Which two of the following object-level security configurations are NOT done in the BI Administration Tool?