Forums for the Business Analyst

 
  Modern Analyst Forums  Business and Sy...  Structured Anal...  Technical Use Case - any other alternatives
Previous Previous
 
Next Next
New Post 7/13/2015 12:14 PM
Unresolved
User is offline cisco.leon
3 posts
No Ranking


Technical Use Case - any other alternatives 

A team member is being ask to produce Technical Use cases on a project. It seems to relate to creating test cases to describe the functions and exception handling of a particular API. An API that resolves user permissions for a given system.

 

Use Case just doesn't feel right here but I'm at a loss as to what exactly to prescribe. Activity Diagram or  Sequence perhaps. Its just very strange to see in a UseCase the step where "Developer check if Method X is present.".


UC Name

Developer API and Policy Logic

Actors:

Developer, Developer Components, Security Service

Description:

The purpose of this use case is to document how Developer API and Policy Logic works confirming permissions for a user.

Pre-Conditions:

1. The Authorization Service is running successfully

2. The Security Service is running successfully

3. User connected to the network to access the DB in the respective environment (INT, QA, PROD)

Post-Conditions:

1. Return True or False for permissions aligned to a particular user

Triggers:

Developer confirms permissions for a particular user by using “HasPermissions” method.

Assumption

Existing application data is correct

Risk

Existing application data is incorrect

Rules

Developer has access to the network to access environment specific DB.

Main Flow (MF01):

Return Scope Tree Nodes (GetScopeTree)

Step

User Action

System Action

  1. 1

Developer confirms user permission by using the method:

“HasPermissions(userId, permissionsId, scopetreenodeId)”

System configures IAuthZManagerFactory

N/A

System creates IAuthZManager to request user permissions

N/A

System request IAuthRepository to provide user permissions

N/A

IAuthRepository checks the service client memory cache for the user.

If user exists in cache, steps 5 or otherwise 8.

N/A

Systems pulls user application permissions and scope tree nodes from cache.

N/A

System resets cache timer

N/A

System returns True or False for user – HasPermissions method.

Note: Please refer Policy Logic Diagram for Permissions.

N/A

IAuthRepository invokes GetUserPermissions service – Please follow steps in “Permissions and Scope Tree Services – Return Scoped User Application Permissions” use case.

N/A

IAuthRepository invokes GetScopeTree service - Please follow steps in “Permissions and Scope Tree Services – Return Scope Tree Nodes” use case.

N/A

IAuthRepository invokes GetDefault service – Steps will be included in the Permissions and Scope Tree Services use case.

N/A

System will store Scoped User Permissions, Scope Tree Nodes, and Default Scope Tree information for the user in the service client memory cache.

N/A

System returns True or False for user – HasPermissions method.

Note: Please refer Policy Logic Diagram for Permissions.


 
Previous Previous
 
Next Next
  Modern Analyst Forums  Business and Sy...  Structured Anal...  Technical Use Case - any other alternatives

Community Blog - Latest Posts

Leveraging Blockchain Technology for Enhanced Data Security in Business Operations
In an age where data breaches and cyberattacks are becoming more frequent and sophisticated, businesses are searching for robust solutions to safeguard their data. Blockchain technology has emerged as a promising tool in this quest, offering a way to secure data with unparalleled reliability. Although initially known for powering cryptocurrencies l...
Building software products that solve actual customer concerns and generate business success is not an easy fit. Product executives battle strong competition, tight timelines, and high expectations, all while seeking to offer value. While success gives the opportunity to showcase approaches and frameworks, the reality is that building excellent pro...
Business Impact Analysis(BIA): Assessing the Potential Impact of a Cybersecurity Incident on Business Operations
In today’s highly interconnected society, businesses depend on technology even more than before. While offering opportunities for innovation and creativity, businesses are exposed to various cybersecurity threats that can disrupt operations, damage reputation, and result in substantial financial losses. It is crucial to carry out a comprehens...

 



Upcoming Live Webinars




 

Copyright 2006-2025 by Modern Analyst Media LLC