Forums for the Business Analyst

 
  Modern Analyst Forums  Business and Sy...  Structured Anal...  Technical Use Case - any other alternatives
Previous Previous
 
Next Next
New Post 7/13/2015 10:14 AM
Unresolved
User is offline cisco.leon
3 posts
No Ranking


Technical Use Case - any other alternatives 

A team member is being ask to produce Technical Use cases on a project. It seems to relate to creating test cases to describe the functions and exception handling of a particular API. An API that resolves user permissions for a given system.

 

Use Case just doesn't feel right here but I'm at a loss as to what exactly to prescribe. Activity Diagram or  Sequence perhaps. Its just very strange to see in a UseCase the step where "Developer check if Method X is present.".


UC Name

Developer API and Policy Logic

Actors:

Developer, Developer Components, Security Service

Description:

The purpose of this use case is to document how Developer API and Policy Logic works confirming permissions for a user.

Pre-Conditions:

1. The Authorization Service is running successfully

2. The Security Service is running successfully

3. User connected to the network to access the DB in the respective environment (INT, QA, PROD)

Post-Conditions:

1. Return True or False for permissions aligned to a particular user

Triggers:

Developer confirms permissions for a particular user by using “HasPermissions” method.

Assumption

Existing application data is correct

Risk

Existing application data is incorrect

Rules

Developer has access to the network to access environment specific DB.

Main Flow (MF01):

Return Scope Tree Nodes (GetScopeTree)

Step

User Action

System Action

  1. 1

Developer confirms user permission by using the method:

“HasPermissions(userId, permissionsId, scopetreenodeId)”

System configures IAuthZManagerFactory

N/A

System creates IAuthZManager to request user permissions

N/A

System request IAuthRepository to provide user permissions

N/A

IAuthRepository checks the service client memory cache for the user.

If user exists in cache, steps 5 or otherwise 8.

N/A

Systems pulls user application permissions and scope tree nodes from cache.

N/A

System resets cache timer

N/A

System returns True or False for user – HasPermissions method.

Note: Please refer Policy Logic Diagram for Permissions.

N/A

IAuthRepository invokes GetUserPermissions service – Please follow steps in “Permissions and Scope Tree Services – Return Scoped User Application Permissions” use case.

N/A

IAuthRepository invokes GetScopeTree service - Please follow steps in “Permissions and Scope Tree Services – Return Scope Tree Nodes” use case.

N/A

IAuthRepository invokes GetDefault service – Steps will be included in the Permissions and Scope Tree Services use case.

N/A

System will store Scoped User Permissions, Scope Tree Nodes, and Default Scope Tree information for the user in the service client memory cache.

N/A

System returns True or False for user – HasPermissions method.

Note: Please refer Policy Logic Diagram for Permissions.


 
Previous Previous
 
Next Next
  Modern Analyst Forums  Business and Sy...  Structured Anal...  Technical Use Case - any other alternatives

Community Blog - Latest Posts

I have always loved cooking. I learned from my Grandma June and her kitchen was her sanctuary, a small, warm sunlit space filled with jars of spices, stacks of cookbooks, and the comforting smell of something always on the stove or baking in the oven. Grandma June was as great a cook as she was a teacher to me. She never followed a recipe “to...
Now, I know, I don’t know what kind of new intro BPO may require, but at least I can promise you upfront that I have something different to say about Business Process Outsourcing or simply BPO. What is it? This hasn't been a call center job or a sales job as we all think. It is a mammoth profile, and firms are grappling to ge...
Leveraging Blockchain Technology for Enhanced Data Security in Business Operations
In an age where data breaches and cyberattacks are becoming more frequent and sophisticated, businesses are searching for robust solutions to safeguard their data. Blockchain technology has emerged as a promising tool in this quest, offering a way to secure data with unparalleled reliability. Although initially known for powering cryptocurrencies l...

 






 

Copyright 2006-2025 by Modern Analyst Media LLC