
Smart Access Control Management
The Application Programming Interfaces (AP) facilitate multi-tenant, multi-site environments by enabling detailed access policies, real-time auditing, and automation of access workflows. This manual effort, boosts security, and guarantees adherence to regulations.
Features

User Management ( API )
-
Role-Based Access Control (RBAC): Enables streamlined user lifecycle management.
-
Dynamic User Creation: Supports creation of various user roles (Organisation Admin, Company Admin, Site Admin, User).
-
Flexible User Assignment: Allows assignment of users to specific companies and sites.
-
Configurable Access Levels: Offers automatic or request-based access level assignment.
-
User Profile Management: Provides the ability to view user profiles, including roles and permissions.
-
User Status Tracking: Enables checking of user active/inactive status.
-
User Detail Editing: Allows modification of user details and access.
-
Safe User Deactivation: Supports deactivation of users prior to deletion.
-
Deletion Prevention: Prevents deletion of users with active access or pending requests.
Access Level & Permission Management API
-
Simplified Access Management: Effortlessly create, assign, and modify access permissions for users, locks, and sites.
-
Flexible Access Configuration: Supports both automatic (direct entry) and approval-based (request-based) access.
-
Real-Time Access Monitoring: Provides real-time visibility into who has access to what.
-
Adaptable Security Policies: Allows permissions to be adapted to align with evolving security policies.
-
Access Request Tracking: Tracks the status of access requests (pending, approved, denied).
-
Approval Decision Logging: Maintains logs of approval decisions for auditing and review.
-
Contextual Access Association: Enables associating access levels with specific users, locations, or devices.


Site & Company Management API
-
Hierarchical Company/Site Management: Enables external systems to manage the hierarchical structure of companies and sites within the ACMS platform.
-
Site/Company Creation and Structuring: Allows for the creation and organization of sites and companies within an organization.
-
User, Lock, and Policy Assignment: Permits the assignment of users, locks, and policies (geo-fencing, pre/post-operation rules) to specific sites or companies.
-
Information Access: Provides access to information regarding site/company associations, user permissions, and lock settings.
Mobile-FirstAccess Control
Secure smartphone-based credentials replace traditional keys and cards, providing cloud-provisioned access with real-time updates.
Multi-Site & Multi-Tenant Support
Oversee distributed access control across various companies, locations, and locks, along with detailed policies for pre-operation and post-operation access, geo-fencing, and flexible site permissions.
Centralised Cloud Management
Web-based dashboard for managing access across multiple sites with Scalable SaaS deployment with o on-prem infrastructure needed.
Lock & Site Access Control API
-
External System Lock Control: Allows external systems to manage lock access policies.
-
Policy Enforcement via Geo-fencing, Operational Checks, and Security Workflows: Uses location, operational status, and security procedures to control access.
-
Company/Site-Linked Lock Management: Enables managing locks associated with specific companies or sites.
-
Access Verification: Provides the ability to verify lock availability, user access, and access levels.
-
Location-Based Access Regulation: Implements access restrictions based on user location.
-
Photo Validation: Supports review and upload of photo validation criteria (before and after operations).
-
Emergency Override Functionality: Facilitates emergency overrides for authorized roles (security, facility management).
-
Override Log Monitoring: Tracks override logs for auditing and compliance.


Lock History & Event Auditing API
-
Real-Time and Historical Lock Activity Logging: Provides comprehensive records for security, compliance, and investigations.
-
Detailed User Action Logs: Captures access attempts, approvals, and denials with timestamps.
-
Advanced Log Filtering: Enables filtering by user, lock, access level, site, or date range for targeted analysis.
-
Approval/Denial Decision Review: Allows review of decisions with reason codes for transparency.
-
Log Export Functionality: Supports exporting logs to SIEM, compliance, and analytics tools.
-
Custom Report Generation: Facilitates the creation of reports on access trends, security incidents, and compliance infractions.
Security & Compliance Considerations
-
Secure access is provided through OAuth 2.0 or API key authentication.
-
Role-based API access control establishes defined permission boundaries.
-
All API transactions are recorded for compliance and security audits.
-
Data retention policies can be customised based on company or site requirements.
