Access Control Systems (ACS)
Systems for managing and monitoring access to physical spaces
Access control systems centralize access authorization for buildings, which means that you can use a single system to grant users access to one or more entrances. An access control system manages the following elements:
Who has access
The entrances to which users have access
The access schedule for each user and entrance
The access mechanismβPIN codes, mobile keys, or plastic cardsβfor each access grant
To grant access using the Seam access control system API, use the following basic process:
Create
acs_user
s.Configure access for these users. For some access control systems, configure the allowed entrances and access schedule. For other systems, use
acs_access_group
s. For details, see the system integration guide for your access control system.Create
acs_credential
s, which are the digital means of granting access to users, such as PIN codes, mobile keys, and plastic (RFID) cards. If you are developing a mobile app to provide access for your users, you can also use Seam's iOS and Android SDKs that pair with the Seam API to create and manage mobile keys.
Resources
The Access Control Systems (ACS) namespace contains the following resources:
Represents an access control system.
Within an acs_system
, create acs_user
s and acs_credential
s to grant access to the acs_user
s.
For details about the resources associated with an access control system, see the access control systems namespace.
Represents a user in an access control system.
An acs_user
typically refers to an individual who requires access, like an employee or resident. Each user can possess multiple credentials that serve as their keys or identifiers for access. The type of credential can vary widely. For example, in the Salto system, a user can have a PIN code, a mobile app account, and a fob. In other platforms, it is not uncommon for a user to have more than one of the same credential type, such as multiple key cards. Additionally, these credentials can have a schedule or validity period.
For details about how to configure acs_user
s in your access control system, see the corresponding system integration guide.
Represents an entrance within an access control system.
In an access control system, an entrance is a secured door, gate, zone, or other method of entry. You can list details for all the acs_entrance
resources in your workspace or get these details for a specific acs_entrance
. You can also list all entrances associated with a specific credential, and you can list all credentials associated with a specific entrance.
Group that defines the entrances to which a set of users has access and, in some cases, the access schedule for these entrances and users.
Some access control systems use access group, which are sets of users, combined with sets of permissions. These permissions include both the set of areas or assets that the users can access and the schedule during which the users can access these areas or assets. Instead of assigning access rights individually to each access control system user, which can be time-consuming and error-prone, administrators can assign users to an access group, thereby ensuring that the users inherit all the permissions associated with the access group. Using access groups streamlines the process of managing large numbers of access control system users, especially in bigger organizations or complexes.
To learn whether your access control system supports access groups, see the corresponding system integration guide.
Means by which an access control system user gains access at an entrance. The acs_credential
object represents a credential that provides an ACS user access within an access control system.
An access control system generally uses digital means of access to authorize a user trying to get through a specific entrance. Examples of credentials include plastic key cards, mobile keys, biometric identifiers, and PIN codes. The electronic nature of these credentials, as well as the fact that access is centralized, enables both the rapid provisioning and rescinding of access and the ability to compile access audit logs.
For each acs_credential
, you define the access method. You can also specify additional properties, such as a PIN code, depending on the credential type.
Represents a hardware device that encodes credential data onto physical cards within an access control system.
Some access control systems require credentials to be encoded onto plastic key cards using a card encoder. This process involves the following two key steps:
Credential creation Configure the access parameters for the credential.
Card encoding Write the credential data onto the card using a compatible card encoder.
Separately, the Seam API also supports card scanning, which enables you to scan and read the encoded data on a card. You can use this action to confirm consistency with access control system records or diagnose discrepancies if needed.
See Working with Card Encoders and Scanners.
To verify if your access control system requires a card encoder, see the corresponding system integration guide.
Last updated
Was this helpful?