Access control can be designed and deployed in a number of ways. This 101 guide examines the most common options and architectures used in 2022.
Architectures are based on 10 fundamentals decisions:
- Credentials: What kind of credential key will users unlock the opening? RFID? Biometrics? Phones?
- Readers: What type of readers will you use and what credentials will they support?
- Connecting Readers and Controllers: Will you use Wiegand or OSDP?
- Locking: What kind of lock will you use to prevent unauthorized access? Will the door need to be fail safe or fail secure?
- Controllers: What type of controller will you use? Will it be part of a centralized system or located at the edge?
- Inputs: What inputs will connect to your controller?
- Outputs: What outputs will connect to your controller?
- Management Software: Where will your management software be hosted? Embedded? On-premise? In the cloud?
- Monitoring - What features will you need? Will you require mobile monitoring or will you have a dedicated workstation?
- Enrollment - Where and how will you perform enrollment?
Inside this report, we explain the tradeoffs of these 10 fundamental decisions, overview a number of the most common combinations, and examine which future trends are most promising.