Access Control Systems
Systems for managing and monitoring access to physical spaces
Last updated
Was this helpful?
Systems for managing and monitoring access to physical spaces
Last updated
Was this helpful?
Access control systems centralize access authorization for buildings, which means that you can use a single system to grant users access to one or more entrances. An access control system manages the following elements:
Who has access
The entrances to which users have access
The access schedule for each user and entrance
The access mechanism—PIN codes, mobile keys, or plastic cards—for each access grant
To grant access using the Seam access control system API, use the following basic process:
Create acs_user
s.
Configure access for these users.
For some access control systems, configure the allowed entrances and access schedule. For other systems, use acs_access_group
s. For details, see the for your access control system.
Create acs_credential
s, which are the digital means of granting access to users, such as PIN codes, mobile keys, and plastic (RFID) cards.
If you are developing a mobile app to provide access for your users, you can also use that pair with the Seam API to create and manage mobile keys.
Represents an .
Within an acs_system
, create and to grant access to the acs_user
s.
For details about the resources associated with an access control system, see the .
An acs_user
typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
In an access control system, an entrance is a secured door, gate, zone, or other method of entry. You can list details for all the acs_entrance
resources in your workspace or get these details for a specific acs_entrance
. You can also list all entrances associated with a specific credential, and you can list all credentials associated with a specific entrance.
Group that defines the entrances to which a set of users has access and, in some cases, the access schedule for these entrances and users.
An access control system generally uses digital means of access to authorize a user trying to get through a specific entrance. Examples of credentials include plastic key cards, mobile keys, biometric identifiers, and PIN codes. The electronic nature of these credentials, as well as the fact that access is centralized, enables both the rapid provisioning and rescinding of access and the ability to compile access audit logs.
For each acs_credential
, you define the access method. You can also specify additional properties, such as a PIN code, depending on the credential type.
Some access control systems require credentials to be encoded onto plastic key cards using a card encoder. This process involves the following two key steps:
Credential creation Configure the access parameters for the credential.
Card encoding Write the credential data onto the card using a compatible card encoder.
Separately, the Seam API also supports card scanning, which enables you to scan and read the encoded data on a card. You can use this action to confirm consistency with access control system records or diagnose discrepancies if needed.
Represents a in an .
For details about how to configure acs_user
s in your access control system, see the corresponding .
Represents an within an .
Some access control systems use , which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.
To learn whether your access control system supports access groups, see the corresponding .
Means by which an gains access at an . The acs_credential
object represents a that provides an ACS user access within an .
Represents a hardware device that encodes data onto physical cards within an .
See .
To verify if your access control system requires a card encoder, see the corresponding .