To deploy and manage iLOQ Locking System, you will need both, access to the database, and the system-specific Programming Token. The token acts as a physical encryption key.
Tokens are locking system specific. However, it is possible to reset a token and re-use it as token for another locking system.
Depending on the desired security level, logging in to the locking system and programming may require a user-specific login token, in addition to a user name and password.
A token can be attached to several users, and one user can have several tokens. The user's usage rights may vary depending on the login token in use.