From 9b6514ff4c70b159df5f0d6e19d52d61664d4398 Mon Sep 17 00:00:00 2001 From: Ludovic Robert <30499179+bigludo7@users.noreply.github.com> Date: Fri, 26 Jul 2024 14:48:47 +0200 Subject: [PATCH] Fixes bugs on user stories + improve them --- .../NumberVerification_verify_User_Story.md | 10 ++++------ ...berVerificationdevice_phone_number_User_Story.md | 13 +++++-------- 2 files changed, 9 insertions(+), 14 deletions(-) diff --git a/documentation/API_documentation/NumberVerification_verify_User_Story.md b/documentation/API_documentation/NumberVerification_verify_User_Story.md index c64a9b3..d058ec3 100644 --- a/documentation/API_documentation/NumberVerification_verify_User_Story.md +++ b/documentation/API_documentation/NumberVerification_verify_User_Story.md @@ -3,10 +3,8 @@ | **Item** | **Details** | | ---- | ------- | | ***Summary*** | As an enterprise application developer, I want to verify the phone number associated with the phone from which the call was made, so I can get a proof of possession of the phone number. | - -| ***Roles, Actors and Scope*** | **Roles:** Customer:User, Customer:BusinessManager, Customer:Administrator
**Actors:** Application service providers, hyperscalers, application developers, end users, Communication Service Provider (CSP).
**Scope:**
- Verifies if the specified phone number (plain text or hashed format) matches the one that the user is currently using. | -| ***Pre-conditions*** |The preconditions are listed below:
  1. The Customer:BusinessManager and Customer:Administrator have been onboarded to the CSP's API platform.
  2. The Customer:BusinessManager has successfully subscribed to the Number Verification product from the product catalog.
  3. The Customer:Administrator has onboarded the Customer:User to the platform.
  4. The Customer:User performs an authorization request to CSP.
  5. The CSP checks access & user approval then provide access token to the Customer:User
  6. The Customer:User get the access token based on network authentication to ensure secure access of the API.| - -| ***Activities/Steps*** | **Starts when:** The customer application makes a POST verify via the number verification API providing in the request the phone number provided by the user on the application. This input could be hashed or plain.
    **Ends when:** The Number Verification Server responds to confirm whether the provided phone number matches the device from which the request was initiated or not. | +| ***Roles, Actors and Scope*** | **Roles:** Customer:User, Customer:BusinessManager, Customer:Administrator
    , end-user, Communication Service Provider (CSP), Channel Partner **Actors:** Application service providers, hyperscalers, aggregator, application developers, end users, Communication Service Provider (CSP).
    **Scope:**
    - Verifies if the specified phone number (plain text or hashed format) matches the one that the user is currently using. | +| ***Pre-conditions*** |The preconditions are listed below:
    1. The Customer:BusinessManager and Customer:Administrator have been onboarded to the CSP's API platform via (or not) a Channel Partner.
    2. The Customer:BusinessManager has successfully subscribed to the Number Verification product from the product catalog.
    3. The Customer:Administrator has onboarded the Customer:User to the CSP API platform via (or not) a Channel Partner.
    4. The Customer:User performs an authorization request to CSP.
    5. The CSP checks access & user approval then provide access token to the Customer:User
    6. The Customer:User get the access token, via (or not) the Channel Partner, based on network authentication to ensure secure access of the API.| +| ***Activities/Steps*** | **Starts when:** The customer application makes a POST verify via the number verification API providing in the request the phone number provided by the user on the application. This request could be done via (or not) the Channel Partner. This input could be hashed or plain.
      **Ends when:** The Number Verification Server responds to confirm whether the provided phone number matches the device from which the request was initiated or not. | | ***Post-conditions*** | The customer application could continue offering its service to the user with the confirmation of the user phone number. | -| ***Exceptions*** | Several exceptions might occur during the Number Verification API operations
      - Unauthorized: Not valid credentials (e.g. use of already expired access token).
      - Invalid input: Not valid input data to invoke operation (e.g. phone number without the '+' prefix).
      - Not able to provide: Client authentication was not performed via mobile network. Not working on mobile hotspot (tethering) neither Wifi nor VPN mobile connections | +| ***Exceptions*** | Several exceptions might occur during the Number Verification API operations
      - Unauthorized: Not valid credentials (e.g. use of already expired access token).
      - Invalid input: Not valid input data to invoke operation (e.g. phone number without the '+' prefix).
