We hear this occasionally: "But your competitor allows API keys" or "Why can't I just use client credentials?"
Our position is clear and unwavering:
We will not compromise on security to match competitors' looser standards. This guide explains why.
Security is Not a Feature to Toggle
The argument: "Competitor X lets me use API keys, why can't you?"
Our response: Security isn't a competitive feature we adjust based on market pressure. It's a fundamental requirement for protecting:
- Your customers' physical safety
- Building access integrity
- Legal and compliance obligations
- Audit trail reliability
If a competitor offers weaker security, that's their liability exposure - not a feature we need to match.
We Protect Your Customers, Not Just You
The scenario:
You: "But I'm a trusted developer, just give me an API key."
Us: "What happens when:"
- Your laptop gets stolen?
- Your employee goes rogue?
- Your codebase gets breached?
- Your customer wants to revoke just your access?
- Insurance auditors review your security?
- A compliance audit happens?
API keys can't handle these scenarios. OAuth can.
Different Security Models = Different Liability
Competitors with API keys
DoorFlow with OAuth
When something goes wrong (and it eventually does), which position do you want to defend?
Our Commitment is to Your Customers
DoorFlow's customers trust us with physical access to their buildings. We take that responsibility seriously.
We will never
This isn't negotiable.
We Know This is More Work
We understand these requirements mean more implementation work upfront. You might be thinking:
"I just want to unlock a door. Why all this OAuth complexity?"
Here's the thing: We've made the conscious decision that proper security is worth the extra effort. And we're committed to making that effort as small as possible.
What we provide to help
The reality: Once you've implemented OAuth once, it works for all your customers. The upfront investment pays off quickly.
We're here to help you succeed - not to make your life difficult. These requirements exist to protect everyone involved, and we'll support you through the implementation.
Why We're Confident in This Position
Physical security is different
These requirements exist in
Your integration needs to meet the same standards - whether you're protecting a startup office or a hospital.
Real-World Examples
Why Granular Revocation Matters
Scenario: You build a property management platform serving 50 buildings.
Building A discovers a security issue and wants to immediately revoke your app's access to their building only.
With API keys
With OAuth
Why Audit Trails Matter
Scenario: Unauthorized person gained building access. Insurance investigation.
Question: "Who authorized this app to control building access?"
With API keys
With OAuth
Why Short-Lived Tokens Matter
Scenario: Developer's laptop stolen from coffee shop.
With API keys on laptop
With OAuth tokens on laptop
Common Objections (And Our Responses)
"I'm building an internal tool, not a public app"
Internal tools face the same risks:
- Employee turnover
- Stolen laptops
- Insider threats
- Audit requirements
- Compliance needs
Your internal tool still needs proper authorization, audit trails, and revocation capabilities.
"This is too complex for my simple use case"
There are no "simple" use cases for physical access control. Even unlocking one door involves:
- Legal liability
- Insurance requirements
- Safety implications
- Audit obligations
- Compliance needs
The OAuth overhead is minimal compared to these risks.
"My customers don't care about this"
Your customers may not understand OAuth, but they do care about:
- Who can access their buildings
- Ability to revoke access instantly
- Complete audit trails
- Compliance with regulations
- Legal protection
OAuth provides all of this. API keys provide none of it.
"Can't you just make it optional?"
No. Security isn't a feature toggle. We won't create a "simple but insecure" tier that puts customers at risk.
Our responsibility is to protect physical safety, not to offer the path of least resistance.
How This Protects You Too
These requirements aren't just about DoorFlow's customers - they protect you:
Legal protection
Operational protection
Liability protection
Business protection
The Industry Standard
DoorFlow isn't inventing these requirements. This is how physical security works:
Smart locks (August, Yale, Schlage)
Building access systems
Security integrations
We're following industry best practices, not being difficult.
Our Promise
We promise
We won't
The Bottom Line
We are unflinching in protecting DoorFlow customer data and physical security.
These requirements protect:
- Your customers' buildings
- People's physical safety
- Your liability exposure
- Compliance obligations
- Everyone's reputation
If you want to integrate with a system that protects your customers as seriously as you do, join us.