Back to Home

Bridging the Gap: Solving On-Prem and SaaS-Managed Access Rights for Digital Keys


 

Bridging the Gap: Solving On-Prem and SaaS-Managed Access Rights for Digital Keys

 

In today’s complex IT and OT environments, managing access rights across both on-premises systems and SaaS platforms is already a challenge. But when it comes to digital key systems, the complexity deepens. Many organizations rely on electronic key solutions—such as ASSA ABLOY CLIQ or iLOQ—to secure physical access to critical infrastructure. Yet, these systems often operate in silos, disconnected from modern Identity Governance & Administration (IGA) or Identity and Access Management (IAM) platforms.

This article explores how organizations can unify access control across on-prem and SaaS environments—including physical digital keys—into a single, compliant, and automated framework.

 

The Challenge: Disconnected Worlds

Traditional key management systems were designed before the cloud era. As a result:

  • Access rights for digital keys (e.g. issuing or revoking permissions) often require manual action.

  • These rights are typically managed in proprietary, on-prem applications—disconnected from cloud-based IAM solutions like Microsoft Entra ID, Okta, or SailPoint.

  • Lack of integration means delayed revocation of physical access when roles change or contracts end—posing a real security risk.

For organizations facing CER, NIS2, ISO 27001, or SOC2 compliance, this fragmentation introduces unnecessary audit complexity and operational overhead.

 

The Solution: Federated Access Control for Digital Keys

To bridge the gap, leading organizations are adopting a federated model that integrates digital key systems with their existing IAM/IGA infrastructure. Here’s how it works:

1. Central Identity as Source of Truth

All users—internal and external—are managed through the central IAM platform. Role-based access control (RBAC) and entitlements are defined in a SaaS or hybrid IAM solution.

2. Real-Time Key Provisioning

Using a middleware or integration platform (like Key2XS), the system automatically provisions or revokes digital key access based on IAM role changes, identity lifecycle events, or policy triggers.

3. Unified Audit Trail

All actions—digital key issuance, activation, access logs—are synchronized with the organization’s audit system, allowing for real-time monitoring and compliance reporting.

4. Policy-Driven Access Governance

IGA systems (e.g. SailPoint, One Identity) enforce periodic access reviews for both IT and OT access rights, ensuring that no dormant or orphaned key access exists.

 

Use Case: Hybrid Utility Company

A Dutch utility managing 10,000 substations implemented an IAM-integrated digital key system using Key2XS. By linking Microsoft Entra ID with their ASSA ABLOY CLIQ system:

  • Access rights are updated in near-real time when a technician changes teams or leaves the organization.

  • Facility managers no longer need to track physical keys manually.

  • CER and NIS2 audit reporting includes both digital and physical access controls in one dashboard.

 

Key Benefits

  • Eliminate manual processes for digital key management
  • Accelerate provisioning and revocation of physical access
  • Achieve compliance with CER, NIS2, ISO, and internal governance policies
  • Unify IT and OT access control into a single pane of glass
  • Support zero trust principles—even for physical assets

 

 

Final Thoughts

The convergence of physical and digital access rights is no longer a futuristic ideal—it’s a regulatory and operational necessity. By integrating digital key systems with IAM and IGA platforms, organizations can automate, audit, and secure access across the board—no matter where it’s hosted.

Want to see how this works in practice?

Explore how Key2XS connects physical key systems like CLIQ to Microsoft Entra ID, SailPoint, and One Identity—bridging on-prem and cloud access management with AI-powered automation.

 

🇳🇱 Privacyverklaring – Key2XS

Laatst bijgewerkt: 4 april 2025

Bij Key2XS hechten wij veel waarde aan jouw privacy en de bescherming van persoonsgegevens. In deze privacyverklaring leggen wij uit welke gegevens wij verzamelen, waarom wij dat doen en hoe wij deze gegevens beveiligen.

1. Wie zijn wij?

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
KvK-nummer: 96651504
E-mail: info@key2xs.com
Website: www.key2xs.com

2. Welke gegevens verzamelen wij?

  • Voor- en achternaam
  • E-mailadres
  • Telefoonnummer
  • Functie en bedrijfsnaam
  • IP-adres
  • Inloggegevens
  • Gebruiksgegevens van onze software

3. Waarvoor gebruiken wij deze gegevens?

  • Het leveren van onze diensten
  • Accountbeheer en toegangscontrole
  • Klantcommunicatie
  • Wettelijke verplichtingen
  • Verbetering en beveiliging van onze diensten

4. Rechtsgrond voor verwerking

  • Uitvoering van een overeenkomst
  • Wettelijke verplichting
  • Gerechtvaardigd belang
  • Toestemming

5. Gegevensopslag en hosting

Alle gegevens worden opgeslagen binnen de Europese Unie. Wij maken gebruik van ISO-gecertificeerde hostingpartners die voldoen aan de AVG.

6. Delen van gegevens met derden

Wij delen jouw gegevens niet met derden, tenzij dit wettelijk verplicht is of noodzakelijk voor onze dienstverlening. Met derden sluiten wij verwerkersovereenkomsten af.

7. Beveiliging van gegevens

Wij nemen maatregelen zoals:

  • Encryptie
  • Tweefactorauthenticatie
  • Toegangsbeheer
  • Regelmatige audits

8. Bewaartermijnen

Gegevens worden niet langer bewaard dan nodig of wettelijk verplicht.

9. Jouw rechten

  • Inzage, correctie, verwijdering
  • Beperking of bezwaar
  • Gegevensoverdraagbaarheid

Neem contact op via info@key2xs.com.

10. Klachten

Je kunt een klacht indienen bij ons of bij de Autoriteit Persoonsgegevens (www.autoriteitpersoonsgegevens.nl).

11. Wijzigingen

Wij behouden ons het recht voor deze verklaring te wijzigen. Check regelmatig onze website voor updates.

🇬🇧 Privacy Policy – Key2XS

Last updated: April 4, 2025

At Key2XS, we highly value your privacy and the protection of personal data. This privacy policy explains what data we collect, why we collect it, and how we secure it.

1. Who we are

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
Chamber of Commerce (KvK) number: 96651504
Email: info@key2xs.com
Website: www.key2xs.com

2. What personal data do we collect?

  • Full name
  • Email address
  • Phone number
  • Job title and company
  • IP address
  • Login credentials
  • Usage data from our software

3. Why do we process your data?

  • To provide our services
  • Account and access management
  • Customer communication
  • Legal compliance
  • Service improvement and security

4. Legal grounds for processing

  • Performance of a contract
  • Legal obligation
  • Legitimate interest
  • Consent

5. Data storage and hosting

All data is hosted and stored within the European Union. We use ISO-certified hosting providers that comply with the GDPR.

6. Sharing data with third parties

We do not share your data with third parties, unless legally required or necessary for our services. Data processors are bound by processing agreements.

7. Data security

We implement measures such as:

  • Encryption
  • Two-factor authentication
  • Access control
  • Regular security audits

8. Data retention

We retain data only as long as necessary or legally required.

9. Your rights

  • Access, correction, deletion
  • Restriction or objection
  • Data portability

Contact us at info@key2xs.com to exercise your rights.

10. Complaints

You may file a complaint with us or with the Dutch Data Protection Authority: www.autoriteitpersoonsgegevens.nl.

11. Changes

We reserve the right to update this privacy policy. Please check our website regularly for updates.