Back to Home
ASSA Abloy Cliq

Bridging Worlds: How Logical and Physical Access Are Converging and Why Key2XS Is Out in Front



 

Bridging Worlds: How Logical and Physical Access Are Converging and Why Key2XS Is Out in Front

 

Executive summary

The boundary between IT (“logical” access) and OT/facility security (“physical” access) is disappearing. Identities now span cloud apps, data centers, substations, pumps, and doors. To stay resilient, critical entities need one identity fabric that governs both domains with the same policies, telemetry, and accountability.

Key2XS sits at the center of this shift: it connects electronic key and cylinder systems (e.g., ASSA ABLOY CLIQ, iLOQ) with leading IAM platforms (Microsoft Entra ID, SailPoint, Okta, One Identity and others), so you can govern real-world access with the same rigor you apply to systems and data.

The Key2XS platform is protected by several patents pending, ensuring its unique approach and innovation remain unmatched in the market.

 

Why convergence is happening now

1) Shared risk surface. Hybrid attacks blend credential abuse with on-site manipulation (e.g., opening a cabinet to plug in a rogue device). Treating logical and physical access separately leaves blind spots.

2) Regulation & accountability. Frameworks like NIS2 and the CER Directive require provable control over identities, suppliers, and incidents across IT and OT.

3) Workforce dynamics. Contractors and mobile crews need time-bounded, context-aware access both to apps and to assets in the field.

4) Tech maturity. Modern IAM, policy engines, and electronic keys now support real-time provisioning, revocation, and audit at scale.

 

What true convergence looks like

One identity, one policy, everywhere.

  • Authoritative source: HR/IAM is the “single source of truth” for people, roles, and lifecycle events.

  • Policy portability: The same role/attribute rules that grant a user SCADA read-only access also grant the right physical keys for the right doors, cabinets, and padlocks.

  • Just-in-time (JIT) & least privilege: Keys activate only when needed, for specific jobs and time windows, then expire automatically.

  • Unified telemetry: Door events and key audit trails stream into the SOC alongside identity and endpoint signals for correlation and response.

  • Automated revocation: Terminate or offboard once in IAM; both badge/keys and app access are removed instantly.

    one-key2xs

 

Architecture at a glance

  1. IAM / IGA (Entra ID, SailPoint, Okta, One Identity, OpenText/NetIQ and others) holds identities, roles, and SoD policies.

    • Translates IAM roles into granular physical permissions.

    • Provisions/updates electronic keys and cylinders (e.g., ASSA ABLOY CLIQ, iLOQ).

    • Collects audit trails and pushes events to SIEM/SOAR.

    • Applies AI assistance to propose keyplans, detect anomalies, and optimize cylinder/route management.

      Key2XS acts as the bridge/orchestrator:

  2. Physical endpoints (keys, cylinders, cabinets, gates) enforce access offline/online; syncs validate and rotate permissions.

  3. SOC & OT monitoring receive unified alerts, enabling playbooks that include both door/asset response and logical remediation.

 

Zero Trust for the real world

  • Never trust, always verify: A key alone isn’t enough; context (who, when, where, job ticket) is evaluated before activation.

  • Continuous evaluation: Access can be paused based on risk signals (e.g., compromised contractor identity, unusual travel, failed PIN attempts on multiple cabinets).

  • Micro-segmentation of the physical estate: Keys activate only for the precise set of cylinders a work order requires.

 

Compliance, simplified

  • Lifecycle evidence: Every grant, change, and revocation is linked to the identity and business justification from IAM.

  • Incident reporting: Physical events (forced openings, repeated denials) correlate with logical anomalies for faster root cause and structured reporting.

  • Third-party control: Contractors get time-boxed, scope-limited access with full traceability and easy renewal/termination.

