Figure:
Use case example of access control system
Open figure