In this paper, the authors explain about the concept of \"Getting biometric input from the user without using any external devices for providing high level user authentication during login\". The purpose of biometric recognition for secure access restricts is to avoid the un-trusted source of interaction. Most cases, object level changes happening in the IT environment is not monitored properly. Considering, a database administrator is trying to change an object. In that case, the user will change without the knowledge of other DBA's. In case of accidental changes, or any changes in the system acceptance of the other administrator is important. The system may be prone to hacking vulnerabilities too.