Access Control Glossary

Access control is a huge and complex topic -- that's why we've constructed a glossary for all the terms you might not be able to find in standard articles. 

Manager Checklist

ORDER LIST

For quick viewing, a definition overview is written for each glossary term for quick viewing. But we've also delved deeper into each term with comprehensive explanations on their individual pages.

By design this list is a beta project and far from complete -- it will be updated continuously.

Access Control and Identity Management

Definition:

Identity and Access Management, or briefly IAM is a system of security policies and tools that allows the right people to access the right resources for the right reason at the right time.

Read More

Anti Passback

Definition:

Anti passback is a security system feature that is used to prevent users from passing their credentials (such as access card or similar device) back to a second person to enter a security controlled area, such as a car park or employee building. 

It can also stop users to enter the controlled area by following or tailgating another person.

Read More

Centralized Access Control

Definition:

Centralized access control enables the user to access all applications, websites and other computing systems from a single profile, with the same credentials from any location. 

All information assets in control of the user are subject to unified identity management.

Read More

Check in Check out

Definition:

A check-in check-out is a system used for tracking of assets such as rental or library items, tools, cars, office files or folders used by multiple people etc. With this system, you can find out who owns the item at the moment and when does it need to be back. 

Beyond the everyday tracking, check-in/check-out systems can also provide reports on asset usage such as: what’s used most and what’s used least to adjust your asset collection, which assets have been used most and need replacement, but most importantly, the system reduces the risk of having lost or stolen items.

Read More

Intrusion Detection

Definition:

Access control and Intrusion detection is a combined system of hardware and software components that lets the user control the physical access to the interior of a building, a room or another type of closed space, at the same time protecting the space from intruders who trespass or violate the physical perimeter in any other way from the outside.

Read More

Lockdown

Definition:

Lockdown and lockout are two different features within a standard response protocol every feasible access control plan should incorporate.

In brief, lockdown is a feature that is locking down doors, windows, or gates to prevent access to a certain room. Lockout is a feature that locks the outside perimeter of an area.

Read More

Mantrap

Definition:

A mantrap is an access control tool designed and restricted to a physical space, which is separated from the adjoining spaces (rooms) by two doors, usually an exit and an entry door that cannot be unlocked at the same time. 

Mantraps are like a double-door checking system that use either airlock technology or interlocking doors.  

Read More

ONVIF

Definition:

ONVIF refers to Open Network Video Interface Forum, which is an open industry forum founded in 2008, aimed at facilitating the development and adaptation of a global open standard for the interface of physical Internet-Protocol (IP) based products.

Read More

OSDP

Definition:

OSDP stands for Open Supervised Device Protocol. It is a communication interface that connects a reader with a device it is linked to.

As its name implies, this protocol is open to all manufacturers of readers, controllers and software. Security Industry Association (SIA) recognizes OSDP as a standard interface along with Wiegand and Clock and Data.

Read More

Personalized Cards

Definition:

Personalized cards for access control allow a reliable form of a person’s identification and authentication to enter certain premises or access data. They contain such holder’s information as name, date of birth, photo, employee ID, signature,  level of access control, etc.

Personalized smart cards store a lot of important data and foster an additional level of security at any organization.

Read More

Role Based Access Control

Overview:

RBAC security approach relies on giving access to certain facilities or information based on a person’s role within an organization.

In other words, employees are only granted access to data and equipment that are needed to perform their job duties. A role is therefore associated with a set of access rights.

Read More

Two-man Rule

Overview:

The simplest way to explain the two-man rule is to say that it’s a “Buddy System” for grownups. It’s a procedure in which two people operate together as a single unit so that they are able to monitor and help each other to ensure the work is finished safely.

The purpose of the two-man rule is to have control and a high level of security for especially critical material or operations (such as nuclear weapons, submarines, laboratories, aircrafts etc.).

Read More

Wiegand

Overview:

Wiegand is a wire communication interface between a reader (i.e. a card-, a fingerprint- or other data capture devices) and a controller. It is widely used in access control systems.

On the physical level, the Wiegand interface consists of three conductors: Data0, Data1 (transmission wires) and Ground wire.

Read More

Subscribe to our Newsletter

Get the latest product and company updates

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.