Primary Use Case: WeCom Account & Permission Management
Background Overview
Organizations need centralized management of WeCom accounts and permissions to ensure security and compliance. Without proper governance, account sprawl and permission issues create security risks. This primary use case describes account lifecycle management, permission governance, and compliance controls.
Goals & Value
- Unified Account System: Centralized management of all WeCom accounts.
- Fine-grained Permissions: Precise control over user access and capabilities.
- Compliance Modularization: Ensure compliance with regulatory requirements.
- Security & Governance: Maintain security posture and audit compliance.
Participating Roles
- IT Administrators: Manage accounts and permissions.
- Security Teams: Enforce security policies and access controls.
- Compliance Officers: Ensure regulatory compliance.
- Department Managers: Request and manage access for teams.
- End Users: Use WeCom within assigned permissions.
Primary Scenario User Story
As an IT administrator, I want to manage WeCom accounts and permissions centrally, so that I can ensure security and compliance while enabling business operations.
Sub-scenario Details
Sub-scenario A: Account Lifecycle Management
- Roles & Triggers: Manage WeCom accounts throughout their lifecycle.
- Main Process:
- Create accounts for new employees.
- Update permissions as roles change.
- Deactivate accounts for departing employees.
- Audit account status regularly.
- Success Criteria: Complete account management; timely updates; regular audits.
- Exceptions & Risk Control: Orphaned accounts; permission errors; audit gaps.
- **Metric Suggestions: Account accuracy, update timeliness, audit completeness.
Sub-scenario B: Permission Governance
- Roles & Triggers: Need to control access to WeCom features.
- Main Process:
- Define permission levels and roles.
- Assign permissions based on job requirements.
- Review and approve permission changes.
- Monitor permission usage and violations.
- Success Criteria: Appropriate permissions; proper governance; effective monitoring.
- Exceptions & Risk Control: Excessive permissions; unauthorized access; governance failures.
- **Metric Suggestions: Permission appropriateness, governance effectiveness, violation rate.
Sub-scenario C: Compliance & Auditing
- Roles & Triggers: Need to maintain compliance and audit trails.
- Main Process:
- Maintain audit logs for all account activities.
- Generate compliance reports.
- Support external audits and reviews.
- Implement compliance improvements.
- Success Criteria: Complete audit trails; compliance reports; audit readiness.
- Exceptions & Risk Control: Log gaps; compliance issues; audit failures.
- **Metric Suggestions: Audit completeness, compliance score, audit success.
Sub-scenario D: Integration & Sync
- Roles & Triggers: Need to sync with other systems.
- Main Process:
- Integrate with HR systems for employee changes.
- Sync with identity management systems.
- Maintain single source of truth for accounts.
- Handle sync conflicts and errors.
- Success Criteria: Accurate synchronization; conflict resolution; system reliability.
- Exceptions & Risk Control: Sync failures; data conflicts; integration errors.
- **Metric Suggestions: Sync success rate, conflict resolution time, integration reliability.
Scenario-level Test Case Examples
Test Preparation: Prepare account management system, permission governance tools, compliance reporting, and integration connectors.
Test Case A-1: New Employee Onboarding (Positive)
- Prerequisites: New employee joins organization.
- Steps:
- HR system triggers account creation.
- WeCom account created with appropriate permissions.
- Expected Results:
- Account created successfully.
- Permissions assigned based on role.
- Employee can access WeCom immediately.
Test Case B-1: Permission Change Request (Negative)
- Prerequisites: Employee role changes requiring new permissions.
- Steps:
- Manager requests permission change.
- Approval workflow executed.
- Permissions updated.
- Expected Results:
- Request approved through workflow.
- Permissions updated accurately.
- Change logged for audit.
