Mobility and Public Transport
Metro, tram, bus, veer, stations en depots.
24/7 availability and predictable management with incident-driven access. Offline opening is a prerequisite. Mobile validation often works well but may be limited by technical or policy. Keyless is possible for specific processes but is not the default.
Policy in brief
-
Mobile validator: often, sometimes limited
-
Keyless to the lock: limited, only with specific requirements
-
Flex (optionally wired): for vital infrastructure objects
-
Default issuance: named
-
Integrations: sometimes
-
Publication: no specific locations or asset names
Context and assets
Access is distributed across lines, stations, depots, and technical rooms. Network limitations occur. Management is layered with team structures and many external parties.
Recommended setup
Rights-based access with a key as the basis.
Mechatronic cylinders and padlocks as standard on exterior assets and technical rooms. Offline opening with central authorization and audit trail.
Mobile validation where appropriate
Deploy where IT policy and operations support it. Otherwise, the process continues to operate via management points.
Keyless selective
Only in the event of concrete process gains, such as temporary access with strict time windows and limited profiles.
Update points and management points
Management points at workshops and depots for periodic synchronization.
Issuance and vault process
The default is key on the person. Key programming safes for frequent temporary access with changing contractors, or chain of custody with mission and PIN code.
Flex (wired)
Flex for wired applications with online I/O, such as signaling or process connections within a location.
Software and hosting
CAW Enterprise as the management base. EU-hosted shared for smaller to medium-sized environments. EU-hosted dedicated for segregation scale or integrations. On-prem if hosting is not permitted or if logging and IT governance must remain within the own domain.
Pitfalls within the sector
Design
Design as if mobile validation is always available
Keyless
Widely deploy keyless without tangible process gains
Governance
Relying governance on ad hoc synchronization instead of management points