‘Whitelist configuration’ is a technical term, but the associated context and the resulting consequences are what truly matter, and this information should be documented.
Specifically, when the ‘whitelist’ is modified, the system reads it during initialization. When the system reaches the ‘ServiceInfoCalculation’ phase, it triggers the ‘ServiceStatusChangedDetector’ to check for differences between the new and old ‘ServiceInfo’. These changes are then sent out and broadcast through various channels. Crucially, only changes related to services listed in the ‘whitelist’ can actually be sent.
In other words, the ‘whitelist’ is merely one component in the message sending process, indicating that this particular technique is employed. Other techniques, such as using a ‘hardcode array’, could also serve the purpose. For documentation purposes, the primary focus should be on the use case—the impact and consequences of applying the technology.
Describing requirements solely centered around the term ‘whitelist’ can confuse readers or users, making it an unsuitable approach. Ultimately, describing the overall process should be the main focus.