# Overview
This section contains applications, and scenario specific guides for Pomerium.
- The ad-guard recipe demonstrates how Pomerium can be used to augment web applications that only support simplistic authorization mechanisms like basic-auth with single-sign-on driven access policy.
- The argo guide demonstrates how Pomerium can be used to add access control to Argo (opens new window).
- The Cloud Run recipe demonstrates deploying Pomerium to Google Cloud Run as well as using it to Authorize users to protected Cloud Run endpoints.
- The code-server guide demonstrates how Pomerium can be used to add access control to third-party applications that don't ship with fine-grained access control (opens new window). code-server is a tool to run Visual Studio code as a web application.
- The JWT Verification guide demonstrates how to verify the Pomerium JWT assertion header using Envoy.
- The Kubernetes Dashboard guide covers how to secure Kubernetes dashboard using Pomerium.
- The kubernetes guide covers how to add authentication and authorization to kubernetes dashboard using helm, and letsencrypt certificates. This guide also shows how third party reverse-proxies like nginx/traefik can be used in conjunction with Pomerium using forward-auth.
- The local OIDC guide demonstrates how Pomerium can be used with local OIDC server for dev/testing.
- The mTLS guide demonstrates how Pomerium can be used to add mutual authentication using client certificates and a custom certificate authority.
- The TiddlyWiki guide demonstrates how Pomerium can be used to add authentication and authorization to web application using authenticated header.
- The Transmission guide demonstrates how Pomerium can act as an authentication and authorization proxy for your Transmission daemon's RPC interface, which only provides unencrypted HTTP auth out of the box.
AdGuard →