How Doors Impact Access Control

Author: Brian Rhodes, Published on Feb 11, 2012

Assuming every door can be secured with either a maglock or an electric strike can be a painful assumption in the field. While those items can be applied flexibly with various openings, there are occasions where certain hardware cannot be used.

A common pitfall is inadequately or inaccurately describing the door resulting in a field mistake. In this note, we examine how to properly identify a type of opening including an explanation of terms including leafs, mullions, frames, lites, transorms and a review of steel, wood and glass doors.

Leafs

A single door is often called a 'leaf'. Most commonly, a double-doored opening has two 'leaves'. Sometimes one of the 'leafs' is held stationary and is locked in place.

Mullions

Sometimes 'leaves' are separated by a bar stop running vertically between them called a 'mullion'. Here's an example of leaves separated by a mullion

Mullions can be permanently affixed as part of the frame assembly or may be a removable type - typically locked into place to prevent unauthorized removal (and threaten the security of the opening).

'Mullion mount' card readers are common, named for the slim form factor they are designed to accomodate. Mullion mount readers are most commonly used on both frames and mullions. Be aware that mullion mounted devices will be subject to impacts and abuse.

Frames

Key elements of "Frames" include material used and its 'profile':

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

  • Steel and Aluminum are common materials used to construct frames, although wooden frames can sometimes be found on older buildings.
  • The 'profile' of the frame - or the shape in which it constructed is often dependent on aspects like the adjacent wall to which it is attached, the type of door it is intended to frame, the swing of that door, and the type of hinges it is designed to work with.

When specifying electronic strikes or hanging readers from frames, make sure that enough room for the device and the device wiring exists inside the frame.

Lites and Transoms

‘Lites’ and ‘transoms’ refer to the pieces of glass within or adjacent to the door leaf itself. It is a common feature to have a full-height glass sidelight adjoining an entry door. These features are important to note due to the impacts they may provide access control features like wire runs or the mounting options of items like maglocks.

Here's an example

Type of Doors

In general, care must be taken to understand the construction of the door and any special ratings it may possess (ie UL rated Fire doors, etc.).

For example, consider the distance between a card reader and the swing of a door upon a card read. Will the swing of the door make it awkward for the card holder to gain entry after scanning a card? Would a card reader located on the door frame itself or with a longer read range make the opening easier to use?

A low-level perspective is important during the design and installation phases of implementing an access control system, especially in how the access control system impacts the usability of the door.

Steel Doors

In the commercial architectural market, 'hollow-core steel doors' and 'steel frames' are a mainstay product. Many access controlled doors fall into this category; the products are typically constructed of 16 - 22 gauge steel sheeting and then cut, formed, and welded into assemblies. ‘Hollow core’ indicates a steel shell with a fiber composition or polystyrene honeycomb core.

Here's an example of a steel door:

Steel doors provide a good rigid medium to hang a variety of security hardware upon. However, over time the perpetual hanging and rehanging of different types of hardware can damage the door and result in a structurally unsecureable opening. For example, make sure that maglocks are mounted with 'thru-bolts' and not only surface mounted.

While a steel door allows for mounting various accessories, this can result in awkward interaction of mechanical devices and access control systems. If the intent of an opening is to open upon a card read, make sure that no existing mechanical device (ie - deadlatching exit device) prevents this action.

Wood doors

'Wood veneer', or 'solid core wood' doors are also very common, especially in institutional and education buildings. The term is self-explanatory; instead of a hollow-core steel door, one composed of wood or wood veneer is used in its place. These types of doors are still commonly installed in steel frames.

Surface mounting hardware like maglocks to wood doors can sometimes be troublesome. Not only are those finishes especially sensitive to damage like tool marking and hole break-outs but the actual door itself will 'move' depending on environmental variables like heat and humidity. Because of that, special care should be taken to mount hardware so that it will always remained aligned, i.e. - a good electromagnetic bond is achieved.

Glass Doors

Glass Doors, sometimes referred to generically by specific brand ‘Herculite’, are very common in architecturally significant openings like storefronts or main entries into highrise structures. These types of doors usually present cosmetic constraints to hardware specification, and due to the thin frame, or frameless, opening types great care must be taken to ensure the constraints of movement and interaction of hardware is well understood.

These types of doors are especially costly to modify in the field if improperly configured. Often times, the glass must be cut during manufacturing to accommodate for items like hardware and hinges. Making sure the build and action of these doors is understood will ensure cost controls when working with them.