 

Where Key2XS leads 11E4DBC6-36FB-45C2-894C-6D9DE1EA2AEF 

1) Native bridge between IAM and key systems

Key2XS natively integrates with ASSA ABLOY CLIQ and iLOQ (among others) while speaking the language of Entra ID, SailPoint, Okta, OpenText and One Identity. No brittle custom glue.

2) Role-driven keyplans

Turn roles and attributes into automated keyplans. When a technician joins a team or picks up an on-call shift, Key2XS issues the minimum set of grants to both applications and cylinders then retracts them when the shift ends.

3) AI-assisted operations

  • Auto-generated keyplans from org roles, site topology, and uploaded infrastructure data.

  • Anomaly detection (e.g., unusual route/sequence across cabinets, repeated after-hours attempts).

  • Optimization for cylinder maintenance, permission hygiene, and field efficiency.

4) Unified audit & response

Stream standardized events and audit trails into your SIEM/SOAR so playbooks can: disable a user, pull all electronic key rights, alert the field team, and lock down sensitive cabinets in one motion.

5) Built for critical entities

Offline-capable keys, robust audit trails, and privacy-by-design controls suit utilities, transport, water, telecom, healthcare, and government infrastructure.

6) Protected innovation

The Key2XS platform is safeguarded by several patents pending, covering its unique orchestration between IAM systems and electronic key ecosystems ensuring customers benefit from capabilities unavailable anywhere else.

 

ROI you can quantify

  • Fewer truck rolls & re-cylindering: Electronic permission changes replace mechanical rekeying after loss or role change.

  • Faster contractor onboarding: Provision once in IAM, keys + apps follow automatically.

  • Audit without heroics: Evidence is generated by default, cutting prep time for assessments and investigations.

  • Reduced downtime risk: Correlated telemetry shortens detection and response for hybrid incidents.

 

Implementation roadmap (90 days to value)

Weeks 0–2: Foundations

  • Connect IAM and import roles; define critical sites and cylinders; map contractors.

Weeks 3–6: Pilot & JIT

  • Select a region/asset class; enable JIT keys for maintenance and emergency crews; integrate SIEM.

Weeks 7–10: Scale & automate

  • Expand to additional vendors/sites; switch on AI keyplan recommendations; align SOC playbooks.

Weeks 11–13: Prove & optimize

  • Validate KPIs (MTTR, audit readiness, onboarding time, permission hygiene); tune policies and SoD.

Suggested KPIs

  • Time to provision/revoke (apps + physical).

  • % of JIT vs. standing permissions.

  • Audit exceptions and remediation time.

  • MTTR for hybrid incidents.

  • Contractor onboarding time.

 

Example use case (anonymized)

A grid operator needed to grant weekend access to a contractor for timed substation work. Through Key2XS, the operations lead approved a work-order role in IAM. Key2XS generated the minimal keyplan, activated it for a six-hour window, and streamed all door events to the SIEM. When the ticket closed, both logical and physical rights expired. The SOC retained a unified audit trail for compliance reporting.

 

What to look for in a convergence platform

  • Tight, supported integrations with your IAM and key systems no bespoke one-offs.

  • Policy & SoD alignment between logical and physical domains.

  • Offline resilience with verifiable audits.

  • Event normalization for your SIEM/SOAR.

  • AI that explains itself (transparent recommendations and change logs).

  • Vendor partnerships and a roadmap for additional lock/key ecosystems.

  • Patented or patent-pending innovations to ensure long-term differentiation.

 

Conclusion

Logical and physical access are no longer separate problems. Identities, policies, and evidence must move as one especially for critical entities facing hybrid threats and rising regulatory pressure. Key2XS, protected by several patents pending, is purpose-built for this reality: a reliable bridge that turns IAM intent into precise, auditable control over the physical world without friction for your workforce.

Interested in a deeper dive? We can tailor a short workshop to your estate and show how your existing IAM roles translate into safe, just-in-time physical access with unified audit and response.

