Access Control Specification Guide

By: Brian Rhodes, Published on May 19, 2016

This 15 page report provides the most in-depth guidance on specifying Access Control systems you will find.

Specifying Access Control correctly can be tricky, because every opening has quirks and are prone to outside factors that impact system performance. Not only this, but what you don't specify can be just as problematic as what you do.

Most access RFPs have serious problems. While they comprehensively spell out contract conditions and business terms, they are typically scant on relevant details about the system. Not only do they tend to be a random smattering of technical points, pulling them together into a cohesive system is often needlessly costly or may even be impossible to build.

The Big Mistakes

Most of the trouble specifying access has a root cause in one of the three areas below:

1. Incomplete details, where things you don't know can ruin your budget and system goals.

2. Difficult to build, where details that sound prudent may actually limit selection and significantly drive complexity to integrate.

3. Proprietary, where even generic boilerplate writes in choices that lock you into one vendor.

In this report, we address the best strategies to avoid these problems.

Doing It Right - 18 Key Specification Areas

The good news is that you do not need to be an expert to specify great systems. In the sections below, we cover the right details to include, how to include them, and how to avoid common traps through addressing these 18 areas:

  • Is This An Expansion or New System?
  • Determining Access Security Goals
  • Establishing Monitored, Managed, or Forensic Use
  • Identifying Other System Integrations
  • Which Credentials To Use
  • Defining Doors/Opening Detail
  • Defining Turnstile Use
  • The Importance of Door Position Switches
  • Defining Existing Locks/Hardware
  • Specifying Readers
  • Deciding to Use IP or Serial based Controllers
  • How To Use PoE For Powering Systems
  • System Edge vs. Centralized Architecture
  • Is System Networking Wired or Wireless?
  • Considerations For Using Existing Databases
  • Evaluating User Management Features
  • Using Special Features Like Time and Attendance & Mustering
  • Establishing System Maintenance Expectations

**** ** **** ****** provides *** **** **-***** guidance ** ********** ****** Control ******* *** **** find.

********** ****** ******* ********* can ** ******, ******* every ******* *** ****** and *** ***** ** outside ******* **** ****** system ***********. *** **** this, *** **** *** don't ******* *** ** just ** *********** ** what *** **.

**** ****** **** **** serious ********. ***** **** comprehensively ***** *** ******** conditions *** ******** *****, they *** ********* ***** on ******** ******* ***** the ******. *** **** do **** **** ** be * ****** ********** of ********* ******, ******* them ******** **** * cohesive ****** ** ***** needlessly ****** ** *** even ** ********** ** build.

The *** ********

**** ** *** ******* specifying ****** *** * root ***** ** *** of *** ***** ***** below:

*. ********** *******, ***** things *** ***'* **** can **** **** ****** and ****** *****.

*. ********* ** *****, where ******* **** ***** prudent *** ******** ***** selection *** ************* ***** complexity ** *********.

*. ***********, ***** **** generic *********** ****** ** choices **** **** *** into *** ******.

** **** ******, ** address *** **** ********** to ***** ***** ********.

Doing ** ***** - ** *** ************* *****

*** **** **** ** that *** ** *** need ** ** ** expert ** ******* ***** systems. ** *** ******** below, ** ***** *** right ******* ** *******, how ** ******* ****, and *** ** ***** common ***** ******* ********** these ** *****:

  • ** **** ** ********* or *** ******?
  • *********** ****** ******** *****
  • ************ *********, *******, ** Forensic ***
  • *********** ***** ****** ************
  • ***** *********** ** ***
  • ******** *****/******* ******
  • ******** ********* ***
  • *** ********** ** **** Position ********
  • ******** ******** *****/********
  • ********** *******
  • ******** ** *** ** or ****** ***** ***********
  • *** ** *** *** For ******** *******
  • ****** **** **. *********** Architecture
  • ** ****** ********** ***** or ********?
  • ************** *** ***** ******** Databases
  • ********** **** ********** ********
  • ***** ******* ******** **** Time *** ********** & Mustering
  • ************ ****** *********** ************

[***************]

