Access Control Overview
Core Access Control Capabilities
-
Cloud-Native Management
• Eliminate on-premise servers with centralized, cloud-based policy control—manage all locations from a single dashboard. -
Controller & Barrier Architecture
• Supports remote management of barriers (doors and gates) through credential-authenticating controllers. -
Flexible Policy Engine
• Configure access rules using Barrier Groups, Identity Groups, Schedules, and Authentication Profiles (e.g., Card, Card + PIN, REX) to define who can access what, when, and how. -
Real-Time Barrier Controls
• View live status, control lock/unlock modes, and monitor real-time events such as forced or held-open doors.
Access Control Workflow Overview
Bringing it all together:
-
Install Controllers & Barriers: Deploy hardware like Axis A12/A16 models and configure entry points. (Hardware Support)
-
Manage Identities & Credentials: Assign cards, fobs, PINs, or mobile access to users.
-
Organize with Groups & Schedules: Define logical groupings of users and doors and apply time-based access schedules.
-
Create Access Policies: Combine users, barriers, schedules, and authentication types into enforceable rules.
-
Monitor Live Events & Logs: Get real-time visibility into access status and receive alerts for unauthorized activity or system issues.
Software & Hardware Compatibility
-
Controller Support: Supports Axis A1210, A1610, and A1601 models that meet minimum firmware requirements.
-
Reader Compatibility: Works with both Wiegand and OSDP V2 communication protocols.
-
Credential Options: Accepts 13.56MHz (recommended) and 125kHz cards/fobs, PIN codes, and mobile credentials (Bluetooth on iOS).
-
Credential Format: Uses hexadecimal formatting that must match the reader’s output structure.
-
User Capacity: Allows up to 10,000 unique identities per organization.
-
Authentication Methods: Supports Card-only, Card + PIN, and Request-to-Exit (REX) configurations.
-
Live Controls: Remotely lock, unlock, or grant access to barriers directly from the YourSixOS platform.
-
Time-Based Access: Define daily access permissions using weekly schedules and exception times for holidays or events.
-
Real-Time Alarming: Monitor and alert on critical events such as barriers being forced open or held open too long.
-
Event Notifications: Receive instant alerts for access granted/denied, alarm events, and changes in barrier status (e.g., locked, unlocked, accessed).