Forums for the Business Analyst

 
  Modern Analyst Forums  Business and Sy...  Structured Anal...  Technical Use Case - any other alternatives
Previous Previous
 
Next Next
New Post 7/13/2015 11:14 AM
Unresolved
User is offline cisco.leon
3 posts
No Ranking


Technical Use Case - any other alternatives 

A team member is being ask to produce Technical Use cases on a project. It seems to relate to creating test cases to describe the functions and exception handling of a particular API. An API that resolves user permissions for a given system.

 

Use Case just doesn't feel right here but I'm at a loss as to what exactly to prescribe. Activity Diagram or  Sequence perhaps. Its just very strange to see in a UseCase the step where "Developer check if Method X is present.".


UC Name

Developer API and Policy Logic

Actors:

Developer, Developer Components, Security Service

Description:

The purpose of this use case is to document how Developer API and Policy Logic works confirming permissions for a user.

Pre-Conditions:

1. The Authorization Service is running successfully

2. The Security Service is running successfully

3. User connected to the network to access the DB in the respective environment (INT, QA, PROD)

Post-Conditions:

1. Return True or False for permissions aligned to a particular user

Triggers:

Developer confirms permissions for a particular user by using “HasPermissions” method.

Assumption

Existing application data is correct

Risk

Existing application data is incorrect

Rules

Developer has access to the network to access environment specific DB.

Main Flow (MF01):

Return Scope Tree Nodes (GetScopeTree)

Step

User Action

System Action

  1. 1

Developer confirms user permission by using the method:

“HasPermissions(userId, permissionsId, scopetreenodeId)”

System configures IAuthZManagerFactory

N/A

System creates IAuthZManager to request user permissions

N/A

System request IAuthRepository to provide user permissions

N/A

IAuthRepository checks the service client memory cache for the user.

If user exists in cache, steps 5 or otherwise 8.

N/A

Systems pulls user application permissions and scope tree nodes from cache.

N/A

System resets cache timer

N/A

System returns True or False for user – HasPermissions method.

Note: Please refer Policy Logic Diagram for Permissions.

N/A

IAuthRepository invokes GetUserPermissions service – Please follow steps in “Permissions and Scope Tree Services – Return Scoped User Application Permissions” use case.

N/A

IAuthRepository invokes GetScopeTree service - Please follow steps in “Permissions and Scope Tree Services – Return Scope Tree Nodes” use case.

N/A

IAuthRepository invokes GetDefault service – Steps will be included in the Permissions and Scope Tree Services use case.

N/A

System will store Scoped User Permissions, Scope Tree Nodes, and Default Scope Tree information for the user in the service client memory cache.

N/A

System returns True or False for user – HasPermissions method.

Note: Please refer Policy Logic Diagram for Permissions.


 
Previous Previous
 
Next Next
  Modern Analyst Forums  Business and Sy...  Structured Anal...  Technical Use Case - any other alternatives

Community Blog - Latest Posts

The CEO/CIO's Guide to Architecting AI: Vision to Value in Minutes Introduction to Architected AI Artificial intelligence (AI) is becoming part of our life at an unprecedented pace. As CEOs and CIOs grapple with how to leverage this powerful technology to drive strategy and enhance operations, the concept of Architected AI becomes importa...
In today's dynamic business environment, mastering effective business analysis techniques is crucial for organizations aiming to achieve sustainable growth and competitive advantage. Business analysis involves the systematic evaluation of business processes, requirements, and strategies to uncover insights that drive informed decision-making. T...
For many years now, a lot of people have found it difficult to identify the difference between Sankey diagrams and parallel sets. The two have made headlines, given that most people find it challenging to note what makes them different from each other. What remains to be undeniable is the fact that the Sankey diagram is among the top data visualiza...

 






 

Copyright 2006-2024 by Modern Analyst Media LLC