Commercial

Logged 1-2 Door Access Control Systems

This is the sweet spot for sites that are still small but already care about who entered, when access was granted or denied, and how credentials are managed over time.

Supporting Guide

This is the sweet spot for sites that are still small but already care about who entered, when access was granted or denied, and how credentials are managed over time.

A lot of offices, clinics, gyms, consulting rooms, and staff-only entries are too important for a no-log standalone system, but nowhere near large enough to justify a heavy multi-controller architecture on day one. That is exactly where a logged one- or two-door system makes sense. It keeps the footprint small while still giving the site accountability.

What Changes When Logs Matter

The biggest shift is administrative. Instead of just giving someone a card or PIN and hoping for the best, the site can usually identify the user, define when they are allowed in, and review an event trail later. That matters if staff change, if contractors come and go, or if management has to answer a simple question like whether someone was granted access after hours.

This is also where better schedules and roles start to matter. A logged small system can support cleaner separation between managers, normal users, cleaners, and time-limited visitors. Even if there are only one or two doors, those rules often create much more value than the physical lock itself.

Two Common Ways to Build a Small Logged System

One path is a network-capable smart terminal on a single door, such as a device in the same family as the Hikvision DS-K1T105AM, where the site wants a cleaner event trail and basic remote management for one access point.

The other path is a small controller approach for one or two doors, where the buyer wants a better upgrade path and more controller-style logic. In the Hikvision range, a product such as the DS-K2702X-P shows what that path looks like when the site wants to stay small for now but avoid painting itself into a corner later.

What a Useful Event Trail Should Tell You

At a minimum, the site should be able to identify the user or credential, the door name, the time, and whether access was granted or denied. Depending on hardware and platform choice, the site may also care about door-open-too-long events, forced-door conditions, or image capture at the terminal. Those details matter because they turn an access system from a convenience device into a management tool.

Small systems often underestimate this value. The site might only review logs a few times a year, but when it does need them, it usually needs them badly. That is why paying slightly more for the right small logged system is often better than buying the cheapest door release path available.

Typical Scenarios for This Buying Path

This path is usually right for sites that are no longer “just one door,” but still want to stay tidy and cost-conscious.

  • Small office with a front staff door and a back office or records room
  • Medical or allied health clinic with one public-facing entry and one staff-only door that needs accountability
  • Gym or studio with a main entry plus a staff or plant-room door and changing user permissions
  • Retail back-of-house setup where managers want proper event history without moving to a full enterprise platform

Case Study: Two-Door Small Office

Picture a small professional office with one main entry for staff and one rear records room that should only be accessible to managers. A no-log standalone setup might unlock both doors, but it leaves management blind when someone asks who opened the records room after hours. A logged small system is a better fit because it gives the business user-based permissions, cleaner schedules, and a proper event trail.

In that kind of job, something in the class of a DS-K2702X-P makes more sense than a basic door-only terminal, because the office is already asking management questions rather than just lock questions. The point is not that the office needs hundreds of doors on day one. The point is that it needs proper controller logic, clean user groups, and event history that can still make sense six months later.

Text Diagram: Two-Door Office with Records Room Control

[Staff cards / PINs] --------------------------+
                                              |
                                              v
                         [Reader at main staff entry]
                                              |
                                              +--> [Door 1 on DS-K2702X-P]

[Manager cards / PINs] -----------------------+
                                              |
                                              v
                           [Reader at records room]
                                              |
                                              +--> [Door 2 on DS-K2702X-P]

                           [DS-K2702X-P controller]
                                     |
                 +-------------------+-------------------+
                 |                   |                   |
                 v                   v                   v
         [User groups]         [Schedules]       [Event history]
                 |
                 +--> Staff = main entry only
                 |
                 +--> Managers = main entry + records room

What This Installation Would Actually Require

A proper two-door logged install is not just “controller plus two readers.” The installer still has to design each door as a complete opening with locking, egress, monitoring, and administration in mind.

  • One DS-K2702X-P mounted in a secure cupboard, cabinet, or comms area rather than left exposed in the ceiling space.
  • A stable 12V DC power path for the controller, with battery backup planning if the client wants the access path to survive short outages.
  • One reader for the main staff entry. A card reader such as the DS-K1107AM can suit card-only workflows, while a DS-K1107AMK is more suitable if the site wants card and PIN on at least one door.
  • One reader for the records room, usually with tighter permissions than the main entry and often a stronger authentication rule if the client wants that room treated differently.
  • One compatible lock per door, which in many office jobs means a suitable electric strike, plus an exit button or request-to-exit device and a door contact on each controlled opening.
  • An Ethernet connection back to the office LAN so the controller can be configured, reviewed, and maintained properly.
  • Where the reader is on the insecure side of the door and the client wants better protection of lock-side wiring, a secure relay path such as the DS-K2M061 should be considered.

