PDK connector
Automate Physical Security Workflows with PDK Integrations
Connect PDK cloud access control to your business systems and cut out manual security management.

What can you do with the PDK connector?
PDK (Professional Door Keeper) is a cloud-based physical access control platform used by facilities teams, IT administrators, and security operators to manage door access, credentials, and real-time entry events. Integrating PDK with your broader tech stack lets you automate credential provisioning, sync access rights with HR and identity systems, and pipe security events into your monitoring and alerting workflows. With tray.ai, you can build automations that keep your physical security posture in sync with every employee onboarding, offboarding, or role change — no manual intervention needed.
Automate & integrate PDK
Automating PDK business process or integrating PDK data is made easy with tray.ai
Use case
Employee Onboarding Access Provisioning
When a new employee is added to your HRIS or identity provider, automatically create a PDK credential and assign the appropriate access groups based on department, location, or job role. No more lag between a start date and the ability to get through the right doors, and no risk that someone hands out broader access than your policy allows.
Use case
Employee Offboarding and Access Revocation
Trigger immediate PDK credential deactivation or deletion when an employee is terminated in your HR system or identity provider — Okta, Workday, wherever. Revoking access in real time shrinks your exposure window and removes a manual step from your offboarding checklist that's too easy to forget.
Use case
Real-Time Security Event Alerting
Stream PDK door events — forced entry, door held open, repeated failed access attempts — into your Slack, PagerDuty, or Microsoft Teams channels so security and facilities teams can respond immediately. You can filter events by door, time of day, or access group to cut noise and surface only the alerts that actually matter.
Use case
Visitor Management and Temporary Access
Integrate PDK with your visitor management system or calendar tools to automatically issue time-limited credentials when a visitor appointment is confirmed, then revoke them after the meeting window expires. Front desk staff don't need to manually issue and collect visitor badges.
Use case
Access Rights Reconciliation and Audit Reporting
Periodically pull PDK access group memberships and credential lists, compare them against your authoritative identity source, and flag or fix discrepancies automatically. Your physical access data stays in sync with HR and IT records without quarterly manual audits that nobody has time for.
Use case
Role and Department Change Access Updates
When an employee changes departments, gets promoted, or transfers to a new office location, automatically update their PDK access groups to reflect their new role — no helpdesk ticket, no facilities request. Access rights stay current with organizational changes as they happen.
Use case
Security Incident Ticketing from Access Events
When PDK reports a high-priority event — a forced door, tailgating alert, or access denial on a sensitive area — automatically create a ticket in ServiceNow, Jira, or Zendesk and assign it to the right security team member. Raw physical security events become trackable work items instead of noise.
Build PDK Agents
Give agents secure and governed access to PDK through Agent Builder and Agent Gateway for MCP.
Data Source
Look Up Contact Records
Retrieve contact information from PDK, including personal details, access credentials, and associated groups. An agent can use this data to verify identities or provide context for access-related decisions.
Data Source
Query Access Events and Audit Logs
Fetch historical access event logs from PDK to review entry and exit activity for specific doors, zones, or individuals. An agent can analyze patterns, spot anomalies, or pull compliance reports.
Data Source
Retrieve Door and Reader Status
Pull real-time status for doors, readers, and panels managed within PDK. An agent can check whether doors are locked, unlocked, or in an alarmed state to support security workflows.
Data Source
Fetch Credential Information
Look up credential details such as access cards, PINs, or mobile credentials assigned to individuals. An agent can use this to confirm access rights or flag expired and inactive credentials.
Data Source
List Access Groups and Permissions
Retrieve configured access groups and their permission sets from PDK. An agent can use this to see who has access to which areas and flag discrepancies or over-provisioning.
Agent Tool
Create or Update Contacts
Add new contacts or update existing records in PDK, including assigning credentials and access groups. An agent can handle onboarding automatically by provisioning physical access when a new employee is added in an HR system.
Agent Tool
Revoke or Suspend Access
Disable or revoke credentials and access permissions for a contact in PDK. An agent can suspend access automatically when an employee is offboarded or a security incident is detected.
Agent Tool
Unlock or Lock a Door
Trigger a remote lock or unlock command for a specific door or reader in PDK. An agent can respond to authorized requests or scheduled events to manage physical entry points programmatically.
Agent Tool
Assign Credentials to Contacts
Issue and assign access credentials such as card numbers or mobile passes to contacts within PDK. An agent can handle credential provisioning as part of an onboarding or visitor management workflow.
Agent Tool
Manage Access Groups
Create, update, or assign contacts to access groups within PDK. An agent can adjust group memberships based on role changes, project assignments, or policy updates from connected business systems.
Agent Tool
Trigger Visitor Provisioning
Create temporary contacts and credentials in PDK for visitors or contractors who need time-limited access. An agent can automate visitor check-in by generating short-term credentials tied to scheduled meetings or events.
Get started with our PDK connector today
If you would like to get started with the tray.ai PDK connector today then speak to one of our team.
PDK Challenges
What challenges are there when working with PDK and how will using Tray.ai help?
Challenge
Keeping Physical Access in Sync with HR Lifecycle Events
HR systems, identity providers, and physical access control systems run in separate silos with no native integration. Access provisioning and revocation end up depending on manual processes or helpdesk tickets that introduce dangerous delays — especially during offboarding.
How Tray.ai Can Help:
tray.ai connects PDK directly to your HRIS and identity provider, triggering credential changes the moment lifecycle events occur. Automated workflows run in seconds rather than hours or days, closing the gap between HR decisions and physical access reality.
