Evaluation Guide
Evaluation Steps
-
Go through the list of heuristics to have a sense of each.
-
Read the description of the scenario and understand the business logic.
-
Perform each task as described on the IdM system.
-
Identify usability problems while doing each task or after finishing the task. For each problem, please record the task in which you found the problem, and the heuristic with which you identified the problem. Use the scenario description and heuristics to check if the system supports the activity described in the scenario.
-
Please record the problems in Here
-
If you want to edit any of the identified problems which you already entered in the form, you can do it from Here.
Recommendations
-
I recommend exploring the IdM system first before going through specific tasks.
-
When performing the tasks, you should login with different users as described in the scenario For example, if you want to login as a Security team member or a particular manager, use the organizational chart to find the right person to login as.
-
If you want to login as a user, the user name is: first name + the first letter of the family name (e.g. James Beers -> jamesb) and password is “q1w2e3”.
-
If you couldn’t finish a task or get the desired result, don’t worry! The real user may have the same problem.
-
If you face any problems, you can ask the person conducting the study.
Scenario:
As a part of the organization's policy, the security team should certify the roles of the employees in each department every 3 months. The security team sends notifications to managers to certify their employees.
After receiving notification, the manager logs into the IdM system and tries to certify the roles of the employees. In order to make certification decisions, the manager should determine the users’ job function, and verify if the role that the employee is assigned to helps the user perform his job. The manager might know the job function of the user from his memory, and he might know what permissions are assigned to each role.