Let's implement role-based access control.