3. The user choosen during the installation is automatically created in Glitch-Soc with admin rights
4. At the end of the installation a mail is sent to the user with the automatically generated password
5. It seems important to close the inscriptions for your Glitch-Soc, so that it remains a private body. We invite you to block remote malicious instances from the administration interface. You can also add text on your home page.