{"id":3487,"date":"2022-12-14T12:52:00","date_gmt":"2022-12-14T12:52:00","guid":{"rendered":"https:\/\/trustcenter.solutions2share.com\/documentation\/trust-center\/sichere-entwicklung\/bereitstellungsprozess"},"modified":"2024-05-03T12:30:34","modified_gmt":"2024-05-03T12:30:34","slug":"bereitstellungsprozess","status":"publish","type":"manual_documentation","link":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/trust-center\/sichere-entwicklung\/bereitstellungsprozess","title":{"rendered":"Bereitstellungsprozess"},"content":{"rendered":"\n<p>Der Bereitstellungsprozess umfasst in der Regel eine Reihe von Schritten, darunter die Erstellung der Anwendung, das Testen der Anwendung, die Konfiguration der Umgebung und die Bereitstellung der Anwendung auf dem Produktionsserver.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"328\" src=\"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-3-1024x328.png\" alt=\"\" class=\"wp-image-3903\" srcset=\"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-3-1024x328.png 1024w, https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-3-300x96.png 300w, https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-3-768x246.png 768w, https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-3-1536x491.png 1536w, https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-3-600x192.png 600w, https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-3.png 1879w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"author":1,"featured_media":0,"parent":3469,"menu_order":0,"template":"","manualdocumentationcategory":[72],"manual_doc_tag":[],"class_list":["post-3487","manual_documentation","type-manual_documentation","status-publish","hentry","manualdocumentationcategory-trust-center-de"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bereitstellungsprozess - Trust Center by Solutions2Share<\/title>\n<meta name=\"description\" content=\"Der Bereitstellungsprozess umfasst das Erstellen und Testen der Anwendung, das Konfigurieren der Umgebung und die Bereitstellung der Anwendung auf dem Produktionsserver.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/trust-center\/sichere-entwicklung\/bereitstellungsprozess\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bereitstellungsprozess - Trust Center by Solutions2Share\" \/>\n<meta property=\"og:description\" content=\"Der Bereitstellungsprozess umfasst das Erstellen und Testen der Anwendung, das Konfigurieren der Umgebung und die Bereitstellung der Anwendung auf dem Produktionsserver.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/trust-center\/sichere-entwicklung\/bereitstellungsprozess\" \/>\n<meta property=\"og:site_name\" content=\"Trust Center by Solutions2Share\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/solutions2share\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-03T12:30:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-3-1024x328.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\\\/dokumentation\\\/trust-center\\\/sichere-entwicklung\\\/bereitstellungsprozess\",\"url\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\\\/dokumentation\\\/trust-center\\\/sichere-entwicklung\\\/bereitstellungsprozess\",\"name\":\"Bereitstellungsprozess - Trust Center by Solutions2Share\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\\\/dokumentation\\\/trust-center\\\/sichere-entwicklung\\\/bereitstellungsprozess#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\\\/dokumentation\\\/trust-center\\\/sichere-entwicklung\\\/bereitstellungsprozess#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/image-3-1024x328.png\",\"datePublished\":\"2022-12-14T12:52:00+00:00\",\"dateModified\":\"2024-05-03T12:30:34+00:00\",\"description\":\"Der Bereitstellungsprozess umfasst das Erstellen und Testen der Anwendung, das Konfigurieren der Umgebung und die Bereitstellung der Anwendung auf dem Produktionsserver.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\\\/dokumentation\\\/trust-center\\\/sichere-entwicklung\\\/bereitstellungsprozess#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\\\/dokumentation\\\/trust-center\\\/sichere-entwicklung\\\/bereitstellungsprozess\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\\\/dokumentation\\\/trust-center\\\/sichere-entwicklung\\\/bereitstellungsprozess#primaryimage\",\"url\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/image-3-1024x328.png\",\"contentUrl\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/wp-content\\\/uploads\\\/2024\\\/05\\\/image-3-1024x328.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\\\/dokumentation\\\/trust-center\\\/sichere-entwicklung\\\/bereitstellungsprozess#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trust Center\",\"item\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\\\/dokumentation\\\/trust-center\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Sichere Entwicklung\",\"item\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\\\/dokumentation\\\/trust-center\\\/sichere-entwicklung\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Bereitstellungsprozess\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de#website\",\"url\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\",\"name\":\"Trust Center by Solutions2Share\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de#organization\",\"name\":\"Trust Center by Solutions2Share\",\"url\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/cropped-solutions2share-favicon.png\",\"contentUrl\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/cropped-solutions2share-favicon.png\",\"width\":512,\"height\":512,\"caption\":\"Trust Center by Solutions2Share\"},\"image\":{\"@id\":\"https:\\\/\\\/trustcenter.solutions2share.com\\\/de#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/solutions2share\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/solutions2share\\\/\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/Solutions2Share\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bereitstellungsprozess - Trust Center by Solutions2Share","description":"Der Bereitstellungsprozess umfasst das Erstellen und Testen der Anwendung, das Konfigurieren der Umgebung und die Bereitstellung der Anwendung auf dem Produktionsserver.