Forums for the Business Analyst

 
  Modern Analyst Forums  Business and Sy...  Structured Anal...  Technical Use Case - any other alternatives
Previous Previous
 
Next Next
New Post 7/13/2015 12:14 PM
Unresolved
User is offline cisco.leon
3 posts
No Ranking


Technical Use Case - any other alternatives 

A team member is being ask to produce Technical Use cases on a project. It seems to relate to creating test cases to describe the functions and exception handling of a particular API. An API that resolves user permissions for a given system.

 

Use Case just doesn't feel right here but I'm at a loss as to what exactly to prescribe. Activity Diagram or  Sequence perhaps. Its just very strange to see in a UseCase the step where "Developer check if Method X is present.".


UC Name

Developer API and Policy Logic

Actors:

Developer, Developer Components, Security Service

Description:

The purpose of this use case is to document how Developer API and Policy Logic works confirming permissions for a user.

Pre-Conditions:

1. The Authorization Service is running successfully

2. The Security Service is running successfully

3. User connected to the network to access the DB in the respective environment (INT, QA, PROD)

Post-Conditions:

1. Return True or False for permissions aligned to a particular user

Triggers:

Developer confirms permissions for a particular user by using “HasPermissions” method.

Assumption

Existing application data is correct

Risk

Existing application data is incorrect

Rules

Developer has access to the network to access environment specific DB.

Main Flow (MF01):

Return Scope Tree Nodes (GetScopeTree)

Step

User Action

System Action

  1. 1

Developer confirms user permission by using the method:

“HasPermissions(userId, permissionsId, scopetreenodeId)”

System configures IAuthZManagerFactory

N/A

System creates IAuthZManager to request user permissions

N/A

System request IAuthRepository to provide user permissions

N/A

IAuthRepository checks the service client memory cache for the user.

If user exists in cache, steps 5 or otherwise 8.

N/A

Systems pulls user application permissions and scope tree nodes from cache.

N/A

System resets cache timer

N/A

System returns True or False for user – HasPermissions method.

Note: Please refer Policy Logic Diagram for Permissions.

N/A

IAuthRepository invokes GetUserPermissions service – Please follow steps in “Permissions and Scope Tree Services – Return Scoped User Application Permissions” use case.

N/A

IAuthRepository invokes GetScopeTree service - Please follow steps in “Permissions and Scope Tree Services – Return Scope Tree Nodes” use case.

N/A

IAuthRepository invokes GetDefault service – Steps will be included in the Permissions and Scope Tree Services use case.

N/A

System will store Scoped User Permissions, Scope Tree Nodes, and Default Scope Tree information for the user in the service client memory cache.

N/A

System returns True or False for user – HasPermissions method.

Note: Please refer Policy Logic Diagram for Permissions.


 
Previous Previous
 
Next Next
  Modern Analyst Forums  Business and Sy...  Structured Anal...  Technical Use Case - any other alternatives

Community Blog - Latest Posts

Business Impact Analysis(BIA): Assessing the Potential Impact of a Cybersecurity Incident on Business Operations
In today’s highly interconnected society, businesses depend on technology even more than before. While offering opportunities for innovation and creativity, businesses are exposed to various cybersecurity threats that can disrupt operations, damage reputation, and result in substantial financial losses. It is crucial to carry out a comprehens...
In today's ever-evolving market, businesses must adapt swiftly to remain competitive and meet the needs of a fast-paced digital economy. Among the various business strategies available, digital transformation, customer-centricity, and sustainability have emerged as top priorities. Let’s explore why these strategies are critical for busine...
The Cisco Certified Network Associate (CCNA) certification is a pivotal credential for networking professionals, validating your skills in networking fundamentals, security, automation, and programmability. Preparing for the CCNA exam can be challenging, but with the right strategy, resources, and mindset, you can successfully achieve this certific...

 



Upcoming Live Webinars




 

Copyright 2006-2024 by Modern Analyst Media LLC