Last Updated on : 2025-11-26 07:26:06download
Access Management is an application designed to assist administrators in implementing efficient and secure access control. It is primarily used for managing access devices (such as door locks), user authorizations, and access records, ensuring secure and efficient entry/exit management.
Access management consists of three core functional modules:
Access device management
Access permission management
Access logs

Manage access control devices such as door locks, including remote unlocking capability. The device card shows various status information simultaneously.

Access permissions are organized and displayed by personnel. Permissions for the same individual across different times and for different devices are aggregated for convenient management.
You can view the quantity of authorized permissions and their details, including device information and location, authorization time period, and authorization method.

You can quickly select internal enterprise personnel and add temporary access users. Furthermore, you can batch assign access permissions across multiple devices using methods such as one-time passwords and recurring passwords. This flexibility caters to the requirements of various usage scenarios.
Choose Access Management > Access Permission and click Add Internal Authorization to add internal personnel.


Configure authorization and add access devices.


Click Add Visitor Authorization to add visitors and configure their access permissions.


The personnel access log is designed to record and show user access activities, enabling administrators and users to maintain comprehensive oversight of access events and achieve efficient security management and event tracing. The system automatically shows access records in reverse chronological order, ensuring the most recent entries are prioritized.
Features:

The access authorization logs are designed to record and show all operations related to access permissions. They help administrators monitor authorization changes in real-time, ensuring transparency and traceability in access permission management.
Features:

Is this page helpful?
YesFeedbackIs this page helpful?
YesFeedback