This article describes all considerations that must be taken into account when deploying a K2B Audit application (i.e. an application that uses K2B Audit). The developer should read it carefully to understand security risks, what needs to be deployed, how and who should execute the deployed code, etc.
|