Why it matters

Poor access controls lead to expensive data breaches. Access is still controlled by identity. But identity is no longer just human.

Pomerium protects your critical workloads from unauthorized access across human, machine, and agentic identities.

97%
of AI breaches occurred in organizations with no AI access controls
$670K
Additional damage from shadow 
AI-caused breaches
63%
of organizations lack formal 
AI governance policies

For security teams

Gain control with just-in-time access, per-request authorization audit logs, and instant revocation all in one place.

For developers and ops

Security that stays out of the way so you can ship faster. No clients, no firefighting, no IT tickets necessary.

Key Use Cases

How Pomerium provides zero trust access

Pomerium follows the NIST 800-207 Zero Trust Architecture. Every request is authenticated and authorized — no implicit trust is ever granted.

Identity Provider

Integrates with any IdP. Okta, Entra ID, Google, and more.

Device Context

EDR/EPP signals used for access decisions.

Audit & Logging

Full session logs for every request every user.

Policy as Code

Fine-grained, Identity-aware rules enforced in real time.

Continuous Verification:

Once a session is established, Pomerium acts as a gateway for AI traffic — logging every request and re-evaluating policy continuously, not just at login.

What users say

See what random people on the internet have to say about us.

wanderingnsfw
reddit

Have you tried Pomerium? Clientless access reverse proxy. Zero trust self-hosted setup, so no gray area like "Changes to a tailnet that were initiated by a request to Tailscale’s support team are currently not included."

Since you said "more secure" is a requirement, I highly recommend shifting away from any hosted solution. Third-party compromise is a real attack vector. Cloudflare recently experienced that when Okta's breach spilled over to them.

Cronocide
reddit

Use Pomerium.

phomey
reddit

Pomerium is awesome.

hiveminer
reddit

UNBELIEVABLE.. Nobody mentioned POMERIUM yet. What's going on? I recently discover them a few months back, and it seems to me they are the only ones rightfully aligning with the inevitable ZTNA future!!! What am I missing? are they not big enough? not mainstream? Are there others improving IAM? they seem to be IAM+ or IAM on steroids.

legolas8911
reddit

I started with nginx proxy manager since I didn't have patience to manually edit nginx configs and tried using authelia with it, failed. Then Keycloak, same. Then I've found Pomerium and I've been using it ever since. Has everything I need out of the box and it hot reloads when you save a config

visualglitch91
reddit

I use cloudflared + pomerium core

Homegrown_420
reddit

Awesome find, exactly what I was looking for.

ProletariatPat
reddit

I went a step further and I use pomerium reverse proxy. I chose pomerium, for yaml config making it dead simple, and the ability to add SSO before accessing any service. Basically doing what Authentik or Authelia does but easier to setup and manage. This lets me secure anything behind SSO.

ponderpandit
reddit

You might want to check out Pomerium. It acts as an identity-aware proxy and supports Keycloak and others. Super easy to run and centrally handles authentication and authorization so you can plug all your dashboards into it and get that global login vibe. Pretty cool project, worth a look

BlueLighning
reddit

Pomerium is open source, I'd recommend that first

lozinge
reddit

This is really cool - just what I have been looking for!

_blarg1729
reddit

Instead of using a lot of oath2-proxys you could use pomerium instead. Pomerium has its own policy's you can apply to the url. So Instead of having a oath2-proxy for every point that needs privilege separation you can just use one pomerium instance and create access policy's in it.

ProletariatPat
reddit

Here’s how I approach it Nextcloud is in a VM itself. I have another VM that runs Pomerium, a reverse proxy with simple sign on support, inside of a docker container. I use certbot-cloudflare docker to pull my certs. I have cloudflare setup with edge certs so it’s fully verified.

ProletariatPat
reddit

I’ve mostly moved to Komodo + pomerium with Nextcloud as my IDM.

vad1mo
reddit

One major thing I like about Pomerium is the Authorization support.

ProletariatPat
reddit

Pomerium reverse proxy. Yaml configured reverse proxy with built in SSO support to sit in front of any service. Dead simple compared to authelia et. al. I use Nextcloud as my OIDC IDM. Major SAF improvement by having SSO for everything.

ramblingdev
reddit

Have you checked out Pomerium? The proxy issues a signed JWT for reach request w/ claims in headers instead of using a broad OAuth token. Just got my homelab all setup with it. Pretty straightforward.

ProletariatPat
reddit

Pomerium. Dead simple yaml configuration, built in SSO through any IDP.

mxxr
reddit

Came here to learn how to secure AdGuard with a Pomeranian. Left confused.

Hedgebull
reddit

I use PocketID. The key is to use something like Pomerium as a proxy and use that to enforce SSO…For other apps, I use their SSO integrations and configure it to re-use the credentials for Pomerium

vad1mo
reddit

I went with Pomerium for the following reasons

  • Many IDPs. vs. LDAP or File like in Authelia

  • Forward Auth Mode

  • K8s Helm Support

  • Zero Knowledge (No DB like in Authelia)

  • Rich AuthN

needmorehardware
reddit

Ease of configuration - I was up and running, working great within an hour!

hurrySl0wly
reddit

Thanks for sharing this. I tested it with kubernetes-mcp-server and works great.

