Back
News

Seamless Transitions: How Key2XS Simplifies Migration Between IAM and Locking Systems


 

Seamless Transitions: How Key2XS Simplifies Migration Between IAM and Locking Systems

In complex operational environments, energy grids, water utilities, transport networks, change is inevitable. Whether it’s a corporate decision to move from SailPoint to Entra ID, or an operational change from ASSA ABLOY CLIQ to iLOQ or vice versa, migrating between identity or key systems has historically been painful, risky, and resource-intensive.

roadworker

The Problem: Fragmented Access During Migration

When organizations change their Identity and Access Management (IAM) provider or physical locking infrastructure, two critical domains collide:

  • Digital identities and entitlements are re-mapped or re-provisioned.

  • Physical credentials (keys, cylinders, and access rights) must remain synchronized to prevent downtime and compliance gaps.

Traditionally, these migrations required parallel administration, duplicated user data, and manual coordination across IT, OT, and facility management. The result: overlapping access lists, potential lockouts, and increased attack surface.

 

The Key2XS Approach

Key2XS was built to eliminate this friction. The platform acts as a vendor-agnostic integration layer between digital identity systems and physical key management. During a migration, Key2XS maintains a single source of truth for access policies, ensuring continuity and compliance while the underlying IAM or locking systems change.

Key2XS supports multi-vendor ecosystems including:

  • IAM: Microsoft Entra ID, Okta, One Identity, SailPoint, OpenText/NetIQ

  • Locking systems: ASSA ABLOY CLIQ, iLOQ S5/10/50, DOM Tapkey and others

 

Controlled Cut-Over and Dual Synchronization

With Key2XS, the migration process is phased and controlled:

  1. Discovery phase – all key users, access groups, and objects are mapped through the Key2XS AI-driven inventory engine.

  2. Dual integration – Key2XS synchronizes both the legacy and target IAM or locking system, allowing parallel operation during transition.

  3. Automated provisioning – keys and access rights are provisioned or revoked automatically through IAM-driven workflows, ensuring continuity.

  4. Validation and reporting – compliance dashboards show audit readiness under CER, NIS2, and GDPR requirements throughout the migration.

This means a DSO, for example, can migrate from Entra ID to SailPoint while keeping thousands of transformer stations accessible with zero downtime.

 

The Compliance Advantage

Under EU regulations such as CER (see guidelines) and NIS2, critical entities must demonstrate traceable and governed access control at all times. A migration event cannot create an “access gap.”

Key2XS ensures every change, whether in IAM or lock infrastructure, is logged, validated, and reportable. This guarantees operational continuity without compromising security or compliance posture.

 

The Outcome

Organizations using Key2XS achieve:

  • Zero operational downtime during IAM or lock vendor change

  • Consistent identity-to-key mapping across systems

  • Audit-ready reporting under CER/NIS2

  • Reduced migration effort by over 60%

 

In Short

Key2XS is the missing bridge between digital and physical access, turning migrations that once took months of manual work into controlled, compliant transitions.

Because in critical infrastructure, continuity is not optional.

 

🇳🇱 Privacyverklaring – Key2XS

Laatst bijgewerkt: 4 april 2025

Bij Key2XS hechten wij veel waarde aan jouw privacy en de bescherming van persoonsgegevens. In deze privacyverklaring leggen wij uit welke gegevens wij verzamelen, waarom wij dat doen en hoe wij deze gegevens beveiligen.

1. Wie zijn wij?

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
KvK-nummer: 96651504
E-mail: info@key2xs.com
Website: www.key2xs.com

2. Welke gegevens verzamelen wij?

  • Voor- en achternaam
  • E-mailadres
  • Telefoonnummer
  • Functie en bedrijfsnaam
  • IP-adres
  • Inloggegevens
  • Gebruiksgegevens van onze software

3. Waarvoor gebruiken wij deze gegevens?

  • Het leveren van onze diensten
  • Accountbeheer en toegangscontrole
  • Klantcommunicatie
  • Wettelijke verplichtingen
  • Verbetering en beveiliging van onze diensten

4. Rechtsgrond voor verwerking

  • Uitvoering van een overeenkomst
  • Wettelijke verplichting
  • Gerechtvaardigd belang
  • Toestemming

5. Gegevensopslag en hosting

Alle gegevens worden opgeslagen binnen de Europese Unie. Wij maken gebruik van ISO-gecertificeerde hostingpartners die voldoen aan de AVG.

6. Delen van gegevens met derden

Wij delen jouw gegevens niet met derden, tenzij dit wettelijk verplicht is of noodzakelijk voor onze dienstverlening. Met derden sluiten wij verwerkersovereenkomsten af.

7. Beveiliging van gegevens

Wij nemen maatregelen zoals:

  • Encryptie
  • Tweefactorauthenticatie
  • Toegangsbeheer
  • Regelmatige audits

8. Bewaartermijnen

Gegevens worden niet langer bewaard dan nodig of wettelijk verplicht.

9. Jouw rechten

  • Inzage, correctie, verwijdering
  • Beperking of bezwaar
  • Gegevensoverdraagbaarheid

Neem contact op via info@key2xs.com.

10. Klachten

Je kunt een klacht indienen bij ons of bij de Autoriteit Persoonsgegevens (www.autoriteitpersoonsgegevens.nl).

11. Wijzigingen

Wij behouden ons het recht voor deze verklaring te wijzigen. Check regelmatig onze website voor updates.

🇬🇧 Privacy Policy – Key2XS

Last updated: April 4, 2025

At Key2XS, we highly value your privacy and the protection of personal data. This privacy policy explains what data we collect, why we collect it, and how we secure it.

1. Who we are

Key2XS B.V.
Kraanspoor 50, 1033 SE Amsterdam
Chamber of Commerce (KvK) number: 96651504
Email: info@key2xs.com
Website: www.key2xs.com

2. What personal data do we collect?

  • Full name
  • Email address
  • Phone number
  • Job title and company
  • IP address
  • Login credentials
  • Usage data from our software

3. Why do we process your data?

  • To provide our services
  • Account and access management
  • Customer communication
  • Legal compliance
  • Service improvement and security

4. Legal grounds for processing

  • Performance of a contract
  • Legal obligation
  • Legitimate interest
  • Consent

5. Data storage and hosting

All data is hosted and stored within the European Union. We use ISO-certified hosting providers that comply with the GDPR.

6. Sharing data with third parties

We do not share your data with third parties, unless legally required or necessary for our services. Data processors are bound by processing agreements.

7. Data security

We implement measures such as:

  • Encryption
  • Two-factor authentication
  • Access control
  • Regular security audits

8. Data retention

We retain data only as long as necessary or legally required.

9. Your rights

  • Access, correction, deletion
  • Restriction or objection
  • Data portability

Contact us at info@key2xs.com to exercise your rights.

10. Complaints

You may file a complaint with us or with the Dutch Data Protection Authority: www.autoriteitpersoonsgegevens.nl.

11. Changes

We reserve the right to update this privacy policy. Please check our website regularly for updates.