Skip to content

Commit 35134f9

Browse files
ZPain8464github-actions[bot]
authored andcommitted
Removes concepts pages (#1257)
* removes policy concept page adds redirect * removes route concept page adds redirect * removes service accounts concepts page adds redirect * fixes or removes broken links * fixes cspell
1 parent 319d4f9 commit 35134f9

File tree

9 files changed

+25
-91
lines changed

9 files changed

+25
-91
lines changed

content/docs/capabilities/reports.md

-1
Original file line numberDiff line numberDiff line change
@@ -35,4 +35,3 @@ The default view shows all changes made through Pomerium Enterprise. Use the **C
3535
[namespace-concept]: /docs/concepts/namespacing
3636
[namespace-reference]: /docs/enterprise/reference/configure#namespaces
3737
[service-accounts-concept]: /docs/capabilities/service-accounts.md
38-
[policy-reference]: /docs/concepts/policies

content/docs/capabilities/routing.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ keywords:
2424

2525
## Routes
2626

27-
A [Route](/docs/concepts/routes) defines how to access a service running behind Pomerium. This includes authentication (both for Pomerium and passed through to the service), rewrites, header management, load balancing, etc.
27+
A **Route** defines how to access a service running behind Pomerium. This includes authentication (both for Pomerium and passed through to the service), rewrites, header management, load balancing, etc.
2828

2929
When first installing Pomerium Enterprise, users may want to import existing routes from the open-source Pomerium core. The **Migrate Routes** button accepts the open-source `config.yaml` file and imports routes from it to Pomerium Enterprise.
3030

content/docs/concepts/policies.mdx

-30
This file was deleted.

content/docs/concepts/routes.mdx

-33
This file was deleted.

content/docs/concepts/service-accounts.mdx

-20
This file was deleted.

content/docs/deploy/enterprise/changelog.mdx

-2
Original file line numberDiff line numberDiff line change
@@ -262,9 +262,7 @@ toc_max_heading_level: 5
262262

263263
[`signing key`]: /docs/reference/signing-key
264264
[google cloud serverless]: /docs/reference/routes/enable-google-cloud-serverless-authentication
265-
[policies]: /docs/concepts/policies
266265
[policy language]: /docs/capabilities/ppl
267266
[runtime]: /docs/capabilities/reports.md#runtime
268-
[service accounts]: /docs/concepts/service-accounts
269267
[spdy]: /docs/reference/routes/timeouts#spdy
270268
[telemetry]: /docs/capabilities/reports.md#traffic

content/docs/guides/code-server.mdx

+1-1
Original file line numberDiff line numberDiff line change
@@ -159,7 +159,7 @@ To complete this guide, you need:
159159

160160
### Configure Pomerium
161161

162-
In your Console, create a [policy](/docs/concepts/policies) that allows any authenticated user to access the route:
162+
In your Console, create a [policy](/docs/capabilities/ppl) that allows any authenticated user to access the route:
163163

164164
1. Select **New Policy**
165165
2. Enter a **Name** for your policy, like `any authenticated`

content/docs/internals/glossary.md

+20-3
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,6 @@
11
---
2+
# cSpell:ignore localdomain
3+
24
title: Glossary
35
lang: en-US
46
keywords:
@@ -60,11 +62,27 @@ The term "Perimeter" in the context of Pomerium and general networking usually r
6062

6163
### Policy
6264

63-
Pomerium allows administrators to define authorization policies dictating what combination of users, groups, devices, etc, have access to protected services. Open-source Pomerium defines a unique policy to every [route], while Pomerium Enterprise can define reusable policies at the global and [namespace] level.
65+
A Policy defines what services behind Pomerium a user is authorized to access based on policy criteria, such as user identity and device identity, and the associated request context.
66+
67+
Policies can be applied to [Routes](/docs/capabilities/routing) directly, or enforced within a [Namespace](/docs/capabilities/namespacing). Policies allow operators to add authorization and access control to a single route or collection of routes.
6468

6569
### Route
6670

67-
Specific to Pomerium, a route is a defined path from outside the network (via a public domain) to an internal service. Routes can be defined in the [configuration](/docs/reference/routes) for open-source Pomerium or the [Pomerium Enterprise Console][pom-routes].
71+
Specific to Pomerium, a route is a defined path from outside the network (through a public domain) to an internal service. At a very basic level, a route sends traffic from `external-address.company.com` to `internalService-address.localdomain`; a route is restricted by its associated policies and encrypted by your TLS certificates.
72+
73+
Routes can be defined in the [configuration](/docs/reference/routes) for open-source Pomerium or the [Pomerium Enterprise Console][/docs/deploy/enterprise].
74+
75+
More advanced configurations allow identity header pass-through, path and prefix rewrites, request and response header modification, load balancer services, and other full featured ingress capabilities.
76+
77+
For more information, see the [Routing Capabilities])(/docs/capabilities/routing) page.
78+
79+
### Service Account
80+
81+
A service account provides bearer token based authentication for machine-to-machine communication through Pomerium to your protected endpoints. A service account can provide authentication for monitoring services, create API integrations, and other non-human driven scripts or services.
82+
83+
A service account identity can either be based on a user entry in your IdP Directory, or exist as a custom identity managed in a Pomerium Console [Namespace](/docs/capabilities/namespacing).
84+
85+
See the [Service Accounts](/docs/capabilities/service-accounts) capabilities page for more information on how to use service accounts in Pomerium.
6886

6987
### Single Sign-On
7088

@@ -145,7 +163,6 @@ Zero trust is a philosophy and/or framework for security models that includes se
145163
[policies]: #policy
146164
[pomerium enterprise]: /docs/deploy/enterprise/install
147165
[pom-namespace]: /docs/internals/glossary
148-
[pom-routes]: /docs/concepts/routes
149166
[route]: #route
150167
[routes]: #route
151168
[secure enclave]: #secure-enclave

static/_redirects

+3
Original file line numberDiff line numberDiff line change
@@ -91,6 +91,9 @@ https://0-20-0.docs.pomerium.com/category/guides https://0-20-0.docs.pomerium.co
9191
# Reference, capabilities, topics, concepts links
9292
/docs/reference/readme.html /docs/
9393
/docs/concepts/namespacing /docs/capabilities/namespacing
94+
/docs/concepts/policies /docs/internals/glossary#policy
95+
/docs/concepts/routes /docs/internals/glossary#route
96+
/docs/concepts/service-accounts /docs/internals/glossary#service-account
9497
# Redirects incorrectly
9598
/docs/reference/certificates.html /docs/topics/certificates
9699
/docs/topics/certificates /docs/concepts/certificates

0 commit comments

Comments
 (0)