One of the key value propositions of the K2 platforms is its ability to combine people and systems into seamless solutions. As a result, the landscape contains disparate systems and technologies brought together by the K2 platform. As with any distributed platform, there is a need to understand, plan and configure for a secure environment for authenticated users.
This section discusses the key concepts as they pertain to authentication within K2 to help assist with decisions and installation procedures that align with an organization’s authentication needs.
Learn more about security authentication
At its most robust level, a computer system should be hardened against malicious and inadvertent threats, at the hardware and software levels. This topic considers a fundamental look at some threat models to understand K2 Host Server and its related sites and services. The primary focus in this document will be on locking down the securable resources under the control of K2 system.
Learn more about platform hardening