Authentication
The Authentication node is used to configure OAuth
These settings are critical to the K2 system. An incorrect configuration, or deleting items from these sections, may cause errors and system instability. These settings should only be modified by an Administrator who is familiar with OAuth configuration, and who understands the impact of editing or deleting items defined in this section.