***** **** * **** at *** ****** ******** appear:

Common ********

**** *** ****** ******* might ** **** ***********, but **** **** *** mean **** **** *** the *** ****. **** at ***** ******** ** pulled **** ****** ****:

*** ****** ******:**** *** *************, *** risk ** ********* *** many *********** **** *********** drive ****. ******* **** Access *******, *** ******** is **** ********* ****. Take **** ******* **** the ************** ******* ****** ******'* ****** ************:

*** **** ** ******* to ***** * ***** from *** ***** ** the *** *****. ** details ********* ****/******* ****, existing ********, *** **** people **** ** **** access ** **** ********** types **** *****, ** when *** ******** ****** be ******** *** *****. Not ** ******* **** descriptions ** *** *** who *** ****** **** be ****, ** ***** other ******* **** **** to ********* **** *** access ********.

*******, *** ***** ******* may ** ******** ** discovered ***** * *** walk, *** *** *** respondents *** **** * fair ***** ** ***** them ** ***** * bid.

******** *************:******* *********** ***** ** the ********* ** ***** that ***** ***** ** economical, *** ***** ** essentially ***** ******* ** just *** ** *** bids. **** *** ******* from * ****** ********** RFP:

******* *** **** ******** good ****** ********* **** descriptions *** ********* *** is ***-******. *******, *** to *** ********* ** defining '****************' *** *** listing ** * ****** proprietary **** ** **** controller *********** ****** ****** to ********** ** **** existing ******.

******* **** ** ******** or *** ** ********* to *****, ******* ** would ** **** **** efficient *** **** *** solicitor *** *** ******* to ***** **** *********** plainly *******. *** ****** does *** ******* *** proprietary ****** ** ****** systems, **** *** ***** they *** ************ ****** to *** ******** ******** for ******* ******. *******, the **** ** ****** defining '****************' ***** **** option.

Technical *************

**** *** ** ********* aspects ** ******* ** every ****** *************:

Defining ********* ** *** *******

** **** ****** ***, or **** ** ** a ****** ******** ** an ******** ******? ********* this ******* **** ******* for *** ******** **** kind ** **** ** being ******. *** ** the *********** ****** ** most ****** *******, **************** is *********** ***-********, *** if * ****** ** already ** ***** *** satisfactory *** **** **** is ****** ********* **** platform. **** ** ****** the ***** ********* ****** since ********* ********* **** servers *** ******** *** be ******* ** *** needed.

**** ****** **** ***** potentially ****** ********** ****** two ******* **** ****** incorporate **** *****'* *********. Even ** *** **** is ********** ** ******** system, ********** ** ******* some ** *** ******** components ** * **** that ****** ** **** clear **** *** *****. Special ***** ** ******** tools *** ** ****** to ******** ******** ********** information, * ***** *** "********* ****** ******* *******" **** ********** ** more ******.

Security *****

****** ** ******, *** essentially *********, ** ** give * ******* *********** of *** ***** *** the ****** ******. ******* "With **** ******, *** facility ***** ** ******** off-shift ***** **** ******** the ******** *** **** all *** ******* *********** from ******** at *** ****" **** greatly ****** ***** ********* a ****** ** ******* the ********* ******** ** build ******.

************, **** ****** ******* is ********** ** *** issue ** "**********", ******* where *** **** ********* openings *** ******* ** key **** ******************* ** ****** *** risk. *** ****** ********** and ****** ** **** risk, *** *************: ****** ******* ************.

**** **** ********* ****** or ********* ** *** needed, ************ *** ***** groups **** *** ****** and ****/***** **** **** it ** *** ********** of ****** *******. ****** these ***** ***** ***** will **** ******* ****** the ***** ******** **** the ****** ***** ** assignable ******** *** *** stated ****.

********* *** ********* ***** goals **** ********* ** existing ****** ** ***** essential, ** *** ***** of ******* *** *************** can ****** **** ****. Including * ***** ********* describing '******** *****' *** refresh *** ************* ** a ****** **** ******* old.

Monitored, *******, ** ********

**** ** ** ****** how *** '*******' ******* of *** ****** **** be *******. ** *** goal ** *** ********** up *********, *** **** only ****** ** **** absolutely *********? **** ** onsite ***** ***** ******** monitor *** ******* ** events **/*/***? ** ** it ****** ** ****** oversight *** ********** ** active, *** ****** *** to * ******* ******* facility?

