One of the key value propositions of the K2 platforms is its ability to combine people and systems into seamless solutions. As a result, the landscape contains disparate systems and technologies brought together by the K2 platform. As with any distributed platform, there is a need to understand, plan and configure for a secure environment for authenticated users.


This section discusses the key concepts as they pertain to authentication within K2 to help assist with decisions and installation procedures that align with an organization’s authentication needs.

Learn more about security authentication

Platform Hardening

At its most robust level, a computer system should be hardened against malicious and inadvertent threats, at the hardware and software levels. This topic considers a fundamental look at some threat models to understand K2 Host Server and its related sites and services. The primary focus in this document will be on locking down the securable resources under the control of K2 system.

Learn more about platform hardening

Choice of Deployment

Choose the approach that best meets your business needs; evolve your deployment approach as your business evolves and configuration and integration with many industry cloud solutions such as Office 365, Salesforce, SharePoint, and Azure Active Directory.

Architecture Planning

This document provides topics that assist with planning the overall landscape in which K2 will be installed and how the K2 instance(s) should look within the larger ecosystem.

Installation and Configuration

The K2 Getting Started Guides contain a significant amount of detail and discussions around supported topologies as well as detailed installation and configuration instructions.