      - Not able to provide: Client authentication was not performed via mobile network. Not working on mobile hotspot (tethering) neither Wifi nor VPN mobile connections | \ No newline at end of file diff --git a/documentation/API_documentation/NumberVerificationdevice_phone_number_User_Story.md b/documentation/API_documentation/NumberVerificationdevice_phone_number_User_Story.md index b2d51c3..fc98acc 100644 --- a/documentation/API_documentation/NumberVerificationdevice_phone_number_User_Story.md +++ b/documentation/API_documentation/NumberVerificationdevice_phone_number_User_Story.md @@ -3,11 +3,8 @@ | **Item** | **Details** | | ---- | ------- | | ***Summary*** | As an enterprise application developer, I want to retrieve the phone number associated with the device from which the call was made, so that I can ensure that I obtain the correct phone number and avoid fraud e.g. identity theft. | - -| ***Roles, Actors and Scope*** | **Roles:** Customer:User, Customer:BusinessManager, Customer:Administrator
      **Actors:** Application service providers, hyperscalers, application developers, end users, Communication Service Provider (CSP).
      **Scope:**
      -Returns the phone number associated with the access token so API clients can get the phone number and verify it themselves. | -| ***Pre-conditions*** |The preconditions are listed below:
      1. The Customer:BusinessManager and Customer:Administrator have been onboarded to the CSP's API platform.
      2. The Customer:BusinessManager has successfully subscribed to the Number Verification product from the product catalog.
      3. The Customer:Administrator has onboarded the Customer:User to the platform.
      4. The Customer:user performs an authorization request to CSP
      5. The CSP checked access & user approval then provide access token to the Customer:user
      6. The Customer:User gets the access token based on network authentication to ensure secure access of the API.| - -| ***Activities/Steps*** | **Starts when:** The customer application makes a POST device phone number via the number verification API.
        **Ends when:** The Number verification server answers providing the phone number corresponding to the one of the device from which the request was triggered. The customer application can check if this number corresponds to the one keyed by the user.| -| ***Post-conditions*** | The customer application could continue offering its service to the user with the confirmation of the user phone number. | - -| ***Exceptions*** | Several exceptions might occur during the Number Verification API operations
        - Unauthorized: Not valid credentials (e.g. use of already expired access token).
        - Invalid input: Not valid input data to invoke operation (e.g. phone number without the '+' prefix).
        - Not able to provide: Client authentication was not performed via mobile network. Not working on mobile hotspot (tethering) neither Wifi nor VPN mobile connections| +| ***Roles, Actors and Scope*** | **Roles:** Customer:User, Customer:BusinessManager, Customer:Administrator, end-user, Communication Service Provider (CSP), Channel Partner.
        **Actors:** Application service providers, hyperscalers, aggregator, application developers, end users, Communication Service Provider (CSP).
        **Scope:**
        -Returns the phone number associated with the access token so API clients can get the phone number and verify it themselves. This user story is valid in direct interaction between Application service providers and CSP as with the presence of the channel partner betwen them. | +| ***Pre-conditions*** |The preconditions are listed below:
        1. The Customer:BusinessManager and Customer:Administrator have been onboarded to the CSP's API platform via (or not) a Channel Partner.
        2. The Customer:BusinessManager has successfully subscribed to the Number Verification product from the product catalog.
        3. The Customer:Administrator has onboarded the Customer:User to the platform via (or not) a Channel Partner.
        4. The Customer:user performs an authorization request to CSP
        5. The CSP checked access & user approval then provide access token to the Customer:user
        6. The Customer:User gets the access token,via (or not) a Channel Partner, based on network authentication to ensure secure access of the API.| +| ***Activities/Steps*** | **Starts when:** The customer application makes a POST device phone number via the number verification API. This request could be done via (or not) the Channel Partner.
          **Ends when:** The Number verification server answers providing the phone number corresponding to the one of the device from which the request was triggered. The customer application can check if this number corresponds to the one keyed by the end-user.| +| ***Post-conditions*** | The customer application could continue offering its service to the end-user with the confirmation of the end-user phone number. | +| ***Exceptions*** | Several exceptions might occur during the Number Verification API operations
          - Unauthorized: Not valid credentials (e.g. use of already expired access token).
          - Invalid input: Not valid input data to invoke operation (e.g. phone number without the '+' prefix).
          - Not able to provide: Client authentication was not performed via mobile network. Not working on mobile hotspot (tethering) neither Wifi nor VPN mobile connections| \ No newline at end of file