an ACS manages, monitors and controls human access to the protected equipment or facility. Most ACSs are designed to take a user provided credential as input, verify/authenticate privileges using the access control list (ACL) and grant/deny access based on the findings.
For example, using biometric security, an ACS can be used to authorize only legitimate access to a data center facility. The individual must provide his or her thumb print, focal or vocal credentials to an ACS, which is then verified through comparison with its database, and grants access only with valid permission.