In the specific implementation, different permissions should be set for the administrator and ordinary users. The administrator should be able to use all the modules of the system, and ordinary users are not authorized to use most of the most critical modules.