Key management

Managing keys is a challenging task. After all, keys provide access to properties, spaces, cupboards or drawers that may contain items or information not intended for everyone. So it’s essential to be aware of which keys there are and who has them. The key management module allows you to manage the physical access of persons to spaces, properties and inventory. One or more locks can be created per object, where various locks may have the same access code (e.g. cylinder numbers).

Per key you will be able to determine which keys have access to which locks and who has been issued the key. The key management module has all the functionalities of the inventory module, allowing you to add photos and keep track of suppliers. The module can be adapted for each group of users by configuring access privileges for fields and functions. You will be able to specify your own procedures for the creation and editing of data using the workflow module. Functions specific to your organization can be added on request.

Example of Key Management Screen:

Key features:

  • People

    Any key management data are available immediately on the internet. In the case of an emergency, you will be able to see who has which keys, has access to a certain space and has supplied the locks.
  • Locks

    You will be able to keep track of information on any locks, such as its type, manufacturer, maintenance condition, date of installation and access codes. You’ll be able to use all the functionalities of the inventory management module.
  • Cylinders

    Cylinders are linked to locks and can be replaced if need be. If a key is lost, you will be able to request the location of the cylinders, for possible replacement.
  • Key inventory

    You will be able to see how many keys you have in stock, to whom they have been issued and if any keys are missing or have been stolen.
  • Key chains

    Multiple keys can be combined into a key chain. You will be able to determine which key chain is required if someone needs access to a space. Upon issuing a key chain, all individual keys are issued also.
  • Spaces and equipment

    One or more locks can be assigned to each space or piece of equipment and you will be able to keep track of who has access to that specific space or piece of equipment.
  • Log

    For each key, a record is kept of when and to whom it was issued. You will be able to see whether the key is still in use or when it was returned, enabling you to determine later who had access to a specific space at a specific point in time. The entire issuing and returning process can be managed using Axxerion.
  • Schematics

    Locks can be made to appear on CAD schematics. The user will be able to retrieve information on cylinders, access codes and keys by clicking on the lock in the schematic.

To find out more about the extensive options available, please contact us.

Axxerion Foundation

As your organization evolves, Axxerion evolves with you

Easy to Use and Highly Configurable:

Work with your own terminology, easily remove unwanted fields or steps or add new ones when needed. Define your own business processes.

Comprehensive Security:

Role based logins to accommodate different types of users and contractors and their access rights.

Global search capability:

Easily and instantly search and find any facility information in the database.

Automatic Review and Approvals:

Easily and graphically define workflow and approval processes for any item in the system.

Contact Us

  • Axxerion USA
  • 24 Professional Center Pkwy, Suite 130
  • San Rafael, CA 94903
  • Follow us on LinkedIn!