Data Plane RBACs
You can use Role-Based Access Control (RBAC) to secure access to Kubernetes resources based on user roles. When you register a data plane, by default it creates ClusterRole, ClusterRoleBinding, Role, and RoleBinding.
By default, the service account has cluster-scope permissions. If you do not want to give cluster-scope permissions to a service account, you can disable cluster-scope permissions when registering a data plane from the TIBCO Control Plane UI. If you disable cluster-scoped permissions, cluster-scoped role-bindings are not created. It creates namespace-scoped roles and RoleBindings in the namespace where the dp-configure-namespace
chart is deployed.