physical security tools that actually talk to enterprise identity systems - does anything exist
so I saw the thread about self-defense tools and it got me thinking about something adjacent that I've actually wondered about from an enterprise security angle. the question of whether physical security hardware can integrate with things like Active Directory, PAM solutions, or even something like Entra ID for conditional access. not stun guns talking to LDAP obviously, but like. door controllers, badge readers, physical access systems. because right now in most orgs I've worked with, physical and logical identity are completely siloed and it creates some genuinely weird gaps. the closest thing I've seen in practice is PACS (physical access control systems) that can pull from AD groups to determine who gets badge access to server rooms. this is actually a solved problem at the vendor level now - things like HID SAFE, Genetec ClearID, Verkada, with JumpCloud or Duo integration, and Alert Enterprise all have connectors that go well beyond a basic one-way sync. some of them do full lifecycle automation, so joiner/mover/leaver flows cover physical access alongside logical accounts. but in practice, most orgs I've touched still aren't using any of that. the sync is janky, one-directional, and nobody owns it properly, so you end up with terminated, employees who still have building access because the offboarding runbook only covers AD and maybe the VPN. I've also seen setups where a PAM solution triggers a physical alert when privileged sessions hit certain thresholds, but that's more SIEM-adjacent than true integration. what I'm genuinely curious about is whether anyone here has actually built out a setup where physical access events feed back into identity risk scoring. like, a user badging into a restricted area outside business hours bumping their risk level in something like Microsoft Entra ID Protection or an ITDR platform. the data exists on both sides. the PIAM vendors are starting to talk about this kind of cyber-physical convergence and some are claiming real-time behavioral analysis, feeding into access decisions, but I haven't seen it cleanly wired into an actual identity risk pipeline in the wild. has anyone actually pulled that off or is it still a PowerShell duct-tape situation on the integration side?