Creating a Table Hierarchy
Defining Table Security
Enabling Row-Level Permissions
Identifying Main User Tables