Generally, access control software program works by determining someone (or Computer system), verifying These are who they claim to be, authorizing they've the necessary access degree and then storing their actions in opposition to a username, IP deal with or other audit program to assist with electronic forensics if essential.3. Access Once a cons