Configuring user security In a deployment of i2 Analyze, you can configure how users are authenticated and authorized with the system. Configuring the Liberty user registryThe access levels that each user receives within i2 Analyze are determined by their membership of groups. The names of these groups must match the group permissions elements values that are defined in your security schema.Configuring a privacy promptClients that connect to i2 Analyze can display a prompt to users that they must accept before they can connect to the server. If the user rejects the prompt, they cannot connect to i2 Analyze.Configuring SPNEGO single sign-on for i2 AnalyzeThe following section describes how to configure i2 Analyze with Simple and Protected GSS-API Negotiation Mechanism (SPNEGO) single sign-on. The instructions detail how to configure SPNEGO single sign-on with an existing deployment of i2 Analyze.Configuring X.509 client certificate authentication with i2 AnalyzeYou can enable your deployment to use X.509 client certificate authentication. After successful configuration, users can log in to i2 Analyze with client certificates instead of user names and passwords.Parent topic: Configuring the i2 Analyze application