/
Configuration and administration

Configuration and administration

Introduction

These endpoints are protected differently from the endpoints exposed to clients that act on behalf of the user.