How Pangolin Works

March 8, 2026

Pangolin is a zero-trust access platform that provides secure, identity-centric access to applications and infrastructure - without opening firewall ports or deploying traditional VPNs. Let's walk through how the system works: the control plane, how you connect networks and define resources, and how policy is enforced for users and devices. The result is a single platform for both web application access and private (VPN-style) access, with centralized policy, full auditability, and support for hybrid and multi-cloud environments.

Pangolin delivers zero-trust network access (ZTNA) for workforce and machine identity: users and systems only reach the applications and hosts you explicitly allow, based on identity, role, and context. Public resources provide secure web access to internal and SaaS applications via identity-aware reverse proxy. Private resources provide least-privilege access to specific hosts and network segments through an optional client. A unified policy model and integration with your identity provider (IdP) lets you manage access once and enforce it everywhere.

Let’s walk through the architecture and key concepts from the ground up:

Architecture overview

Pangolin separates control plane and data plane. The Pangolin server is the control plane: it handles authentication, stores access policies, and coordinates authorization. It does not sit in the path of user or machine traffic. The data plane is made up of sites (connectors in your networks) and clients (on user devices or machines). Sites run a WireGuard peer; clients authenticate and then connect directly “peer-to-peer” to the appropriate sites to reach authorized resources. This gives you centralized policy and governance without a single choke point for traffic.

Access is deny-by-default. Deploying a site does not expose any resources. Defining a resource does not grant access until you assign users or roles. Zero-trust is enforced by explicit policy: you define what exists, who can access it, and under what conditions. Logs and audit trails support compliance and incident response.

Lets walk through how to setup the system:

Step 1: Connect infrastructure with sites

Sites extend Pangolin’s secure access to your networks - office LANs, cloud VPCs, data centers, and edge locations. A site is a logical representation of a network segment connected via the Newt connector: a lightweight software component you install on a host that already has network access. Newt creates secure, outbound-only tunnels to the Pangolin control plane. No public IP addresses or inbound firewall rules are required; infrastructure remains behind the perimeter.

Sites run inside your perimeter. They maintain outbound connectivity to the server and, by default, do not allow any traffic until you define resources and assign access in policy. Adding a site does not expose the network; it registers the segment so you can later define resources and enforce who may access them. They also run a WireGuard peer sitting and waiting for clients to establish peer-to-peer connections.

Each site is provisioned with credentials (endpoint, ID, secret) and supported deployment options: Unix, Windows, Docker, Kubernetes, and others. Credentials can be rotated without re-deploying the connector.

Organizations typically deploy multiple sites - one or two per VPC, campus, or region. Each site is a policy enforcement point for the resources attached to it. Users and machines never connect “to a site” directly; they are authorized to resources that the site can see on the network. Sites provide connectivity; resources and policy define what can be accessed.

Step 2: Define resources and policy

Resources are the applications, hosts, or network segments you expose for secure access. They are bound to sites and have no access until you define policy: which roles and users (or machine identities) may reach them. This application - and resource - level model supports least-privilege access and reduces the attack surface compared to network-wide VPN access.

Pangolin supports two resource types: public (browser-based, reverse proxy) and private (client-based, ZTNA-style access to specific hosts or CIDRs). Both share the same identity and policy framework.

Public resources: secure application access

Public resources provide secure web access to internal and third-party applications. They function as identity-aware reverse proxies: users access a URL in the browser, authenticate (via SSO, MFA, or password), and are routed to the backend based on policy. No client is required on the user device. Pangolin handles TLS termination, routing, and policy enforcement.

You configure backend targets (addresses and ports), path-based routing, optional path rewriting, and health checks. Traffic is sent only to healthy targets. Applications remain behind the firewall; only the site’s outbound tunnel is used.

Health status is visible per resource and per target, so operations teams can monitor availability and troubleshoot before user impact.

Policy for public resources can require authentication, enforce MFA, and apply rules based on user, role, group, geography, IP, or path. This supports secure access to internal tools, admin consoles, and SaaS-style applications with a consistent policy model.

Private resources: least-privilege infrastructure access

Private resources provide access to specific hosts or network ranges - databases, SSH servers, internal APIs, or subnets - for users or machines that have the Pangolin client. Access is scoped to the resources you grant; there is no broad network access. This is zero-trust network access (ZTNA): only explicitly authorized resources are reachable.

For each private resource you define the destination (hostname, IP, or CIDR), optional internal DNS alias, and port policy (TCP, UDP, ICMP). Port-level restrictions limit exposure compared to full-network VPN access.

Access is granted per resource by roles and users (and optionally machine clients). Administrative roles retain access; all other access is explicitly assigned in policy.

In summary: public resources provide clientless, browser-based access with identity-aware policy; private resources provide client-based, least-privilege access to specific infrastructure. Both use the same identity store and policy engine.

