User roles

You can use the built-in roles or create your own roles that you can assign to users to customize authorization. For example, you can customize access to the cluster management console to meet the security requirements of any site.