• you know exactly who is using the keys • define rights for users, add/remove users, cards and keys • users will access the keys only with permission • view reports and log • safe storage • manage keys in several buildings from a central office via intranet • provide temporary access for asset service...