NG-Key
NG-Key
Secure identity, readers, credentials, and audit visibility in one platform
AI-guided access operations

Modern access operations for mobile keys, smart readers, and audit-ready rollout.

NG-Key brings mobile enrollment, passkeys, NFC credentials, cloud-connected readers, and verifiable audit visibility into one operating model for teams that need rollout control, reliable daily operations, and a clean path to expansion.

Passkeys + NFC credentials
Cloud-connected readers
EU-hosted audit visibility
Built for serious rollout teams
Use-case media

A visual layer for rollout, onboarding, and daily operations.

Use-case visuals help explain how NG-Key connects enrollment, credentials, reader operations, and audit visibility in one operational flow for customers, partners, and delivery teams.

Enrollment clarity

Show mobile onboarding, passkeys, and credential rollout with clear visual context.

Reader operations

Present controllerless readers, direct connectivity, and operational readiness in one story.

Audit visibility

Support go-live and procurement conversations with traceable operational narratives.

Use-case visual
Visual storytelling for rollout and operating practice.
NG-Key use-case visual

This visual supports the explanation of enrollment, operations, and audit visibility across the NG-Key platform.

AI copilots

AI that helps operations teams, customer stakeholders, and channel sales act faster.

NG-Key now turns platform signals into serious business guidance. The AI layer does not replace operational control. It summarizes rollout posture, highlights blockers, recommends the next action, and gives customer, admin, and partner teams a clearer basis for go-live, expansion, reference conversations, and scheduled stakeholder reporting.

Customer rollout copilot

Inside the tenant dashboard, the AI rollout copilot shows whether user activation, credential adoption, reader coverage, and support stability are strong enough for the next rollout phase.

Operations monitoring brief

For platform operators, the monitoring AI highlights queue pressure, reader availability, latency, ledger health, and runtime anomalies with clear operational next steps, while the reporting layer packages the same posture into scheduled admin digests.

Reseller and channel guidance

A dedicated reseller portal uses the same AI foundation for workspace blockers, commercial follow-up, project handover, and partner program execution.

Visible business value
A serious AI layer for rollout confidence, steering updates, and commercial expansion.
Customer teams immediately see the next operational action instead of only raw metrics.
Sales and delivery teams gain stronger evidence for renewal, expansion, and reference-readiness discussions.
The AI remains grounded in real platform data, with rule-based fallback and optional OpenAI refinement through the same provider layer.
Platform coverage

A complete access platform instead of disconnected point tools.

The platform is structured around the operational components you actually need in the field: identities, Microsoft Entra ID capable sign-in flows, FIDO2 and WebAuthn credentials, NFC mobile keys, smart readers, credential-media assignments, permissions stored directly on the reader, direct cloud provisioning, schedules, admin reporting, audits, ledger events, and clear visibility into what happened when.

Mobile enrollment

Guide users from invitation to enrolled phone with a controlled onboarding flow for NFC mobile keys.

Microsoft Entra ID Connect

Connect tenant workspaces to Microsoft Entra ID for Azure based sign-in and cleaner enterprise identity alignment.

FIDO2 and WebAuthn credentials

Use public-key credentials with device-bound private keys and local user verification instead of relying on conventional static card identifiers.

Smart readers without controllers

Provision reader settings, claim flows, NFC mobile key approval logic, and live operational state directly without adding separate on-site controller infrastructure.

Schedules and policies

Apply access windows, area assignments, and repeatable access presets without spreadsheet drift.

Admin reporting

Deliver personal daily, weekly, or monthly monitoring digests with incident aware summaries for platform admins.

Reader-resident permissions

Translate high-level grants into effective permissions stored directly on the reader so approval continues even when connectivity is interrupted.

Audit and ledger visibility

Track operational history, access decisions, ledger events, and blockchain-backed verification from the same system context.

Why this architecture is different

A simpler operating model than classic controller-based access stacks.