******** **** *** *** system ** ***** ** be **** *** ** whom *** ******* ***** by ******** ****** ********, or ** ****** **** the ***** ****** *** manage *** ****** ** the ***** ****.

Other ******* ***********

** *** **** **** access ******* ** ** combined **** ***** ************ or ********* ******? ** you **** * **** alarm ******? ****** * point ** ***** ***** goals, ******** **** *** current ****/******/******** ** *** systems ** ** ********** help ***** ****** *** installation ***** ************.

***********

** *** ****** ** new, ********* ********* ****** not ** ******** ** the ****** *** ********. If ** ********* ** an ******** ******, *** answer ***** ******* ** made. *******, ** ****** case, ********** ******** ***** credential **** ** ******* prevents ** **** ***** a ****** ******** ********.

** ***** ** **********, most ****** ******* *** contactless ***********. ** *** past, *** *** *********** have **** *** ********, but *** ** ******** concerns (**** ** **********) and ******* ******* ********, they **** **** ********** by **.** *** *****. From * **** **********, the **** ******** *********** are *** **** ***** or ******* **** ***** formats.

** ** *********** ******* exist, ******** *** ***** product ** ** **** security ****** ** ** economic ***. *** **** people **** ** ************? Should ***** *** ****** as ******, ** ** a **** ******* ****** needed? **** ***** ******* use ***********, *** ****** they ** ********? **** about **********? **** **** mandate ******** ******* *** used?

************, ** ******** ******** codes *** ** ***, they ****** ** ***** as * ************* ** the ****** ******. *** all ******* *** **** to **** **** ******* codes, *** **** ***** detail *** ***** *********** cost ** *** **** clear.

*** **** *******, **** our ******* **:

Doors/Openings ******

********** *** ******** ** be ********** ** ******* not **** **** * design *********** *** **** from ********* ********** *******. No *** ******** *** alike ** **** *** same ***, *** * short *********** ** ******* of *** ******* *** it ** **** **** far ** ********* **** controls.

*** *******, *** '**** entrance ** ** ****** building' ** ****** ********* as ****:

"*** **** ******** ** a *** ** ***** double ***** **** **** swing ***. ***** ***** are ******** **********, *** the ***** **** ************* opens *** ****** **** a ****** ****** ** pressed. * ****** ******** camera ****** ** ********** into *** ****** ** that *** ********* ***** are ******** ** **** enter. **** ******** ** typically **** ** *** public ****** ******** *****, but ****** ** ****** and **** ********** ** approved ***** **** *** - *** *********. ************* 30 ****** *** **** access ****** * ******* night ****** ***** *****, including ******** ***** *** delivery ******. **** ******* shows *** *******:"

****: ****** **** ** annotation, **** * **** clean **** ** *** opening ** ** ******.

***** *** *********, *** information ******** ***** ***** insight **** ****** ** observed ****** * ***** job **** *** ******** door ****, **** ********, security ****, **** *******, and ********* ****** *********** (video). ***** ****** ********* is *** ******, ******* on ***** ******* ********* guesswork.

*** **** ****** ** how ** ******** ******** openings, ******* **** *** doors, *****, ** **** turnstiles, ***** *** ******** below:

Door ******** ********

*** ** *** **** useful, *** **** ********* aspects ** ****** ******* are *** ******* **** indicate ******* *** **** is **** ** ****. While **** **** *** as ** '*****', ***** remains ** **** ********* or *********** *** ** monitor *** ******* ***** of *** ******* **** these *******.

***** **** *** ****** by **** ** '********', solicitors ****** ********** ***** they **** ***** ******* included. ***** *** "**** ******** ******** (***) For ****** ******* ********" *** **** ******. For ******** ** *** biggest ******* ** ********** use ** *** ********, read "********* **** **** ********" ** ***** *** subtle ******** **** ******* undermines *** ****** ******.

