Details
-
Task
-
Resolution: Done
-
Major
-
None
-
None
Description
Where no authentication is to occur on the http management interface we should still establish a security context for the purpose of operations such as whoami, auditing and even ACLs based on anonymous access.