INSUREX_SYSTEMS
Access & Intrusion

Capability Use Case

Enterprise Access Control & Mobile Credentialing

Scalable access control ecosystems from reader hardware to cloud-managed mobile credentials, unified under a single policy engine.

OSDPBLENFCReactNode.jsPostgreSQLREST APILDAPSAMLMQTT
Enterprise Access Control & Mobile Credentialing

Executive Summary

Our enterprise access control practice migrates organizations from legacy Wiegand-based card systems to encrypted OSDP v2 reader infrastructure with mobile credentialing, eliminating card cloning vulnerabilities and the ongoing cost of physical badge issuance. A typical 50-site enterprise saves $150,000-$300,000 annually in badge production, replacement, and administrative overhead after transitioning to smartphone-based credentials. More critically, the migration closes the Wiegand cloning vulnerability that renders most legacy access control systems trivially defeatable with commodity hardware.

The Challenge

The majority of installed access control infrastructure in the United States still uses the Wiegand protocol, a 40-year-old unencrypted communication standard between card readers and access control panels. Wiegand transmissions can be intercepted, replayed, and cloned using devices costing under $50, available commercially. Research presented at DEF CON and Black Hat conferences has repeatedly demonstrated that an attacker with 30 seconds of physical access to a Wiegand reader can install a transparent interception device that captures every credential presented, enabling mass credential cloning.

Beyond the security vulnerability, physical badge programs are operationally expensive. Large enterprises spend $15-25 per badge in production costs, manage replacement cycles for lost/stolen cards (5-15% annual attrition), and maintain badge issuance offices with dedicated staff and equipment. Visitor management adds further complexity: temporary badges must be issued, tracked, and collected, with compliance implications when they are not returned. The total cost of a physical badge program at a 10,000-employee organization typically exceeds $250,000 annually.

Identity lifecycle management compounds the problem. When an employee is terminated, their badge must be physically recovered or their credential manually deactivated in the access control system. In practice, credential deactivation is often delayed or missed entirely, leaving active credentials in circulation for former employees. Integration between HR systems, identity providers, and access control platforms is typically manual or batch-processed, creating windows of vulnerability during onboarding, role changes, and termination.

Our Approach

We design and deploy access control architectures built on OSDP v2 (Open Supervised Device Protocol) readers communicating with panels over RS-485 with AES-128 encrypted channels. OSDP v2 provides bidirectional communication (enabling reader firmware updates, LED/buzzer control, and tamper monitoring from the panel), encrypted credential transmission (preventing Wiegand-style interception attacks), and reader supervision (detecting reader removal or communication loss). We specify readers from HID, STid, and ASSA ABLOY that support OSDP v2 natively, and deploy OSDP-to-Wiegand converters at legacy panels that cannot be immediately replaced.

Mobile credentialing uses BLE (Bluetooth Low Energy) and NFC smartphone credentials issued through HID Mobile Access, ASSA ABLOY Mobile Keys, or Wavelynx mobile wallet integration. Credentials are provisioned automatically when a user's identity is created or updated in the enterprise identity provider (Azure AD, Okta, or on-premise LDAP). When an employee is terminated in HR systems, the credential revocation propagates through the identity provider to the access control platform within minutes, automatically revoking all physical and mobile credentials without requiring badge collection.

The policy engine operates at a layer above the physical access control system, enabling unified access governance across multi-vendor environments. Organizations running Lenel in their headquarters, Genetec at branch offices, and AMAG at data centers can enforce consistent access policies—time-based restrictions, anti-passback, two-person rules, muster reporting—from a single management interface. The policy engine synchronizes identity and access rights to each downstream ACS through vendor-specific API adapters, maintaining the existing panel infrastructure while centralizing governance.

Key Capabilities

OSDP v2 Encrypted Communication

AES-128 encrypted reader-to-panel communication over RS-485 eliminates Wiegand cloning vulnerabilities, with bidirectional supervision for tamper detection and remote reader management.

