Access control is used in order to supervise entrance into exclusive areas or specific zones. In order to exert an adequate control process, the following steps must be followed:
A verification is required to determine the identity of a user of the system.
Passwords, voice recognition, and biometric scans are some common methods of authentication. The goal is to corroborate the identity of the user.
This happens after a user is authenticated and is authorized to enter. In general, the user is only authorized to access specific areas according to his or her role in the organization.