Moving to mobile

Access & Identity Management Handbook 2021 Access Control & Identity Management

Mobile access control has shown good growth over the past few years, albeit from a small base. Omdia made a comment in 2019 that while growth of mobile-based access would continue, the primary market for this technology is new installations. Apparently, a mass migration from cards/fobs to mobile is not on the cards, but many newer installations are taking advantage of the benefits of access control via the user’s mobile device.

Of course, when referring to using mobile devices for access control, we include the residential (or consumer) market as well as the commercial and enterprise market as there are many solutions available for smaller and home installations. The question is, are South African consumers and organisations making the move to mobile access? If they are, what are their options and can they make the move gradually without a massive replacement project that would cost a fortune?

Wouter du Toit, regional director, Salto Systems Africa says digitalisation and new technologies are transforming the world, including the access control market. “We continue to get requests for mobile credentials in Africa. Mostly, NFC/BLE (near-field communications/Bluetooth Low Energy) projects are new installations. With Salto’s new generation of BLUEnet hardware, BLE/NFC is built into the technology by default, making it future proof for any client to convert to mobile in the future if they are not ready to implement it immediately.”

Hayley Elwen, business development director, Africa at ASSA ABLOY agrees, noting that many companies using standard readers are now requesting mobile credentials. “We have found around 15% of sites are now asking for mobile credentials compared to traditional systems. With Wi-Fi already installed in many buildings, mobile access makes for an easy conversion and saves long-term costs on lost physical credentials.

“Another advantage we see for building owners is that with ASSA ABLOY’s SMARTair solution with Openow, you no longer require hubs. The software loaded onto the server connects directly to the mobile phone and SMARTair’s wireless door locks. Not only does this make for a more cost effective solution, but means a simple no-fuss installation, which is appealing in existing buildings wanting to upgrade from keys to an access control solution.”

Pros and cons

As with almost everything in the world related to technology today, one of the questions around mobile credentials is whether employees will be happy to load an app on their smartphones, an app their company controls. Some could even ask what other information the app might share without the user’s knowledge.

Most mobile smartphones have a number of secure features to protect your data and the phone, such as password, PIN and even biometric authentication, making it very secure even if lost or stolen, according to Du Toit. Moreover, he adds that Salto does not ask for any information when the user downloads the application. “We are also GDPR compliant to enforce our stance on people’s privacy. Where we do collect data, we acknowledge it and it is shared with us willingly.”

Elwen echoes this and adds that flat batteries and data connectivity are also concerns to some. However, she says that as data has become more affordable and accessible, this is less of a concern. In addition, in an emergency, flat batteries can be managed by card override functionality on many devices. There again, the majority of users will be disinclined to allow their batteries to run flat and be out of communications except in unusual circumstances.

As far as the benefits of mobile access are concerned, Du Toit continues: “Assigning and revoking access has never been easier and convenient without sacrificing security; gone are the days that a card must be encoded and then distributed to a user in person, with mobile technology it is done on the go. This makes it a lot simpler for remote workers to get access on the go. There is no need to be in contact with the user when assigning access as you can send new or updated credentials OTA (over the air).

“It makes multi-site management easier for the operator and more user friendly for users. It can be used with wired, wireless and battery-operated standalone solutions. It also transforms offline readers into semi-online devices. In areas where a networked reader is not possible nor needed, the phone becomes the carrier to the server with OTA services and it can update the blacklisting on the device and also retrieve the battery status and transaction log. This creates a very cost-effective solution in terms of issuing credentials.”


Moreover, the company can also easily cancel a user’s access when they leave or when a smartphone is lost or stolen with the click of a button.

Facility managers get through their access management workload much faster when they replace traditional card or tag credentials with mobile credentials, notes Elwen. Because solutions like Openow and the SMARTair TS1000 software handle everything, delays in issuing or revoking keys for sensitive doors no longer jeopardise site security or company efficiency.

“Essentially, there are no physical credentials to handle or track, no card encoders to buy and no queues at reception for staff or visitors awaiting credentials being issued. And of course, mobile credentials provide a more sustainable offering – no plastic cards being manufactured or lost,” she continues.

Looking at the hotel industry, Elwen mentions that mobile access offers a simpler way to provide multiple credentials for one room. Should a family be staying together, it is easy to generate mobile credentials for all those staying in a specific hotel room, with no potential loss of cards and the costs associated with that. “And of course, there is no manual check-in required. Within 24 hours, you do a mobile check-in and access is sent directly to the guest’s phone. Upon arrival, the guest simply presents their phone to the room door lock to get in – easy and convenient.”

A secure ecosystem

Further to the security question, Du Toit points out that Salto is certified according to the Secure Digital Applications Kitemark Certification for the organisation’s JustIN app and web services. According to the BSI, the BSI Kitemark certification “independently tests websites or apps to make sure they have the security controls in place for the information they are handling. It requires a website or app to undergo rigorous and independent testing.” (Read more at www.bsigroup.com)

“This provides further reassurance to Salto customers that its entire access control ecosystem has the appropriate security controls in place,” he states.

