Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Access ManagementEducation: K-12Education:University

Controlling Credentials, Identity and Access on Campus

By Ajay Jain
Security key pad
Jupiterimages / PHOTOS.com>> / Getty Images Plus / Via Getty Images

Jupiterimages / PHOTOS.com>> / Getty Images Plus / Via Getty Images

January 29, 2013

 

Security has increasingly become a core facility operations priority in campus environments across the education and corporate/industrial markets. Security management at these facilities needs to know who is on campus and tightly control their access to various areas within what are often sprawling facilities. While conventional credentials such as visitor passes and access devices enable physical access, the underlying issue is to verify, validate and track the individuals holding these credentials. The ability to effectively manage identities campus-wide improves security to best protect people, property and assets.

The Challenge: No Centralized Management

Non-integrated access control, timekeeping and visitor management systems typically require individuals to be enrolled separately into each system. Such scenarios are inefficient and time-consuming to administer as there are too many manual processes related to identity management in the campus environment. Manual processes most often require completion of paperwork to issue an access control device or data entry to enroll a new hire into multiple systems. These processes must happen before a card is activated, and another set of manual processes must occur to de-activate a card and deny access, for example, in the case of a terminated employee. The corresponding delays, whether because of slow processes or heavy workload, can compromise security.

De-provisioning has inherent risks if it is not managed in a timely way. A delay in updating the status of a terminated employee or an expelled student could put student safety at risk and create serious liability for the institution. When an access device is stolen or lost, there is also potential for unauthorized individuals to enter various areas on campus.

The Solution: Physical Identity and Access Management (PIAM) Software

Identity Management (IdM) or Access and Identity Management (AIM) systems are used in the IT world to manage individual’s identities, their authentication, authorization, roles and privileges across systems and networks. A similar type of software system, Physical Identity Access Management (PIAM) systems, can be used to manage identities in the physical security environment. These systems operate like IdM systems to manage all aspects of identity and access across multiple systems, including physical access control systems. Like IdM systems, PIAM solutions can base decisions and enable workflows according to the identities of users.

Software systems interface with existing physical access control systems to verify identities and grant access based on consideration of campus-wide policies and an individualized profile of where an identity has access. Software systems also automate the manual processes that have previously undermined campus-wide security. PIAM software streamlines time-consuming and inefficient processes in the campus security environment, from issuing ID badges to managing databases to assigning access privileges across multiple physical access control systems.

Centralized identity management software can also address the risk of campus visitors or vendors who might work for several days or weeks on a campus. Software systems can automatically provide access during a specified time span and immediately revoke access privileges when the time elapses. Vendors may need both physical and logical access, and software automation can provide and manage both. Access and identity can all be linked to the length of a contract.

Full and complete reporting of a data mine of transactions and approvals is another benefit of PIAM software. Any activity, event or status at any point in the identity lifecycle is reportable and auditable.

When vetting employees, students or visitors, real-time access to watch lists or criminal history databases is another valuable tool. Software identity management systems can provide instant access to cross-check identities against any list. Institutions should be attentive to and compliant with any state requirements to notify the subject of a background check.

Role-Based Assignment of Access

Managing identity requires addressing three categories of identities in the campus environment – trusted identities (faculty and staff), semi-trusted identities (students) and untrusted identities (visitors, vendors, etc.). Anyone tasked with improving campus security and safety should recognize the complexities involved in managing all three. For example, a student's identity might include when and where he or she has access based on class requirements and schedule. Any changes in class schedule or housing would need to be updated in real-time to ensure security. Managing identities effectively requires role-based assignment of access to restricted areas and physical assets for all three categories of trust. Centralized and automated PIAM software does just that.

KEYWORDS: PIAM (physical identity and access management) school security security credentials University security

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Ajay Jain is President and CEO of Quantum Secure

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Columns
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Stores Virtual Credentials on  Smartphones for Access Management MACE from Nedap Identification Systems

    Stores Virtual Credentials on Smartphones for Access Management

    See More
  • Software Changes Unify Identity and Access Management

    See More
  • Banking on Identity Management for Security and Compliance

    See More

Related Products

See More Products
  • 9780367259044.jpg

    Understanding Homeland Security: Foundations of Security Policy

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing