top of page

Smart Access Control Management

The Application Programming Interfaces (AP) facilitate multi-tenant, multi-site environments by enabling detailed access policies, real-time auditing, and automation of access workflows. This manual effort, boosts security, and guarantees adherence to regulations.

Features

User mangament .png

User Management ( API )

  • Role-Based Access Control (RBAC): Enables streamlined user lifecycle management.

  • Dynamic User Creation: Supports creation of various user roles (Organisation Admin, Company Admin, Site Admin, User).

  • Flexible User Assignment: Allows assignment of users to specific companies and sites.

  • Configurable Access Levels: Offers automatic or request-based access level assignment.

  • User Profile Management: Provides the ability to view user profiles, including roles and permissions.

  • User Status Tracking: Enables checking of user active/inactive status.

  • User Detail Editing: Allows modification of user details and access.

  • Safe User Deactivation: Supports deactivation of users prior to deletion.

  • Deletion Prevention: Prevents deletion of users with active access or pending requests.

Access Level & Permission Management API

  • Simplified Access Management: Effortlessly create, assign, and modify access permissions for users, locks, and sites.

  • Flexible Access Configuration: Supports both automatic (direct entry) and approval-based (request-based) access.

  • Real-Time Access Monitoring: Provides real-time visibility into who has access to what.

  • Adaptable Security Policies: Allows permissions to be adapted to align with evolving security policies.

  • Access Request Tracking: Tracks the status of access requests (pending, approved, denied).

  • Approval Decision Logging: Maintains logs of approval decisions for auditing and review.

  • Contextual Access Association: Enables associating access levels with specific users, locations, or devices.

 access level permission management.png
7a0b6080-11d5-4666-84b1-aaf08912065f.png

Site & Company Management API

  • Hierarchical Company/Site Management: Enables external systems to manage the hierarchical structure of companies and sites within the ACMS platform.

  • Site/Company Creation and Structuring: Allows for the creation and organization of sites and companies within an organization.

  • User, Lock, and Policy Assignment: Permits the assignment of users, locks, and policies (geo-fencing, pre/post-operation rules) to specific sites or companies.

  • Information Access: Provides access to information regarding site/company associations, user permissions, and lock settings.

Mobile-FirstAccess Control

Secure smartphone-based credentials replace traditional keys and cards, providing cloud-provisioned access with real-time updates.

Multi-Site & Multi-Tenant Support

Oversee distributed access control across various companies, locations, and locks, along with detailed policies for pre-operation and post-operation access, geo-fencing, and flexible site permissions.

Centralised Cloud Management

Web-based dashboard for managing access across multiple sites with Scalable SaaS deployment with o on-prem infrastructure needed.

Lock & Site Access Control API

  • External System Lock Control: Allows external systems to manage lock access policies.

  • Policy Enforcement via Geo-fencing, Operational Checks, and Security Workflows: Uses location, operational status, and security procedures to control access.

  • Company/Site-Linked Lock Management: Enables managing locks associated with specific companies or sites.

  • Access Verification: Provides the ability to verify lock availability, user access, and access levels.

  • Location-Based Access Regulation: Implements access restrictions based on user location.

  • Photo Validation: Supports review and upload of photo validation criteria (before and after operations).

  • Emergency Override Functionality: Facilitates emergency overrides for authorized roles (security, facility management).

  • Override Log Monitoring: Tracks override logs for auditing and compliance.

a80118ba-6105-4106-8873-1730650a6205.png
 lock history and event auditing.png

Lock History & Event Auditing API

  • Real-Time and Historical Lock Activity Logging: Provides comprehensive records for security, compliance, and investigations.

  • Detailed User Action Logs: Captures access attempts, approvals, and denials with timestamps.

  • Advanced Log Filtering: Enables filtering by user, lock, access level, site, or date range for targeted analysis.

  • Approval/Denial Decision Review: Allows review of decisions with reason codes for transparency.

  • Log Export Functionality: Supports exporting logs to SIEM, compliance, and analytics tools.

  • Custom Report Generation: Facilitates the creation of reports on access trends, security incidents, and compliance infractions.

Security & Compliance Considerations

  • Secure access is provided through OAuth 2.0 or API key authentication.

  • Role-based API access control establishes defined permission boundaries.

  • All API transactions are recorded for compliance and security audits.

  • Data retention policies can be customised based on company or site requirements.

secuirty and compliance .png
bottom of page