Use Case Name:
Login_Use_Case
Iteration: Filled
Summary:
All
users who request entry into the system must prove they are who they say they
are. This aplies to users inside the
company and outside the company. Who
the user is determines what the user has access to.
Basic Course of Events:
1. The use case begins when the user accesses the system.
2. The system responds by requesting user
identification and password.
3. The user enters the identification and
password.
4. The system responds by verifying the
combination of ID and password against a list of valid users.
5.
The
system responds by notifying the user that the ID and password are valid and
allows the user
access to the application.
Alternative Paths:
None
Exception Paths:
1. In step 4, if the user identification and password combination is
not valid, the
system responds by notifying the users
that log in failed and asks the user
to try again. The system returns to step 2.
2. If the user tries unsuccessfully three times,
the system responds by informing
the user to contact the pharmacist and the system returns to the
ready/wait state.
3. In step 4, if authentication fails because
the user’s account is suspended, the
system responds by informing the user to
contact the pharmacist and the
system returns to the ready/wait state.
Extension Points: Administrator, Customer
1. If the user is identified as a customer, the
system presents the user with the
customer use case.
2. If the user is identified as an
administrative, the system presents the user with
the administrator use case.
Trigger:
The user repsonds to the
login prompt at the ready/wait state.
Assumptions:
The system is operational
Preconditions:
The system is operational and
the system is in the ready/wait state
Postconditions:
The validated user is
presented with the appropriate use case
Related Business Rules:
1. The user must be in good standing.
Author: HGG
Date: Fall 2002