0333 900 0101

Mobile Access Control: A UK Buyer’s Guide

 

Mobile Access Control

Mobile access control replaces plastic cards and fobs with a credential on your phone. Users present a handset via NFC or Bluetooth Low Energy (BLE), or the door senses a nearby authenticated device for hands-free entry. Done well, it improves convenience, reduces plastic waste and issuance overheads, and makes onboarding and offboarding much faster—without sacrificing security. Done poorly, it can introduce gaps around device policy, lost phones and data governance. This guide explains how to deploy mobile credentials in a way that is robust, compliant and user-friendly across UK estates.

If you’re exploring mobile credentials for a new build or retrofit, our team can translate these principles into a right-sized design and commissioning plan. (See: Commercial Access Control Installation)

What “mobile credentials” actually are

In today’s systems, the “card” lives in a secure container on the smartphone and is presented to a reader using NFC (near-field, tap-to-enter) or BLE (short-range radio that allows tap or hands-free entry). The door controller still makes the decision at the edge using policy you’ve defined; the difference is how the user authenticates to the reader and how credentials are issued, revoked and updated. For multi-site estates, mobile credentials are typically delivered over the air via the access platform, with the controller caching permissions so doors continue to function during brief network outages. The UK government’s protective security guidance frames Automatic Access Control Systems (AACS) around controlling who goes where and when with an auditable trail—mobile credentials don’t change the purpose, only the user experience. 

Why organisations adopt mobile access

For facilities teams, the big wins are onboarding speed (issue to the phone, no print runs), offboarding certainty (revoke remotely), and lower plastic/print logistics. For users, it reduces forgotten cards—most people don’t forget their phone—and enables touch-free journeys at busy doors. From a governance perspective, binding access to a device that already requires a screen lock and supports hardware-backed keys can raise the assurance of “who is holding the credential” compared with basic cards. The National Cyber Security Centre (NCSC) encourages organisations to take device security and secure administration seriously; mobile credentials benefit when those broader device controls (screen locks, updates, managed app distribution) are already in place. 

BYOD, ownership and acceptable use: set the ground rules first

The biggest design decision is whose device you will trust. Many programmes allow bring-your-own-device (BYOD), provided basics are met: a device lock (PIN/biometric), current OS, and the ability to revoke the credential instantly. NCSC’s BYOD guidance recommends setting clear policy, providing user support, and using mobile device management (MDM) or lightweight app controls commensurate with risk. The ICO’s BYOD guidance adds the data-protection lens: you remain the data controller, so you must document how access data is processed and protected on personal devices and set proportionate retention and removal controls. Build this governance into your roll-out plan and staff communications—it shortens approval cycles and keeps auditors comfortable.

If you don’t want to manage personal devices, a corporate-only approach still works well: issue managed handsets or allow mobile credentials only on enrolled devices using your chosen MDM. The NCSC’s MDM guidance explains what to look for (device inventory, policy enforcement, remote wipe, containerisation and update hygiene). 

NFC vs BLE (hands-free) – picking the right fit

NFC gives a tap-to-enter experience similar to a contactless card. It tends to be fast and deterministic at turnstiles or busy lobbies and feels familiar to users.

BLE enables proximity-based entry (from a few centimetres to a few metres depending on configuration), which is excellent for hands-free or accessibility-friendly journeys—no need to present a card when carrying goods or using mobility aids. BLE security is mature but different from NFC; it relies on device pairing and encrypted links. If BLE is in scope, use platforms and readers that implement modern Bluetooth security correctly, and follow recognised guidance on key management and device authentication. NIST’s Guide to Bluetooth Security provides a solid industry baseline for hardening decisions around pairing modes, key strength and protection against relay attacks. 

For an overview of touch-free journeys and practical upgrade paths across door types, see our short primer on Hands-Free Access Control.

Security model: raise the floor, don’t invent new risks

A defensible mobile deployment looks boringly sensible:

  • Device assurance. Require a screen lock and current OS; block rooted/jailbroken devices; prefer devices enrolled in your MDM if risk is high. NCSC’s device security collection sets out practical controls for hardening endpoints used at work.

