/
Configuration and administration
Configuration and administration
Introduction
These endpoints are protected differently from the endpoints exposed to clients that act on behalf of the user.
These endpoints are protected differently from the endpoints exposed to clients that act on behalf of the user.