-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[UC] Sharing Access #35
Comments
This scenario refers the existence of a list or directory of other entities an |
Similar to Access to stored health records. |
We may need to come up with a term for the entities an owner can share with. Would it be a good idea to user the term end-user? |
I believe this may also be related to #27, Grant access to (business) data. |
I'm confused. How is this different from the normal access control? Initially I thought this is to "share my permission to another person", but after reading it turned out to be different. The example says an "owner" "shares permission", but effectively it is "setting permission", which is exactly how currently access control in ACL functions. |
As an author with authoring permission,
Guinan wants to use the sharing interface of her authoring tool to manage access permissions to her article,
so that Deanna can review, Seven of Nine can co-edit, and Torres can view the progress.
Preconditions:
What conditions must be in place or assumed before this use case can begin?
Trigger:
What (user or system) event or action initiates this use case?
Guinan, as the "Owner" of her article, opens her address book from the authoring tool and selects Deanna, Seven of Nine, and Torres, assigning them "Commenter", "Editor", and "Viewer" permissions to the article respectively.
Actors:
Describe the primary actor, and any other relevant actors involved in this use case
Primary actor: Guinan, as an author with knowledge and experience in using an authoring tool to create and publish accessible content, is able to associate an inbox to the article to receive notifications about it (e.g., #7). She understands the distinctions between assigning different access permissions to individuals or making her article public. Guinan can select individuals from her address book and invite anyone not listed by entering their online identifier.
Distinction:
What unique challenges or distinguishing factors (like technical issues, user experience needs, workflow integration, etc.) are associated with this use case?
Scenario:
Describe an ideal or happy-case scenario where this use case would play out as intended.
Guinan logs into the authoring tool using her personal online identity. As the owner of her article - a technical specification - she authors the second draft (e.g., #7 ). She decides that it is time for some of her colleagues to have a look at the work so far. Using the sharing interface of her authoring tool, Guinan enters "Dea" in the input box, and the interface filters names that match. Guinan spots Deanna on the list, and selects her name, and assigns Deanna her "Commenter" access permission. When Seven of Nine last met with Guinan, she expressed interest in co-editing the article after reviewing the initial draft. So, Guinan updates Seven of Nine’s current "Viewer" permission and grants her "Editor" access instead. Finally, she remembers that Torres isn't in her address book yet, so she manually enter Torres' online identity, which she noted down on a napkin earlier that day. She assigns Torres "Viewer" permission. Afterward, Guinan sends a short notification to all three, explaining the current state of the work and thanking them for their time and contributions (e.g., #22 ). After this long day, Guinan takes a sip of her Earl Grey tea in the ship's lounge gazes at the stars.
Alternative case(s):
What alternative flows or variations should the system handle for this use case?
Error scenario:
What unexpected issues or errors might arise, and how should the system handle them?
https://torres.example.org/
but if she entershttps://torrex.example.org/
that doesn't exist, the system should display an error message indicating the identifier is not found. If the identifier matches someone else, likehttps://torres.example.net/
, the system should display the name and photo, for example, of the unintended actor to confirm the correct selection before proceeding.Acceptance Criteria:
What conditions or criteria must be met for this use case to be considered successfully handled? What limitations are acceptable?
References:
List any relevant resources or examples that could inform this use case, possibly from other domains or solutions.
The text was updated successfully, but these errors were encountered: