Mobile access management APP

Access Management Mobility


  • The Smart Access Mobile App is an essential module within the iAMS Enterprise ecosystem that brings REAL-TIME value in operational cost savings for the owner and the user of the APP.
  • SMART functionalities implemented in the APP analyzes, processes and pushes the data to the control central in a meaningful and valuable format allowing the control central to draw operational decisions.
  • The app helps to increase efficiency, decrease cost and provide emergency features to help increase up-time and cater for the health and safety of the field user.
  • The APP is a cost savings module, allowing the field user to use network data to check-in/out, open locks and use enterprise functionalities without incurring high costs. SMS messaging is a redundancy option in the case of an emergency.




  • Integrates with the access control system Manages and Monitors and gives control over the critical assets
  • Records in real-time the access logs and consolidates with the trouble ticket for the asset maintenance
  • Connects to the mobile app with status codes/messages of the transactions

Smart Access

Mobile App

  • Communicates with iAMS Enterprise and enables remote user and hardware management.
  • Receives notification of assigned tickets to field users
  • Update iAMS Enterprise with ticket closure and transactional information


Access Units

  • Controls keyed and keyless access to Acsys locks
  • Smart Access app will prompt the user to confirm site access
  • Smart Access mobile app downloads access logs from the Locks and update with iAMS Enterprise


Access on the go

Picture verification

Trouble Ticket


emergency / safety

How it works

  1. The user makes a request to the iAMS server to access a specific lock
  2. The request is received and based on the user’s profile and access privileges, a unique 10-digit code is generated and sent back to the user
  3. The OTP received is wirelessly sent to the Bluetooth key or the smartphone allowing the user to physically open the door
  4. Transaction logs are sent back to the server as a proof of access