In these days’s sophisticated IT environments, access control has to be considered to be “a living technology infrastructure that utilizes one of the most sophisticated instruments, reflects improvements from the function ecosystem for example greater mobility, acknowledges the variations inside the devices we use as well as their inherent pitf