Access Control Overview

Core Access Control Capabilities

  1. Cloud-Native Management
    • Eliminate on-premise servers with centralized, cloud-based policy control—manage all locations from a single dashboard.

  2. Controller & Barrier Architecture
    • Supports remote management of barriers (doors and gates) through credential-authenticating controllers.

  3. Flexible Policy Engine
    • Configure access rules using Barrier Groups, Identity Groups, Schedules, and Authentication Profiles (e.g., Card, Card + PIN, REX) to define who can access what, when, and how.

  4. Real-Time Barrier Controls
    • View live status, control lock/unlock modes, and monitor real-time events such as forced or held-open doors.


Access Control Workflow Overview

Bringing it all together:

  • Install Controllers & Barriers: Deploy hardware like Axis A12/A16 models and configure entry points. (Hardware Support)

  • Manage Identities & Credentials: Assign cards, fobs, PINs, or mobile access to users.

  • Organize with Groups & Schedules: Define logical groupings of users and doors and apply time-based access schedules.

  • Create Access Policies: Combine users, barriers, schedules, and authentication types into enforceable rules.

  • Monitor Live Events & Logs: Get real-time visibility into access status and receive alerts for unauthorized activity or system issues.


Software & Hardware Compatibility

  • Controller Support: Supports Axis A1210, A1610, and A1601 models that meet minimum firmware requirements.

  • Reader Compatibility: Works with both Wiegand and OSDP V2 communication protocols.

  • Credential Options: Accepts 13.56MHz (recommended) and 125kHz cards/fobs, PIN codes, and mobile credentials (Bluetooth on iOS).

  • Credential Format: Uses hexadecimal formatting that must match the reader’s output structure.

  • User Capacity: Allows up to 10,000 unique identities per organization.

  • Authentication Methods: Supports Card-only, Card + PIN, and Request-to-Exit (REX) configurations.

  • Live Controls: Remotely lock, unlock, or grant access to barriers directly from the YourSixOS platform.

  • Time-Based Access: Define daily access permissions using weekly schedules and exception times for holidays or events.

  • Real-Time Alarming: Monitor and alert on critical events such as barriers being forced open or held open too long.

  • Event Notifications: Receive instant alerts for access granted/denied, alarm events, and changes in barrier status (e.g., locked, unlocked, accessed).


YourSixOS Data Sheet