The biggest difference is not only in the UI. It is in the architecture: permissions live on the reader, onboarding happens through a fast QR flow, NFC mobile keys can also be used directly at the reader, and cloud connectivity stays direct instead of passing through extra controller layers.

Classic controller-based setup
More hardware, more dependencies, more commissioning effort.
Permissions are often tied to separate controller infrastructure instead of living directly on the reader.
Installation grows with extra hardware, cabinet space, wiring, and integration dependencies.
Commissioning is slower because device onboarding and effective access delivery are split across multiple layers.
Audit evidence and operational history are often fragmented across controllers, backend systems, and logs.
NG-Key smart reader cloud model
Less installation effort, faster onboarding, and offline decisions at the edge.
Permissions are materialized directly onto the reader, so access approval continues even when connectivity is temporarily unavailable.
Readers connect directly to the cloud through MQTT without requiring separate local controller hardware.
Reader onboarding is fast: scan the QR code, claim the reader, and bring it online in under a minute.
Readers support Legic on a Legic 6300 based platform, a MIFARE variant is also available, and the hardware can integrate into environments that rely on Matter, Thread, Wi-Fi, BLE, or LAN with PoE.
The reader hardware can support Apple Wallet capable mobile access scenarios, but NG-Key does not currently provide the Apple Wallet credentials.
Lower installation and commissioning effort combines with centralized audits, ledger events, and blockchain-backed verification trails.
How it works

A clear operational flow from identity onboarding to reader decision traceability.

01
Invite or manage users

Create identities and prepare them for controlled enrollment.

02
Enroll phones and passkeys

Bind devices and public-key credentials to a defined user lifecycle.

03
Assign access grants

Map users or groups to readers, areas, and schedule presets.

04
Scan and bring the reader online

Scan the reader QR code, complete the claim flow, and bring the device online in under a minute.

05
Tap, verify, and open

At the reader the flow is NFC tap, local Face ID or biometric verification, signed token exchange, and door approval with central audit visibility.

World First · Q-Air Technology

The world's fastest smart reader enrollment.

Q-Air provisioning is instantaneous. Scan a QR code, the reader is online, configured, and access-ready — in under 60 seconds. No cables. No controllers. No commissioning overhead.

Scan. · Connect. · Done.
Live provisioning
QR-driven setup

Scan the reader's unique QR code with the Q-Air app. The device is claimed, configured, and online — zero manual input required.

Instant cloud provisioning

Permissions, schedules, and access policies are pushed to the reader in real-time over a direct MQTT connection — no on-site controller required.

Under 60 seconds, start to finish

From unboxing to access-ready: mount the reader, scan the Q-Air QR, and the door is live. The fastest reader enrollment in the industry.

< 60s
Enrollment time
0
Controllers needed
1 scan
To bring reader online
24/7
Offline edge decisions
Credentials and identity

Credential operations stay tied to real devices, users, and enrollment state.

Linked mobile devices

See which phones are active, enrolled, and connected to the identity lifecycle.

Passkeys and credential metadata

Track WebAuthn credential registration, public key state, transports, device association, and DESFire-linked identifiers where physical media is part of the rollout.

High-security credential options

Use device-bound cryptographic credentials with local user verification, while still supporting controlled card or transponder assignment flows for deployments that use physical media.

NG-Key passkeys and credentials workspace
NG-Key managed readers and operations workspace
Reader operations

Smart readers, NFC mobile key approval, and effective access stay directly connected to the cloud.

Smart readers without controller hardware

Provision runtime details, claim flows, local permissions, NFC mobile key behavior, and health signals for readers that connect directly to the platform.

Area coverage

Group readers into meaningful operational areas instead of managing every edge by hand.

Offline approval from reader-stored permissions

Apply reusable schedule presets and store the effective permissions on the reader so access decisions keep working offline.

QR onboarding, NFC access, and direct MQTT cloud connectivity

Scan the reader QR code, complete onboarding in under a minute, enable NFC mobile key access, and keep provisioning, commands, and telemetry on a direct cloud path.

