top of page

Role Based Access Control

User Journey

Mapped out the journey a user takes when accessing and authenticating to a printer.

Research

The Goal

Design and define how each feature and function will behave when users with multiple access levels interact with them.

Information Architecture

and

Function Access Control Definition

Prioritized and structured the function access controls based on functionality and user usage.

Defined the behavior for each function access control.

Competitive Analysis

Performed competitive analysis to understand how other products in the market allow users to scan and print from various cloud storage services.

Design

Show-Hide Behavior Mapping

Two security settings: Show Protected Features & Hide Protected Features

Mapped out the behavior on the user interface for each of the settings

Low Fidelity Mockups

Mocked up the design using Balsamiq.

Detailed Workflows

Mocked up a high-fidelity wireframes and defined the behaviors for the “final” design.

[Adobe XD Tool]

NOTE: Icons, and Brand Colors - By Graphic Design Team

Homescreen

Overflow Items

Original designs and mockups were to show an icon for protected options in the overflow menu.

Due to a technical limitation on how the android base components are built, addition of lock icons to the overflow menus was not possible.

Moved forward with the design to show protected options without any security indicators. 

Hamburger Menu

aka Categories Menu

Settings Drawer

Action Button

Due to a technical limitation on how the android base components are built, addition of lock icon to the action button was not possible.

And the button is always available to inform the user why the primary action on the screen is not available.

Login Pop-up

There are multiple types of login methods for the administrator to configure

  • PIN

  • Username

  • Password

  • Username & Password

  • Active Directory

  • LDAP

  • Kerberos

Depending on the what login methods are configured by the adminitrator and what login option the user selects, the fields in the login pop-up will change.

Chain-Lock image from www.pexels.com

bottom of page