Kisi Introduction To Access Control Systems
Kisi Introduction To Access Control Systems
Access Control
Systems
A guide to getting started with
access control
www.getkisi.com
Access Control Systems
Getting started with access control can be overwhelming at first with
so many technical terms and things to wrap your head around. But under-
standing access control systems is really an achievable goal - especially after
reading this guide.
This is really a 101 crash course guide for access control systems. If you want
to get a relatively quick idea of how access control works, you’ve come to the
right place.
If you are new to the world of
physical access control, you
might have some questions like:
Components
What are the pieces of
Why
an access control
system and how does it What are typical
work? reasons why people
choose access
control?
Is it absolutely needed that you learn about access control yourself? No, definitely not.
However it will save you tons of time when you are into your project allow you to under-
stand some of the basic terms commonly used in access control
****
Introduction to
Access Control Systems
As long as you are carrying an access card or ID badge, it means that your
office uses an access system
But how does it really work? It's difficult since most people have never seen an access
system. Most people believe it is just a card reader on the wall.
Of course there is a little bit more to it in reality. It’s not very difficult though, there are
just a few parts behind the scenes that make the magic of easily unlocking a door every
time.
Reading this will give you a full and comprehensive understanding how access control
systems work and the language needed to communicate about it with vendors.
What is an access
control system?
Let’s keep this simple: An access control
system allows you to manage, monitor and Access
Since the introduction of the manage access or entry to almost anything: file
key some 4000 years ago, much access, workstation access, printer access and
more advanced systems have in our case, door, facility, building or office
been introduced. Today there access. The standard form of today’s access
electronic access control to grant access to the secured area. In the case
Credentials
This is your electronic “key” and what you have that gets you access.
It could be access cards, ID badges, ID cards or smartphone based
mobile app access. People can use it to gain access through the doors
secured by access control systems. The form factor of access cards is
the same as credit cards, so it fits in the wallet or purse. However
demagnetization is very common with basic access control cards. The
benefit of using credentials is that they are personalized, so any
unlock event can be tracked back to the person associated with the
credential.
Card reader
Mounted on the wall, the card reader electronically reads your credentials
and sends the request to unlock the door with your user credentials to a
server. Typically the type of cards used are proximity cards which require
the card to be held in a 2” to 6” proximity to the reader .
Card readers are mounted outside of the perimeter (exterior non-secured
wall) next to the door they should be unlocking. In addition to card
readers, some access control systems provide the option of using
keypads (PINS) or biometrics instead of cards or smartphones as creden-
tials. This is rather uncommon, since PINs can easily be passed on and
biometrics are harder to manage.
Admin-facing side
of Access Control
The admin facing side is where your office In more advanced systems the manual operations aspect can
administrator, head of security or IT manager be automated - as an example the provisioning and de-provsi-
sets the parameters of who is allowed to oining (creating and deleting access) can be done automati-
access under which circumstances. This cally by connecting the access dashboard to your company
involves a management dashboard (often in directory of employees. When a new employee shows up in
the cloud these days) and a way to provision the system, a new access right is automatically provisioned
access, e.g. a card programming device. via a directory like Google Apps, Microsoft Azure, SAML or
Okta.
Management dashboard or portal where API and integrations can be used to automate
administrators can manage manual workflows and make operations less prone to
errors
Power to lock
Pro Controller
Lock
CAT6 cable
Pro Reader
Supply
CAT6 cable
Locks
Electronic locks are used to electrically unlock the door that
it is installed on. They typically have a wire that supplies
them with power.
In terms of the electronic locks used, we see everything from electronic strikes, electromagnetic locks
(mag locks), electric exit devices, electrified mortise door lock sets and many more. Based on your door
type and construction, the integrator will specify the best lock to install.
Independent of the lock installed, they are typically wired back to the access control system panel.
----
Also included is the wiring to connect everything and Again, the most important thing about quotes is that you get
set up the system, a license for maintenance and line items so you understand what is being done. If the
support which sometimes includes the hosting and a access control installer lumps everything together in one
few accessories. Vendors sometimes include a trip sum like above they sometimes ballpark the numbers and
charge or service call. don’t specify the brand of hardware they use
It is of high importance to clarify at this point if the quote
Because the company wants to manage access from includes a Certificate of Insurance (COI) which you can ask
remote, a cloud-based physical access control system your building management if you are required to have this for
is recommended. This allows logging on to a web incoming vendors. This makes sure possible damages by a
based portal from any browser and - given the correct vendor up to a certain amount are covered.
credentials are presented - to make changes to the
access rights and share or revoke access from remote.
****
****
****
Because the company wants to manage access from remote, a cloud-based physical access control system is
recommended. This allows logging on to a web based portal from any browser and - given the correct credentials
are presented - to make changes to the access rights and share or revoke access from remote.
****
How it Works
https://www.getkisi.com/how-it-works
https://www.getkisi.com/pricing
Contact Us
https://www.getkisi.com/contact-us
CAL L US EMAIL
646-663-4880 [email protected]