Configuring user security

In a deployment of i2 Analyze, you can configure how users are authenticated and authorized with the system.