Access Keys:
Skip to content (Access Key - 0)

How protect a server with Touchstone?

Answer

Setting up a system to use Touchstone is well-documented and straightforward for common web server platforms (Apache, IIS); it's doable if you're using nginx but is more complex. Instructions are available here:

https://wikis.mit.edu/confluence/display/TOUCHSTONE/Provisioning+Steps

IS&T Contributions

Documentation and information provided by IS&T staff members


Last Modified:

January 04, 2016

Get Help

Request help
from the Help Desk
Report a security incident
to the Security Team
Labels:
c-touchstone c-touchstone Delete
protect protect Delete
server server Delete
touchstone touchstone Delete
authentication authentication Delete
login login Delete
require require Delete
add add Delete
certificates certificates Delete
Enter labels to add to this page:
Please wait 
Looking for a label? Just start typing.
Feedback
This product/service is:
Easy to use
Average
Difficult to use

This article is:
Helpful
Inaccurate
Obsolete
Adaptavist Theme Builder (4.2.3) Powered by Atlassian Confluence 3.5.13, the Enterprise Wiki