Learn

Access all YourSix resources in one place—articles, videos, documentation, and more—designed to help you quickly find the information you need.

Access Control Overview

Core Access Control Capabilities

  • Cloud-Native Management
    Eliminate on-premise servers with centralized, cloud-based policy control—manage all locations from a single dashboard.
  • Controller & Barrier Architecture
    Supports remote management of barriers (doors and gates) through credential-authenticating controllers.
  • Flexible Policy Engine
    Configure access rules using Barrier Groups, Identity Groups, Schedules, and Authentication Profiles (e.g., Card, Card + PIN, REX) to define who can access what, when, and how.
  • Real-Time Barrier Controls
    View live status, control lock/unlock modes, and monitor real-time events such as forced or held-open doors.

Access Control Workflow Overview

Bringing it all together:

  • Install Controllers & Barriers: Deploy hardware, such as Axis A12/A16 models, and configure entry points. (Hardware Support)
  • Manage Identities & Credentials: Assign cards, fobs, PINs, or mobile access to users.
  • Organize with Groups & Schedules: Define logical groupings of users and doors and apply time-based access schedules.
  • Create Access Policies: Combine users, barriers, schedules, and authentication types into enforceable rules.
  • Monitor Live Events & Logs: Get real-time visibility into access status and receive alerts for unauthorized activity or system issues.

Software & Hardware Compatibility

  • Controller Support: Supports Axis A1210, A1610, and A1601 models that meet minimum firmware requirements.
  • Reader Compatibility: Works with both Wiegand and OSDP V2 communication protocols.
  • Credential Options: Accepts 13.56MHz (recommended) and 125kHz cards/fobs, PIN codes, and mobile credentials (Bluetooth on iOS).
  • Credential Format: Uses hexadecimal formatting that must match the reader’s output structure.
  • User Capacity: Allows up to 10,000 unique identities per organization.
  • Authentication Methods: Supports Card-only, Card + PIN, and Request-to-Exit (REX) configurations.
  • Live Controls: Remotely lock, unlock, or grant access to barriers directly from the YourSixOS platform.
  • Time-Based Access: Define daily access permissions using weekly schedules and exception times for holidays or events.
  • Real-Time Alarming: Monitor and alert on critical events such as barriers being forced open or held open too long.
  • Event Notifications: Receive instant alerts for access granted/denied, alarm events, and changes in barrier status (e.g., locked, unlocked, accessed).