What the Installer Has to Confirm at Site Survey Stage

This is where a lot of supposedly simple jobs become messy. Before the installer promises hardware, they need to inspect the actual doors and the client’s operating rules.

  • What the doors are made from: aluminium frame, timber, glass with rail, solid-core, or something less standard.
  • Whether an electric strike, maglock, or another locking method is realistic for each opening.
  • How people legally and safely exit each door, because access control still has to respect egress and any building or fire-path requirements.
  • Whether the frame has enough room for a strike and whether the door already closes properly without slamming, binding, or sagging.
  • Where cables can actually be run back to the controller without ugly surface wiring or major builder work.
  • Whether the records room is sensitive enough to justify card plus PIN, tighter schedules, or a door-held-open alert.
  • Who is going to administer users after handover and whether they need a simple local workflow or remote support.

Locking, Egress, and Wiring Decisions

On paper, both doors may just look like controlled openings. In practice, the installer still has to decide how each opening is going to lock, how it is going to release, and how the controller will know whether the door is secure. That is why an installation guide has to talk about strikes, exit devices, and door contacts, not just controller model numbers.

For a typical office main entry, an electric strike is often the cleanest answer if the existing latch and frame suit it. The records room may also use a strike, but some sites choose a different arrangement if the door hardware, frame condition, or room sensitivity calls for it. Either way, the installer has to give each door a full path: reader on the entry side, lock release wiring, exit button or request-to-exit arrangement on the safe side, and a door contact so the system can report whether the opening is actually shut.

The installer also has to think about where the lock relay lives. If the reader is outside and the client does not want lock control exposed through the reader cabling, then a secure module such as the DS-K2M061 becomes a sensible part of the design rather than an optional extra. That is especially true where the office wants a real audit trail and does not want the weakest part of the system to be the wiring at the door.

Power, Backup, and Software Expectations

A logged two-door office system also needs a sensible power and administration plan. The controller should be on stable power, and if the client expects access and event logging to survive short outages, then battery backup or UPS planning needs to be part of the quote. It is not enough to say the doors are electronic; the client needs to know what happens during a power failure, whether the locks release or stay secure, and whether the office can still answer audit questions afterward.

On the software side, the installer should agree early on how users will be managed. If office managers are going to add and remove staff, the handover has to include naming conventions, user groups, holiday or after-hours schedules, and a quick demonstration of how to review events. If the client does not understand how to find “denied access on the records room at 7:48 pm,” then the logged system has not really been handed over properly.

Example Topology for This Office

A tidy way to build this job is to place the controller in a locked back-office cabinet or comms cupboard. From there, one door circuit runs to the main staff entry and the second runs to the rear records room. Each door has its own reader, lock output, exit button input, and door contact input. That keeps the system organised and makes later troubleshooting much easier.

The main staff entry might use a simple card reader if staff turnover is low and the client wants quick entry. The records room, by contrast, may justify a keypad reader or a tighter permission rule because the client already knows that not every staff member should enter it. That is where logged access control becomes useful in practice: both doors live in the same system, but they do not have to behave the same way.

Text Diagram: Two-Door Controller Wiring Logic

[Reader: Main Staff Entry] -----------+
                                      |
                                      v
                                [DS-K2702X-P]
                                      |
        +-----------------------------+-----------------------------+
        |                                                           |
        v                                                           v
[Door 1 lock output]                                         [Door 2 lock output]
        |                                                           |
        v                                                           v
[Main entry strike / maglock]                               [Records-room strike / maglock]
        |                                                           |
        +--> [Door 1 exit button / REX]                            +--> [Door 2 exit button / REX]
        |                                                           |
        +--> [Door 1 contact]                                       +--> [Door 2 contact]
                                      |
                                      v
                           [LAN / software / event logs]

How the Cabinet and Field Wiring Should Be Laid Out

On a good two-door job, the installer should make the cabinet or secure backboard readable at a glance. The controller, power supplies, battery backup, lock-side fusing, network patch, and labelled field cables should all be laid out so a future technician can identify Door 1 and Door 2 quickly without tracing every pair manually. This matters because most service time on small logged systems is spent understanding the previous install rather than replacing parts.

The cleanest pattern is usually one clearly labelled door bundle per opening: reader cable, lock output, exit input, and contact input. If the records room has stronger authentication or a secure relay path, that should also be labelled as its own decision rather than hidden as an unexplained extra module in the cabinet. A logged system feels professional when the event trail and the physical wiring both tell the same story.

What to Prove Before the Client Signs Off

Because the client is paying for accountability, the installer should prove more than simple unlock behaviour. It should be obvious that the office can search events, distinguish staff from managers, and tell the difference between a granted event, a denied event, and a door that was held or left open. That is the point where a logged system stops being a theoretical upgrade and starts being an operational tool.

  • Show that the records room and main entry can have different credential rules without duplicating users manually in two separate devices.
  • Confirm the event log names the right door and the right user instead of showing generic or ambiguous entries.
  • Test a manager override, a normal staff denial, and an after-hours rule so the client sees how each one is recorded.
  • Verify that held-open or not-closed conditions are meaningful and not just noisy false events from poor door alignment.

How You Would Normally Program It

  1. Name the doors clearly in the software, for example “Main Staff Entry” and “Records Room”.
  2. Create at least two user groups such as general staff and managers.
  3. Assign staff access to the main entry according to the client’s actual working hours or expected arrival window.
  4. Restrict the records room to managers only, or require a stronger rule such as card plus PIN if the client wants an extra layer there.
  5. Enable event history so granted, denied, and after-hours attempts are easy to review later.
  6. Set door-held-open or forced-door responses if the client wants the controller to report those conditions.

Why This Is Better Than Two Standalone Terminals

Two standalone devices may still unlock two doors, but they usually create two separate administration problems. Users may have to be added in two places, permissions are harder to compare, and the event trail is weaker or split. A controller-based job gives the office one system of record. That is what management is really buying once it starts asking who accessed the records room after hours.

Commissioning and Handover Checklist

  • Test a valid staff credential on the main entry.
  • Test a manager credential on both doors.
  • Confirm that a general staff credential is denied at the records room if that is the intended rule.
  • Check exit button or request-to-exit operation on both doors.
  • Check that the door contacts report open and closed status correctly.
  • Review the event log to confirm the controller records granted, denied, and after-hours attempts properly.
  • Test any battery-backup or power-fail behaviour the client expects before sign-off.

Buying Checklist for a 1-2 Door Logged Site

  • Decide whether the site needs one door now but may add a second soon
  • Settle whether cards, PINs, or a mixed credential path is best
  • Check how users are added, deleted, and renamed
  • Confirm what event history the site can actually review later
  • Make sure the door hardware and exit path suit the door properly
  • Choose a growth path if the site may want lift control, intercom crossover, or more doors later

Practical Upgrade Rule

If the site already knows it wants accountability, go straight to logs. It is much cheaper to buy the right small platform once than to save a little upfront and replace it when the first audit question appears.

Relevant SecurityWholesalers Product Areas

Source References

Frequently Asked Questions

  • Why do 1-2 door systems need logs?

    Because many small sites still need to know who entered, when they entered, and whether a credential was granted or denied. That matters for accountability even when the site is not large.

  • What usually changes when a site moves from standalone to logged access control?

    The site gains better user administration, searchable event history, schedules, and cleaner control over who can access the door and at what times.

  • What kind of sites benefit most from logged 1-2 door systems?

    Small offices, clinics, gyms, staff-only areas, and mixed commercial sites benefit when they have changing users, compliance expectations, or repeated need to review access events.

  • Should a two-door site buy with future growth in mind?

    Yes. If a second door already exists or a third door is likely later, it is smart to choose a logged architecture that can grow instead of replacing the whole front end later.

  • What hardware does a two-door logged office installation usually need?

    A proper two-door logged install usually needs the controller, door readers, suitable lock hardware such as strikes or other compatible locks, exit buttons or request-to-exit devices, door contacts, power, network connection, and often a secure enclosure or relay approach depending on where the readers are mounted.

  • Should the records room use the same credentials and schedule as the main office door?

    Usually no. The whole point of a logged two-door system is that the site can give broader access to the main office door and narrower access to the records room, often with manager-only permissions, tighter schedules, or even stronger authentication rules.

*Heads up: Prices from major brands expected to increase 5–15% from May.*
We make product support and ordering easy! Reach out to our help team :)

Trade Customers: Log In or Register to Unlock Even Better Prices.

Save & Share Cart
Your Shopping Cart will be saved and you'll be given a link. You, or anyone with the link, can use it to retrieve your Cart at any time.
Back Save & Share Cart
Your Shopping Cart will be saved with Product pictures and information, and Cart Totals. Then send it to yourself, or a friend, with a link to retrieve it at any time.
Your cart email sent successfully :)

Item added to cart
View Cart Checkout