Key Management
The Key Management System (KMS) v2 is Cornell University’s centralized physical (brass) key management & inventory system. KMS is a multi-threaded web-based application provided and managed by the Cornell University Division of Public Safety’s Access Control Program. It provides units with the facilities and tools for documenting, auditing, and monitoring key and profile data – all requirements for compliance with Policy 8.1 – Physical Security Systems.
Software Features
KMS v2 is a complete overhaul of the 1.x series, in both features and performance. Some of the features found in the latest version include:
- A multi-threaded application; no need for you to wait for everything to load before you can start working.
- A fully normalized database; normalization is conceptually cleaner and easier to maintain and change as our needs evolve.
- A role-based system which creates an implicit distinction between profile and key management, coupled with a flexible authorization model allowing for complex access controls.
- A full complement of profile management and organizational tools including functionality to create, edit, organize structure, manage KCCs, define access locations, instantiate keys and much more.
- A full complement of key management and organizational tools to help you define and track keys, keyrings, key groups, AKCCs and their access rights, key storage, and much more.
- Organizational tools allowing lock shop personnel to better manage vast profile trees more efficiently.
- Group-based authorization model allows you to grant managerial access to multiple users working with the same resources.
- End-user inventory tools. Your key holders can now see keys and keyrings that have been assigned to them and report lost and broken keys to you.
- A scalable automated monitoring and reporting tool allowing us to track and report on any conceivable metric via any desired approach.
- An improved user interface, placing more data at your fingertips; reducing the need to navigate around the tool.
- An all new flexible note system, allowing you to attach a note to virtually any data element in the system.
- An abstract object system facilitating fine grained record keeping of both access and storage locations.
- Automated profile and key audit system; tracking and reporting the full life cycle of these elements. Establishing a chain of custody for all physical keys from inception to destruction.
- An Electronic key ordering system
- With much more to be seen and even more being added.
Feature Requests
The KMS v2 development team wants to hear what you think is missing or will make KMS a better product. If you have an idea to make YOUR work within the system easier, faster, or more comprehensive, contact us with some details! We cannot guarantee that all requests will make it in as quickly as you’d like, or even at all; but where it makes sense, we will do our best to bring you the functionality that will make KMS work for you. Contact us via the Help Request to submit your idea.
Key Management Forms
The following forms will assist you in obtaining various key management services such as those outlined in Cornell Policy 8.1 – Physical Security Systems.
Form | Purpose | Download |
---|---|---|
KCC Authorization | Authorization form for Key Control Coordinators, to be signed by Dean or Vice President. | |
Authorization Designate | Designates an individual to act on behalf of Dean or Vice President in matters concerning Access Control authorizations. | |
University Key Orders | For those not using KMS, a paper form for ordering keys from the University Lock Shop. | |
Key Import Template | Use this template to prepare bulk imports of key data from proprietary systems into KMS v2 formatted data. |
KMS Training Materials
The following downloads are for use in the latest version of KMS trainings.