Access control is a huge and complex topic -- that's why we've constructed a glossary for all the terms you might not be able to find in standard articles.
For quick viewing, a definition overview is written for each glossary term for quick viewing. But we've also delved deeper into each term with comprehensive explanations on their individual pages.
By design this list is a beta project and far from complete -- it will be updated continuously.
An access card is a component of an access control system which enables employees or visitors gain entry to business facilities or secure areas.
Access restriction can be obtained by encoding data on the ID cards.
Identity and Access Management, or briefly IAM is a system of security policies and tools that allows the right people to access the right resources for the right reason at the right time.
Anti passback is a security system feature that is used to prevent users from passing their credentials (such as access card or similar device) back to a second person to enter a security controlled area, such as a car park or employee building.
It can also stop users to enter the controlled area by following or tailgating another person.
Biometric readers arguably give the most secure level of access control because these devices authenticate users based on their unique physical characteristics such as fingerprints, finger- or palm- veins, retina or hand geometry.
Centralized access control enables the user to access all applications, websites and other computing systems from a single profile, with the same credentials from any location.
All information assets in control of the user are subject to unified identity management.
A check-in check-out is a system used for tracking of assets such as rental or library items, tools, cars, office files or folders used by multiple people etc. With this system, you can find out who owns the item at the moment and when does it need to be back.
Beyond the everyday tracking, check-in/check-out systems can also provide reports on asset usage such as: what’s used most and what’s used least to adjust your asset collection, which assets have been used most and need replacement, but most importantly, the system reduces the risk of having lost or stolen items.
Access control and Intrusion detection is a combined system of hardware and software components that lets the user control the physical access to the interior of a building, a room or another type of closed space, at the same time protecting the space from intruders who trespass or violate the physical perimeter in any other way from the outside.
Lockdown and lockout are two different features within a standard response protocol every feasible access control plan should incorporate.
In brief, lockdown is a feature that is locking down doors, windows, or gates to prevent access to a certain room. Lockout is a feature that locks the outside perimeter of an area.
A mantrap is an access control tool designed and restricted to a physical space, which is separated from the adjoining spaces (rooms) by two doors, usually an exit and an entry door that cannot be unlocked at the same time.
Mantraps are like a double-door checking system that use either airlock technology or interlocking doors.
ONVIF refers to Open Network Video Interface Forum, which is an open industry forum founded in 2008, aimed at facilitating the development and adaptation of a global open standard for the interface of physical Internet-Protocol (IP) based products.
OSDP stands for Open Supervised Device Protocol. It is a communication interface that connects a reader with a device it is linked to.
As its name implies, this protocol is open to all manufacturers of readers, controllers and software. Security Industry Association (SIA) recognizes OSDP as a standard interface along with Wiegand and Clock and Data.
Personalized cards for access control allow a reliable form of a person’s identification and authentication to enter certain premises or access data. They contain such holder’s information as name, date of birth, photo, employee ID, signature, level of access control, etc.
Personalized smart cards store a lot of important data and foster an additional level of security at any organization.
RBAC security approach relies on giving access to certain facilities or information based on a person’s role within an organization.
In other words, employees are only granted access to data and equipment that are needed to perform their job duties. A role is therefore associated with a set of access rights.
Tailgating is a form of a security breach that occurs when an unauthorized person or a vehicle follows an authorized staff member or an automobile and thus intrudes on a secured premise.
The simplest way to explain the two-man rule is to say that it’s a “Buddy System” for grownups. It’s a procedure in which two people operate together as a single unit so that they are able to monitor and help each other to ensure the work is finished safely.
The purpose of the two-man rule is to have control and a high level of security for especially critical material or operations (such as nuclear weapons, submarines, laboratories, aircrafts etc.).
Wiegand is a wire communication interface between a reader (i.e. a card-, a fingerprint- or other data capture devices) and a controller. It is widely used in access control systems.
On the physical level, the Wiegand interface consists of three conductors: Data0, Data1 (transmission wires) and Ground wire.