...
Requirement | Status | Use cases | ||||||||
---|---|---|---|---|---|---|---|---|---|---|
| User that configures roles is the person who assigns permissions to user | |||||||||
| Multiple Admins create roles and assign permissions to staff. Staff may or may not be assigning and unassigning users. Student perms change so often they try to distribute the responsibility | |||||||||
| 1 Admin configures roles and generally assign staff to roles. Staff that manage the student works will actually assign permissions to their student workers | |||||||||
| User needs to see the granular perms of a specific user on the user record for troubleshooting. | |||||||||
| Generally a security vulnerability to display user permissions to anyone who can see staff users (User could target other users based on their permissions linger at their workstation etc.) | |||||||||
| When identifying why user 1 can not do what user 2 can do we compare the users specific permissions or roles. | |||||||||
| When new permissions are added functional roles are updated. Admins then compare roles to verify all necessary functions are included in each role |
...