Implementation checklist for unauthenticated callers
To configure Cloud API for authentication for unauthenticated callers, you may need to:
- Review and modify the Unauthenticated API role.
- Configure the proxy user
To configure Cloud API for authentication for unauthenticated users, you may need to do the following tasks:
Task | More Information |
---|---|
Review and modify the Unauthenticated API role | Endpoint access |
Configure the proxy user | Proxy user access |
To make a Cloud API call for unauthenticated callers, the caller application does not need to request a code, request a JWT, or include a JWT with the call. The caller simply provides no authentication information.