Skip to content
TechnoGuru — Think Technology, Think TechnoGuru

03 / 10

Case file

02 · ELV Systems

Access Control.

Right person. Right door. Right time.

Card, biometric, mobile-credential and visitor-management — Honeywell, HID, Matrix and Suprema — integrated with CCTV, intrusion and HR systems.

Access Control — premium installation context

/ The discipline, in detail

How we approach access control.

Modern access control is a credential system, not a door system. We design the credential lifecycle — issue, suspend, audit — alongside the hardware. Cards give way to mobile credentials; biometrics handle controlled zones; visitor management screens contractors and meeting attendees with photo capture and pre-approval workflows.

On record

Every access control engagement is documented end-to-end — design, programming, commissioning, calibration — and handed over with the files our successors would need if we were never to return.

/ Three lenses on the same system

Read it the way you actually need it.

Three short readings of access control — for a non-engineer who needs the picture, an engineer who needs the spec, and a buyer who needs to see the system in operation.

/ In simple terms

Access control decides who can open which door at what time. The serious engineering question is what happens on a power cut: fail-safe doors unlock (so people can exit on a fire), fail-secure doors stay locked (so the perimeter does not open on a power outage). Every door in a serious building gets that decision made explicitly, written down, and signed by the fire-safety officer.

/ Technical explanation

An access-control system runs OSDP-connected readers (card / biometric / mobile-credential) into door-cluster controllers, with magnetic locks, electric strikes or motorised mortise locksets per the door's per-door fail-state classification. Fire-alarm release on egress paths is hardware-enforced; free-egress on every door is non-negotiable. CCTV event linking, visitor-management and time-and-attendance integration sit on the supervisory layer.

/ Real project usage

On the Tinsukia Medical College & Hospital deployment, 184 access-controlled doors carry a per-door fail-state classification — theatre doors fail-safe with manual override, drug stores and pharmacy fail-secure with REX, corridor doors on egress paths fail-safe and released on the fire-alarm matrix, records and medical-records archives fail-secure with separate egress on a secondary door. The classification is in the as-built, the AMC log and the fire-safety officer's signed schedule.

/ System architecture

The layers, named.

Every layer below is engineered as one piece of the integrated stack. Each carries its own commissioning artefact and its own AMC inclusion.

  1. 01

    Access controllers at the door cluster — typically 1 controller per 4–8 doors, mounted in a secure enclosure within the building's IT closet or near the door cluster.

  2. 02

    Readers at the door — card, biometric (fingerprint, face, palm-vein), mobile-credential. Reader-controller link is OSDP (Open Supervised Device Protocol) for secure deployments, Wiegand for legacy retrofits.

  3. 03

    Lock hardware — magnetic locks (fail-safe), electric strikes (fail-safe or fail-secure per door classification), motorised mortise locksets (typically fail-secure), with the per-door classification recorded in the door schedule and the as-built.

  4. 04

    Free-egress hardware — request-to-exit button, passive infrared, mechanical handle release on the inside of every access-controlled door, regardless of fail-state.

  5. 05

    Server and database — the access-control management software hosts the credential database, the door schedule, the time-and-attendance integration where applicable, and the audit log. Workstation interfaces in the security control room and at nominated operations desks.

/ Design considerations

The decisions we take early.

  • Per-door fail-state classification — fail-safe on egress paths and fire-alarm-released doors; fail-secure on perimeter and high-security rooms. Recorded in the door schedule, the access-control configuration and the fire-safety as-built, signed by the fire-safety officer.
  • Free-egress is non-negotiable on every door, regardless of fail-state. Tested on every commissioning and on every quarterly AMC visit.
  • Reader-credential mapping — the credential type (card / biometric / mobile) chosen per-door against the access frequency and the security-grade. Drug stores, blood-bank, theatres typically biometric; common doors typically card.
  • Schedule and access-group structure — the access-group hierarchy mapped against the building's actual operational rota, not the org chart, so the access reaches the on-duty shift.
  • Audit log retention — sized against the building's audit and incident-investigation timelines, typically 1 year for clinical, 3 years for regulated, 90 days for general commercial.

/ Integration logic

How it talks to the rest.

  • Fire-alarm release — every door on the fire-alarm matrix's release list must be fail-safe in hardware. The release is via a relay output from the fire-alarm panel that interrupts the lock's power.
  • CCTV event linking — every door event (granted, denied, forced, held-open) is timestamp-linked to the camera covering the door, with synchronised video replay in the VMS.
  • Visitor-management — visitor credentials issued through the access-control system with auto-expiry, with the visit recorded in the audit log.
  • Time-and-attendance — for office and educational deployments, access events feed the time-and-attendance system through a published API.

