Background knowledge and explanationsFurther informationIdentification media, locking devices and the locking plan“Engaging”, “opening”, “locking”, etc.Synchronisation of database and actual stateAccess and physical access listsEvent managementAuthorisation groupsPasswords usedBuildings and locationsHashtags