Access Control
Access control is used in order to supervise entrance into exclusive areas or specific zones. In order to exert an adequate control process, the following steps must be followed:
Identification:
A verification is required to determine the identity of a user of the system.
Authentication:
Passwords, voice recognition, and biometric scans are some common methods of authentication. The goal is to corroborate the identity of the user.
Authorization:
This happens after a user is authenticated and is authorized to enter. In general, the user is only authorized to access specific areas according to his or her role in the organization.