Gravitational Teleport
Pomerium
Gravitational Teleport | Pomerium | |
---|---|---|
65 | 27 | |
18,307 | 4,213 | |
1.3% | 1.2% | |
10.0 | 9.5 | |
5 days ago | 5 days ago | |
Go | Go | |
GNU Affero General Public License v3.0 | Apache License 2.0 |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Gravitational Teleport
-
Access for Infrastructure: SSH
To save others the search: https://github.com/gravitational/teleport/pull/35259 Apache to AGPLv3
-
Ask HN: How did you replace Teleport?
This repo still has AGPL… and another license…
Not sure if AGPL covers all areas of the codebase?
https://github.com/gravitational/teleport
-
Firewall rules: not as secure as you think
For the SSH case mentioned in the article, `ssh -R` trick should already resolve some one-time contingencies (assuming SSH connection is not blocked).
But if you find yourself requesting `ssh -R` too often, maybe just ask those datacenter people to setup a proper SSH Bastion for you. There are opensource solutions and enterprise-level ones (Teleport for example: https://github.com/gravitational/teleport), some also allows you to do audit and access control, which maybe important if you work for a enterprise client.
-
List of ngrok/Cloudflare Tunnel alternatives and other tunneling software and services. Focus on self-hosting.
Teleport - Comprehensive control plane tool, but also supports accessing apps behind NATs. Written in Go.
-
Apache Guacamole: a clientless remote desktop gateway
https://github.com/gravitational/teleport/blob/master/rfd/00...
-
Parsing the Postgres protocol – logging executed statements
I ordinarily would have said you reinvented Teleport <https://github.com/gravitational/teleport/tree/v14.3.7#readm...> but now that they've gone AGPL with v15 I'm guessing there's a market for MIT licensed stuff, although for sure since Teleport has been around for so long it has encountered more edge cases and undergone more security reviews. I was surprised while digging up the link that Gravatational is still releasing v13 and v14 updates under Apache 2, so maybe even Teleport will continue to have legs for those who cannot deploy AGPL stuff
-
👑 Top Open Source Projects of 2023 🚀
Teleport is an SSH for Clusters and Teams and aims to be the drop-in replacement for OpenSSH.
-
Release Radar • February 2024 Edition
Are you looking to set up SSO for your cloud infrastructure? Or maybe establish tunnels to access services behind NATs and firewalls. Then Teleport is for you. It provides connectivity, authentication, access controls and audit for infrastructure. The newest update has a tonne of new features and improvements including enhanced device trust support, SSH connection resumption, MFA for admin actions, improved provisioning for Okta, and heaps. more. Check out all the changes in the Teleport release notes.
-
OpenBao – FOSS Fork of HashiCorp Vault
In case you didn't see it: https://goteleport.com/blog/teleport-oss-switches-to-agpl-v3... and https://github.com/gravitational/teleport/pull/35259
I readily admit it's not the same amount of :fu: as BuSL or whatever the fuck is going on over at Sentry but still :-( as compared to their much friendlier Apache 2
-
Who's hiring developer advocates? (December 2023)
Link to GitHub -->
Pomerium
-
I’m joining Pomerium!
View on GitHub
-
OAuth server for authorization
Option 3: Pomerium might be an alternative as well.
-
Moving from Google workspace to Microsoft 365 and implementing Zero Trust
That is not how you do Zero Trust. You want to use an Identity Aware Proxy. There are lots of ways you can implement this with Google as your core auth. For example Pomerium or oauth2-proxy.
- We have pushed an emergency fix to Pomerium, please upgrade your versions
-
Which reverse proxy are you using?
I’m really surprised this sub has no love for Pomerium. I feel like it’s as simple as Caddy with all the security benefits of Traefik.
-
Is anyone using Pomerium (identity-aware proxy)? I don't understand it.
I am not sure if I understand how Pomerium works (or any identity-aware proxy).
-
AD/AAD Authentication for Apps running in Kubernetes Cluster
Pomerium sidecar.
-
What is the best way to implement an SSO for several existing web apps?
Just want to drop https://www.pomerium.com/ here. We use it at our company with ~1500 people with many apps behind the proxy. It also supports JWT for the backend, so you can integrate your apps easily without having to worry about the OAuth flow and also your apps are protected from random internet attacks.
-
Web Server - Hide Public IP
You’ve got to protect. Anonymity is not going to work. Pomerium is another option in addition to those already suggested. https://github.com/pomerium/pomerium
-
Good stand-alone VPN solution
I am currently looking at Wireguard/Tailscale (Wireguard based) options - early days for me so far. Also planning to look at something like Pomerium for a zero trust approach. https://www.pomerium.com/
What are some alternatives?
Mosh - Mobile Shell
Nginx Proxy Manager - Docker container for managing Nginx proxy hosts with a simple, powerful interface
KeyBox - Bastillion is a web-based SSH console that centrally manages administrative access to systems. Web-based administration is combined with management and distribution of user's public SSH keys.
traefik - The Cloud Native Application Proxy
ShellHub - :computer: Get seamless remote access to any Linux device. Centralized SSH for the edge and cloud computing
oauth2-proxy - A reverse proxy that provides authentication with Google, Azure, OpenID Connect and many more identity providers.