# Overview

This section contains applications, and scenario specific guides for Pomerium.

  • The ad-guard recipe demonstrates how pomerium can be used to augment web applications that only support simplistic authorization mechanisms like basic-auth with single-sign-on driven access policy.
  • The argo guide demonstrates how pomerium can be used to add access control to Argo (opens new window).
  • The Cloud Run recipe demonstrates deploying pomerium to Google Cloud Run as well as using it to Authorize users to protected Cloud Run endpoints.
  • The JWT Verification guide demonstrates how to verify the Pomerium JWT assertion header using Envoy.
  • The Kubernetes Dashboard guide covers how to secure Kubernetes dashboard using Pomerium.
  • The kubernetes guide covers how to add authentication and authorization to kubernetes dashboard using helm, and letsencrypt certificates. This guide also shows how third party reverse-proxies like nginx/traefik can be used in conjunction with pomerium using forward-auth.
  • The local OIDC guide demonstrates how pomerium can be used with local OIDC server for dev/testing.
  • The mTLS guide demonstrates how pomerium can be used to add mutual authentication using client certificates and a custom certificate authority.
  • The TiddlyWiki guide demonstrates how pomerium can be used to add authentication and authorization to web application using authenticated header.
  • The visual studio code guide demonstrates how pomerium can be used to add access control to third-party applications that don't ship with fine-grained access control (opens new window).
  • The Transmission guide demonstrates how Pomerium can act as an authentication and authorization proxy for your Transmission daemon's RPC interface, which only provides unencrypted HTTP auth out of the box.