top of page
Smart Home System

Smart Access Control Management

The Application Programming Interfaces (AP) facilitate multi-tenant,
multi-site environments by enabling detailed access policies, real-time auditing, and automated workflows. 

Features

Unknown.jpeg

User Management ( API )

  • Role-Based Access Control (RBAC): Simplifies user lifecycle management with clearly defined roles.

  • Flexible User & Role Assignment: Create and assign users across organisations, companies, and sites.

  • Configurable Access Levels: Supports automatic or request-based access provisioning.

  • User Profile & Status Management: View, edit, activate, or deactivate users and permissions.

  • Secure Deactivation & Deletion Controls: Prevents removal of users with active access or pending requests.

Access Level & Permission Management API

  • Centralised Permission Management: Create, assign, and modify user, lock, and site access from a single platform.

  • Flexible Access Configuration: Supports both automatic and approval-based access workflows.

  • Real-Time Access Visibility: Monitor live access activities and status updates.

  • Context-Aware Access Control: Link permissions to specific users, locations, or devices.

  • Audit-Ready Approval Tracking: Log access requests and approval decisions for compliance and review.

Digital Security System
Working in the Warehouse

Site & Company Management API

  • Site & Company Management API

  • Hierarchical Management: Enables external systems to manage company and site structures within the ACMS platform.

  • Site/Company Creation & Structuring: Allows the creation and organization of sites and companies within an organization.

  • User, Lock, & Policy Assignment: Supports the assignment of users, locks, and policies (geo-fencing, pre/post-operation rules) to specific sites or companies.

  • Information Access: Provides access to details on site/company associations, user permissions, and lock settings.

Lock History & Event Auditing API

  • Real-Time & Historical Activity Logging: Provides detailed records for security, compliance, and investigation purposes.

  • User Action Logs: Tracks access attempts, approvals, and denials with timestamps.

  • Advanced Log Filtering: Allows filtering by user, lock, access level, site, or date range for focused analysis.

  • Approval/Denial Review: Facilitates the review of decisions with reason codes for transparency.

  • Log Export: Enables exporting logs to SIEM, compliance, and analytics tools.

  • Custom Report Generation: Supports creating reports on access trends, security incidents, and compliance violations.

Technology
Love Locks

Lock & Site Access Control API

  • Centralised Lock Control: Enable external systems to manage lock access across companies and sites.

  • Policy-Based Access Enforcement: Apply geo-fencing, operational status, and security workflows to control access.

  • Real-Time Access Verification: Validate lock status, user identity, and access levels before entry.

  • Location & Evidence-Based Access: Support location-based restrictions and photo validation for secure operations.

  • Emergency Override with Audit Logs: Allow authorised overrides with full monitoring and compliance tracking.

Security & Compliance Considerations

  • Secure access is provided through OAuth 2.0 or API key authentication.

  • Role-based API access control establishes defined permission boundaries.

  • All API transactions are recorded for compliance and security audits.

  • Data retention policies can be customised based on company or site requirements.

Image by Artist Istanbul

Mobile-First Access Control

Smartphone-based credentials replace traditional keys and cards, offering cloud-provisioned access with real-time updates.

Multi-Site & Multi-Tenant Support

Manage access control across multiple companies, locations, and locks, with detailed policies for pre-operation/post-operation access, geo-fencing, and flexible site permissions.

Centralised Cloud Management

Manage access control across multiple companies, locations, and locks, with detailed policies for pre-operation/post-operation access, geo-fencing, and flexible site permissions.

bottom of page