A user must login to the system to access data, add or delete data.
Basic Path
The use case starts when a user indicates that he/she wants to login.
The system requests the username and password.
The user enters his/her username and password.
The system verifies the username and password against all registered users.
The system starts a login session and displays a welcome message.
Alternative Paths
Step 4: If username is invalid, the use case goes back to step 2.
Step 4: If the password is invalid, the system requests that the user re-enter the password. When the user enters another password, the use case continues with step 4 using the original username and new password.
Exception Paths
The system may abandon login after 5 unsuccessful attempts.
Preconditions
The user is registered.
The username is the user’s email address.
Postconditions
The user can now add data, delete data, query data and visualise data.
A user must login to the system to access data, add or delete data.
Basic Path
The use case starts when a user indicates that he/she wants to login. The system requests the username and password. The user enters his/her username and password. The system verifies the username and password against all registered users. The system starts a login session and displays a welcome message. Alternative Paths
Step 4: If username is invalid, the use case goes back to step 2. Step 4: If the password is invalid, the system requests that the user re-enter the password. When the user enters another password, the use case continues with step 4 using the original username and new password.
Exception Paths
The system may abandon login after 5 unsuccessful attempts. Preconditions
The user is registered. The username is the user’s email address. Postconditions
The user can now add data, delete data, query data and visualise data.