Investigate if there is a way to ping a peer with identity without introducing any actual change Then we can verify if a identity like admin/user is authorized.
Investigate if there is a way to ping a peer with identity without introducing any actual change
Then we can verify if a identity like admin/user is authorized.