Often, network resources are accessible by users that belong to multiple groups. Different groups may simply represent different business functions, or they may have different security rights (read, write, list, create, delete, etc.).
- The group's owner(s), who would have to authorize the user's request for membership in that group.
- The group's security rights with respect to the selected resource.
- Whether the group contains members of other groups (i.e., nested groups).
The user uses this information to select an appropriate group to join.