Identity allows you to determine authorization based on a controller, or a specific action in the controller.
[Authorize]
public void controllermethod(param) {}
authorize will require authentication before this action or controller can be visited.
So, if you wanted to create an action that only the admin could perform (or any user role group you have created), above the controller method you would put
[Authorize(Roles="admin")]
public void controllerMethod(param) {}
Roles can accept a list of strings, like (Roles="Admin","Manager"), so you can put multiple roles in a single authorization claim.
You can also do this on the controller level, forcing every action in the controller to adhere to your authorization claims. Basically if you put it above the controller declaration every action will be affected, but you can whitelist a particular action with
[AllowAnonymous]
public void nosecuritycontrolleraction {}
I hope this is what you are looking for, and you can find better guides here:
http://www.asp.net/identity
UPDATE 1
For the DeleteCustomer example, I'm assuming you have some methods in a controller that handles the deletion of a customer object. Above those methods, put [Authorize(Roles="CustomerAdmin")] and then only the users with the customerAdmin role in UserRoles can use that action.
like:
[Authorize(Roles="CustomerAdmin")]
public ActionResult DeleteCustomer(string/int id){}