Step 3: Identity, roles, and device trust

Access is granted only after authentication and authorization. The Pangolin server enforces policy and typically integrates with your existing identity provider (IdP) so that workforce identity, SSO, and MFA are consistent across applications and infrastructure.

Federated identity and login

Users authenticate via the Pangolin login page or the client. Organizations can use a single identity provider - Microsoft Entra ID, Google Workspace, Okta, or another OIDC/SAML-compatible IdP - for SSO and MFA. It consumes identity from the IdP and applies the roles and resource entitlements you configure. Pangolin can also manage its own set of internal users if you are not working with an IdP.

Users and role-based access control

Users and roles are managed in the admin console. Users are linked to an identity (e.g. email) and an IdP. You assign one or more roles per user. Roles define entitlements: which resources (public and private) can be accessed, plus SSH and other capability settings. This role-based access control (RBAC) keeps policy manageable at scale and supports compliance and audit requirements.

Roles can include SSH-specific policy: whether SSH is allowed, sudo level (none, full, or restricted commands), Unix groups, and home directory provisioning for use with Pangolin's ssh daemon which can run on the site or as a remote auth daemon on the same network the site can access. This gives a single place to define infrastructure access behavior for each role.

Endpoints and device trust

For private resource access, users (or automated systems) use the Pangolin client on supported endpoints (Mac, Windows, Linux, iOS, Android). The client authenticates, receives the set of authorized resources, and establishes encrypted tunnels directly to the appropriate sites. No per-application configuration is required; the client handles routing and tunnel management.

Device approval can be required so that new devices cannot access resources until an administrator approves them. This extends zero-trust to the endpoint: valid credentials alone are not sufficient without device trust.

Pending requests appear in a dedicated approvals queue so administrators can review device details and grant or deny access in one place.

Devices can be blocked (e.g. lost, stolen, or compromised) so that access is revoked immediately. The device record is retained for audit and compliance.

Key concepts summary

So to recap we have the:

  • Pangolin Server (control plane)  -  Central policy, authentication, and coordination. Available as Pangolin Cloud (managed) or self-hosted. Does not sit in the data path; enforces who may access what.
  • Sites  -  Network segments connected via the Newt connector. Outbound-only tunnels; no public IPs or open inbound ports. Sites enable resource definitions and policy enforcement at the edge.
  • Resources  -  Applications and infrastructure exposed for access. Public = identity-aware reverse proxy (browser). Private = ZTNA-style access to specific hosts/CIDRs (client). Both are deny-by-default and policy-driven.
  • Clients  -  Endpoint software for users and machines. Single sign-on; access to all resources permitted by role. Handles routing and tunnels without application changes.

How Pangolin differs from traditional VPN and proxy

  • Vs. reverse proxy - Pangolin’s public resources provide identity- and context-aware reverse proxy capabilities without requiring public IPs or open ports; sites use outbound tunnels only.
  • Vs. VPN - Private resources provide access to specific applications and segments, not entire networks. Least-privilege and role-based access reduce over-permission and support zero-trust and compliance objectives.
  • Unified platform - One policy model for web and infrastructure access. Single integration with your IdP; consistent RBAC and auditability across use cases. No separate reverse proxy and VPN products to operate and reconcile.

Enterprise use cases and benefits

  • Secure hybrid workforce access  -  Provide identity-centric access to internal applications and infrastructure from any location, with SSO/MFA and device trust, without exposing the corporate network or maintaining VPN concentrators.
  • Application and infrastructure access without perimeter exposure  -  Replace bastion hosts and jump boxes with role-based access to SSH, databases, and internal services. No inbound SSH or database ports; policy is enforced at the application and resource level.
  • Unified access policy and auditability  -  Define users, roles, and resource entitlements in one place. Full visibility into who and which devices accessed what, supporting compliance, incident response, and access reviews.
  • Reduced attack surface  -  No public IPs or open inbound ports for access. Sites and clients use outbound connectivity and NAT traversal. Firewall posture can remain restrictive while enabling secure access.
  • Identity-centric access  -  Integrate with enterprise IdPs for SSO and MFA. Govern access by user and role rather than IP; align with existing identity and access management (IAM) processes.

For organizations that need both secure web application access and least-privilege infrastructure access under a single policy model - with full auditability and no open ports - Pangolin is designed for that requirement.

Get started

You can use Pangolin Cloud for a managed control plane, or self-host the server for full control over data and infrastructure. The same architecture and concepts apply: connect sites, define resources, assign users and roles, and enforce secure access across your environment.

About Pangolin
Pangolin is an open-source infrastructure company that provides secure, zero trust remote access for teams of all sizes. Built to simplify user workflows and protect critical systems, Pangolin helps companies and individuals connect to their networks, applications, and devices safely without relying on traditional VPNs. With a focus on device security, usability, and transparency, Pangolin empowers organizations to manage access efficiently while keeping their infrastructure secure.
Stop managing networks. Start managing access.