Adjective
unauthenticated (not comparable)
Having no authentication
Next, define the rules that will prevent unauthenticated users to access our protected resources. Source: Internet
One that accepts unauthenticated requests (), another one that accepts requests from authenticated users (), and the third one that accepts requests only from users authenticated as administrators ( Source: Internet
Others can be prevented by ensuring unauthenticated users cannot perform operations that require significant server resources. Source: Internet
The following example resends a confirmation code via SMS that confirms the registration for an unauthenticated user. Source: Internet
“The node info command is entirely unencrypted and unauthenticated. Source: Internet
The unauthenticated store is now available for use. Source: Internet