Hotel access control systems — architecture, technologies, and deployment
A hotel's access control system manages who can open which door, when, and under what conditions. The depth of that system — from a guest's room key to the cage vault entry sequence at a casino — is one of the industry's quieter technical stories.
Layered access architecture
Hotel access control is layered. The outermost layer is the parking garage and perimeter; the next layer is the lobby and amenity access; further in are guest floors, individual guest rooms, back-of-house, and finally the highest-trust spaces (cage, count room, server room, surveillance control room). Each layer has its own credential rules and audit posture.
The same physical credential — a guest's room key, a staff badge, a vendor temporary card — typically grants different access at different layers. A guest's key opens their assigned room and the elevator to their floor and the fitness center; a housekeeper's badge opens any guest room on their assigned floor during their shift; a director's badge opens substantially more. The scope of each credential is defined in the access management system and audited in its logs.
Credential technologies
Magnetic-stripe key cards (the original hotel key technology, dating from the 1970s) are now legacy. They remain in service at older properties but are being phased out — the cards demagnetize easily, the stripe is trivially copyable, and the encoding is well-documented in security research. Replacements are RFID/NFC smart cards, BLE-enabled mobile credentials, and increasingly hybrid approaches that support multiple credential types at the same lock.
The dominant modern technology is 13.56 MHz RFID (MIFARE family) or compatible NFC. The cards are passive; the lock includes an antenna that energizes the card and reads its credential. Encryption between card and lock has tightened over the years: classic MIFARE was broken in 2008, MIFARE DESFire and newer variants address known weaknesses, and current best practice uses DESFire EV2 or EV3 with proper key management.
Lock infrastructure
Modern hotel guest-room locks are typically standalone battery-operated devices with a card reader, an internal microcontroller, and an audit log of every access attempt. Major manufacturers include Assa Abloy (VingCard, Yale), Salto, dormakaba (Saflok, Ilco), and Onity. The locks are connected to the back-end system via portable encoder devices (the front desk encoder writes a credential onto a card; that credential is self-validating against the lock's internal clock and key schedule).
Wireless online locks are an emerging architecture. Instead of the lock being a standalone device, it's connected to a property network (typically via mesh radio, sometimes Wi-Fi) so credentials can be issued, revoked, or modified in real time. The trade-off is infrastructure (every lock needs network connectivity and battery management is more complex when radios are active) versus operational benefit (remote unlocking, real-time audit, instant credential revocation).
Authorization back-end
The access control management system holds the master record of who has what access. For guest rooms, this integrates with the PMS — a check-in event triggers credential issuance, a check-out triggers credential expiration. For staff, the system integrates with the HR platform — a hiring event provisions a badge, a termination event de-provisions it. Vendor credentials are managed separately, typically with shorter expiration windows and approval workflow.
The audit log captures every access event: which credential, which door, what time, whether access was granted or denied. The log is essential for investigations: an incident at 3 a.m. on the seventh floor can be reconstructed by querying which credentials accessed the floor or specific rooms in the relevant window. Retention of access logs typically follows retention of CCTV — 30–90 days as a baseline, longer when associated with an active investigation.
Operational lifecycle
Credentials have a lifecycle: issuance, active use, modification (scope changes, expiration extension), revocation, and destruction. The lifecycle discipline is what separates well-run properties from the rest. Guest credentials issued at check-in expire at check-out plus a brief grace period; staff credentials get reviewed on tenure milestones and on role change; vendor credentials default-expire and require active renewal.
The single most common failure mode is staff credentials that outlive employment. A terminated employee's badge that still works weeks later is a control failure that is also a documented audit-finding pattern. HR-to-access-control integration addresses it; manual processes tend to leak. Properties without the integration sometimes find out about lapses only when an incident reveals them.