HP Storage Provisioning Manager (SPM) Version 2.0 User Guide

Table Of Contents
5 Storage service provisioning......................................................................28
Provisioning a storage service..................................................................................................29
Manually assigning a volume to a storage service.......................................................................30
Viewing a storage service........................................................................................................30
Editing the configuration of a storage service.............................................................................31
Editing basic properties (metadata) of a storage service...............................................................31
Deactivating a storage service..................................................................................................31
Deleting a storage service........................................................................................................31
6 Managing storage catalog entities..............................................................33
Managing arrays....................................................................................................................33
Viewing and modifying array properties (Overview tab) .........................................................33
Viewing array storage pools (Storage Pools tab).....................................................................33
Viewing array volumes (Volumes tab)....................................................................................33
Viewing array ports (Ports tab).............................................................................................34
Viewing array host entries (Hosts tab)...................................................................................34
Viewing and modifying array capabilities settings (Capabilities tab).........................................34
Viewing and modifying array security settings (Security tab)....................................................34
Removing an array.............................................................................................................35
Managing storage pools.........................................................................................................35
Viewing and modifying storage pool properties (Overview tab)...............................................35
Viewing storage pool volumes (Volumes tab).........................................................................36
Viewing and modifying storage pool security settings (Security tab)..........................................36
Removing a storage pool....................................................................................................36
Managing volumes.................................................................................................................37
Viewing and modifying volumes settings (Overview tab) ........................................................37
Viewing volumes presentations (Presentations tab)..................................................................37
Viewing and modifying volumes security settings (Security tab) ................................................37
Removing a volume............................................................................................................38
Managing networks................................................................................................................38
Viewing and modifying network settings (Overview tab) .........................................................38
Viewing network endpoints (Endpoints tab)...........................................................................39
Viewing network zones (Zones tab)......................................................................................39
Viewing and modifying network capability settings (Capabilities tab).......................................40
Viewing and modifying network security settings (Security tab).................................................40
Removing a network...........................................................................................................41
Managing security..................................................................................................................41
Create security roles...........................................................................................................41
Grant privileges.................................................................................................................42
Create security groups........................................................................................................42
Grant permissions..............................................................................................................43
Managing roles.................................................................................................................43
Viewing and modifying role settings (Overview tab)...........................................................44
Viewing and modifying role privileges (Privileges tab)........................................................44
Viewing and modifying role users and groups (Users and Groups tab).................................44
Viewing and modifying role security settings (Security tab)..................................................45
Deleting a role..............................................................................................................45
Managing security groups...................................................................................................45
Viewing and modifying security group settings (Overview tab)............................................45
Viewing and modifying security group access control settings (Access Control tab).................46
Viewing security group objects (Objects tab).....................................................................46
Viewing security group effective permissions settings (Effective Permissions tab)......................46
Deleting a security group...............................................................................................47
Resynchronizing resources........................................................................................................47
Quarantining resources...........................................................................................................47
4 Contents