Sample Use Case
I. Use Case Identification
II. Objective
This use case aims to outline the process by which a user authenticates themselves within the system.
III. Scope
IV. Stakeholders
Stakeholder | Role | Responsibility |
---|
User | End User | Needs to securely log in to access the system |
System Administrator | Admin | Manages user accounts and access permissions |
V. Actors
Primary Actor: User
Secondary Actor: System
VI. Preconditions
VII. Trigger
The user enters their username and password and clicks the "Login" button.
VIII. Main Flow
The system displays the login page.
The user enters their username and password.
The system verifies the credentials.
If the credentials are valid, the system grants access to the user.
If the credentials are invalid, the system displays an error message.
IX. Alternate Flows
Invalid Credentials:
The system prompts the user to re-enter their credentials.
After three unsuccessful attempts, the system locks the user's account.
X. Postconditions
If the credentials are valid, the user gains access to the system.
If the credentials are invalid, the user receives an error message and is prompted to retry.
XI. Special Requirements
XII. Assumptions
XIII. Frequency of Use
This use case is expected to be utilized multiple times daily by all registered users.
XIV. Miscellaneous
Use Case Templates @ Template.net