Kubernetes Access Gateway

Secure Kubernetes API proxy with identity-aware impersonation, kubectl exec session recording, pod log streaming, and short-lived kubeconfig tokens. No direct cluster access required.

Zero Trust Kubernetes Access

Kubernetes API proxy with user impersonation headers
kubectl exec sessions recorded as asciinema
Pod log streaming via browser WebSocket
Short-lived kubeconfig token generation from CLI
Cluster auto-discovery via kubeconfig or service account
Namespace and pod-level RBAC enforcement
No direct K8s API server exposure to the internet
Integrate with existing SAML/OIDC identity providers

Secure Kubernetes Access

pumagate — kubernetes $ pumagate kube config --cluster prod-eks --ttl 4h Authenticating via Okta SSO... Identity verified: alice@acme.co (DevOps) Short-lived token generated (expires: 4h) Kubeconfig context "pumagate-prod-eks" ready $ kubectl get pods -n production NAME READY STATUS api-server-6f8b9c5-x7k2p 1/1 Running worker-7d4e1a2-m9n3q 1/1 Running redis-cache-3a1f-b2k8r 1/1 Running Session recording: ses_k8s_2m9x • Impersonating: alice@acme.co KUBERNETES PROXY API proxy with impersonation headers • kubectl exec recording • Pod log streaming

How It Works

1. Connect Identity Provider

Integrate with Okta, Azure AD, Google Workspace, or any SAML/OIDC provider in minutes.

2. Add Resources

Register your servers, databases, and web apps. Define role-based access policies.

3. Secure Access

Users access resources through the browser with identity verification, session recording, and audit logs.

Ready for Kubernetes Access Gateway?

Deploy in minutes. No legacy VPN required. No credit card required.