Configuring the security schema

After you create and deploy an i2 Analyze security schema file, there are restrictions on the changes that you can make to it. The actions that you perform to update a deployed security schema file depend on the changes that you make.

If you want to modify a security schema, you are relatively free to:

  • Change any display names

  • Add security dimension values to existing security dimensions

  • Remove dimension values from existing dimensions

  • Create security groups and permissions

For more information about performing these types of change, see Modifying security dimensions and Modifying security permissions.

If you want to replace the security schema, make other destructive changes, or add security dimensions, you must remove and re-create the underlying database in the system. For more information about performing these types of change, see Replacing a security schema.