Implementation checklist for unauthenticated callers

To configure Cloud API for authentication for unauthenticated callers, you may need to:

  1. Review and modify the Unauthenticated API role.
  2. Configure the proxy user

To configure Cloud API for authentication for unauthenticated users, you may need to do the following tasks:

Task More Information
Review and modify the Unauthenticated API role Endpoint access
Configure the proxy user Proxy user access

To make a Cloud API call for unauthenticated callers, the caller application does not need to request a code, request a JWT, or include a JWT with the call. The caller simply provides no authentication information.