This section describes how to manage user accounts and roles. Different levels of user accounts vary in operation permissions, thereby ensuring system stability and data security.