Configuring the security schema
After you create and deploy an i2 Analyze security schema file, there are restrictions on the changes that you can make to it. The actions that you perform to update a deployed security schema file depend on the changes that you make.
If you want to modify a security schema, you are relatively free to:
Change any display names
Add security dimension values to existing security dimensions
Remove dimension values from existing dimensions
Create security groups and permissions
For more information about performing these types of change, see Modifying security dimensions and Modifying security permissions.
If you want to replace the security schema, make other destructive changes, or add security dimensions, you must remove and re-create the underlying database in the system. For more information about performing these types of change, see Replacing a security schema.