Reference Architecture: Using AWS EKS with Pomerium

November 22, 2024
Reference Architecture for setting up AWS EKS and Pomerium

Pomerium integrates well with AWS EKS, giving you fine grained access to any application you’re hosting in AWS, regardless of how Authentication and Authorization are managed. Pomerium also supports any IdP you may be using, including AWS Cognito.

Architectural Notes

  • Pomerium prefers a Network Load Balancer over an ELB/ALB, due to performing best when TLS is terminated at its proxy. 

  • Pomerium can be used to offload Authentication that supports JWKS, as well as can be used to add AuthN/AuthZ to applications that don’t have it (in this case shown as Redpanda’s console, which defaults to HTTP without Auth)

  • Pomerium can be used to provide secure authentication to your Kubernetes API, anywhere in the world, without the need for a client.

  • Pomerium can also be used to provide SSH to your internal hosts and databases via our TCP over HTTPS support

Network architecture diagram showing how to use Pomerium with AWS EKS
Share:

Stay Connected

Stay up to date with Pomerium news and announcements.

More Blog Posts

See All Blog Posts
Blog
Taking Back Zero Trust: Bank Policy Institute (BPI) provides a fairly reasoned take on Zero Trust
Blog
November 2024 Data Breaches [LIST]
Blog
12 Zero Trust Architecture Examples With Actionable Guide

Revolutionize
Your Security

Embrace Seamless Resource Access, Robust Zero Trust Integration, and Streamlined Compliance with Our App.

Pomerium logo
© 2024 Pomerium. All rights reserved