Post Installation Security Considerations

Once K2 has been installed there are various rights and settings that must be configured to allow people access to certain K2 functionality. Listed below are the various areas that require configuration to ensure the K2 installation is functional.

K2 blackpearl

K2 smartforms