Attention: The role-based security commands are discontinued. Use the user management commands to configure remote authentication service and manage users and user groups on the cluster.