2.5 Use Cases

The following table lists the use cases that span the functionality of the Storage Services protocols. The use cases are grouped into four groups as shown in the first column of the following table.

Use case group

Use cases

Manage Disks and Volumes

Create and Modify a Volume (section 2.5.1.1)

Convert a Basic Disk to a Dynamic Disk (section 2.5.1.2)

Make an Offline Disk Online (section 2.5.1.3)

Configure HBA Port and iSCSI Initiators (section 2.5.1.4)

Backup and Restore Data

Create a Shadow Copy Storage Association (section 2.5.2.1)

Back Up or Restore an Encrypted File (section 2.5.2.2)

Perform a Backup of a File Share Remotely (section 2.5.2.3)

Manage Removable Storage

Create and Delete a Media Pool (section 2.5.3.1)

Mount and Dismount Media (section 2.5.3.2)

Delete Work Queue Items (section 2.5.3.3)

Encrypted File Access Control and Encryption

Provide Cryptographic Access Permissions to an Encrypted File (section 2.5.4.1)

Encrypt a File (section 2.5.4.2)

Decrypt an Encrypted File (section 2.5.4.3)

The following sections provide detailed descriptions for each of the use cases in each group.