Implementation checklist for unauthenticated callers
To configure the system APIs for authentication for unauthenticated callers, you may need to:
- Register the caller application with Guidewire Hub
- Review and modify the Unauthenticated API role.
- Configure the proxy user
To configure the system APIs for authentication for unauthenticated users, you may need to do the following tasks:
Task | More Information |
---|---|
Provide deployment information | Enabling bearer token authentication |
Register the caller application with Guidewire Hub | Authentication with Guidewire Identity Federation Hub in the Guidewire Cloud Platform documentation set. |
Review and modify the Unauthenticated API role | Endpoint access |
Configure the proxy user | Proxy user access |
To make a system API call for unauthenticated callers, the caller application does not need to request a code, request a JWT, or include a JWT with the system API call. The caller simply provides no authentication information.