Types of Access Control Credentials

Modern electronic access control systems, whether hosted on-premise or in the cloud, offer a variety of ways to authenticate users and grant them access to a space. Credentials are typically classified into a few categories, something you have like a card or fob, something you know like a pin code, something you are like a fingerprint or retina scan, or any combination of these categories. Please continue reading to learn about four of the most common types of access control credentials and how they can help you manage your space more securly.

RFID

RFID Historically, the most common credential is RFID technology using some sort of card or fob. These RFID options can range from basic proximity cards, fobs, bracelets to more advanced and secure smart cards that use integrated circuit chips embedded into the card itself to provide encrypted communication with the access control readers. Access control cards can easily be lost or stolen, which can create a vulnerability in your security

PIN Codes

 PIN codes are also a popular method where a PIN code is assigned to a user and then used as their credential to access a secured space. With PIN codes, a user walks up to a door and types in a numerical code assigned to them on a keypad to authenticate and gain access to the secured space. PIN codes do have some drawbacks as well. PIN codes are often shared, creating a security risk.  PIN codes can also be cumbersome to administer and maintain.

Biometric

Biometric credentials have grown in popularity over the past few years and can include multiple biometric features. There are biometric devices that can scan fingerprints, retinas, or the palms of your hand to authenticate you and grant or deny access to a space. Another biometric option is facial scanning where a device can scan a face to determine facial features that can be turned into a hash that can then be used as a credential. Biometric readers offer a high level of security, but in order for biometric readers to work effectively and efficiently, they need to be installed in the right location and in the right environmental conditions. Somewhat limited use.

Mobile Credentials

Perhaps one of the fastest-growing credentials lately is mobile credentials as nearly everyone carries a mobile phone with them. Mobile credentials allow users to have a credential stored on their mobile devices, usually in the form of a mobile app, that they can use to gain access to secured spaces providing those spaces have compatible hardware. As a user approaches a reader, they can make an unlock request using a button on their phone or even a gesture, to gain access. Mobile credentials also have the advantage of providing multi-factor authentication easily by leveraging the built-in PIN code functionality or biometric readers of the mobile device for additional security.