This PR resolve issue with inconsistency state if the provisioner uses the admin role privileges wrong by adding a check if we can use scope on the current type, target combination.
```
> TF_ACC=1 go test -v -timeout 120m github.com/appgate/terraform-provider-appgatesdp/appgate -run '^(TestAccadministrativeRol.+)$'
=== RUN TestAccadministrativeRoleBasic
=== PAUSE TestAccadministrativeRoleBasic
=== RUN TestAccadministrativeRoleWithScope
=== PAUSE TestAccadministrativeRoleWithScope
=== RUN TestAccadministrativeRoleWtihAssignFunction
=== PAUSE TestAccadministrativeRoleWtihAssignFunction
=== CONT TestAccadministrativeRoleBasic
=== CONT TestAccadministrativeRoleWtihAssignFunction
=== CONT TestAccadministrativeRoleWithScope
--- PASS: TestAccadministrativeRoleBasic (3.33s)
--- PASS: TestAccadministrativeRoleWithScope (6.48s)
--- PASS: TestAccadministrativeRoleWtihAssignFunction (7.01s)
PASS
ok github.com/appgate/terraform-provider-appgatesdp/appgate (cached)
```
This PR resolve issue with inconsistency state if the provisioner uses the admin role privileges wrong by adding a check if we can use scope on the current type, target combination.