

Smart Access Control Management
The Application Programming Interfaces (AP) facilitate multi-tenant, multi-site environments by enabling detailed access policies, real-time auditing, and automation of access workflows. This manual effort, boosts security, and guarantees adherence to regulations.
Home > WMSenseHub > WMCommand
Features

User Management ( API )
-
Role-Based Access Control (RBAC): Simplifies user lifecycle management.
-
Dynamic User Creation: Supports creating various roles (Organisation Admin, Company Admin, Site Admin, User).
-
Flexible User Assignment: Allows users to be assigned to specific companies and sites.
-
Configurable Access Levels: Offers automatic or request-based access level assignments.
-
User Profile Management: Enables viewing and managing user profiles, roles, and permissions.
-
User Status Tracking: Tracks whether users are active or inactive.
-
User Detail Editing: Allows modifications to user details and access.
-
Safe User Deactivation: Supports deactivating users before deletion.
-
Deletion Prevention: Prevents deletion of users with active access or pending requests.
Access Level & Permission Management API
-
Access Level & Permission Management API
-
Simplified Management: Easily create, assign, and modify user, lock, and site permissions.
-
Flexible Configuration: Supports automatic and approval-based access.
-
Real-Time Monitoring: Provides live visibility of access activities.
-
Adaptable Policies: Adjust permissions to align with changing security requirements.
-
Access Request Tracking: Monitors the status of requests (pending, approved, denied).
-
Approval Logging: Keeps logs of approval decisions for auditing.
-
Contextual Access: Associates access levels with specific users, locations, or devices.


Site & Company Management API
-
Site & Company Management API
-
Hierarchical Management: Enables external systems to manage company and site structures within the ACMS platform.
-
Site/Company Creation & Structuring: Allows the creation and organization of sites and companies within an organization.
-
User, Lock, & Policy Assignment: Supports the assignment of users, locks, and policies (geo-fencing, pre/post-operation rules) to specific sites or companies.
-
Information Access: Provides access to details on site/company associations, user permissions, and lock settings.
Lock History & Event Auditing API
-
Real-Time & Historical Activity Logging: Provides detailed records for security, compliance, and investigation purposes.
-
User Action Logs: Tracks access attempts, approvals, and denials with timestamps.
-
Advanced Log Filtering: Allows filtering by user, lock, access level, site, or date range for focused analysis.
-
Approval/Denial Review: Facilitates the review of decisions with reason codes for transparency.
-
Log Export: Enables exporting logs to SIEM, compliance, and analytics tools.
-
Custom Report Generation: Supports creating reports on access trends, security incidents, and compliance violations.


Lock & Site Access Control API
-
External System Lock Control: Allows external systems to manage lock access policies.
-
Policy Enforcement: Controls access through geo-fencing, operational status, and security workflows.
-
Company/Site-Linked Lock Management: Manages locks associated with specific companies or sites.
-
Access Verification: Verifies lock status, user access, and access levels.
-
Location-Based Access Control: Restricts access based on the user’s location.
-
Photo Validation: Enables photo verification for operations (before and after).
-
Emergency Override: Provides emergency override capabilities for authorized roles (e.g., security, facility management).
-
Override Log Monitoring: Tracks and audits override actions for compliance.
-
Web-based Dashboard: Centralized access management across multiple sites with scalable SaaS deployment, no on-prem infrastructure required.
Security & Compliance Considerations
-
Secure access is provided through OAuth 2.0 or API key authentication.
-
Role-based API access control establishes defined permission boundaries.
-
All API transactions are recorded for compliance and security audits.
-
Data retention policies can be customised based on company or site requirements.

Mobile-First Access Control
Smartphone-based credentials replace traditional keys and cards, offering cloud-provisioned access with real-time updates.
Multi-Site & Multi-Tenant Support
Manage access control across multiple companies, locations, and locks, with detailed policies for pre-operation/post-operation access, geo-fencing, and flexible site permissions.
Centralised Cloud Management
Manage access control across multiple companies, locations, and locks, with detailed policies for pre-operation/post-operation access, geo-fencing, and flexible site permissions.