AUG 2021
What is access control: authorization vs authentication vs management
Access control is technology to secure your confidential data. It is a system that gives access or denies access to data depending upon the permission given to the user by the authority/host.
It is a modern way of security for corporate and other offices. An access control system is of two types -
Authentication is the process by which an individual's identity is verified by the system. This will let the system know what the user has access to and to what not.
In simple words, it works like our username and password for any of your social media accounts. Like yours, there are millions of accounts on every social media platform. However, when you log in using your ID and password, you get access to your account only. This is how authentication works.
Authentication is one of the steps in the whole security system of access control. It is the step that verifies the identity of the individual and guides further processes for access control.
This is the next step after the user has passed authentication and is verified by the system. This step has the data on the information to be shared with the user and what information to hide.
Authorization is the number of functions the user can perform or information the user has access to. It is where the access control system comes into play and serves its main purpose.
Just like authentication, authorization is also a step of the process of the whole access control. This step controls the access to information or premises as guided by the host.
Access Management is planning the flow of access to information to employees/individuals over a network of computers or any private room or premises. This will guide the authenticator on whether to give access to the user or not.
Access management is the first step or plan for an access control system. This flow planned by the host in a way they would like to give access will govern the whole access control system.
Access control systems are widely used technology in today’s world. It works in steps to manage access to information/premises. These are authentication, authorization, and access control. This all is managed and planned properly by the host for the smooth working of the system.
2nd Floor, No. 89, 27th Main Rd, Sector 2, PWD
Quarters, 1st Sector, HSR Layout, Bengaluru,
Karnataka 560102