If you use a comprehensive centralized security deployment, in which users are authorized externally, you do not need to configure roles.
Resource privileges vary based on the scope of access required for users to do their jobs. The best practice for administrators is to follow the principle of least privilege. Assign to users the lowest level of privilege needed to do their work.