Use Case user enters hash
The user of the application receives a hash code and uses it to log in to the survey
- Author: Iina Pirinen
- Date / Version: 07/02/2023
User roles
- End user
- Admin
Prerequisites / Conditions
- User gets hash code
- User knows she/he is going to get hash code
Use Case Diagram
Description of use case -eg. Modify existing request
- User gets the hash
- User enters the hash
- User gets in to the survey
Exceptions
-
Wrong hash code
-
User never got the hash code
Result
- User gets in to the survey
Use frequency
- Everytime hash code is generated and sent to company/companies
Sources
This wiki-document is based on the The public administration recommendations
Thans to the original authors.