Use Case ID: UC-001
Title: User Authentication
Created By: [YOUR NAME]
Date Created: [DATE]
Last Updated: [DATE]
Version: 1.0
This use case aims to outline the process by which a user authenticates themselves within the system.
In-Scope: User authentication process
Out-of-Scope: User registration, password recovery
Stakeholder | Role | Responsibility |
---|---|---|
User | End User | Needs to securely log in to access the system |
System Administrator | Admin | Manages user accounts and access permissions |
Primary Actor: User
Secondary Actor: System
The user has a registered account in the system.
The user is on the login page.
The user enters their username and password and clicks the "Login" button.
The system displays the login page.
The user enters their username and password.
The system verifies the credentials.
If the credentials are valid, the system grants access to the user.
If the credentials are invalid, the system displays an error message.
Invalid Credentials:
The system prompts the user to re-enter their credentials.
After three unsuccessful attempts, the system locks the user's account.
If the credentials are valid, the user gains access to the system.
If the credentials are invalid, the user receives an error message and is prompted to retry.
All user credentials must be securely stored and encrypted.
The system should include CAPTCHA or other security measures to prevent automated login attempts.
Users have previously registered accounts with valid credentials.
The system infrastructure supports secure authentication protocols.
This use case is expected to be utilized multiple times daily by all registered users.
Diagrams: Include any relevant diagrams illustrating the authentication process.
Notes: Any additional notes or considerations relevant to the use case.
Templates
Templates