Existing *****/********

**** *****, ******-***** ****** is *** ********, *** basic ************ *** ******. Often ****** ******* ************* with ******** ********** *****, and ***** ********* ** how **** ******* ** appointed ** ********** ** choosing *** **** ****** of *******.

*** **** ****, * picture ** ***** ******* description ** ******: "*** **** **** ** a ***** (*****) **** currently **** ****** **** a ***** ***. *** door ****** *** *** has ** '****' ******* above **. *** **** can ** ****** ** unlocked **** *** ******* of *** **** ** a *** **** ****** to ********. *** ******* for *******:"

*** ******* ******* ** describing ***** ** *** to ****** *** ***** type *** ******** **** access ****, *** ***** posts:

Choosing *******

********* *** ***** ****** is *** ****** ** which *********** *** **** and ***** *** ******* is *******. **** *** written ************ *** ****** of *** *****/*****, **** decisions *** ** **** what **** ** ******* and *****.

******* ********** *** ******** where******** ************** ************* ** **** **** ensure *** ***** ****** is ********* ** ******* all *********** ****** ** that ****.

*** ******* ********** *** more ****** ** ******** readers, ***** *** ****** below:

IP ** ****** ********* *******

*** ******* **** **** a ****** ******** ****** be ********* ** ******** cabling ** *** ****** be ****. **** ********** one **** **** *** other *** ** ****** if ********** ** *** strong, ******** **** ****** systems *** ** ******** as *** ******* ******, a ***** **** **** continue.

** ******** ******** *** to ** ****, ****** the ********* ** ******** switch ***** ***** ****** guesswork ** ********* **********. Marking * *** ** floorplans **** ******* ***** positions **** ** **** specification ** *****:

** *** ** ********* networks *** ******, ****** note ** *** *******, main ***** *****, ** access ****** ******** **** new ***** **** *** concurrent **** ********.

Edge ** *********** ************

** * ****** ******, specifying ***** **** ******* takes ***** ** *********. Most ****** ******* *** a **** ** **** controller ******* **** *** opening, *** ********** *********** location ** ****** ********** could ************* ***** ***** costs ** ****** ** older ******* ***** ***.

**** ** '****' ******* are ****, *** ********* can ** ********* ****** locked ******* ** ******* enclosures. *******, ****** **** enough ***** ** ********* for ***** ******* ** commonly ********** *** *** drive ***** ** *** properly ********** ****** **** writing. ***** ******* ******* more ****** *** *******:

Using ***** **** ********

** **** *****, ******** 802.3 **/** *** *** be **** ** ****** power ** **** *********** and ************ ********* ******* like ******* *** *******. Using *** ** ********* more ********** *** ****** online ********** **** ********, stand ***** ***** ******** typically ** ***.

*******, ***** *** *** limit *** ***** ** connected ******* ***** ** 'total ****-*******' ***** *********, which ** ******* *** mA ** ****, *** the *** ****** ** doors ** * ****** PoE ******* ********** *** limited ** ***. ***** factors ** ******** ******* the ****** ** *** controller ********, *** *********** against ******** ******** ** a ******** ***** **** a *** ********** *** common.

****** ******* ****** ******* Guide******** ** **-***** **** at *** *******.

Wired ** ********

**** ** ***** ** controlling ****, **** ************* of ***** ******* *** cause ****** ** ********* for ****** ** **** to ***** ********. ********** if ***** ***** *** not ******* ****, *** electronic ******* *** ******* is *********, ******** ***** wireless *** '*****-*****' ****** of *****.

***** *** **** **** may ** **** *** a ****** ******** ****, the ******* **** ** connecting ******** ******* ******** via * **** ******* run ***** ** **** expensive. ***** *** ******* price *** *********** ********** with ******** ***** (**: replacing *********) ***** ** prohibitive *** ****** *******, they ***** ***** ** economic *** ** **** of *********** ***** ******* expansion. *** **** ** these ************, *** *** "******** ****** ******".

Using ******** *********

********** *** ******, *****-**** systems, *** ******** *** bring *********** ****. ******** the **** ********** ****** will ** **** ** foolish ****** *** ************* explicitly ****** ***** ******** platform *** ******* ** available. *** "****** **** ** ******: Database" ***** ****** **** point, *** *** ****** options, ** *****.

