{"p":"can-20","op":"mint","tick":"can","amt":"1000","rows":[{"df":"qa","content":[{"q":"How does the BRC-100 protocol manage privileged role permissions?","a":"Assign permissions: According to the responsibilities of the privileged roles, assign corresponding permissions to each role. For example, system administrators have the highest permissions such as creating, deleting users, and configuring system parameters; database administrators have permissions to manage databases, tables, and views; ordinary users have basic permissions such as querying data.↵↵3..."}]}],"pr":"caa7def2a5e9f190578ff36119e3b99b377d2520f436037d06e7503d10f6dc2b"}