Access Control Glossary

Access control is a huge and complex topic -- that's why we've constructed a glossary for all the terms you might not be able to find in standard articles. 

Manager Checklist

ORDER LIST

For quick viewing, a definition overview is written for each glossary term for quick viewing. But we've also delved deeper into each term with comprehensive explanations on their individual pages.

By design this list is a beta project and far from complete -- it will be updated continuously.

Alarm Filter

Definition:

A checklist from which alarm types can be chosen to monitor.


Read More

What are Account Panels in my Access System?

Definition:

A panel that sends events to a receiver through a supported connection path in your network.

Read More

Access Control and Identity Management

Definition:

Identity and Access Management, or briefly IAM is a system of security policies and tools that allows the right people to access the right resources for the right reason at the right time.

Read More

Access Panels in Office Security

Definition:

A device that can control up to 64 card readers in a space.

Read More

Active Badge in Access Control

Definition:

A card that is marked active in your security system.

Read More

Active Directory Service Interfaces

Definition:

A set of COM interfaces which are used to access directory services from different networks.


Read More

Advanced Encryption Standard

Definition:

A specification of electronic data encryption established by the U.S. government to protect sensitive information.


Read More

Alarm Panel

Definition:

A specialized circuit board containing alarm inputs and outputs that connects to an access panel.


Read More

Anti Passback

Definition:

Anti passback is a security system feature that is used to prevent users from passing their credentials (such as access card or similar device) back to a second person to enter a security controlled area, such as a car park or employee building. 

It can also stop users to enter the controlled area by following or tailgating another person.

Read More

Arm Alarm

Definition:

The process of turning on monitoring for a space.


Read More

Automation Software

Definition:

A software package that handles reported events and displays them for monitoring purposes.

Read More

CCD Camera

Definition:

A video camera that contains a charged-coupled device, which is a transistorized light sensor on an integrated circuit.

Read More

CCTV Switcher

Definition:

A device use by security camera systems to automatically switch between cameras in monitoring mode.


Read More

Card Encoder

Definition:

A device that encodes user information on plastic access cards.


Read More

Card Number

Definition:

A unique ID number assigned to a cardholder’s badge.


Read More

Card Types

Definition:

Different methods of access card encoding technologies, including magnetic, Wiegand, and smart cards.

Read More

Cardholder Activation Date

Definition:

The date on which a card becomes valid.


Read More

Centralized Access Control

Definition:

Centralized access control enables the user to access all applications, websites and other computing systems from a single profile, with the same credentials from any location. 

All information assets in control of the user are subject to unified identity management.

Read More

Check in Check out in Access Control

Definition:

A check-in check-out is a system used for tracking of assets such as rental or library items, tools, cars, office files or folders used by multiple people etc. With this system, you can find out who owns the item at the moment and when does it need to be back. 

Beyond the everyday tracking, check-in/check-out systems can also provide reports on asset usage such as: what’s used most and what’s used least to adjust your asset collection, which assets have been used most and need replacement, but most importantly, the system reduces the risk of having lost or stolen items.

Read More

Cipher Mode

Definition:

A mode of operation used by readers with keypads that requires users to enter a master key before allowing card access.

Read More

Ciphertext

Definition:

An unreadable message that must be decrypted before being understood.

Read More

Cleartext

Definition:

A readable message that has been decrypted.


Read More

Common Access Card

Definition:

A standard badge card issued by the U.S. government that is used to access secure facilities.

Read More

Continuous Archiving

Definition:

The automatic process of sending video clips from selected cameras to a secondary location for storage.

Read More

Delay Arm

Definition:

Arming a space with a delay.


Read More

Disarm Alarm

Definition:

Disarm alarm, or alarm deactivation, means turning the system off. 

Read More

Door Holder

Definition:

A mechanical device that holds a door open until instructed by the security system to change status.

Read More

Door Strike

Definition:

A mechanical device that keeps a door locked.


Read More

Duress Alarm Button

Definition:

Duress alarm (also known as ‘panic switcher’ or ‘panic button’) is an electronic device that is designed to assist in requesting assistance in case of an emergency situation. 

Read More

Elevator Reader

Definition:

A reader with an output module that controls access to multiple floors via an elevator system.


Read More

False Acceptance Rate

Definition:

The frequency with which users who should be denied access to an asset are granted permission.


Read More

False Reject Rate

Definition:

The frequency with which users who should be granted access to an asset are denied permission.


Read More

How do Access Levels Work?

Definition:

How do access levels work and how should I assign them?


Read More

Intrusion Detection

Definition:

Access control and Intrusion detection is a combined system of hardware and software components that lets the user control the physical access to the interior of a building, a room or another type of closed space, at the same time protecting the space from intruders who trespass or violate the physical perimeter in any other way from the outside.

Read More

What Are Access Control Groups?

Definition:

A collection of users, computers, or contacts that can be used for security or distribution purposes.


Read More

What are Cardholder Access Group?

Definition:

A collection of hardware access levels that have been grouped together for convenient use by one or more employees.


Read More

What does a Conettix D6600 do?

Definition:

A communications receiver and gateway that improves multiple aspects of system communication.

Read More

What is System Alarm Acknowledgment?

Definition:

The act of using software to respond to a triggered alarm.


