Control access to the server
- Author: Sanni Rummakko
- Date / Version: 21/02/2024
User roles
- Server Administrator
- System Operator
- Authorized User
Prerequisites / Conditions
- User authentication credentials.
- Access rights assigned based on user roles.
Use Case Diagram
Description of use case - Modify existing access permissions
- Server Administrator or System Operator initiates access permissions modification process.
- The system prompts for authentication credentials.
- Upon successful authentication, the user selects the access permissions to modify.
- The system verifies the user's authority to modify the permissions.
- If authorized, the permissions are modified as requested.
- Confirmation of the modification is displayed, and relevant logs are updated.
Exceptions
- E1: Invalid authentication credentials.
- E2: User lacks authority to modify the requested permissions.
Result
- Expected result of the use case: Access permissions are successfully modified according to the user's request.
Use frequency
- The use case is executed whenever there is a need to modify existing access permissions, typically in response to changes in roles or security requirements.
Additional information
- Access permissions modification may be governed by organizational policies and regulatory compliance standards.
- Access control lists (ACLs) and role-based access control (RBAC) mechanisms are commonly used to manage server access.
Sources
This wiki-document is based on the The public administration recommendations
Thans to the original authors.