This article explains how to make targets available to some of your cloned security roles.
ITMS 8.x
We have the following article in our online documentation:
Creating or Modifying a Resource Target
Here is a short description explaining how to make targets available for cloned security roles:
Note: The name of targets and roles are fictional and are used as example only.