Post-installation configuration

Previous Topic

Next Topic

Book Contents

Post-installation configuration

In this section

Restrict access to CRF Submit server machines

Configure strong user passwords

Configure roles and rights

Download PDF and CSV output onto a secure machine

Send Feedback