  • Strong admin. Protect the management plane of your access platform with role-based access and multi-factor authentication for administrators. NCSC’s MFA guidance is clear: pick the strongest available methods and secure admin paths.

Edge determinism. Doors should make decisions locally using cached permissions if the server or WAN is down; events reconcile later. This principle remains valid whether you’re cloud-managed or on-prem—design for continuity at the door, not just in the server room. (For the networking underlay that keeps everything reliable, see our primer on IP Security System Installation.)

Lost phones, flat batteries and offline scenarios

The question you’ll get from the board is simple: what if the phone is lost or flat? Build sensible fallbacks:

  • Rapid revocation from the management console (and an out-of-hours process for security to trigger it).

  • Secondary factor on critical doors (e.g., card + PIN, or mobile + PIN), and a temporary visitor/contractor card workflow.

  • Reception support via video intercom for exceptional cases, so you preserve verification and audit rather than propping a door. (See: Entry Phone Installation.)

These aren’t special to mobile credentials—they’re good access hygiene in any system.

Privacy, data and transparency

Access events are personal data. Switching from plastic to mobile doesn’t change your duties, but the optics can: staff often ask whether location is being “tracked” on their phone. Be explicit: the access system logs door events (time, place, credential), not GPS tracking of the handset. Update your privacy notice, retention policy and signage accordingly. If you extend mobile credentials to contractors or visitors, ensure your notices and retention windows cover them too. The ICO’s BYOD guidance underscores your responsibilities (lawful basis, minimisation, security, and clear user information) when personal devices enter the picture. 

Integrations: where mobile shines

Mobile credentials are at their best when they simplify complex journeys:

  • Visitors: pre-issue a temporary mobile pass to a guest’s phone for the duration of their meeting, with entry limited to reception, meeting rooms and facilities.

  • CCTV and alarms: pair door events with camera bookmarks and first-in/last-out arming so security staff get rich context without hunting. We’ve outlined patterns and benefits here: CCTV–Access Control–Alarm Integration.

  • Vehicle access: extend privileges to car-park barriers and gates to keep a single source of truth for people and vehicles.

The BSIA’s specifier guidance stresses that access control should be specified for how people actually use buildings, and integrated with other measures—mobile doesn’t change that principle; it makes the orchestration easier. 

Cloud vs on-prem for mobile roll-outs

Mobile credentials often favour cloud-managed platforms because over-the-air provisioning, revocation and analytics are simpler at multi-site scale. That doesn’t remove your security responsibilities—identity, secure admin, audit and data location still matter—but it can reduce the care-and-feeding you carry in-house. If you remain on-prem, you can still deploy mobile credentials reliably; just ensure your server availability, backups and patch regime are engineered and documented. The NCSC’s Cloud Security Principles and admin MFA guidance provide a vendor-neutral benchmark for either path. 

Deployment playbook (in plain English)

Start with a small but representative pilot: a busy lobby, a secure plant room and a typical internal office. Enforce device prerequisites, measure throughput and user satisfaction, and rehearse “lost phone” and “flat battery” scenarios with reception and security. Document everything—who can issue and revoke, how overnight contractors get temporary access, how privacy notices are displayed—and then scale in phases. Keep the number of internal SKUs low (avoid three different reader families if one will do) and standardise on a single, inclusive journey that works for most people most of the time.

What good looks like on day one

  • Clear policy: BYOD/corporate-only decision made; device prerequisites and acceptable use documented; privacy notices updated.

  • Hardened platform: admin MFA and role-based access configured; deterministic edge behaviour verified; change control established.

  • Engineered doors: readers positioned for natural approach; release on alarm and relevant faults proved with the fire contractor (mobile doesn’t change life-safety duties).

  • Trained people: reception can issue and revoke temporary passes; security can triage exceptions without breaking audit.

When those boxes are ticked, mobile access becomes a daily convenience rather than a daily question.

 

Get in touch today

Have a no-obligation chat with one of our data cabling experts, who can recommend a solution to suit your requirements and budget.