Authentication As An Access Control Mechanisms