User **********

******** ****'* ***** *** a ******** ****** ** the *************, *** *** where ********* ******** **** be ********* ** *********. Spelling *** ******** '**** View' *** ********** ******* helps ********* ******* *** configure *** ***** ********. If ********* **** ** lock/unlock ***** ** **** time, ****** ******** ******* are ** ** *******, or ** *** ****** system ****** ********* **** the ***** ************ ******, these ************ ****** ** clear.

**** *** ******* **** are *** ******** *******, if ***** **** '****** access' **** *********** ** inclusion ** '** *****' creation *******, ** ****** not ** ******* ** will ** ******** ****** stated.

****, ** ******** ************ are ** ** **** for ******* *******, *********** of ***** ******** *** build ************** ****** ** listed ** ********* *** system ** ********* ** confirmed. *** **** ******* on *** ******** ********** piece *** ************ ** the ******* ******** *******, see *** ********* *****:

******* ********:****** ******* ** ****** for **** **** **** unlocking *****. **** ******* include ******* *** '**** and **********' ******* **** essentially ******** * **** clock, ** '*********' **** grants *** ******* ********* that **** ******* * roster ** ********* ** a ********** ****.

** ***** ******** *** desired, ** *** ***** integrations ******* ******* *** core ****** ******* *********, effort ****** ** ***** defining *** ******* ****** in ************* *********. ***** posts **** **** ******* what ** *** *** and *** ** **** the ************:

Maintenence *****

*******, ************** ****** ***** out *** ******* ****** software *********** ***** *** any ********** ******* ******** required ** **** *** system ******* *** ***********. Some ********* **** ** ongoing *********** ****, ***** others ******* * ****** plan *** *** *** prioritize ******* ** **** support ** *** *******.

*** **** ** **** maintenance ****** ****** **** system *********, ** * system *** ** ********* less **** ********* *********, but *** ********* ** unrealized ***** ** ********** years.

Access ******* ************* ****

*** ********* ******* ******** a ******* ** **** requirement *** ****** ******* to ********. ** ********* you **** *** ***** this **** **** *** documents *** *** ** as * ******** ***** in ******** *** ************ for **** ****** *******.

Opening/Door ****: Often best depicted in a picture. If not permitted, a short written description describing: Steel, wood single or double door? Right, left, or swing ‘reverse’. Glass opening? Turnstile?

Users *** ****: Average number of users during busy times, so that cycle times of locking hardware can be sized accounting to the busiest period the door permits access.

Opening's ******** *****: The high-level purpose of access control: “Restrict unapproved users from entering during overnight hours” or “Only residents with current rent payments should be allowed to use gym facility.”

Other ********* ** *** ****: Often best expressed in a picture, a snapshot or written description of the other hardware devices hung on the opening. Examples: “Closer on upper hinge side, vertical rod on upper strike side, and an exit device hung on the inside. Outside keyed access.”

Reader ****/******** ********: On the door frame (mullion), or on an adjacent wall? Are mounting surfaces suitable? Are they protected/sheltered from ice and snow? Can someone is a wheelchair or with limited range of movement reach the reader, per ADA (or similar)?

Credentials ** ***/******** ************** ******: Common Choices: 125 mHz, 13.56 MHz contactless. HID format, MiFARE/DESFire? 26,33,34,35 bit cards? Facility code needed? Is more than one credential needed at the door to verify the user?

Intercom ******?: If a user cannot enter the door, or if a visitor request entrance, can they page help or an attendant? Two two-way conversations need to be supported?

Lock **** ******: Choices- typically electric strikes or maglocks, but dictated by building code, AHJ preference, and type of hardware existing on the door.

System ******* ****: TCP/IP, Serial hardwire, wireless, or stand alone locks? If IP, are existing LAN segments available? Are cable pathways and data closets marked? If wireless, the signal strength at doors verified?

Controller *****: Choices- Edge or Centralized? Standalone or host dependent?

Critical **** ********** ********: What real-time features required? What type of reporting is needed? Will users need access from a browser or mobile devices? Are client workstations available?

