Each user can only be assigned one role. Users with different roles have different permissions. When a user attempts an operation, the system will check its permissions by its role to determine the operation access. If lacking required permissions, the user will only have basic read permissions.