Legic, MIFARE, Matter, Thread, BLE, Wi-Fi, and PoE-ready hardware

Readers support Legic on a Legic 6300 based platform, offer a MIFARE variant, support Matter, Thread, Wi-Fi, BLE, and LAN with PoE, and the hardware can work with Apple Wallet capable scenarios even though NG-Key does not currently provide the Apple Wallet credentials.

Audit and traceability

See what happened, why it happened, and which ledger event proves it.

NG-Key is built to make access operations inspectable. That includes user activity, reader state, access decisions, effective permissions, ledger events, and blockchain-backed verification paths when verification is enabled.

This turns audit history into something stronger than generic logs: teams can inspect the operational event itself, the related access context, and the associated verification trail in one place. In connected reseller and fulfillment flows, order and handover milestones can also be kept on a traceable commercial event path.

Access audits
Monitoring
Ledger events
Blockchain verification trail
NG-Key ledger event and audit inspection view
Deployment and architecture

A practical operating stack for controllerless readers, direct cloud delivery, and verifiable access history.

The platform is designed around the components access teams actually operate: a central workspace, Microsoft Entra ID capable identity integration, mobile enrollment, passkeys, smart readers, direct MQTT cloud delivery, reader-resident permissions, scheduled reporting, and audit-grade event history.

That makes NG-Key different from stacks that still depend on separate controllers, higher installation effort, slower commissioning, disconnected audit evidence, and ad hoc stakeholder communication instead of built-in reporting.

Administrative control center
Microsoft Entra ID ready identity bridge
Smart reader cloud operations
Direct MQTT provisioning path
Scheduled admin reporting
Offline approval from reader-stored permissions
QR onboarding in under a minute
NFC mobile key with biometric verification
NG-Key blockchain verification workspace
Security area

A visible security area with whitepapers, operating controls, and deployment discipline.

NG-Key treats security as part of the product and delivery story. That includes platform security foundations, stronger identity posture, credential and reader visibility, protected production delivery, audit traceability, European cloud hosting, GDPR aligned operations, and clear public materials for customers, partners, procurement, and stakeholder review.

Device-bound identity

Passkeys with FIDO2 and WebAuthn capable flows support stronger authentication posture and cleaner identity assurance.

Controlled administration

Administrative ownership, sensitive settings, and invitation hygiene remain visible governance topics.

Credential and reader technologies

Deployments can combine public-key credentials with reader hardware for LEGIC and MIFARE-class environments, plus DESFire-linked identifiers where physical media is provisioned.

European hosting and compliance posture

The cloud footprint is positioned in Europe, aligned with GDPR / DSGVO aware operations, and backed by an ISO 27001 certified data-center environment.

Protected production delivery

Production rollout follows validated Git and CI/CD workflows with builds, formatting checks, static analysis, tests, immutable runtime images, and controlled runtime secrets.

Whitepapers and security materials
Business and security content aligned with the NG-Key web presence.
Operating principles

Built around clarity, controlled access, and operational trust.

Explicit access control

Users, groups, areas, readers, and schedules remain visible and reviewable.

Device-bound identity

Credential lifecycle stays connected to the phone and passkey context that produced it.

Operational observability

Health, provisioning, cloud connectivity, offline state, and access decisions can be inspected without leaving the platform.

Critical setting protection

Administrative control and sensitive settings stay separate from routine actions.

Verifiable event trail

Operational history stays close to the affected entities and can be linked to ledger events and verification evidence instead of disappearing into generic logs.

Visual product walkthrough

The page highlights real product views so capabilities, workflows, and operational context stay easy to understand.

Lower installation and commissioning cost

Removing separate controller infrastructure and simplifying reader onboarding reduces installation effort and commissioning cost.

Access entry

Enter the NG-Key workspace when you are ready to operate identities, readers, and access history.

This public page is intentionally informational. Access to the platform happens through authenticated sign-in only.