Keybook
i-doit / Free
Manage all your keys comfortably in i-doit. See at any time which people have access to which buildings and rooms.
-
Keys can be created as separate object types.
-
For each key, it is possible to record the person to whom it was issued and by whom it was handed over.
-
For each key it can be recorded to which buildings and rooms this key allows access.
-
In each building/room, it is possible to see which keys open it and which persons have a key.
-
The included report "Key book" shows all keys and the persons who have a key.
-
In each created person it is visible which keys this person has.
Free
This add-on can be used for free.
Information on support options can be found on the developer website (German only).
For installation instructions, please contact the developer (German only).
Centralized management of physical keys
With the Keybook add-on you can manage keys directly in the CMDB. After installation you will find new object types for the documentation of keys and keyboxes. Created keys can be linked to persons, rooms and buildings.
Through these logical links, when you call up a building or room, you can see which people have a key. You can also see which persons have received which keys and to which rooms they have access.
With the documentation of the keys, you can better design offboarding processes and, in an emergency, directly determine which persons can be contacted to gain access to rooms.
Use cases
i-doit use cases for your documentation needs

You document active and passive network elements including cabling, port assignment, IP addresses and configurations centrally and comprehensibly.

You record and analyze software and licenses, monitor runtimes, users and authorizations and avoid license violations and unnecessary costs.

You analyze your IT infrastructure, identify documentation gaps and create location, user or cost centre-related reports and audit PDFs.

You document and manage contracts centrally, link them to objects and responsible parties and are automatically informed about deadlines and terms.

They document maintenance and lifecycles, make changes traceable, automate processes and keep track of responsibilities and warranty periods.

You document locations, rooms and infrastructure, link these to contact persons and also visualize server rooms clearly.
Use-Cases
.webp?width=300&name=multi-ethnic-colleagues-working-together-at-data-c-2025-03-15-19-35-44-utc%20(1).webp)
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.

Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua.
Related Add-ons
Add-on für mächtige Datenanalyse. Berechnen Sie Servicekosten, prüfen Sie die Datenqualität der CMDB und führen Sie Ausfallsimulationen durch.
Erstellen Sie leistungsstarke Automatisierungen ohne Programmierkenntnisse ganz einfach nach einem Zeitplan oder manuell per Knopfdruck starten.
Bauen Sie ein Information-Security-Management-System mit Risikoanalyse und -management nach ISO 27001 auf.
Dokumente auch als PDF automatisch erstellen mit tagesaktuellen Daten (z.B. Hardware-Übergabeschein oder Desaster Recovery Plan).
Integrieren Sie das Monitoring-System Checkmk2 in i-doit. Abgleiche zwischen SOLL und IST aus CMDB und Monitoring werden damit unterstützt.
Erstellen Sie auf einfache Weise Formulare, die Sie Nutzern zur vereinfachten Dateneingabe zur Verfügung stellen. Beispiel: Hardware oder Waren selbst dokumentieren lassen.
Hinterlegen Sie Buttons mit eigenen Triggern und starten Sie IT-Prozesse direkt aus i-doit –z.B. das automatische Deployen einer virtuellen Maschine.
Mit diesem Add-on können Sie ein Managementsystem für die Informationssicherheit (ISMS) nach IT-Grundschutz-Methodik des BSI erstellen.
More Add-ons
Extend i-doit with powerful analysis functions: Calculate service costs, check data quality and perform failure simulations.
i-doit
Paid
From the hardware handover certificate to the disaster recovery plan. Create appealing documents - also as PDF - with daily updated data from your CMDB - automatically!
i-doit
Paid
Create powerful automations without any programming knowledge!
i-doit
Paid
Easily create forms to share with users for simplified data entry.
i-doit
Paid
Get your personalized quote today!
Discover how the i-doit Add-on Keybook can support and streamline your processes. Get in touch with us for more information, pricing details, or to request a quote.

Telefon: +49 (0) 211 - 699 31 0


