Create access levens and roles, to decide who can access which data. Create different permissions to access isolated IoT environments