To deploy and manage iLOQ Locking System, you will need both, access to the database, and the system-specific Token. Token acts as a physical encryption key.
Tokens are locking system specific. However, it is possible to reset Token and re-use it as Token for another locking system.
Depending on the desired security level, logging in to the locking system may require a user-specific login Token, in addition to a user name and password. However, programming is not possible without Token.
Token can be attached to several users, and one user can have several Tokens. The user's usage rights may vary depending on the login Token in use.