The document discusses the architecture and security of the Necto software. It describes the client-server architecture with the Necto server connecting an analysis server to customer data warehouses. It also covers role-based security for restricting access to data and content, with roles determining which data dimensions and members users can access. Users are imported from Active Directory domains and assigned roles to control their permissions.
Related topics: