Configuring the security schema
After you deploy an i2 Analyze security schema, there are restrictions on the changes that you can make to the security schema. The actions that you perform to update a deployed security schema depend on the changes that you make.
You are relatively free to create security groups and permissions, add security dimension values to existing security dimensions, and change any display names. For more information about performing these types of change, see Modifying security permissions and Modifying security dimensions.If you want to replace the security schema, make destructive changes, and add security dimensions, you must remove and re-create the underlying database in the system. For more information about performing these types of change, see Replacing a security schema.