 

🇳🇱 Privacyverklaring – Key2XS

Laatst bijgewerkt: 4 april 2025

Bij Key2XS hechten wij veel waarde aan jouw privacy en de bescherming van persoonsgegevens. In deze privacyverklaring leggen wij uit welke gegevens wij verzamelen, waarom wij dat doen en hoe wij deze gegevens beveiligen.

1. Wie zijn wij?

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
KvK-nummer: 96651504
E-mail: info@key2xs.com
Website: www.key2xs.com

2. Welke gegevens verzamelen wij?

  • Voor- en achternaam
  • E-mailadres
  • Telefoonnummer
  • Functie en bedrijfsnaam
  • IP-adres
  • Inloggegevens
  • Gebruiksgegevens van onze software

3. Waarvoor gebruiken wij deze gegevens?

  • Het leveren van onze diensten
  • Accountbeheer en toegangscontrole
  • Klantcommunicatie
  • Wettelijke verplichtingen
  • Verbetering en beveiliging van onze diensten

4. Rechtsgrond voor verwerking

  • Uitvoering van een overeenkomst
  • Wettelijke verplichting
  • Gerechtvaardigd belang
  • Toestemming

5. Gegevensopslag en hosting

Alle gegevens worden opgeslagen binnen de Europese Unie. Wij maken gebruik van ISO-gecertificeerde hostingpartners die voldoen aan de AVG.

6. Delen van gegevens met derden

Wij delen jouw gegevens niet met derden, tenzij dit wettelijk verplicht is of noodzakelijk voor onze dienstverlening. Met derden sluiten wij verwerkersovereenkomsten af.

7. Beveiliging van gegevens

Wij nemen maatregelen zoals:

  • Encryptie
  • Tweefactorauthenticatie
  • Toegangsbeheer
  • Regelmatige audits

8. Bewaartermijnen

Gegevens worden niet langer bewaard dan nodig of wettelijk verplicht.

9. Jouw rechten

  • Inzage, correctie, verwijdering
  • Beperking of bezwaar
  • Gegevensoverdraagbaarheid

Neem contact op via info@key2xs.com.

10. Klachten

Je kunt een klacht indienen bij ons of bij de Autoriteit Persoonsgegevens (www.autoriteitpersoonsgegevens.nl).

11. Wijzigingen

Wij behouden ons het recht voor deze verklaring te wijzigen. Check regelmatig onze website voor updates.

🇬🇧 Privacy Policy – Key2XS

Last updated: April 4, 2025

At Key2XS, we highly value your privacy and the protection of personal data. This privacy policy explains what data we collect, why we collect it, and how we secure it.

1. Who we are

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
Chamber of Commerce (KvK) number: 96651504
Email: info@key2xs.com
Website: www.key2xs.com

2. What personal data do we collect?

  • Full name
  • Email address
  • Phone number
  • Job title and company
  • IP address
  • Login credentials
  • Usage data from our software

3. Why do we process your data?

  • To provide our services
  • Account and access management
  • Customer communication
  • Legal compliance
  • Service improvement and security

4. Legal grounds for processing

  • Performance of a contract
  • Legal obligation
  • Legitimate interest
  • Consent

5. Data storage and hosting

All data is hosted and stored within the European Union. We use ISO-certified hosting providers that comply with the GDPR.

6. Sharing data with third parties

We do not share your data with third parties, unless legally required or necessary for our services. Data processors are bound by processing agreements.

7. Data security

We implement measures such as:

  • Encryption
  • Two-factor authentication
  • Access control
  • Regular security audits

8. Data retention

We retain data only as long as necessary or legally required.

9. Your rights

  • Access, correction, deletion
  • Restriction or objection
  • Data portability

Contact us at info@key2xs.com to exercise your rights.

10. Complaints

You may file a complaint with us or with the Dutch Data Protection Authority: www.autoriteitpersoonsgegevens.nl.

11. Changes

We reserve the right to update this privacy policy. Please check our website regularly for updates.