UFC 4-021-02NF
27 September 2006
change 1, 23 October 2006
3-2
ACS ENTRY-AUTHORIZATION IDENTIFIERS
3-2.1
ACS entry-authorization identifiers are grouped into three categories:
Credential devices
Coded devices
Biometric devices
These devices operate on three basic techniques:
Something a person has, such as a common access card (CAC), swipe
card, or proximity card
Something a person knows, such as a personal identification number
(PIN)
Something a person is or does, such as a biometric identifier
3-2.2
Credential devices. Credential devices identify a person as having
legitimate authority to enter a controlled area. A coded credential (such as a plastic card
or key) contains a prerecorded, machine-readable code. When the card or key is read,
an electric signal unlocks the door if the prerecorded code matches the code stored in
the system. A credential device only authenticates the credential; it assumes a user with
an acceptable credential is authorized to enter. Various technologies are used to store
the code within a card or key. The most common types of cards are described in more
detail in the section Card Types.
3-2.2.1 Advantages and disadvantages of using credential devices are shown in
Figure 3-2.
Figure 3-2. Advantages and Disadvantages of Using Credential Devices
Advantages
Cards and card readers are reliable.
Disadvantages
Cards can be lost or stolen.
Some types of cards can easily be duplicated.
Each type of card and card reader has its own advantages and disadvantages. Refer to
the subsections Card Readers and Card Types in the section ACS Equipment in this
chapter for more on the advantages and disadvantages of each.
26