It is used for the authorization of users, closely interacts with the system, and prohibits unauthorized access.