Skip to content

Control access to the server

  • Author: Sanni Rummakko
  • Date / Version: 21/02/2024

User roles

  1. Server Administrator
  2. System Operator
  3. Authorized User

Prerequisites / Conditions

  1. User authentication credentials.
  2. Access rights assigned based on user roles.

Use Case Diagram

uml diagram

Description of use case - Modify existing access permissions

  1. Server Administrator or System Operator initiates access permissions modification process.
  2. The system prompts for authentication credentials.
  3. Upon successful authentication, the user selects the access permissions to modify.
  4. The system verifies the user's authority to modify the permissions.
  5. If authorized, the permissions are modified as requested.
  6. Confirmation of the modification is displayed, and relevant logs are updated.

Exceptions

  • E1: Invalid authentication credentials.
  • E2: User lacks authority to modify the requested permissions.

Result

  • Expected result of the use case: Access permissions are successfully modified according to the user's request.

Use frequency

  • The use case is executed whenever there is a need to modify existing access permissions, typically in response to changes in roles or security requirements.

Additional information

  • Access permissions modification may be governed by organizational policies and regulatory compliance standards.
  • Access control lists (ACLs) and role-based access control (RBAC) mechanisms are commonly used to manage server access.

Sources

This wiki-document is based on the The public administration recommendations

Thans to the original authors.