top of page
Smart Home System

Smart Access Control Management

The Application Programming Interfaces (AP) facilitate multi-tenant, multi-site environments by enabling detailed access policies, real-time auditing, and automation of access workflows. This manual effort, boosts security, and guarantees adherence to regulations.

Features

On the Phone

User Management ( API )

  • Role-Based Access Control (RBAC): Simplifies user lifecycle management.

  • Dynamic User Creation: Supports creating various roles (Organisation Admin, Company Admin, Site Admin, User).

  • Flexible User Assignment: Allows users to be assigned to specific companies and sites.

  • Configurable Access Levels: Offers automatic or request-based access level assignments.

  • User Profile Management: Enables viewing and managing user profiles, roles, and permissions.

  • User Status Tracking: Tracks whether users are active or inactive.

  • User Detail Editing: Allows modifications to user details and access.

  • Safe User Deactivation: Supports deactivating users before deletion.

  • Deletion Prevention: Prevents deletion of users with active access or pending requests.

Access Level & Permission Management API

  • Access Level & Permission Management API

  • Simplified Management: Easily create, assign, and modify user, lock, and site permissions.

  • Flexible Configuration: Supports automatic and approval-based access.

  • Real-Time Monitoring: Provides live visibility of access activities.

  • Adaptable Policies: Adjust permissions to align with changing security requirements.

  • Access Request Tracking: Monitors the status of requests (pending, approved, denied).

  • Approval Logging: Keeps logs of approval decisions for auditing.

  • Contextual Access: Associates access levels with specific users, locations, or devices.

Digital Security System
Working in the Warehouse

Site & Company Management API

  • Site & Company Management API

  • Hierarchical Management: Enables external systems to manage company and site structures within the ACMS platform.

  • Site/Company Creation & Structuring: Allows the creation and organization of sites and companies within an organization.

  • User, Lock, & Policy Assignment: Supports the assignment of users, locks, and policies (geo-fencing, pre/post-operation rules) to specific sites or companies.

  • Information Access: Provides access to details on site/company associations, user permissions, and lock settings.

Lock History & Event Auditing API

  • Real-Time & Historical Activity Logging: Provides detailed records for security, compliance, and investigation purposes.

  • User Action Logs: Tracks access attempts, approvals, and denials with timestamps.

  • Advanced Log Filtering: Allows filtering by user, lock, access level, site, or date range for focused analysis.

  • Approval/Denial Review: Facilitates the review of decisions with reason codes for transparency.

  • Log Export: Enables exporting logs to SIEM, compliance, and analytics tools.

  • Custom Report Generation: Supports creating reports on access trends, security incidents, and compliance violations.

Technology
Love Locks

Lock & Site Access Control API

  • External System Lock Control: Allows external systems to manage lock access policies.

  • Policy Enforcement: Controls access through geo-fencing, operational status, and security workflows.

  • Company/Site-Linked Lock Management: Manages locks associated with specific companies or sites.

  • Access Verification: Verifies lock status, user access, and access levels.

  • Location-Based Access Control: Restricts access based on the user’s location.

  • Photo Validation: Enables photo verification for operations (before and after).

  • Emergency Override: Provides emergency override capabilities for authorized roles (e.g., security, facility management).

  • Override Log Monitoring: Tracks and audits override actions for compliance.

  • Web-based Dashboard: Centralized access management across multiple sites with scalable SaaS deployment, no on-prem infrastructure required.

Security & Compliance Considerations

  • Secure access is provided through OAuth 2.0 or API key authentication.

  • Role-based API access control establishes defined permission boundaries.

  • All API transactions are recorded for compliance and security audits.

  • Data retention policies can be customised based on company or site requirements.

Image by Artist Istanbul

Mobile-First Access Control

Smartphone-based credentials replace traditional keys and cards, offering cloud-provisioned access with real-time updates.

Multi-Site & Multi-Tenant Support

Manage access control across multiple companies, locations, and locks, with detailed policies for pre-operation/post-operation access, geo-fencing, and flexible site permissions.

Centralised Cloud Management

Manage access control across multiple companies, locations, and locks, with detailed policies for pre-operation/post-operation access, geo-fencing, and flexible site permissions.

bottom of page