Skip to content
Snippets Groups Projects
Commit 2aa138d8 authored by SAM CARPENTER's avatar SAM CARPENTER
Browse files

possibly works possibly does not work

parent 3ebffcca
No related branches found
No related tags found
1 merge request!44Supplements Training Documentation with Additional Information
......@@ -5,7 +5,7 @@ To set up a secure agent on Linux, running in a Docker container, you will need
- Access to a workstation with an Intel-based processor. This is needed to run the Secure Agent. This could be a work computer, or, in the case of someone using a Macbook with an M1 processor, this could be an Amazon WorkSpaces desktop.
- Git. This is needed to pull the necessary Secure Agent files. [Official instructions on installation can be found here](https://git-scm.com/book/en/v2/Getting-Started-Installing-Git).
- Docker. This is used to set up the container in which the Secure Agent will run.
- [Docker Compose](https://docs.docker.com/compose/). This is an additional command used to build the image which the Secure Agent runs. [Instructions to install this and Docker on an AWS Workspace can be found here](https://www.cyberciti.biz/faq/how-to-install-docker-on-amazon-linux-2/).
- [Docker Compose](https://docs.docker.com/compose/). This is an additional command used to build the image which the Secure Agent runs. Instructions to install this and Docker on an AWS Workspace can be found here http://www.cyberciti.biz/faq/how-to-install-docker-on-amazon-linux-2/
- Your own IICS trial account. If you are already using the shared test or prod organizations, this tutorial is unnecessary. Use ei.secureagent.doit.wisc.edu instead. If you are using a different organization with a pre-existing Secure Agent, follow the instructions given to you when your access was provisioned.
# Setup
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment