• Identity & Access Management

    Integrate physical and logical security requirements

Central management of multifunctional company ID cards and smart devices

One system for all identification media 

One system for all identification media Our ID card management system is a component of the Peak Security Suite and offers you the unique opportunity to efficiently manage the entire life cycle of multifunctional company ID cards and other identification media such as tokens, smartphones and electronic keys in one system.


With our system, you can seamlessly integrate various identification technologies, including RFID, digital X.509 certificates and QR codes, on a single card. This multifunctionality enables you to cover a wide range of applications for both physical and IT security, thus significantly simplifying the management of your identification media and significantly improving security.

Seamless integration and easy management of multifunctional company ID cards

Our solution fits perfectly into your existing security landscape and guarantees hassle-free implementation and smooth operation. Thanks to the user-friendly interface and flexible customization options, you can effortlessly create, personalize and manage your multifunctional company ID cards and smart devices. Whether you need employee ID cards, visitor ID cards or ID cards for external personnel, our system offers you the flexibility and scalability needed to meet the requirements of large companies, public institutions, business parks and properties.

The features of our ID management system at a glance

  • Life Cycle Management of identification media

    • Controlled issuing, updating and deactivation of multifunctional company ID cards and other smart devices such as tokens, smartphones and electronic keys
    • User-friendly management of employee ID cards, visitor ID cards and ID cards for external personnel
    • Standard workflows for a variety of use cases, which can be flexibly adapted to individual requirements

  • Integration of various identification technologies

    • Support of RFID technology such as LEGIC, LEGIC Advant, MIFARE® Classic, MIFARE® Desfire and HDI for contactless identification
    • Use of digital X.509 certificates for signature, authentication and encryption applications
    • Use of QR codes for versatile and flexible application options, such as pre-registration or reservations

  • Seamless integration into existing security landscapes

    • Connection of ID printers, coding devices, etc. from various manufacturers via the Peak Smart Bridge
    • Bidirectional connectors for the synchronization of identity data with directory services (e.g. Active Directory, eDirectory), identity management systems (e.g. NetIQ, One Identity Manager, Sailpoint, Omada), access control systems (e.g. dormakaba, Primion, Interflex, nedap, Salto, Schneider Intercom) and personnel management systems (e.g. SAP HR/HCM)
    • Provision of digital certificates via existing certification authorities, such as Microsoft PKI or OpenXPKI and secure key management with HSMs (Hardware Security Modules) from Thales and Utimaco

  • Compliance and data protection

    • Fulfillment of all legal and company-internal compliance requirements
    • Support in complying with data protection guidelines and specifications
    • Detailed logging and auditing of all ID and authorization allocation actions

  • Comprehensive support and services

    • Technical support and training for administrators
    • Regular software updates and security patches
    • Adaptation and integration services for specific company requirements

Do you have any questions? No problem, contact us to learn more about how our integrated credential management platform supports the convergence of physical security and IT security. Or simply request a demo of the Peak Security Suite.


Connected solutions

You can click on the links to get more information about the individual components