Server *****/**********?: Do you have available resources in the server stack? Are they physical or virtual? Do you need your servers to host access locally or remotely? Including this ensures no ugly incompatibilities happen at the last minute. If a new server is used, will local IT resources be familiar with configuration and support?

Database ******** ******: Does you enterprise already use a standard database platform like SQL? If so, make note so the access system can plan to make use of existing rather than purchasing new or using a proprietary platform.

Special ********: Do you need Time & Attendance or Mustering? If so, does your hardware design support those features? Make note of the ‘other systems’ you would like access control to feed into or use like video surveillance or intrusion alarm.

[****: **** ***** *** originally ******** ** **** but *** ******* / improved ** ****.]

Comments (0)

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Access Control Course Spring 2020 - Save $50 Last Day on Mar 26, 2020
Register Now - Spring 2020 Access Control Course. Today, March 26th is the last day to save $50. IPVM offers the most comprehensive access...
Hotel Access Control Explained on Dec 23, 2019
Hotel access control does not work like typical commercial access control because doors in hotels are not typically directly connected to a central...
2020 Access Control Book Released on Dec 19, 2019
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing has been significantly...
Access Control Door Controllers Guide on Oct 22, 2019
Door controllers are at the center of physical access control systems connecting software, readers, and locks. Despite being buried inside...
Securing Access Control Installations Tutorial on Oct 17, 2019
The physical security of access control components is critical to ensuring that a facility is truly secure. Otherwise, the entire system can be...
Access Control Mustering Guide on Sep 30, 2019
In emergencies, determining where employees are located can be critical for knowing whether they are in danger. Access systems can be used for...
Access Control Time & Attendance Guide on Sep 24, 2019
Access control systems can do more than lock doors. With little or no extra equipment, they can be used to track labor hours for employees...
ZK Teco Atlas Access Control Tested on Aug 20, 2019
Who needs access specialists? China-based ZKTeco claims its newest access panel 'makes it very easy for anyone to learn and install access control...
Responsibility Split Selecting Locks - Statistics on Jul 22, 2019
A heated access debate surrounds who should pick and install the locks. While responsible for selecting the control systems, integrators often...
Access Control Job Walk Guide on May 22, 2019
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...

Most Recent Industry Reports

Pivot3 Mass Layoffs on Mar 27, 2020
Pivot3 has conducted mass layoffs, the culmination of grand hopes, a quarter of a billion dollars in VC funding, and multiple failures to gain...
Athena CEO Criticizes 'Deplorable' 'Nitpicking', IPVM Refutes on Mar 27, 2020
Athena Security's CEO Lisa Falzone has strongly objected to IPVM's reporting on Athena, calling it 'deplorable' and repeatedly criticizing IPVM's...
Hikvision Admits Sanctions Harming Its Financial Performance on Mar 27, 2020
While Hikvision initially downplayed being sanctioned for human rights abuses, the company is now admitting a significant impact in a new PRC...
New Axis M30 Cameras Tested on Mar 26, 2020
Axis has released a new generation of, for them, relatively low cost M30 series cameras, claiming to deliver "sharp video quality even in poor...
Coronavirus Shuts Down ADT Door Knockers on Mar 26, 2020
Coronavirus has another victim - this time, alarm giant ADT has stopped all door to door sales. Door knockers are a critical but controversial...
Access Control Course Spring 2020 - Save $50 Last Day on Mar 26, 2020
Register Now - Spring 2020 Access Control Course. Today, March 26th is the last day to save $50. IPVM offers the most comprehensive access...
Convergint Coronavirus Cuts on Mar 25, 2020
One of the world's largest security integrators, Convergint, has made a major move to handle the impact of coronavirus, with cuts across the...
VSaaS 101 on Mar 25, 2020
Video Surveillance as a Service (VSaaS) is the common industry term for cloud video. But what does it mean? How does it all work? Inside this...
TVT / InVid Facial Recognition Tested on Mar 25, 2020
Facial recognition is frequently sold for thousands of dollars per channel but some China manufacturers are offering full facial recognition...
IPVM Launches On-Demand Courses on Mar 24, 2020
For nearly a decade, IPVM has been a leader in online live courses. Now, we have added on-demand versions for all courses. The same course...