The purpose of the identification activity area is to determine the metadata for a configuration itemto uniquely identify it and specify its relations to the outside world and other configuration items. Identification is one of the cornerstones of configuration management, as it's impossible to control something whose identity you don't know. If the tables in a restaurant have no numbers to which orders can be traced, the waiter will have difficulty matching the dishes to the proper guests. Perhaps this will come off all right if you have three or four tables, but definitely not if you have more than 20 and the guests keep coming and going all evening and the waiter who serves the food is not the one who received the order. To be sure everything is under control, the waiters and orders need to be uniquely identified as well. Figure 1-4 shows how identification is influenced by its surroundings. Figure 1-4. Identification in Context
InputsTwo incidents may initiate the identification process:
OutputsIdentification results in the registration of metadata for a configuration item. Process DescriptionsMethods, conventions, and procedures necessary for the activities in identification may be
Unique IdentificationEach organization must define its own conventions for unique identification. One general convention most often is not enough; typically, a number of conventions are necessary for various classes of configuration items, such as documents and code. These conventions may be difficult to define. You have to consider what purpose the unique identification serves and how to implement it in the easiest way. It will connect the registration and the physical configuration item in such a way that it's always possible to find the configuration item. This should be considered when defining conventions for unique identification. Furthermore, the procedures are tool dependent and often highly predefined in the tools available. The file name under which the item is saved may constitute the unique identification. It should also be possible to write the unique identification on the configuration item's mediumfor instance, on a diskette label. The unique identification also registers the relations between configuration items, such as variations or parts of each other. It may be a good idea to consider making identification a key in a database registration. It's important to define the conventions for unique identification so that the formation of new configuration items will not make it necessary to change or delete existing configuration items. For instance, the number of digits in a number must be sufficient to cover the total number of configuration items; it's not appropriate to have only two digits if more than a hundred items may be produced. ExamplesFigures 1-5 and 1-6 illustrate unique identification for two types of configuration items. Figure 1-5. Document Front Page
Figure 1-6. Test Cases
The document identifier in Figure 1-5 contains
The test cases in Figure 1-6 are included in a test specification document, and the identification contains (for the first test case)
AuthorizationAuthorization information may be derived from a quality assurance plan and a development plan. It's an advantage to have general directions for authorization in such plans, such as descriptions of the kinds of people who are responsible for acceptance and production of various types of configuration items. Perhaps documents placed under configuration management in the form of a draft could be approved by the author himself, while documents placed under configuration management in a version to be used by everybody should be approved by a group consisting of the project manager, the person responsible for quality assurance, and a customer representative. RolesOften the person who produces an item is also in charge of its identification. Identification is based partly on conventions for individual data elements and partly on information available from various plans (for instance, general procedures determining who is in charge of the approval of a particular kind of document). It may be necessary to draw on a library tool, for example, if numbers that are part of the unique identification are generated automatically and/or reserved in a storage tool. Connection with Other ActivitiesAn item cannot be declared as being under full configuration management until it has been placed in controlled storage. It is not sufficient that the item be identified. Identification, production, and placement in storage often overlap or are carried out interchangeably. Sometimes the identification, or parts of it, is carried out before the item is produced, such as when the decision is made about its production. In other cases, it may be carried out in connection with placing the item in storage (for instance, when a tool increases a counter). |