Secure Configuration Guide Secure installation and configuration Post-installation configuration Post-installation configuration In this section Restrict access to Oracle InForm CRF Submit server machines Configure strong user passwords Configure roles and rights Download PDF and CSV output onto a secure machine Parent topic: Secure installation and configuration