User management is managed in Okta and VPN is required
IAM implementation: IAM for Back Office
Okta Technical implementation: IAM for Back Office (Technical)
Connecting to VPN: Connecting to Cloudflare VPN
Role: BOFE user (access matrix)
Objective: I as a BOFE user want to sign in to the BOFE application
Reason: to access all the view/edit functionalities in BOFE assigned to current user’s role
Functional requirements: user can sign in to the BOFE using his/her credentials (email + password)
UI requirements: login screen with redirect to Okta UI
Execution steps:
User is set up in Okta and his role(s), supervisor (checker) is filled in
User will create his login credentials (password) on first login and will set up 2FA
User needs to establish secure VPN connection
User clicks on login button and enters credentials (email, password)
Internal dependencies: Access matrix, including roles
External dependencies: Okta setup, including roles from Access Matrix and Checker supervisor reference.
Alternative scenarios: user cannot sign in to the BOFE either because he/she has no access granted to BOFE or he/she is using incorrect credentials. Error message will appear in this case to inform user that credentials he/she is using are incorrect and correction steps are handled within Okta UI.
Acceptance criteria: User can successfully sign in to the BOFE application (with valid credentials) and is able to see and edit information assigned to his/her role.
Attachments:
~drawio~6203b5e435a62a0068440d9b~Sign in.tmp (application/vnd.jgraph.mxfile)
~drawio~6203b5e435a62a0068440d9b~Sign in.tmp (application/vnd.jgraph.mxfile)
Sign in (application/vnd.jgraph.mxfile)
Sign in.png (image/png)
Screen Shot 2022-09-26 at 20.53.13.png (image/png)
1.1. Login.png (image/png)