@ -8,3 +8,5 @@ Some ideas for different scenarios:
* Instances that use domain or referrer to restrict data.
* Instance that uses API key
* Instance that uses keycloak as auth.
See the wiki tab