Updating the security schema
In the schema development environment, you can quickly make and deploy changes to the i2 Analyze security schema. Use this environment to develop the security schema for your production deployment.
About this task
Procedure
After you modify your security
schema, update the deployment with your
changes.
What to do next
This is not the final time that you can modify the security schema, but you should aim to have most of the security dimensions and dimension values defined.
After you finish developing your schema files, you can move to the next environment. For more information, see Configuration development environment.