User security
In a deployment of i2 Analyze, configuring how users are authenticated and authorized with the system is key to establishing a secure environment. i2 Analyze supports a range of authentication mechanisms, and can be integrated with external identity providers.
Through the processes of authentication and provisioning, i2 Analyze determines whether a user can access the system at all, and associates them with a unique identifier, a user name, and a display name. Users become members of groups, which also have identifiers and display names.
When a user is authenticated, i2 Analyze uses the security schema to authorize their access to data, and command access control to authorize their use of application features.