Figure 12-5. Configuring object class security or object instance security from an object instance.