Electromagnetic locks are most commonly used in glass doors rather than strikes. A variety of factors account for this: these doors see high traffic counts and strikes are more burdensome to maintain than electromagnetic locks, and it is difficult to 'hide' the strike in such a way that is aesthetically pleasing.

Though not traditionally within the domain of the 'security integrator', doors and openings remain a vital aspect for the integrator to understand. A good integrator or system designer should commit to understanding the different types of openings, how they are used, and how those factors influence selection of physical security devices.

Comments : PRO Members only. Login. or Join.

Related Reports on Access Control

Access Control Records Maintenance Guide on Jan 16, 2019
Weeding out old entries, turning off unused credentials, and updating who carries which credentials is as important as to maintaining security as...
Access Control Cabling Tutorial on Jan 15, 2019
Access Control is only as reliable as its cables. While this aspect lacks the sexiness of other components, it remains a vital part of every...
Avigilon Favorability Results 2019 on Jan 15, 2019
Since IPVM's 2017 Avigilon favorability results, the company was acquired by Motorola and has shifted from being an aggressive startup to a more...
Wavelynx Access Control Manufacturer Profile on Jan 10, 2019
Denver-based WaveLynx is not well known as an access reader manufacturer, but OEMs for big industry brands including Amag, Isonas (Allegion),...
Combating Vaping Epidemic - Halo Smart Sensor Profile on Dec 21, 2018
Youth vaping has become an epidemic, according to the US Surgeon General, while the market leader, Juul, just received a $12.8 billion investment...
ACRE-Acquired Open Options Access Company Profile on Dec 17, 2018
Who is the company ACRE is acquiring? In this note, we examine Open Options line for best customer fit, key features, pricing, and main...
Open Options Acquired By ACRE on Dec 17, 2018
ACRE is doing deals again. A year after they sold Mercury, they are buying another access control company - Open Options. In this note, we...
2019 Access Control Book Released on Dec 12, 2018
This is the best, most comprehensive access control book in the world, based on our unprecedented research and testing has been significantly...
Multi-Factor Access Control Authentication Guide on Dec 10, 2018
Can a stranger use your credentials? One of the oldest problems facing access control is making credentials as easy to use as keys, but restricting...
Top 2019 Trend - AI Video Analytics on Dec 10, 2018
160+ Integrators answered: What do you think the top industry trend will be in 2019? Why? AI / video analytics was the run-away winner with...

Most Recent Industry Reports

The IP Camera Lock-In Trend: Meraki and Verkada on Jan 18, 2019
Open systems and interoperability have not only been big buzzwords over the past decade, but they have also become core features of video...
NYPD Refutes False SCMP Hikvision Story on Jan 18, 2019
The NYPD has refuted the SCMP Hikvision story, the Voice of America has reported. On January 11, 2018, the SCMP alleged that the NYPD was using...
Mobile Surveillance Trailers Guide on Jan 17, 2019
Putting cameras in a place for temporary surveillance where power and communications are not readily available can be complicated and expensive....
Exacq Favorability Results 2019 on Jan 17, 2019
Exacq favorability amongst integrators has declined sharply, in new IPVM statistics, compared to 2017 IPVM statistics for Exacq. Now, over 5 since...
Testing Bandwidth Vs. Low Light on Jan 16, 2019
Nighttime bandwidth spikes are a major concern in video surveillance. Many calculate bandwidth as a single 24/7 number, but bit rates vary...
Access Control Records Maintenance Guide on Jan 16, 2019
Weeding out old entries, turning off unused credentials, and updating who carries which credentials is as important as to maintaining security as...
UK Fines Security Firms For Illegal Direct Marketing on Jan 16, 2019
Two UK security firms have paid over $200,000 in fines for illegally making hundreds of thousands of calls to people registered on a government...
Access Control Cabling Tutorial on Jan 15, 2019
Access Control is only as reliable as its cables. While this aspect lacks the sexiness of other components, it remains a vital part of every...
Avigilon Favorability Results 2019 on Jan 15, 2019
Since IPVM's 2017 Avigilon favorability results, the company was acquired by Motorola and has shifted from being an aggressive startup to a more...
Gorilla Technology AI Provider, Raises $15 Million, Profiled on Jan 15, 2019
Gorilla Technology is a Taiwanese video analytics manufacturer that recently announced a $15 million investment from SBI Group, saying this...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact