| 4 | | A guest can browse the system in read-only mode. When the guest tries to perform a restricted action, the system requires authentication. The guest logs in by providing credentials, the system verifies them and starts an authenticated session. After login, the user can perform actions allowed by their role (e.g. client). If login fails, access remains read-only. |
| | 4 | A guest can browse the system in read-only mode. When the guest attempts to perform a restricted action, the system requires authentication. |
| | 5 | The guest logs in by providing a username and password. The system verifies the credentials and, if valid, starts an authenticated session. After login, the user can perform actions allowed by their role. If authentication fails, the user remains in read-only mode. |