernetes integration, improved policy management capabilities, and expanded protocol support beyond HTTP/HTTPS.
image media
1 / 2

Key Features

Zero Trust Access Proxy

Identity-aware reverse proxy that provides clientless access to applications with continuous verification of every request based on identity, device, and context.

Self-Hosted Security

Fully self-hosted data plane ensures your data never leaves your infrastructure while providing hosted control plane for easy management.

Context-Aware Policies

Makes access decisions based on user identity, device posture, location, time, and other contextual factors to enforce sophisticated access policies.

Kubernetes Integration

Native Kubernetes support with Helm charts, kubectl access control, and seamless integration into cloud-native environments.

Pros and Cons

Pros

True Zero Trust

Implements genuine zero trust principles with continuous verification of every action, not just initial authentication like traditional VPNs.

Clientless Access

No client software required - users access applications through standard web browsers, eliminating installation and maintenance overhead.

Self-Hosted Data Plane

Data never leaves your infrastructure as the proxy runs entirely on your systems, while management is simplified through hosted control plane.

Cons

Relatively New

Newer solution in the market with smaller user base and ecosystem compared to established VPN or access management solutions.

Limited Customization

Some users find the customization options limited compared to building custom solutions, though this improves with open source version.

Minimum User Requirements

Enterprise version requires minimum 50 users, which may not be suitable for smaller organizations.

Feature Comparison

Comments

Kateryna ShevchenkoSecureFlow Technologies

Kateryna ShevchenkoSecureFlow Technologies

Jun 26, 2025

Streamlined Identity-Aware Access

Pomerium simplifies secure application access for our MSP clients. The identity-aware features integrate well with existing authentication systems while providing granular access control.

Isabella CostaProSecure MSP

Isabella CostaProSecure MSP

Jun 26, 2025

Secure Clientless Access Solution

Pomerium identity-aware proxy eliminates VPN requirements for client application access. The vulnerability assessment perspective appreciates how it reduces attack surface while maintaining usability.