34
ÂFor information about how to work with Mac OS X group accounts and group folders, see Chapter 5, “Setting Up Group Accounts.”
ÂFor information about how to add a group folder to the dock to make it more accessible to users, see Chapter 10, “Managing Preferences.”
ÂFor information about setting up ACLs, see File Services Administration.
Step 9: Define group account preferences
You can manage preferences for a group account. A group account with managed preferences is called a workgroup. For information about Mac OS X workgroups, see Chapter 9, “Client Management Overview,” and Chapter 10, “Managing Preferences.”
Step 10: Define computer accounts, computer groups, and preferences
Use computer accounts or computer groups to manage Macintosh client computers.
ÂFor information about creating Mac OS X computer accounts or computer groups, see Chapter 6, “Setting Up Computers and Computer Groups.”
ÂFor information about computer group preferences, see Chapter 9, “Client Management Overview,” and Chapter 10, “Managing Preferences.”
Step 11: Perform ongoing account maintenance
As users come and go, and the requirements for your servers change, you must update account information:
ÂFor information about how to use Workgroup Manager to display accounts, see Chapter 3, “Getting Started with Workgroup Manager.”
ÂFor information about how to perform common tasks such as creating accounts, disabling accounts, adding and removing users from groups, and deleting accounts, see Chapter 4 through Chapter 6.
ÂFor solutions to common problems, see Chapter 11, “Solving Problems.”
Planning Strategies for User Management
The following are planning activities to undertake before you implement user management.
Analyzing Your Environment
Your environment defines your user management settings, including:
ÂSize and distribution of your network
ÂNumber of users who access your network
ÂType of computers used (Mac OS X or Windows)
ÂHow client computers are used
ÂWhich computers are mobile
ÂWhich users should have administrator privileges
ÂWhich users should have access to particular computers
Chapter 2 Getting Started with User Management