- Key and access control is integrated as part of the organization-wide centralized identity and access rights management system. The key and access control systems currently in use in your organization can be integrated as part of a centralized whole.
- The process of granting physical access is simplified and streamlined with the centralization of data and the automation it enables. Information about any changes to users’ rights is automatically forwarded to the target system concerned.
- When the period of validity of the access rights expires, the deletion process automatically begins. This is to ensure that no unnecessary access rights remain in effect when the individual concerned leaves the organization. The access rights can be deleted immediately in the event of danger.
- The centralized register makes up-to-date information about all keys and access permits to your organization available at all times, i.e. who has access and where, who has granted the access rights and on what grounds. This enhances the security of your organization and supports compliance.
Simplify your access control process and enhance the security of your organization
Are you aware of who has the right to access your organization’s facilities and for what reasons? Are you aware of how many keys there are currently in use in your organization?
United Identity allows you to control permanent and temporary employees’, partners’, subcontractors’, customers’ and other visitors’ access to your organization’s facilities, areas and other sites with ease and in a centralized manner.
Increase control and speed up the granting process
When the access rights to all your organization’s sites have been defined in a single system, requests for user-specific access rights can easily be made in accordance with predefined access levels, for example. The processes for requesting and granting access rights to the system simplify and speed up the process of granting physical access and ensure that users are only granted access they really need and provided with the associated keys and access permits.
Any changes to the physical access rights will be carried out following the regular request and granting process. Up-to-date information will be updated in all the target systems concerned. The system will maintain a record of all access right requests made, as well as of those who accepted or rejected them and of the reasons for doing so.
Prevent unauthorized access and misconduct
The period of validity of physical access rights is defined in connection with the request, and its expiry will automatically trigger requests to delete them. This is to ensure that no unnecessary access rights remain in the system. When the situation requires it, the access rights can be deleted immediately in the event of danger, misconduct or loss.
Integrate current systems into a larger whole
The key and access control systems currently in use in your organization can be integrated as part of the comprehensive identity and access rights management system provided by United Identity. No separate login to the integrated target systems is necessary when access is requested, as the process of requesting and granting access will be carried out in the United Identity system, from which the particulars of the granted access rights will be automatically sent to the target systems concerned.
For example, the ABLOY PROTEC2 CLIQ locking and access control system can be seamlessly integrated with United Identity.