As a system administrator, you can provide permissions to users for accessing CNFs in a specific cluster and restrict access to any other clusters.
Users are assigned roles and each role has specific permissions. With role-based access control, you can restrict access to authorized users that have the required permissions to perform operations on the CNF.
For example, a user having the Network Function Deployer role can view all CNFs but can perform life cycle management operations only on permitted CNFs.