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/trust-center\/sichere-entwicklung\/bereitstellungsprozess","og_locale":"de_DE","og_type":"article","og_title":"Bereitstellungsprozess - Trust Center by Solutions2Share","og_description":"Der Bereitstellungsprozess umfasst das Erstellen und Testen der Anwendung, das Konfigurieren der Umgebung und die Bereitstellung der Anwendung auf dem Produktionsserver.","og_url":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/trust-center\/sichere-entwicklung\/bereitstellungsprozess","og_site_name":"Trust Center by Solutions2Share","article_publisher":"https:\/\/www.facebook.com\/solutions2share","article_modified_time":"2024-05-03T12:30:34+00:00","og_image":[{"url":"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-3-1024x328.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/trust-center\/sichere-entwicklung\/bereitstellungsprozess","url":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/trust-center\/sichere-entwicklung\/bereitstellungsprozess","name":"Bereitstellungsprozess - Trust Center by Solutions2Share","isPartOf":{"@id":"https:\/\/trustcenter.solutions2share.com\/de#website"},"primaryImageOfPage":{"@id":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/trust-center\/sichere-entwicklung\/bereitstellungsprozess#primaryimage"},"image":{"@id":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/trust-center\/sichere-entwicklung\/bereitstellungsprozess#primaryimage"},"thumbnailUrl":"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-3-1024x328.png","datePublished":"2022-12-14T12:52:00+00:00","dateModified":"2024-05-03T12:30:34+00:00","description":"Der Bereitstellungsprozess umfasst das Erstellen und Testen der Anwendung, das Konfigurieren der Umgebung und die Bereitstellung der Anwendung auf dem Produktionsserver.","breadcrumb":{"@id":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/trust-center\/sichere-entwicklung\/bereitstellungsprozess#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/trust-center\/sichere-entwicklung\/bereitstellungsprozess"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/trust-center\/sichere-entwicklung\/bereitstellungsprozess#primaryimage","url":"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-3-1024x328.png","contentUrl":"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2024\/05\/image-3-1024x328.png"},{"@type":"BreadcrumbList","@id":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/trust-center\/sichere-entwicklung\/bereitstellungsprozess#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/trustcenter.solutions2share.com\/de"},{"@type":"ListItem","position":2,"name":"Trust Center","item":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/trust-center"},{"@type":"ListItem","position":3,"name":"Sichere Entwicklung","item":"https:\/\/trustcenter.solutions2share.com\/de\/dokumentation\/trust-center\/sichere-entwicklung"},{"@type":"ListItem","position":4,"name":"Bereitstellungsprozess"}]},{"@type":"WebSite","@id":"https:\/\/trustcenter.solutions2share.com\/de#website","url":"https:\/\/trustcenter.solutions2share.com\/de","name":"Trust Center by Solutions2Share","description":"","publisher":{"@id":"https:\/\/trustcenter.solutions2share.com\/de#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/trustcenter.solutions2share.com\/de?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/trustcenter.solutions2share.com\/de#organization","name":"Trust Center by Solutions2Share","url":"https:\/\/trustcenter.solutions2share.com\/de","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/trustcenter.solutions2share.com\/de#\/schema\/logo\/image\/","url":"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2022\/12\/cropped-solutions2share-favicon.png","contentUrl":"https:\/\/trustcenter.solutions2share.com\/wp-content\/uploads\/2022\/12\/cropped-solutions2share-favicon.png","width":512,"height":512,"caption":"Trust Center by Solutions2Share"},"image":{"@id":"https:\/\/trustcenter.solutions2share.com\/de#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/solutions2share","https:\/\/www.linkedin.com\/company\/solutions2share\/","https:\/\/www.youtube.com\/user\/Solutions2Share"]}]}},"_links":{"self":[{"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/manual_documentation\/3487","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/manual_documentation"}],"about":[{"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/types\/manual_documentation"}],"author":[{"embeddable":true,"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/users\/1"}],"version-history":[{"count":2,"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/manual_documentation\/3487\/revisions"}],"predecessor-version":[{"id":3905,"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/manual_documentation\/3487\/revisions\/3905"}],"up":[{"embeddable":true,"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/manual_documentation\/3469"}],"wp:attachment":[{"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/media?parent=3487"}],"wp:term":[{"taxonomy":"manualdocumentationcategory","embeddable":true,"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/manualdocumentationcategory?post=3487"},{"taxonomy":"manual_doc_tag","embeddable":true,"href":"https:\/\/trustcenter.solutions2share.com\/de\/wp-json\/wp\/v2\/manual_doc_tag?post=3487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}