Enabled Table Configuration Actions

The following table lists the actions that allow a user to work with a configuration in an ad-hoc manner. For example, these actions allow the user to perform ad-hoc searches and sorting. These actions are always available, regardless of the security setting for the class on which the configuration is located.