Configuring role-based access to clusters
Creating and deleting clusters, and adding capabilities to existing clusters