Skip to main content
 

Authentication and Authorization in K2

UPDATED

PRODUCT
K2 Five
K2 blackpearl
K2 smartforms

 

In this article series you'll discover how:

  • User identities flow into K2 and by what mechanisms, and how they are verified
  • Users are authorized for resources internal to K2
  • Users and the K2 server are authorized for resources external to K2
  • Users, groups and roles are managed by K2
  • K2Trust is used for when integrating with Azure Active Directory and SharePoint Online
  • Troubleshooting claims-based authentication problems is accomplished using browser-based and other tools

 

Articles in this Series

 

For information about authentication for K2 Mobile, see topics in the Knowledge Center

 

 

Be the first to reply!

Reply