Site Overlay

Access Control

our services

Badge access

Key pad Access

Key Fob Access

Access Control

identification

For access control to be effective, it must provide some way to identify an individual.

Authenticatoin

Identification requires authentication. This is the process of ensuring that the identity in use is authentic, that it's being used by the right person. Such as fingerprints, smartcards, and encryption keys.

Authorization

The set of actions allowed to a particular identity makes up the meat of authorization. On a computer, authorization typically takes the form of read, write, and execution permissions tied to a username.