Create access groups
Typically various sets of users tend to use the same applications that use common features from a given host. They typically require the same volume resources and permissions of access to these shared volumes. For this reason, hosts are registered in groups that are identified with a group name, which serves as a root for all access control entries (ACEs) in the group.
Prerequisites
See Roles and associated permissions to determine the user roles that can perform this task.
About this task
Access groups contain groups of access IDs and their ID names. Any ID and name must belong to just one group and are entered into the database together. For ease of management, it is highly recommended that you choose an access ID name that best associates with the particular host in use. For example, SunHost1 is more appropriate than a name such as JRSMITH.
After the group has been created, the group name can be used to create access control entries (ACEs).
To create an access control group:
.