A. Assign relevant security groups to Work Centers.
B. Configure portlets within the Work Centers.
C. Define data restrictions for each Work Center.
D. Link Work Centers to specific database instances.
E. Customize Work Center layouts per user group.