Welcome to the Electronic Access Control Glossary, your reference guide for key terms, definitions, and concepts used in modern security systems.
If you’re expanding your knowledge, explore our Video Surveillance Glossary and Fire Alarm Glossary for more related terminology.  These resources are designed to help security professionals, integrators, and end users better understand the technologies shaping today’s security solutions.

Electronic Access Control Glossary

A complete A–Z reference of key access control terms for security professionals and integrators.

Electronic Access Control Glossary Terms and Definitions

A

  • Access Control System

    Regulates who can enter/exit areas using credentials and rules.
  • Access Levels

    Groups of doors/resources assigned to users.
  • Anti-Passback

    Prevents re-entry without exit; enforces area occupancy rules.
  • API/SDK Integration

    Connects access logs to HR, VMS, SIEM, visitor apps.
  • Audit Trail

    Tamper-proof log of access events and operator actions.

B

  • Biometric Reader

    Authenticates via fingerprint, face, iris, vein or palm.
  • Bit Length (26/34/37)

    Common Wiegand lengths; 37 often for corporate unique.
  • BLE/NFC

    Wireless tech used to present a phone as a credential.

C

  • Capacity/Occupancy Rules

    Limits people in an area; blocks new access when full.
  • Card Format

    Encoding layout (facility code, bit length, parity).
  • Card Printing/Encoding

    Issuing badges with photos, holograms, secure keys.
  • Christmas Tree Effect

    Multiple readers/LEDs blinking from power/ground faults.
  • Cloud-Hosted Access

    Managed in the cloud with browser/mobile apps.
  • Code Compliance

    NFPA, IBC, ADA, UL, local AHJ requirements.
  • Controller

    Access control decision-making device connecting readers, inputs, and locks.
  • Controller Topology

    Door, distributed, or enterprise IP controller layouts.
  • Credential Anti-Clone

    Encrypted keys, rolling codes, diversified keys.
  • Credential Lifecycle

    Issue, activate, suspend, revoke, retire credentials.
  • CUP/BLE Keys in Wallet

    Apple/Google wallet support for mobile badges.

D

  • Deadbolt Monitoring

    Input monitoring bolt position for secure doors.
  • Door Closer

    Controls door swing and latching; ensures fire/life-safety.
  • Door Contactless Unlock

    Hands-free unlock via mobile or wave to open sensors.
  • Door Held Open Alarm

    Triggers when door remains open too long.
  • Door Position Switch

    Monitors door open/closed state for alarms and logic.
  • Door Power Supply

    UL-listed power with battery backup for locks/readers.
  • Door Sequencing

    Airlock, sally port, or air pressure sequencing logic.
  • Door Survey

    Collect door/hardware info to ensure correct parts.
  • Duress PIN

    Special PIN signaling distress while appearing normal.

E

  • Edge Controller

    Reader/controller combo at the door, IP-addressable.
  • Egress Button

    Manual request-to-exit control, often with delay and sounder.
  • Electric Strike

    Replaces strike plate to release a locked latch via power.
  • Electrified Lever/Exit Device

    Door hardware with integrated latch/rail electrification.
  • Elevator Control

    Controls floor access via relay/RS-485 interfaces.
  • Event Linking with VMS

    Pulls camera views and recording on access events.

F

  • Fail-Safe vs Fail-Secure

    Defines lock state on power loss for life-safety.
  • FIPS 201/PIV

    U.S. federal credential standard for high security.
  • Fire Alarm Interface

    Releases locks on alarm per code requirements.
  • First-Card Unlock

    First valid credential of the day unlocks scheduled door.
  • Forced Door Alarm

    Triggers when door is opened without valid access.

G

  • Global Anti-Passback

    Enforces anti-passback across multiple controllers/sites.
  • Guard Tour

    Reader checkpoints that guards must visit on schedule.

H

  • Holidays/Exceptions

    Overrides normal schedules for special days.
  • Hot-Staging

    Preconfiguring controllers/readers before field install.

I

  • Intercom/Video Entry

    Audio/video stations to request entry from operators.
  • Interlock/Mantrap

    Two-door sequence ensuring only one opens at a time.

K

  • Key Escrow/Key Diversification

    Managing encryption keys uniquely per card/device.
  • Keypad

    PIN entry device for single or dual‑factor access.

L

  • Liveness Detection

    Tests that a biometric sample is from a live person.
  • Lockdown

    Instantly secures selected doors/areas from software.
  • Locker/Asset Control

    Badges control lockers or equipment cabinets.

M

  • Magnetic Lock (Maglock)

    Electromagnetic lock requiring door release controls.
  • Maintenance Mode

    Temporarily disables alarms during service.
  • Man-Down Integration

    Badge presence used for worker safety systems.
  • Mobile Credential

    Digital access token stored on a smartphone/wearable.
  • Mustering

    Account for people at assembly points during emergencies.

O

  • Operator Privileges

    Granular permissions for admins and guards.
  • OSDP/OSDP-SC

    Modern encrypted reader protocol over RS-485.

P

  • Parking Gate/AVI

    Vehicle access via long-range RFID/AVI or LPR.
  • Proximity Card (125 kHz)

    Legacy low-frequency card technology; easily cloned if not protected.

R

  • Reader

    Device that reads credentials (card, fob, mobile, biometric).
  • Request to Exit (REX)

    Exit motion sensor or button to allow egress.
  • Request-to-Exit Sensor Types

    Passive IR, active IR, radar, touchless.
  • Role-Based Access

    Permissions tied to job roles to simplify management.

S

  • Smart Card (13.56 MHz)

    High-frequency card supporting encryption and applications.

T

  • Tailgating Detection

    Detects unauthorized entry following an authorized user.
  • Threat Levels

    Systemwide modes changing rules (e.g., Normal/High).
  • Time Schedules

    Defines valid days/hours for access.
  • Turnstile/Speed Gate

    Pedestrian barrier integrated with readers.
  • Two-Factor / MFA

    Requires two methods (card+PIN, card+biometric). MFA=Multi-factor Authroization

U

  • UL 294

    Access control system standard for safety/reliability.

V

  • Visitor Management

    Register, badge, and track visitors/contractors.
  • Visitor QR/Barcode

    Temporary codes scanned at readers or kiosks.

W

  • Wiegand

    Legacy reader interface using D0/D1 lines; limited security.
  • Wire Gauge & Distance

    Sizing wire runs for power and data integrity.

Z

  • Zone/Area Control

    Grouping doors/readers for logic and reporting.

This [Focus Keyword Glossary] is part of our ongoing effort to provide educational resources for the security industry.  For deeper insights, check out our related blog posts such as Electronic Access Control Basics or Video Surveillance Best Practices.  If you have questions or want to explore product options, contact our team for expert support.

Share This