Challenge
Handling PDK API Pagination and Rate Limits at Scale
When pulling large volumes of credential or event data from PDK for audits or reconciliation, you have to handle API pagination, rate limit retries, and error handling carefully. One-off scripts that skip this tend to break at the worst possible time.
How Tray.ai Can Help:
tray.ai's built-in PDK connector handles pagination and retry logic automatically, so you can build reliable data pipelines that pull complete credential and event datasets without writing custom error handling code.
Challenge
Routing the Right Security Events to the Right Teams
PDK generates a lot of door events. Without intelligent filtering and routing, teams either drown in noise or miss the alerts that matter. PDK itself has no way to build conditional routing logic across external systems.
How Tray.ai Can Help:
tray.ai's workflow logic lets you filter PDK events by type, door, time window, or credential attributes and route them to different destinations — Slack channels, PagerDuty, ServiceNow — based on your actual escalation policies.
Challenge
Enforcing Least-Privilege Physical Access Across Role Changes
As employees change roles, departments, or office locations, their physical access groups tend to accumulate without cleanup. That's a least-privilege violation, and finding over-provisioned credentials manually is slow and error-prone.
How Tray.ai Can Help:
tray.ai can trigger access group updates in PDK whenever role or department changes are detected in your HRIS, simultaneously adding new access rights and removing old ones so credentials always reflect the employee's current role — not their history.
Challenge
Building a Compliant Audit Trail Across Physical and Digital Systems
Compliance frameworks like SOC 2, ISO 27001, and FedRAMP require demonstrable evidence that physical access is granted and revoked appropriately and that all changes are logged. Manually compiling that evidence from PDK and HR systems is slow, inconsistent, and painful right before an audit.
How Tray.ai Can Help:
tray.ai workflows automatically write PDK provisioning and revocation events to centralized audit logs in Google Sheets, Airtable, or your SIEM, building a continuous, timestamped record of all access changes that satisfies auditor requirements without manual data gathering.
Talk to our team to learn how to connect PDK with your stack
Find the tray.ai connector with one of the 700+ other connectors in the tray.ai connector library to integrate your stack.
Start using our pre-built PDK templates today
Start from scratch or use one of our pre-built PDK templates to quickly solve your most common use cases.
Template
New Employee → PDK Credential Provisioning
Automatically create a PDK user and assign access groups when a new employee record is created in BambooHR, Workday, or another HRIS, mapping department and location fields to the correct PDK access groups.
Steps:
- Trigger when a new employee is created or activated in BambooHR
- Map employee department and location fields to the corresponding PDK access group IDs
- Create a new PDK user credential and assign the mapped access groups via the PDK API
- Send a Slack notification to the facilities team confirming credential creation
Connectors Used: PDK, BambooHR, Slack
Template
Okta Deprovisioning → PDK Access Revocation
When a user is deactivated or suspended in Okta, immediately deactivate their PDK credential and log the revocation event to a Google Sheet or Airtable for compliance tracking.
Steps:
- Trigger on Okta user deactivation or suspension event via webhook
- Look up the corresponding PDK credential using the user's email address
- Deactivate or delete the PDK credential via the PDK API
- Append a row to a Google Sheet audit log with timestamp, user details, and revocation status
Connectors Used: PDK, Okta, Google Sheets
Template
PDK Forced Entry Alert → PagerDuty Incident
Monitor PDK for forced entry or door-held-open events and automatically create a PagerDuty incident, routing it to the on-call security team with door location and event details.
Steps:
- Poll PDK event feed or receive webhook for door events with critical severity types
- Filter events to match forced entry, door held open, or repeated denial patterns
- Create a PagerDuty incident with event metadata including door ID, timestamp, and credential used
- Post a parallel alert to the security Slack channel with a direct link to the PagerDuty incident
Connectors Used: PDK, PagerDuty, Slack
Template
Calendly Visitor Booking → Temporary PDK Credential
When a visitor appointment is booked via Calendly or Google Calendar, issue a time-limited PDK visitor credential and send access instructions to the visitor by email, then revoke the credential automatically after the appointment ends.
Steps:
- Trigger on new Calendly event creation with a visitor or external guest tag
- Create a time-scoped PDK credential valid only during the appointment window
- Send the visitor an email with their access credential and entry instructions via Gmail
- Schedule a follow-up automation step to deactivate the credential at the appointment end time
Connectors Used: PDK, Calendly, Gmail
Template
Weekly PDK Access Audit Report
Every week, pull all PDK credentials and access group memberships, cross-reference them against your active employee list in your HRIS, and email a discrepancy report to your IT security team.
Steps:
- Schedule a weekly trigger to fetch all active PDK credentials via the PDK API
- Retrieve the current active employee list from BambooHR
- Compare both lists to identify credentials with no matching active employee record
- Write discrepancies to a Google Sheet and email a summary report to the IT security team
Connectors Used: PDK, BambooHR, Gmail, Google Sheets
Template
PDK Access Denial Spike → ServiceNow Security Ticket
Detect when a specific door or credential sees an unusual volume of access denials within a short window and automatically open a ServiceNow incident for investigation.
Steps:
- Ingest PDK access denial events and aggregate counts by door and credential over a rolling time window
- Trigger when denial count exceeds a configured threshold within the detection window
- Create a ServiceNow security incident with door location, credential details, and denial timestamps
- Notify the facilities security channel in Slack with a link to the new ServiceNow ticket
Connectors Used: PDK, ServiceNow, Slack