Smartphone-Based Credentials

BLE and NFC mobile credentials provisioned directly to employee smartphones eliminate physical badge production costs and enable instant credential issuance, modification, and revocation from the cloud.

Automated Identity Lifecycle

Real-time synchronization with Azure AD, Okta, or LDAP directory services ensures access rights are granted at onboarding, adjusted at role changes, and revoked at termination within minutes—not days.

Multi-Vendor Policy Governance

A unified policy engine enforces consistent access rules across heterogeneous ACS platforms (Lenel, Genetec, AMAG), enabling centralized governance without requiring panel-level standardization.

Technical Architecture

OSDP v2 communication is implemented per the SIA OSDP standard (SIA-OSDP-2.2) over RS-485 half-duplex at 9600-115200 baud. The Secure Channel protocol establishes an AES-128 encrypted session between reader and panel using a PDAC (Panel-Derived Authentication Code) and a pre-shared key provisioned during reader enrollment. All credential data, including card numbers and biometric templates, is encrypted in transit, preventing the interception attacks that plague Wiegand installations. Reader supervision messages (tamper status, communication health) are transmitted every 200ms, enabling the panel to detect reader removal within seconds.

Mobile credential issuance follows the PACS (Physical Access Control System) mobile credential lifecycle defined by the SIA. Credentials are issued as secure containers to the HID Origo or ASSA ABLOY Seos mobile credential platform, stored in the smartphone's secure element or TEE (Trusted Execution Environment). BLE engagement uses the HID iCLASS SE reader protocol with a configurable engagement range (0.5m to 5m) to support both tap-style and hands-free use cases. NFC credentials conform to the ISO/IEC 14443 Type A standard and are compatible with Apple Wallet and Google Wallet credential containers where supported.

Identity synchronization uses SCIM 2.0 (System for Cross-domain Identity Management) as the primary protocol for provisioning and deprovisioning events from the identity provider. The synchronization service maintains a mapping table between IdP user identifiers and ACS cardholder records across all connected platforms. When a SCIM event signals a user status change (disabled, deleted, role change), the service translates the event into vendor-specific API calls: Lenel OnGuard DataConduIT badge-status updates, Genetec Security Center cardholder modifications via the SDK, or AMAG Symmetry REST API badge operations. The entire provisioning pipeline executes within 120 seconds of the IdP event, with dead-letter queuing and automatic retry for transient API failures.

Specifications & Standards

Reader Protocol
SIA OSDP v2.2, AES-128 Secure Channel
Mobile Credential
BLE (HID Seos), NFC (ISO/IEC 14443A)
Identity Sync
SCIM 2.0, LDAP, SAML 2.0, < 120 s provisioning
Encryption
AES-128 (OSDP), TLS 1.3 (API), AES-256 (at rest)
Anti-Cloning
Eliminates Wiegand interception, secure element storage

Integration Ecosystem

HID Global (iCLASS SE, Mobile Access)ASSA ABLOY (Aperio, Mobile Keys)Lenel S2 / OnGuardGenetec SynergisAMAG SymmetryAzure AD / Okta (SCIM 2.0)Wavelynx TechnologiesSTid Readers

Measurable Outcomes

$280,000 annual savings in badge costs
A 12,000-employee financial services firm eliminated physical badge production, replacement processing, and badge office staffing after transitioning to mobile credentials, saving $280,000 in the first year with increasing savings in subsequent years.
Zero credential cloning incidents post-migration
Following OSDP v2 migration at a university campus that had experienced 12 confirmed Wiegand cloning incidents in the prior 18 months, zero credential cloning or interception incidents were reported in the 24 months following deployment.
4-minute average credential revocation
Automated identity lifecycle integration reduced average time from employee termination in HR systems to full credential revocation across all access points from 3-5 business days (manual process) to under 4 minutes (automated SCIM pipeline).

Let's Build

READY TO START?