Expand your infrastructure with confidence using ITG Security's industry-leading access control solutions with Avigilon Alta, Salto, and more. Implement anywhere, manage from anywhere with Avigilon Alta's agile mobile access control, while Salto provides advanced, flexible, and secure access control solutions for all industry applications.

Identification
Identification is the starting point, where the users provide information about their identity. Typically, identification is done by assigning a username. The process establishes a unique user that aims to provide accountability whenever they use the system. Today’s systems use authentication factors like fingerprint, retinal, or facial scans, which can be used to validate them in the system.
Authentication
The authorization stage is where pre-set permissions are granted to users who’ve proven their identity’s authenticity. A reference monitor or authorization matrix stores and provides control information, mediating access to users and deciding what level of clearance should be granted.
_JPG.jpg)

Auditing and Accountability
The final factor of the access control system is accountability or audit. This way, if something goes wrong, you can trace what happened, including what data is accessed or retrieved and the total duration of each task. In this stage, your system can provide logs for auditing of permissions and use.
