Use Case
From MgmtWiki
Revision as of 13:43, 8 July 2019 by Tom (talk | contribs) (Created page with "==Full Title of Use Case== Empty template ==Context== To provide a good user experience at ===Goal=== * The user has full capability to exercise their right to select an ...")
Contents
Full Title of Use Case
Empty template
Context
To provide a good user experience at
Goal
- The user has full capability to exercise their right to select an Identifier or Attribute Provider of their own choosing.
Examples of Problems to be Addressed
The user cannot remember all of the user names and passwords that would be required if every site where they had consented to the storage of their information used their own scheme.
Actors
- User
- Relying Party
- Provider of services related to Authentication or User Information sharing.
Preconditions
- The user wants to control access to their own User Information.
- At least one Identifier or Attribute Provider exists that is acceptable to both the User and the Relying Party.
- The user will be able to use the registered account later at the Relying Party, see wiki page Relying Party Authentication Use Case.
Scenarios / User Journeys
The goal of these scenarios is to test the functionality of any web site were the user access and update their information.
Journey 1 - the user's comes to the site to learn what emergency access really is:
Journey 2 - the user is directed to the site as they do want to start to collect contact data:
Journey 3 - The user has already registered with the site.
Results
Accepted Risks:
- Data transfers involved work within a framework of trust and mutual understand as to the user's wishes with respect to care and privacy.
- It is not clear how a non-responsive user can provide sufficient details to the First Responder. Presumably the existing First Responder network can provide some guidance on that challenge.
Post Condition:
- There are now two additional consents steps, lab with sensitive data and secondary provider with sensitive.
- No data is ever shared with any provider that has not been strongly identified to the user.
- The user results are available it is assumed that the consent receipt acknowledged that the data would be sent back to the primary care doctor.
Examples:
- tbd
Dependencies::
- Web Sites must be trusted before any user information is provided to them.
- Trust federations can be used to help users make informed decisions.
- User consent and trust must begin with no user information transferred.
- Standards exist to collect needed attributes where-ever they may be.
Workflow Diagram
TK