In this article series you'll discover how:

  • User identities flow into K2 and by what mechanisms, and how they are verified
  • Users are authorized for resources internal to K2
  • Users and the K2 server are authorized for resources external to K2
  • Users, groups and roles are managed by K2
  • K2Trust is used for when integrating with Azure Active Directory and SharePoint Online
  • Troubleshooting claims-based authentication problems is accomplished using browser-based and other tools

Articles in this Series

For information about authentication for K2 Mobile, see topics in the Knowledge Center