Azuras33
reddit

I use pocket id directly with service that handles oidc, and put all others behind a pomerium reverse proxy that will handle oidc auth before giving access to the service.

hiveminer
reddit

I think ztna deployments are in a minority tho. Of course there aRe some companies doing creative things like combining IAM and Access control, for example POMERIUM.

Crotherz
reddit

I don’t see a lot of cool stuff on Reddit lately. This, is cool and useful. Nice job

ProletariatPat
reddit

I like Pomerium because it’s a simple yaml to setup, no additional web server needed.

leventus93
reddit

I can recommend Pomerium. We use it as identity aware proxy to protect HTTP endpoints either with Keycloak or Google as respective IDP. Works perfectly fine.

ramblingdev
reddit

Check out Pomerium. It's a reverse proxy that enforces policy for every request…Pretty slick. Keeps it simple and gives you what you're looking for I think…

kjaer_unltd
reddit

That looks amazing, opens up a ton of possibilties for the company i am in. Good work.

kevinsnijder
reddit

Nice :) I've been using pocketid with pomerium and it's been great. Thanks for all the good work!

PancakeFrenzy
reddit

But after setting this up, replacing my old Traefik without any auth with Pomerium + PocketId (as OIDC), I must say this is a fantastic and comfy setup.

ProletariatPat
reddit

Pomerium has been smooth, easy and nails the final security measures I wanted in the lab. Very excited to expand it to my VPSs’ and other servers.

Naito-
reddit

Just recently found this, wanted to say great job. Pretty much exactly what I've been looking for.

visualglitch91
reddit

I use Pomerium, and Pangolin is nice too... I like having reverse proxy ans auth handled by a single tool

faresssssssss
reddit

I use pomerium core. Its an identity aware reverse proxy. It gives you authentication (with your preferred solution) as well as authorization.

brucepnla
reddit

One option is to use an MCP gateway that can manage individual users upstream oauth keys, check out https://github.com/pomerium/mcp-app-demo

Confident_Chest5567
reddit

Interesting, will check it out. Had to make something very similar to this about a month ago. Looks good.

ProletariatPat
reddit

Pomerium Core. Simple yaml config, OIDC redirect like authelia and such but easier to setup. Fantastic reverse proxy.

PancakeFrenzy
reddit

I’m really enjoying it, it’s an awesome piece of software. It honestly feels like a future of doing user and access control for my home lab.

tortoiseponcho
reddit

I personally think Pomerium is the most versatile and powerful solution out there, especially if you are on Kubernetes or even Docker.

ProletariatPat
reddit

There are several competitors that can auth against almost any type of SSO. Pomerium is the one I’ve been enjoying most recently

wanderingnsfw
reddit

Have you tried Pomerium? Clientless access reverse proxy. Zero trust self-hosted setup, so no gray area like "Changes to a tailnet that were initiated by a request to Tailscale’s support team are currently not included."

Since you said "more secure" is a requirement, I highly recommend shifting away from any hosted solution. Third-party compromise is a real attack vector. Cloudflare recently experienced that when Okta's breach spilled over to them.

Cronocide
reddit

Use Pomerium.

phomey
reddit

Pomerium is awesome.

hiveminer
reddit

UNBELIEVABLE.. Nobody mentioned POMERIUM yet. What's going on? I recently discover them a few months back, and it seems to me they are the only ones rightfully aligning with the inevitable ZTNA future!!! What am I missing? are they not big enough? not mainstream? Are there others improving IAM? they seem to be IAM+ or IAM on steroids.

legolas8911
reddit

I started with nginx proxy manager since I didn't have patience to manually edit nginx configs and tried using authelia with it, failed. Then Keycloak, same. Then I've found Pomerium and I've been using it ever since. Has everything I need out of the box and it hot reloads when you save a config

visualglitch91
reddit

I use cloudflared + pomerium core

Homegrown_420
reddit

Awesome find, exactly what I was looking for.

ProletariatPat
reddit

I went a step further and I use pomerium reverse proxy. I chose pomerium, for yaml config making it dead simple, and the ability to add SSO before accessing any service. Basically doing what Authentik or Authelia does but easier to setup and manage. This lets me secure anything behind SSO.

ponderpandit
reddit

You might want to check out Pomerium. It acts as an identity-aware proxy and supports Keycloak and others. Super easy to run and centrally handles authentication and authorization so you can plug all your dashboards into it and get that global login vibe. Pretty cool project, worth a look

BlueLighning
reddit

Pomerium is open source, I'd recommend that first

lozinge
reddit

This is really cool - just what I have been looking for!

_blarg1729
reddit

Instead of using a lot of oath2-proxys you could use pomerium instead. Pomerium has its own policy's you can apply to the url. So Instead of having a oath2-proxy for every point that needs privilege separation you can just use one pomerium instance and create access policy's in it.

ProletariatPat
reddit

Here’s how I approach it Nextcloud is in a VM itself. I have another VM that runs Pomerium, a reverse proxy with simple sign on support, inside of a docker container. I use certbot-cloudflare docker to pull my certs. I have cloudflare setup with edge certs so it’s fully verified.

