Access control systems (ACSs) rely on administrator-defined rules that allow or restrict user access to protected network resources.
These access rules can, for example, require strong user authentication such as tokens or biometric devices to prove the identity of users requesting access.