<img height="1" width="1" style="display:none;" alt="" src="https://px.ads.linkedin.com/collect/?pid=7847562&amp;fmt=gif">
Home > Integrations

Integrations & Technical Details

Connect your IAM infrastructure to physical key management through standards-based integrations with full lifecycle control.

Integration Architecture

Select a system to explore its connection path through Key2XS

IAM Systems
Key Systems

Identity Providers

SailPoint
SCIM 2.0 REST
Entra ID
Graph API Webhooks
Okta
REST Event Hooks
One Identity
REST Polling
OpenText ILM
SCIM 2.0
User lifecycle events
Status updates

Key2XS

Intelligence Engine

Identity Resolution

Maps IAM identities to physical access profiles

Policy Engine

Enforces access rules across all systems

Connector Framework

Protocol translation and normalization

Audit Trail

Complete lifecycle logging for compliance

AI Access Plan Generator

Intelligent access orchestration

Provisioning commands
Status & audit data

Physical Access Systems

eCLIQ ASSA ABLOY
SOAP mTLS
PROTEC² CLIQ ASSA ABLOY
SOAP mTLS
CLIQ Remote ASSA ABLOY
SOAP mTLS
ABLOY PULSE ASSA ABLOY
SOAP mTLS
iLOQ S5/S50 iLOQ
REST

IAM System Integrations

Connect your identity provider for automated physical access lifecycle management

Physical Access System Integrations

Full lifecycle management for physical keys and cylinders

API & Deployment

Standards-based API with flexible deployment options

REST API & SCIM 2.0 Server

Key2XS exposes a comprehensive REST API and a standards-compliant SCIM 2.0 server. Auto-generated OpenAPI documentation provides full endpoint reference with request/response schemas.

api-endpoints.txt
# IDENTITY MANAGEMENT
POST /api/v1/users   Create user
GET  /api/v1/users/{id}/keys   Get assigned keys

# KEY LIFECYCLE
POST /api/v1/keys/assign   Assign key to user
DEL  /api/v1/keys/{id}/revoke   Revoke key access

# COMPLIANCE
GET  /api/v1/audit/trail   Query audit events
POST /api/v1/reports/generate   Generate report

# SCIM 2.0
GET  /scim/v2/Users   List users (SCIM)
POST /scim/v2/Users   Create user (SCIM)

Deployment & Infrastructure

Deployment Model
Available as cloud-hosted SaaS, on-premises, or hybrid deployment. All options include the same full feature set and API access.
Authentication
OAuth 2.0, API keys, mutual TLS (mTLS) for key system connections
Data Handling
Pass-through middleware architecture — no long-term PII storage. Identity data flows from IAM to key systems without being retained.
SCIM 2.0 OpenAPI 3.0 OAuth 2.0 mTLS

See Key2XS in Action

Discover how Key2XS extends IAM governance to physical access.