ProletariatPat
reddit

I’ve mostly moved to Komodo + pomerium with Nextcloud as my IDM.

vad1mo
reddit

One major thing I like about Pomerium is the Authorization support.

ProletariatPat
reddit

Pomerium reverse proxy. Yaml configured reverse proxy with built in SSO support to sit in front of any service. Dead simple compared to authelia et. al. I use Nextcloud as my OIDC IDM. Major SAF improvement by having SSO for everything.

ramblingdev
reddit

Have you checked out Pomerium? The proxy issues a signed JWT for reach request w/ claims in headers instead of using a broad OAuth token. Just got my homelab all setup with it. Pretty straightforward.

ProletariatPat
reddit

Pomerium. Dead simple yaml configuration, built in SSO through any IDP.

mxxr
reddit

Came here to learn how to secure AdGuard with a Pomeranian. Left confused.

Hedgebull
reddit

I use PocketID. The key is to use something like Pomerium as a proxy and use that to enforce SSO…For other apps, I use their SSO integrations and configure it to re-use the credentials for Pomerium

vad1mo
reddit

I went with Pomerium for the following reasons

  • Many IDPs. vs. LDAP or File like in Authelia

  • Forward Auth Mode

  • K8s Helm Support

  • Zero Knowledge (No DB like in Authelia)

  • Rich AuthN

needmorehardware
reddit

Ease of configuration - I was up and running, working great within an hour!

hurrySl0wly
reddit

Thanks for sharing this. I tested it with kubernetes-mcp-server and works great.

Azuras33
reddit

I use pocket id directly with service that handles oidc, and put all others behind a pomerium reverse proxy that will handle oidc auth before giving access to the service.

hiveminer
reddit

I think ztna deployments are in a minority tho. Of course there aRe some companies doing creative things like combining IAM and Access control, for example POMERIUM.

Crotherz
reddit

I don’t see a lot of cool stuff on Reddit lately. This, is cool and useful. Nice job

ProletariatPat
reddit

I like Pomerium because it’s a simple yaml to setup, no additional web server needed.

leventus93
reddit

I can recommend Pomerium. We use it as identity aware proxy to protect HTTP endpoints either with Keycloak or Google as respective IDP. Works perfectly fine.

ramblingdev
reddit

Check out Pomerium. It's a reverse proxy that enforces policy for every request…Pretty slick. Keeps it simple and gives you what you're looking for I think…

kjaer_unltd
reddit

That looks amazing, opens up a ton of possibilties for the company i am in. Good work.

kevinsnijder
reddit

Nice :) I've been using pocketid with pomerium and it's been great. Thanks for all the good work!

PancakeFrenzy
reddit

But after setting this up, replacing my old Traefik without any auth with Pomerium + PocketId (as OIDC), I must say this is a fantastic and comfy setup.

ProletariatPat
reddit

Pomerium has been smooth, easy and nails the final security measures I wanted in the lab. Very excited to expand it to my VPSs’ and other servers.

Naito-
reddit

Just recently found this, wanted to say great job. Pretty much exactly what I've been looking for.

visualglitch91
reddit

I use Pomerium, and Pangolin is nice too... I like having reverse proxy ans auth handled by a single tool

faresssssssss
reddit

I use pomerium core. Its an identity aware reverse proxy. It gives you authentication (with your preferred solution) as well as authorization.

brucepnla
reddit

One option is to use an MCP gateway that can manage individual users upstream oauth keys, check out https://github.com/pomerium/mcp-app-demo

Confident_Chest5567
reddit

Interesting, will check it out. Had to make something very similar to this about a month ago. Looks good.

ProletariatPat
reddit

Pomerium Core. Simple yaml config, OIDC redirect like authelia and such but easier to setup. Fantastic reverse proxy.

PancakeFrenzy
reddit

I’m really enjoying it, it’s an awesome piece of software. It honestly feels like a future of doing user and access control for my home lab.

tortoiseponcho
reddit

I personally think Pomerium is the most versatile and powerful solution out there, especially if you are on Kubernetes or even Docker.

ProletariatPat
reddit

There are several competitors that can auth against almost any type of SSO. Pomerium is the one I’ve been enjoying most recently

Frequently Asked Questions

Pomerium operates at Layer 7, so it can authenticate and authorize every individual request, not just open a connection. Layer 4 tools only see that traffic flowed; they can't enforce per-request policy.

SSO confirms identity at login but stops there. Pomerium adds continuous authorization, evaluating identity, device posture, and context on every request, not just at session start.

Pomerium re-evaluates user context (identity, device, location, groups) on every single request. If anything changes mid-session, access is revoked instantaneously, no waiting for token expiry.

Networks control where traffic flows, not who accesses what. Pomerium replaces IP-based rules with identity-and-context-aware access control at the resource level, limiting lateral movement.

Pomerium sits between AI agents and tools, enforcing per-request identity, tool-level authorization, and full audit logging, so agents never hold credentials and every action and access to each tool call is fully controlled and managed by policy.