From bfe96e9a47b1c49be631f5286ed05d4377fba684 Mon Sep 17 00:00:00 2001 From: Aeneas Date: Sat, 16 Jun 2018 11:11:24 +0200 Subject: [PATCH] docs: Adds link to examples repository (#79) --- README.md | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 0d79fcdb95..28e6b92f4b 100644 --- a/README.md +++ b/README.md @@ -39,8 +39,9 @@ This service is under active development and may introduce breaking changes in f - [Building from source](#building-from-source) - [Ecosystem](#ecosystem) - [ORY Security Console: Administrative User Interface](#ory-security-console-administrative-user-interface) - - [ORY Hydra: OAuth2 & OpenID Connect Server](#ory-hydra-oauth2--openid-connect-server) + - [ORY Hydra: OAuth2 & OpenID Connect Server](#ory-hydra-oauth2-&-openid-connect-server) - [ORY Keto: Access Control Policies as a Server](#ory-keto-access-control-policies-as-a-server) + - [Examples](#examples) - [Security](#security) - [Disclosing vulnerabilities](#disclosing-vulnerabilities) - [Telemetry](#telemetry) @@ -124,6 +125,11 @@ for low-latency, high throughput, and low resource consumption. ORY Hydra is not to AWS IAM Policies, in order to determine whether a subject (user, application, service, car, ...) is authorized to perform a certain action on a resource. +### Examples + +The [ory/examples](https://github.com/ory/examples) repository contains numerous examples of setting up this project +individually and together with other services from the ORY Ecosystem. + ## Security ### Disclosing vulnerabilities