Skip to content

Commit

Permalink
fix: intro docs (#2602)
Browse files Browse the repository at this point in the history
  • Loading branch information
vinckr committed Jul 1, 2021
1 parent 5ae6fe6 commit bc87822
Show file tree
Hide file tree
Showing 2 changed files with 21 additions and 22 deletions.
26 changes: 13 additions & 13 deletions docs/docs/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -20,18 +20,17 @@ registration), a particular template engine, or a predefined front-end.
This allows you to implement user management and login your way, in your
technology stack, with authentication mechanisms required by your use case
(token-based 2FA, SMS 2FA, etc). You can of course use existing solutions like
[authboss](https://github.com/go-authboss/authboss) or
[auth0.com](https://auth0.com/). It provides you all the benefits of OAuth 2.0
and OpenID Connect while being minimally invasive to your business logic and
technology stack.
[authboss](https://github.com/go-authboss/authboss). It provides you all the
benefits of OAuth 2.0 and OpenID Connect while being minimally invasive to your
business logic and technology stack.

## OpenID Certified

ORY Hydra is a
[Certified OpenID Provider Server](https://openid.net/developers/certified/) and
implements all the requirements stated by the OpenID Foundation. In particular,
it correctly implements the various OAuth 2.0 and OpenID Connect flows specified
by the IETF and OpenID Foundation.
[Certified OpenID Connect Provider Server](https://openid.net/developers/certified/)
and implements all the requirements stated by the OpenID Foundation. In
particular, it correctly implements the various OAuth 2.0 and OpenID Connect
flows specified by the IETF and OpenID Foundation.

## Cryptographic Key Storage

Expand All @@ -43,7 +42,7 @@ OAuth 2.0 Clients.

ORY Hydra's architecture and work flows are designed to neutralize many common
(OWASP TOP TEN) and uncommon attack vectors.
[Learn more](https://www.ory.sh/docs/guides/master/hydra/5-security/).
[Learn more](./security-architecture.md).

## High Performance

Expand Down Expand Up @@ -90,10 +89,11 @@ help you decide if OAuth 2.0 and Hydra are the right fit for a use case:

## Other solutions

If all you need is a library or SDKs that implements OAuth 2.0, take a look at
If you only need a library or SDKs that implements OAuth 2.0, take a look at
[fosite](https://github.com/ory/fosite) or
[node-oauth2-server](https://github.com/oauthjs/node-oauth2-server).

If you need a more fully featured identity solution including user management
and user interfaces, those exist in the form of
[Keycloak](https://www.keycloak.org) or [Okta](https://www.okta.com).
If you need a fully featured identity solution including user management and
user interfaces, those exist in the cloud as [Ory](https://console.ory.sh) or
when self-hosting as [Keycloak](https://www.keycloak.org) or
[Ory Kratos](https://github.com/ory/kratos/) among others.
17 changes: 8 additions & 9 deletions docs/versioned_docs/version-v1.10/index.md
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
---
id: index
slug: /
title: ORY Hydra
title: Introduction
sidebar_label: Introduction
---

Expand All @@ -20,15 +20,14 @@ registration), a particular template engine, or a predefined front-end.
This allows you to implement user management and login your way, in your
technology stack, with authentication mechanisms required by your use case
(token-based 2FA, SMS 2FA, etc). You can of course use existing solutions like
[authboss](https://github.com/go-authboss/authboss) or
[auth0.com](https://auth0.com/). It provides you all the benefits of OAuth 2.0
[authboss](https://github.com/go-authboss/authboss). It provides you all the benefits of OAuth 2.0
and OpenID Connect while being minimally invasive to your business logic and
technology stack.

## OpenID Certified

ORY Hydra is a
[Certified OpenID Provider Server](https://openid.net/developers/certified/) and
[Certified OpenID Connect Provider Server](https://openid.net/developers/certified/) and
implements all the requirements stated by the OpenID Foundation. In particular,
it correctly implements the various OAuth 2.0 and OpenID Connect flows specified
by the IETF and OpenID Foundation.
Expand All @@ -43,7 +42,7 @@ OAuth 2.0 Clients.

ORY Hydra's architecture and work flows are designed to neutralize many common
(OWASP TOP TEN) and uncommon attack vectors.
[Learn more](https://www.ory.sh/docs/guides/master/hydra/5-security/).
[Learn more](./security-architecture.md).

## High Performance

Expand Down Expand Up @@ -90,10 +89,10 @@ help you decide if OAuth 2.0 and Hydra are the right fit for a use case:

## Other solutions

If all you need is a library or SDKs that implements OAuth 2.0, take a look at
If you only need a library or SDKs that implements OAuth 2.0, take a look at
[fosite](https://github.com/ory/fosite) or
[node-oauth2-server](https://github.com/oauthjs/node-oauth2-server).

If you need a more fully featured identity solution including user management
and user interfaces, those exist in the form of
[Keycloak](https://www.keycloak.org) or [Okta](https://www.okta.com).
If you need a fully featured identity solution including user management
and user interfaces, those exist in the cloud as [Ory](https://console.ory.sh) or when self-hosting as
[Keycloak](https://www.keycloak.org) or [Ory Kratos](https://github.com/ory/kratos/) among others.

0 comments on commit bc87822

Please sign in to comment.