Security and users The documentation in this section describes how security and users are configured for a deployment of i2 Analyze in a containerized environment.