Similarly, Elwen says ASSA ABLOY’s mobile solutions use end-to-end encryption to protect communications between the phone and the server to ensure users are protected. Mobile phones also have additional layers of security against physical credentials: a screen-lock adds an extra layer of security. Additionally, with phones, multi-factor authentication is baked into the credential.

“And how quickly would you notice if a plastic keycard went missing? Nowhere near as fast as you’d spot your smartphone was gone,” she notes.


Salto’s solutions

In describing his company’s solutions, Du Toit says Salto is continuously improving its hardware and software solutions and part of this development always includes mobile credential and functionality with convenience and security.

“Our main on-premise access control solution, Salto ProAccess Space, uses JustIN Mobile as a carrier option for Android and iOS. This solution also ties back to our hospitality solutions using the same JustIN Mobile application.”

SaltoKS is a cloud-based access control and hospitality solution with mobile credential support. This solution features more than just opening the door; users are also able to interact from the mobile device, managing certain aspects of the solution. Danalock cloud-based residential and SME solutions also feature a mobile offering for management and interaction with the door opening.

“Gantner recently became part of the Salto family and adds a host of mobile solutions that tie into locker management, T&A; and ticketing solutions,” he concludes.

ASSA ABLOY’s solutions

Elwen says ASSA ABLOY provides two different mobile access control offerings to suit a range of applications. One is the Openow mobile functionality offered with the SMARTair commercial and hospitality access control solution, and the other is the range of Aperio locks offered with SEOS mobile credentials, which integrate into most access control systems.

SMARTair Openow: SMARTair is a full access control system using wireless door locks and hubs. It offers various levels of access control management in a single wireless system. With different offerings geared at commercial and hospitality installations, it provides flexibility for the end user, with easier installation.

Openow is the mobile solution for SMARTair wireless locking systems. Users store their validated digital keys securely in the Openow app. To open a SMARTair lock, they simply tap their phone against its inbuilt RFID reader. An encrypted (HTTPS/AES-128) Bluetooth connection connects the phone and locking device to quickly validate or deny an unlock request.

Aperio with SEOS mobile credentials: SEOS is the next generation of credential technology that provides the ideal mix of security and flexibility for any organisation. It is an advanced encryption and software-based infrastructure; it secures trusted identities on any form factor and can be extended for applications beyond physical access control. This solution integrates with existing infrastructure and is secure, portable and adaptable to multiple applications.


Benefits of mobile access - By Wouter du Toit, Salto.

• Increased flexibility and improved security. Easy, efficient and intuitive automated key delivery to create a keyless experience.

• Proven mobile and secure technology to create a keyless experience anytime, from anywhere and on any device.

• Send or receive a secure key to open any door. Issue, cancel, and restrict keys to specific times and locations.


Credit(s)






Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The AI knows best
Access Control & Identity Management
RBA makes use of the vast computing power of machine learning to analyse thousands of data points to determine how risky a transaction may be.

Read more...
Enterprise identity fraud prevention
Access Control & Identity Management
Trustmatic brings government-grade facial 1:N search capabilities to the cloud, supporting face deduplication and identification against watchlists, and providing seamless integration via REST API.

Read more...
From the editor's desk: The new old normal
Technews Publishing News
After two years, the industry is eventually able to get back to a form of normality and Africa’s biggest security show is back. Understandably, some people are still nervous about meeting in person ...

Read more...
Gallagher announces ISO 27001 certification
Gallagher News Access Control & Identity Management
Gallagher has announced it has achieved ISO 27001 accreditation, a standard that ensures organisations protect their information in a systematic and efficient way, through a comprehensive Information Security Management System (ISMS).

Read more...
Enhance security and sustainability
Technews Publishing HID Global Editor's Choice
Jaroslav Barton says mobile access control provides future-proof flexibility for the never-ending endeavours of digital transformation as well as going green.

Read more...
Remote management of access points
Salto Systems Africa Access Control & Identity Management
SALTO BLUEnet Wireless has been developed to meet the demands of security and ease-of-use. This access control system is networked through Bluetooth RF and designed for doors where real-time control is required.

Read more...
Biometrics and breathalysers
Access Control & Identity Management
ERSBio partners with ALCO-Safe to incorporate alcohol testing into customised, intelligent time and attendance solutions.

Read more...
RealPass-N document reader
Suprema Access Control & Identity Management
A compact, multi-functional full-page document reader, Suprema’s RealPass-N offers one-step scanning to capture images and data from multiple documents including ICAO Doc 9303 compliant eMRTD such as e-passports, e-visas, ID cards and barcodes.

Read more...
Contactless access control solution
LD Africa Access Control & Identity Management
The Matrix Cosec Argo Face offers advanced contactless user access in an all-in-one product composed of a door controller powered by facial recognition technology.

Read more...
The leading indicators of corruption
Technews Publishing Editor's Choice
Corruption is endemic in many areas of South African and African organisations, Leon Steyn, CEO at Dante Deo highlights a number of indicators that could show something is amiss.

Read more...