Read More

eCard in Access Control

Definition:

A file that specifies information such as a person’s name, organization, and any other personal information they wish to include.


Read More

Lightweight Directory Access Protocol

Definition:

A software protocol that is commonly used to interact with servers that store user information, allowing users in a network to locate resources.


Read More

Lockdown

Definition:

Lockdown and lockout are two different features within a standard response protocol every feasible access control plan should incorporate.

In brief, lockdown is a feature that is locking down doors, windows, or gates to prevent access to a certain room. Lockout is a feature that locks the outside perimeter of an area.

Read More

Magnetic Stripe

Definition:

A magnetic stripe is located on the back of a plastic badge (usually a magnetic stripe card) and contains encoded information which allows access to a secure area.

Read More

Mantrap

Definition:

A mantrap is an access control tool designed and restricted to a physical space, which is separated from the adjoining spaces (rooms) by two doors, usually an exit and an entry door that cannot be unlocked at the same time. 

Mantraps are like a double-door checking system that use either airlock technology or interlocking doors.  

Read More

Master Arm

Definition:

An operating mode in which an entire area, including interior and exterior, is armed.

Read More

Master Reader

Definition:

An intelligent card reader that contains its own database and is capable of granting access without pinging an access panel.


Read More

Mean Time Between Failures

Definition:

A measure of a hardware product’s reliability that is calculated by predicting the amount of time between each individual failing.


Read More

Monitor Station

Definition:

A computer that displays all of the alarm monitoring stations defined in an access control system.



Read More

Motion Detector

Definition:

A device that detects movement within a space.

Read More

Muster Report

Definition:

A real-time list of everyone in a certain site.


Read More

ONVIF: Open Network Video Interface Forum

Definition:

ONVIF refers to Open Network Video Interface Forum, which is an open industry forum founded in 2008, aimed at facilitating the development and adaptation of a global open standard for the interface of physical Internet-Protocol (IP) based products.

Read More

OSDP: Open Supervised Device Protocol

Definition:

OSDP stands for Open Supervised Device Protocol. It is a communication interface that connects a reader with a device it is linked to.

As its name implies, this protocol is open to all manufacturers of readers, controllers and software. Security Industry Association (SIA) recognizes OSDP as a standard interface along with Wiegand and Clock and Data.

Read More

Passive Infrared Sensor

Definition:

A passive infrared sensor is an electronic device that is designed to detect motion of a living being as the latter always presents a source of an infrared radiation. 

Read More

Peripheral Device

Definition:

A device that is connected to a computer but external to its central processing unit (CPU).

Read More

QR Codes in Access Control

Overview:

The use of QR codes to grant access to certain resources within an office.

Read More

Request to Exit Button

Overview:

Request to exit (REX) devices are applied in access control to allow exit through a locked door.

Read More

Role Based Access Control

Overview:

RBAC security approach relies on giving access to certain facilities or information based on a person’s role within an organization.

In other words, employees are only granted access to data and equipment that are needed to perform their job duties. A role is therefore associated with a set of access rights.

Read More

Security Clearance Level

Overview:

The level of access granted to guards who will accompany certain tours through your space.

Read More

Shear Lock

Overview:

Shear lock is an electromagnetic lock that has a magnet mounted inside of a door frame and a plate affixed to the door edge. 

Read More

Signature Tablet

Overview:

An electronic device that captures a user’s signature for identity verification.


Read More

Simple Network Management Protocol

Overview:

An internet protocol of collecting, organizing, and modifying information about managed devices in a network.

Read More

Slave Reader

Overview:

An unintelligent card reader that must consult its master reader to grant access to a space.


Read More

Storeroom Function

Overview:

The storeroom function of a lock presupposes that the the door should always be kept locked.

Read More

Tailgating (Security)

Overview:

Tailgating is a form of a security breach that occurs when an unauthorized person or a vehicle follows an authorized staff member or an automobile and thus intrudes on a secured premise. 

Read More

Two-man Rule

Overview:

The simplest way to explain the two-man rule is to say that it’s a “Buddy System” for grownups. It’s a procedure in which two people operate together as a single unit so that they are able to monitor and help each other to ensure the work is finished safely.

The purpose of the two-man rule is to have control and a high level of security for especially critical material or operations (such as nuclear weapons, submarines, laboratories, aircrafts etc.).

Read More

Uninterruptible Power Supply

Overview:

A device that continues to provide power to its attached devices even in the event of an outage.

Read More

User Ingress

Overview:

The entry of a cardholder through a point.


Read More

Video Capture Board

Overview:

A circuit board that scans an image, digitizes it, and stores its digital representation in a software system.


Read More

Video Verification

Overview:

The process of comparing a live video image of a cardholder with a stored photograph of that person.


Read More

Wiegand in Access Control

Overview:

Wiegand is a wire communication interface between a reader (i.e. a card-, a fingerprint- or other data capture devices) and a controller. It is widely used in access control systems.

On the physical level, the Wiegand interface consists of three conductors: Data0, Data1 (transmission wires) and Ground wire.

Read More

vCalendar

Overview:

An industry standard of electronic calendars and schedules for groups.


Read More

Subscribe to our newsletter

Get the latest product and company updates

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.