Every lock. Every key. Every door event. One product.
Configure door locks, issue digital keys and scheduled codes, enforce zone policy, verify visitors, log every entry and incident, and track staff attendance. No separate lock app, no code-scheduling spreadsheet, no third-party incident tracker.
,0,+
dedicated routes
,0,
lock types supported
,0,
credential methods
,0,
platform integrations
Locks, keys, and codes. The core of every door operation.
AccessLocksClient shows real-time status for every connected lock. AccessKeysClient tracks the full lifecycle of every issued credential. AccessCodesClient manages temporary and permanent access codes with scheduling.
5 credential methods. 1 registry.
One key registry for every credential type, every holder, every door.
Five credential methods tracked in a single registry. Full lifecycle: active, expired, revoked, pending.
Codes that activate on arrival and deactivate at checkout.
Codes generate from reservation data, activate with a configurable early buffer, and deactivate with a late buffer. Failed activations retry automatically. Lock battery and sync status visible per scheduled code.
Rules evaluate. Zones enforce. Capacity monitors.
Access rules define conditions: time windows, days of week, allowed locks, capacity limits, payment status, waiver compliance. Rules evaluate in priority order before every door open and code generation. Zones group locks into named spaces with real-time occupancy.
Lobby
Pool Deck
Gym
Spa
Conference A
Rooftop Bar
Rules evaluate. Zones enforce. Capacity monitors.
Access rules define who can go where and when. Capacity tracking shows real-time occupancy with automatic status transitions.
Verify identity before issuing temporary access.
Register a visitor, run document verification through the integrated partner, poll for approval, and issue a time-bound credential tied to verified identity. The full flow completes in the Access interface without switching tools.
Every door event logged. Every incident tracked.
Lock events, key operations, clock-ins, capacity alerts, and incidents write to a single searchable audit trail. Severity classification, status workflow, and lock association per incident.
Issue a pass. Scan at the door. Track occupancy.
Day passes, membership access, and visitor credentials issued with wallet delivery. QR scanning at entry points. Real-time occupancy tracking per zone. Apple Wallet and Google Pay passes auto-generate with dynamic status updates.
Manual gate for sensitive access requests.
When an access rule requires human authorization, the request enters the approval queue. Staff review context, approve or deny, and the system issues or blocks the credential accordingly.
Approval Queue
Pending access requests that require manual authorization. Approve or deny from a single queue with requester details, target lock, and requested time window.
Request Context
Each request includes who is asking, which lock or zone, the time window requested, and the rule that triggered the approval requirement.
Rule-Triggered Approvals
Access rules can require manual approval as a condition. Matching requests enter the approval queue instead of issuing automatically.
Escalation Notifications
Pending approvals notify designated staff through Inbox. Time-sensitive requests escalate if not actioned within a configurable window.
Clock-in, break tracking, and payroll export in the same product as your locks.
Real-time attendance board with punch-in/out and break toggle. Historical time logs with CSV export. Vertical-gated: only shown for verticals where Access handles workforce attendance.
4 dashboards. Custom date ranges. CSV and PDF export.
Pillar-scoped summary dashboards filterable by date range, entity, and event type. Exportable to CSV and PDF. Report queries execute in under 300ms.
Entry Control
- Lock status overview
- Key utilization rates
- Code generation volume
Passes
- Pass issuance by type
- Check-in rates
- Occupancy patterns
Attendance
- Time clock usage
- Hours worked by period
- Overtime trends
Security
- Incident volume
- Access denials
- Rule violation trends
10 native integrations. Zero middleware.
Keys auto-issue from Pulse reservations. Lock health flows through Signal. Visitors verify and receive keys in Navigator. Every integration active by default. Zero configuration.
Signal
Lock health monitoring, battery alerts, connectivity tracking, and offline detection flow through Signal device fleet.
Pulse
Reservation confirmations trigger auto-issue of digital keys. Checkout triggers auto-revoke. Extended stays auto-extend key validity.
Navigator
Guests receive and use digital keys inside the Navigator guest portal. Door instructions, access codes, and property entry details.
Ops
Access incidents inject tasks into Ops with lock and location context. Maintenance tasks created when locks need attention.
Contacts
Key holders and visitors linked to Contact records. Visitor verification creates contact entries with verified identity data.
Kiosks
Kiosk devices run time clock mode, check-in mode, or access terminal mode. Configuration delivered from Access.
Display
Room status boards and occupancy displays show real-time data from Access zones and capacity tracking.
Sign
Waiver completion gating enforced before pass issuance. Sign tracks waiver validity per contact and links to pass status.
POS
Pass and product purchases flow through POS terminals. Payment confirmation triggers credential issuance.
Inbox
Code delivery, approval notifications, failure alerts, and visitor verification links route through Inbox messaging channels.
Entry control from €5/lock/month. Admission and attendance included.
4 access pillars, 5 credential types, 10 kiosk auth modes, visual seat designer, zone capacity monitoring, complete audit trail, wallet passes, and 6 native platform interconnects. One product for every door, gate, and checkpoint.
Access
Door locks, digital keys, zone policy, and attendance tracking.
Part of Ops Suite
Wallet-debit
Add to Pro Shop