• Creating a Table Hierarchy
  • Defining Table Security
  • Enabling Row-Level Permissions
  • Identifying Main User Tables