Menu

Roadmap

NG-Visitor

Visitor journeys, invitations, and temporary access designed as a governed extension of the access platform.

NG-Visitor structures invitations, arrival, and temporary rights as a governed process. That makes visitor handling less improvised and more traceable for reception, hosts, and security teams, while keeping temporary permissions closer to the same rules as regular access.

Shared identity Managed reader API layer Ledger trail AI Ops
NG-Visitor

Platform fit

Identity, entitlement, and audit context

Delivery

Roadmap-ready and channel-compatible

Operations

Shared operating and integration model

NG-Visitor

Shared identity APIs Managed reader Audit Lifecycle

Scenarios

Where NG-Visitor fits especially well

Visitor journeys, invitations, and temporary access designed as a governed extension of the access platform.

Scenarios

04

Status

Roadmap

Focus

Roadmap-ready and channel-compatible

01 Shared identity

Scenario 01

Pre-registered visits

Identity, entitlement, and audit context

02 APIs

Scenario 02

Contractor and service visits

Roadmap-ready and channel-compatible

03 Managed reader

Scenario 03

Reception workflows with temporary rights

Shared operating and integration model

04 Audit

Scenario 04

Arrival workflows with host and approval context

Identity, entitlement, and audit context

Pre-registration

Pre-registered visits reduce repetitive manual work at reception.

Arrival workflows

Arrival, host context, and approval can follow a clear operational flow.

Temporary credentials

Time-bound rights are easier to control than manual broad exceptions.

Platform fit

Part of the same identity and entitlement model

Roadmap products are not described as isolated side projects but as layers within the same platform logic as NG-Key.

Shared delivery

Designed for channel, APIs, and integration depth

Products are framed through the same delivery and integration language so the expansion story feels credible.

Operations

Audit, monitoring, and clear extension lines

Future products stay positioned along the same operating, audit, and expansion logic.

Operator-facing AI analysis

AI

Operator-facing AI analysis

Queue, reader, runtime, and monitoring signals are condensed into conservative operator guidance.

Verifiable ledger trails

Ledger

Verifiable ledger trails

Hash-chained audit and state events with reviewable anchors make traceability more visible.

FIDO2, WebAuthn, LEGIC, DESFire, and NFC

Trust

FIDO2, WebAuthn, LEGIC, DESFire, and NFC

Passkey-grade trust, WebAuthn enrollment, and classic plus mobile credentials should be visible as one modern credential layer.