Account
Please wait, authorizing ...

Don't have an account? Register here today.

×

Identity management

Gestión de identidadA key technology for the maximum use of access control.

by Eng. Joel Alejandro Camacho Cortés*

Today, in an era of digital transformation, no one can escape access control systems. When we enter a password to enter our email or when we place our fingerprint to unlock our cell phone, to turn on our computer equipment or to access any type of information, we are talking about access control (by system or by software).

However, in terms of electronic security, an access control system is that mechanism that restricts or allows a user's access to certain areas (physical and identity resources) that require a high degree of security and management; to do this, these systems validate the identification of the person who wants to obtain access through different types of readings (keyboards, proximity tags, biometrics) and are supported by other electronic security devices such as doors, turnstiles and pedestrian or vehicular controlled accesses. Of course, these access control solutions and services are segmented in terms of electronic security.

- Publicidad -

Classification of access control systems

Access control systems can be classified into two main groups based on the connection they need: autonomous access control systems and network access control systems.

- Autonomous access control systems
This type of system allows you to control one or more access areas without being connected to a server, terminal or central system, since its terminals have their own memory for the management of user information. However, these systems cannot keep event logs and have a very limited capacity, since in some cases it is impossible for them to grant access permissions based on schedules or groups of doors.

In other words, autonomous access control systems use a basic method of identification by key, proximity or biometrics, so they work as if they were an electronic key.

- Network access control systems
These systems are integrated through a central or remote system and have a high availability infrastructure, facilitating their integration with access control software or identity management systems, which allows managing multiple areas of an infrastructure, limiting permissions and schedules, and keeping track of all the identities and operations carried out in the system (dates, schedules, areas, profiles, authorizations).

Network access control systems can be composed of very simple applications or systems as complex as sophisticated, which will depend on each particular case.

A maximum security identity management system
In SISSA Digital, one of the main divisions of SISSA Monitoring Integral, we have created and developed IXMAKI, the identity management system that allows capturing and storing the general and biometric information of any person for identity management and the exchange of biometric data. Being a platform that makes use of multiple technologies in a single interface, IXMAKI can be integrated into various systems, including access control systems, which optimizes the security, administration, monitoring and control actions of multiple processes.

- Publicidad -

This is a platform that is widely used in various Social Readaptation Centers and finds its application in multiple environments, such as hospitals, educational centers, banks, industrial parks, manufacturing and airports, among other sectors.

How does identity management work in access control?

To have full control over the access points of any space inside an infrastructure, it is enough to link this identity management system to an access control system and enable in the biometric terminals (fingerprint, facial, iris) the privileges assigned to people by the security department of the organization, ensuring the identification of people and preventing someone from trying to use someone else's identity.

In this way, when a person tries to enter the facilities, their biometric information will be compared with a database that contains the information of all the people who have been enrolled in the same system, verifying or invalidating their identity and providing or denying them access to the facilities with the help of an access control system.

In addition, this identity management system can be integrated with vehicle access control systems, whether biometric, RFID card readers or pen-type barriers, among other security equipment that allows access control in all types of facilities.

Contactless access control
IXMAKI supports biometric and non-biometric devices that do not require contact for the identification of people, minimizing touch points.

- Publicidad -

These are some of the solutions supported by this identity management system to perform contactless access control:

• Contactless fingerprint identification
• Identification by face (2D and 3D)
• Identification by iris (in the process of integration)
• Virtual cards
• Proximity cards
• QR Codes

Main benefits of identity management in access control
Among the many benefits offered by the integration of an identity management system with an access control system, the following stand out:

• Control of inputs and outputs
• Increased security and control of personnel
• Cost savings
• Fast return on investment
• Decrease in registration time
• Increased staff productivity
• Allows and restricts the opening of doors
• Increase in the monetary value of the building
• Added value in modernization
In conclusion, the integration of an identity management system with an access control system provides all occupants of an infrastructure with the security of being in an environment free of intrusions that threaten its integrity.

Likewise, by using devices that do not require contact for the identification of people, it allows greater control over the health measures recommended by the authorities and health specialists.

* Eng. Joel Alejandro Camacho Cortés. Director of Business Development at SISSA Monitoring Integral.

Duván Chaverra Agudelo
Author: Duván Chaverra Agudelo
Jefe Editorial en Latin Press, Inc,.
Comunicador Social y Periodista con experiencia de más de 16 años en medios de comunicación. Apasionado por la tecnología y por esta industria. [email protected]

No thoughts on “Identity management”

• If you're already registered, please log in first. Your email will not be published.

Leave your comment

In reply to Some User
Suscribase Gratis
SUBSCRIBE TO OUR ENGLISH NEWSLETTER
DO YOU NEED A SERVICE OR PRODUCT QUOTE?
LATEST INTERVIEWS

Webinar: NxWitness el VMS rápido fácil y ultra ligero

Webinar: Por qué elegir productos con certificaciones de calidad

Por: Eduardo Cortés Coronado, Representante Comercial - SECO-LARM USA INC La importancia de utilizar productos certificados por varias normas internacionales como UL , Ul294, CE , Rosh , Noms, hacen a tus instalciones mas seguras y confiables además de ser un herramienta más de venta que garantice nuestro trabajo, conociendo qué es lo que certifica cada norma para así dormir tranquilos sabiendo que van a durar muchos años con muy bajo mantenimiento. https://www.ventasdeseguridad.com/2...

Webinar: Anviz ONE - Solución integral para pymes

Por: Rogelio Stelzer, Gerente comercial LATAM - Anviz Presentación de la nueva plataforma Anviz ONE, en donde se integran todas nuestras soluciones de control de acceso y asistencia, video seguridad, cerraduras inteligentes y otros sensores. En Anviz ONE el usuario podrá personalizar las opciones según su necesidad, de forma sencilla y desde cualquier sitio que tenga internet. https://www.ventasdeseguridad.com/2...

Webinar: Aplicaciones del IoT y digitalización en la industria logística

Se presentarán los siguientes temas: • Aplicaciones del IoT y digitalización en la industria logística. • Claves para decidir el socio en telecomunicaciones. • La última milla. • Nuevas estrategias de logística y seguimiento de activos sostenibles https://www.ventasdeseguridad.com/2...

Sesión 5: Milestone, Plataforma Abierta que Potencializa sus Instalaciones Manteniéndolas Protegidas

Genaro Sanchez, Channel Business Manager - MILESTONE https://www.ventasdeseguridad.com/2...
Load more...
SITE SPONSORS










LATEST NEWSLETTER
Latest Newsletter