The authorization and authentication process is not required and depends on your preferences. However, we recommend establishing the authentication process for all the activities that change the data in the system.
For authentication, you can use JWT and Mutual Authentication. To complete the configuration you have to configure at least one of these methods:
Updated about 2 years ago