Operating Environment Software Owner manual

5 Storage service provisioning......................................................................31
Provisioning a storage service..................................................................................................32
Manually assigning a volume to a storage service.......................................................................33
Viewing a storage service........................................................................................................34
Editing the configuration of a storage service.............................................................................34
Editing basic properties (metadata) of a storage service...............................................................34
Deactivating a storage service..................................................................................................34
Deleting a storage service........................................................................................................35
6 Managing storage catalog entities..............................................................36
Managing arrays....................................................................................................................36
Viewing and modifying array properties (Overview tab) .........................................................36
Viewing array storage pools (Storage Pools tab).....................................................................36
Viewing array volumes (Volumes tab)....................................................................................36
Viewing array ports (Ports tab).............................................................................................37
Viewing array targets (Targets tab).......................................................................................37
Viewing array host entries (Hosts tab)...................................................................................37
Viewing and modifying array capabilities settings (Capabilities tab).........................................37
Viewing and modifying array security settings (Security tab)....................................................38
Removing an array.............................................................................................................38
Managing storage pools.........................................................................................................39
Viewing and modifying storage pool properties (Overview tab)...............................................39
Viewing storage pool volumes (Volumes tab).........................................................................39
Viewing and modifying storage pool security settings (Security tab)..........................................39
Removing a storage pool....................................................................................................40
Managing volumes.................................................................................................................40
Viewing and modifying volumes settings (Overview tab) ........................................................40
Viewing volumes presentations (Presentations tab)..................................................................40
Viewing and modifying volumes security settings (Security tab) ................................................41
Removing a volume............................................................................................................41
Managing networks................................................................................................................41
Viewing and modifying network settings (Overview tab) .........................................................42
Viewing connected arrays (Connected Arrays tab)..................................................................42
Viewing and modifying network capability settings (Capabilities tab).......................................43
Viewing and modifying network security settings (Security tab).................................................43
Removing a network...........................................................................................................44
Managing security..................................................................................................................44
Create security roles...........................................................................................................44
Grant privileges.................................................................................................................45
Create security groups........................................................................................................45
Grant permissions..............................................................................................................46
Managing roles.................................................................................................................46
Viewing and modifying role settings (Overview tab)...........................................................47
Viewing and modifying role privileges (Privileges tab)........................................................47
Viewing and modifying role users and groups (Users and Groups tab).................................47
Viewing and modifying role security settings (Security tab)..................................................48
Deleting a role..............................................................................................................48
Managing security groups...................................................................................................48
Viewing and modifying security group settings (Overview tab)............................................48
Viewing and modifying security group access control settings (Access Control tab).................49
Viewing security group objects (Objects tab).....................................................................49
Viewing security group effective permissions settings (Effective Permissions tab)......................49
Deleting a security group...............................................................................................50
Resynchronizing resources........................................................................................................50
Quarantining resources...........................................................................................................51
4 Contents