Use Cases

13.5. Use Cases

To access Use Case information, click the Use Cases tab in the Access Security Manager window.

A use case defines a particular business function. It can be a single, unique business function or a collection of several business functions grouped into a high-level representation of a business area.

Use cases are delivered with the system, are system-defined and may not be changed. The following chart shows a few use case examples.

Use Case Operations allowed
Reference data administration All functions accessed from the Reference Data Maintenance window selection from the SICS Desktop.
System parameter administration All functions accessed from the System Parameter Maintenance window selection on the SICS Desktop.
Security administration All functions accessed from the Security window selection on the SICS Desktop.
Currency administration All functions accessed from the Currency window selection on the SICS Desktop.
Reporting unit administration All functions accessed from the Reporting Units window selection on the SICS Desktop.
Risk zone administration All functions accessed from the Risk Zones window selection on the SICS Desktop.
Location administration All functions accessed from the Locations window selection on the SICS Desktop.

Double-click a use case to see the View Use Case window. View Use Cases, explained later, for more information.

Use Cases Naming Convention #

Use cases ending with “Administration” control access to all functions for the given domain within SICS that are not covered by other use cases. This means the “Administration” role gives the most basic access right for its domain area. System administrators will need to add additional use cases to a role to give full access to the domain. A user assigned only “Business Find” with execute access and “Business Administration” with read access, will be able to find businesses and view most information about a business. He or she will not be able to view information about the businesses that are blocked by other use cases.

All use cases controlling access to find windows end with “Find.” These use cases contain only access right “Execute,” and are typically needed by user roles giving access to other domains. An example of this is found when creating a business though the Create New Business wizard. Without access to the use case “Business Partner Find,” the user cannot assign business partners to the contract using the Find facility.

Use cases ending with P&C and Life are respectively P&C and Life specific.

What Are Use Case Access Rights? #

A use case consists of one or more access rights for its particular business function. It is the access rights that are actually granted or removed from a user role. Each use case may contain the following access rights: Create, Update, Delete, Execute, and Read.

Basic Access Rights #

Basic access rights are the basic functions of Create, Update, and Delete that can be performed on some given object in the system.

For example, assume a use case is defined for general Business Partner functions. It is possible to create and update a business partner (no delete is possible). Therefore, the Business Partner use case is actually an aggregation of two sub-use cases, Create Business Partner and Update Business Partner. As such, each distinct access right (Create and Update) may be granted or removed from a user role.

Partners Business Partners Administration Use Case  
Create Create a Business Partner
Update Update a Business Partner
Delete Delete a Business Partner
Execute Not defined
Read View a Business Partner

Execute Function Access Rights #

The ‘Execute’ category is used to designate one or more business functions or services that are performed. It can also be used to designate all functions in a certain business area.

View Use Cases #

The Use Cases tab on the Access Security Manager window displays all system-defined use cases. Each component use case is listed with columns showing its associated access rights. The columns are:

R Read

C Create

U Update

D Delete

E Execute

The following codes are used in each column:

Y An access right is defined

N An access right is not defined

  • Access right category is not applicable

The Use Cases tab also list all Security User Roles that each Use Case are assigned to.

use_cases_tab.png

You can click the right mouse button pop-up menu to select View. This opens the View Use Case window that shows the sub-component use cases associated with each access right (Read, Create, Update, Delete, Execute) and their associated notes.