Skip to main content
Access Control

Access Control Basics

Access control is one of those phrases that means very different things to different people. Some treat it as a card-swipe at one door; others treat it as a campus-wide identity platform. This guide walks through what access control actually is, the components that make it work, and the planning decisions that determine whether the system holds up over years of real use.
ACCESS EVENT FLOWCredential → audit log · every link recorded/01CredCredentialCard / mobile / PIN/02ReadReaderDecodes & forwards/03ContControllerChecks rules/04DeciDecisionGrant / deny/05LockLockStrike / mag / lockset/06DPSDPSDoor-position confirm/07VideVideoClip bookmark/08AudiAuditEvent loggedATS / ACCESS-EVENTREV. 01

Every credential becomes a chain of events — read, verified, decided, released, confirmed, recorded.

DOOR OPENING · ELEVATIONHardware Access Tech coordinates per openingFLOOR/01Door closer/02Door-position switch/03Hinge & power transfer/04Reader/05Lockset / lever/06Electric strike/07Request-to-exit (REX)/08Wiring → controllerATS / DOOR-OPENINGREV. 02

Per-opening hardware coordination is what makes the digital decision actually open a door.

8 min read

What access control is

An access control system decides who can open which doors, when, and produces a record of every event. It replaces or supplements mechanical keys with electronic credentials — cards, key fobs, mobile credentials, PINs, or biometrics — that are easier to issue, revoke, audit, and integrate with other systems.

The core components

  • Credentials — what the user presents (card, mobile, PIN, biometric)
  • Readers — what the door uses to identify a credential
  • Controllers / panels — the brain that decides whether to unlock
  • Electrified door hardware — what actually releases the door
  • Software / cloud platform — where users, schedules, and reports live
  • Audit trail — a record of every grant, denial, and event

Credentials

Credentials are the first decision and the one most users think about. Cards and key fobs are inexpensive and familiar but can be lost or shared. Mobile credentials reduce lost-card overhead and support remote issuance. PIN entry is cheap but vulnerable to sharing. Biometrics are difficult to share but more sensitive to environment and policy. Most facilities use a mix — and the right mix depends on traffic, sensitivity, and the people involved.

Door hardware

Access control is only as reliable as the door it sits on. Electric strikes, magnetic locks, electrified locksets, and electrified panic hardware each have different installation requirements, behavior under power loss, and life-safety implications. Choosing hardware before reviewing the door is the most common cause of access-control reliability problems.

Permissions, schedules, and groups

Permissions, time schedules, and user groups define how the system behaves day to day. The most useful systems mirror how the organization actually operates: morning unlock for the front office, late-night access for custodial, vendor windows for deliveries, holiday calendars that override regular schedules.

Audit trails

Every modern access platform produces an audit log of every event. Used well, that log answers HR questions, supports incident review, and identifies credential-policy problems. Used poorly, it's just data nobody looks at.

What to integrate with

  • Video surveillance — to pull camera clips for access events
  • Intrusion alarms — for automatic arming and disarming
  • Intercom and visitor entry — to log remote release as access events
  • Lockdown workflows — to change door behavior with a single trigger
  • Gate and garage access — to unify credentials across the perimeter
  • Identity / HR systems — to automate credential lifecycle

A planning checklist

  • Inventory every door in scope, including condition and existing hardware
  • Decide credential type(s) and issuance policy
  • Confirm life-safety, fire, and egress requirements for each opening
  • Plan network, power, and pathways before specifying readers
  • Define user groups, schedules, and exception workflows
  • Decide who owns day-to-day administration
  • Plan integration with video, alarms, and lockdown from day one
  • Document everything — and plan for documentation to be maintained
Next step

Ready to put this into practice?

Bring us a door, a camera, or a project that needs a plan. We'll help you map the next step.