/ Failure scenarios

What goes wrong, in practice.

  • Fail-state mismatch — door specified fail-safe in access-control but installed with fail-secure electric strike. Mitigated by per-door fail-state reconciliation on commissioning and on every quarterly AMC visit.
  • Free-egress hardware failure — the REX or PIR fails, leaving the door's interior unable to release on legitimate egress. Caught only by quarterly free-egress testing on every door.
  • Reader-credential database drift — credentials added but not removed when employees leave, or biometric templates expired. Mitigated by quarterly credential-database audit against the active personnel list.
  • Wiegand security weakness on legacy retrofits — Wiegand is not encrypted and is vulnerable to skimming. Mitigated by OSDP migration on any new install or major upgrade.
  • Backup-power failure on access controllers — controllers carry a battery for fail-state preservation; battery degradation produces unpredictable door behaviour on power loss. Mitigated by quarterly controller battery testing.

/ Maintenance expectations

What the AMC actually delivers.

  • Quarterly free-egress test on every access-controlled door, with signed test record.
  • Quarterly fail-state reconciliation against the access-control configuration and the fire-safety as-built.
  • Quarterly credential-database audit against the active personnel list — credentials for departed employees removed, expired biometric templates re-enrolled.
  • Annual reader-and-controller firmware update calendar with offline configuration baseline.
  • Spares — controllers, reader heads, magnetic locks, electric strikes (both fail-states), REX buttons, sized against the manufacturer's MTBF data.

/ Sister services

The rest of elv.

A serious brief usually crosses two or three of these. Read across the discipline — we deliver them as one contract.

/ Where this system has been deployed

Access Control on the ground.

The reference projects below carry a access control layer engineered as part of an integrated stack. Each case study walks through the engineering challenges that were solved, the standards the work was held to, and the operational outcome on the day-two team.

/ Frequently asked

Access Control — what buyers ask first.

Cards or biometric — which is better?

Use cards for general access (issue, revoke, replace cleanly) and biometric for controlled zones where presence-of-person matters; most premium deployments use both. Cards are operationally cleaner — issue, revoke, replace. Biometric is stronger for controlled zones (data centre, vault, server room) where presence-of-person matters. Most premium deployments use both: card for the building, biometric for sensitive interior zones.

RFID, biometric or mobile credential?

RFID cards are the universal default — cheap, fast, easy to revoke. Biometric (fingerprint or face) suits clinical zones, server rooms and any scenario where shared cards are a real problem. Mobile credentials (Bluetooth via HID Mobile, Apple Wallet, Google Wallet) are the rising default for premium offices and hospitality — no card to lose, easy to grant and revoke remotely.

How does access control integrate with HR onboarding?

Through the access-control system's directory integration — Active Directory, Azure AD, or HRIS. New hires automatically get appropriate door access on day one based on their department; departures lose access at the same minute their account is disabled. We configure these integrations as part of the deployment.

What's the right number of access zones for a typical office?

Coarse zoning works best in practice — 4–6 zones for most offices: building lobby, common floor, departmental floor, server room, executive suite, after-hours. Over-zoning creates a permission-management overhead that exhausts the IT team and makes the system actively useless. We design zoning around the realistic operational pattern.

Do we need access control on internal partition walls?

Usually no — most internal access control should be at the building entry, the floor lift-lobby and 2–3 sensitive interior doors (server room, finance, executive). Putting readers on every interior door creates friction without security gain; the threat model rarely justifies it.

Honeywell Pro-Watch, HID Mercury or Lenel OnGuard — which platform?

Honeywell Pro-Watch is our default for any project where access integrates with VMS — its CCTV pairing with Honeywell's MAXPRO VMS is best-in-class, and it suits regulated healthcare and government estates well. HID Mercury is the open-controller choice when you want platform independence at the panel — a Mercury panel runs under multiple head-end softwares and avoids vendor lock-in. Lenel OnGuard is excellent for very large enterprise where one head-end manages 500+ doors with full identity-management workflows. We deploy all three.

· Begin

Begin a
access control
brief.

Tell us about the building, the timeline, and what success looks like a year after handover. We will reply within two working days with a written response, not a sales pitch.

Access Control & Visitor Management | TechnoGuru