Apple 10.5 Leapard Model Vehicle User Manual


 
34 Chapter 2 Getting Started with User Management
 For information about how to work with Mac OS X group accounts and group
folders, see Chapter 5, “Setting Up Group Accounts.”
 For information about how to add a group folder to the dock to make it more
accessible to users, see Chapter 10, “Managing Preferences.”
 For information about setting up ACLs, see File Services Administration.
Step 9: Define group account preferences
You can manage preferences for a group account. A group account with managed
preferences is called a workgroup. For information about Mac OS X workgroups, see
Chapter 9, “Client Management Overview,” and Chapter 10, “Managing Preferences.”
Step 10: Define computer accounts, computer groups, and preferences
Use computer accounts or computer groups to manage Macintosh client computers.
 For information about creating Mac OS X computer accounts or computer groups,
see Chapter 6, “Setting Up Computers and Computer Groups.”
 For information about computer group preferences, see Chapter 9, “Client
Management Overview,” and Chapter 10, “Managing Preferences.”
Step 11: Perform ongoing account maintenance
As users come and go, and the requirements for your servers change, you must update
account information:
 For information about how to use Workgroup Manager to display accounts,
see Chapter 3, “Getting Started with Workgroup Manager.”
 For information about how to perform common tasks such as creating accounts,
disabling accounts, adding and removing users from groups, and deleting accounts,
see Chapter 4 through Chapter 6.
 For solutions to common problems, see Chapter 11, “Solving Problems.”
Planning Strategies for User Management
The following are planning activities to undertake before you implement user
management.
Analyzing Your Environment
Your environment defines your user management settings, including:
 Size and distribution of your network
 Number of users who access your network
 Type of computers used (Mac OS X or Windows)
 How client computers are used
 Which computers are mobile
 Which users should have administrator privileges
 Which users should have access to particular computers