This section includes various exercises on RBAC-related resources used to configure the authorizations in a cluster.