Back to Blog
Key Management9 min read

How to Build a Master Key System from Scratch: A Step-by-Step Guide

LT
LockBench Team
Editorial

Building a master key system from scratch means designing a key hierarchy, selecting bitting combinations, pinning every cylinder in the system, and documenting everything so the system can be maintained and expanded for years. Done correctly, a master key system gives a building owner precise, layered control over who can access which areas. Done incorrectly, it creates cross-keying vulnerabilities that compromise the security of the entire building. The difference is almost always process.

This guide walks through the complete process of designing and installing a master key system — from the initial site survey to the final key issuance. It assumes familiarity with basic lock cylinder mechanics, pin tumbler operation, and keyway selection. If you are building your first master key system, this process will give you the structure you need to do it right.

Step 1: Conduct a Site Survey

Before designing anything, you need to understand the building. A master key system built on assumptions about access requirements will need to be reworked the moment reality diverges from those assumptions.

The site survey covers:

  • Door inventory. Every door that will be included in the system needs to be catalogued: location, current cylinder brand and type, condition of hardware, and whether the door is interior or exterior.
  • Access requirements by role. Interview the building owner or facility manager to understand who needs access to what. The maintenance team may need every door. Department heads may need their department plus shared areas. Individual staff may need only their office and common areas.
  • Hierarchy depth. How many levels of access are needed? A small office may need only master and change keys. A hospital may need grand master, campus master, building master, department master, and change keys — five levels.
  • Future expansion. Will new doors be added? New departments created? New tenants installed? The system should have room to grow without requiring a complete rebuild.
  • Security requirements. Does any area require a restricted keyway to prevent unauthorized key duplication? Are there high-security cylinders needed for specific doors?

Document everything from the site survey before you leave. Gaps in the survey become gaps in the system design.

Step 2: Design the Key Hierarchy

With the site survey complete, design the key hierarchy on paper (or in software) before touching a single cylinder. The hierarchy is the blueprint — every subsequent decision flows from it.

The standard hierarchy structure:

  • Grand Master Key (GMK) — Opens every lock in the system
  • Master Key (MK) — Opens all locks in a major group (building, floor, or department)
  • Sub-Master Key (SMK) — Opens a subset within a master group
  • Change Key (CK) — Opens only one specific lock

Not every system needs all four levels. A small office with one master and six change keys is a perfectly valid two-level system. Adding hierarchy levels that the building does not need creates unnecessary complexity and reduces the number of non-cross-keying change keys available in the bitting progression.

Assign key symbols to every key in the hierarchy before selecting bitting:

  • Master keys: A, B, C
  • Change keys under master A: A1, A2, A3, A4
  • Sub-masters under master A: AA, AB
  • Change keys under sub-master AA: A1, A2 (under the sub-master context)

The key symbol structure encodes the access relationships. A locksmith looking at a key symbol should be able to determine its position in the hierarchy without consulting additional documentation.

Step 3: Choose the Keyway

Keyway selection at the system design stage determines the bitting space available and the security level of the system.

Consider three factors:

1. Bitting space. The keyway's depth-and-space chart determines how many valid bitting combinations exist. A larger bitting space means more non-cross-keying change keys can be accommodated in the system.

2. Restricted vs. unrestricted. For commercial systems where key control is important, choose a restricted keyway. The added cost of controlled blank distribution is offset by the security of knowing that no key in the system can be duplicated at a hardware store.

3. Keyway separation (for large systems). If the building has multiple independent tenants or departments that need physical isolation — not just bitting separation — use different keyways for different zones. Keys from one zone physically cannot enter cylinders in another zone, regardless of bitting.

Step 4: Assign Bitting Combinations

Bitting selection is the most technically demanding step in master key system design. Every change key in the system needs a bitting that:

1. Operates its assigned cylinder (the bottom pin heights match the change key's bitting at every chamber)

2. Does not cross-key with any other cylinder in the system (no other change key's bitting accidentally aligns at the shear line of a cylinder it should not open)

3. Conforms to the keyway's MACS (minimum adjacent cut specification) — the bitting must be cuttable by a code machine and enterable by the cylinder without binding

The master key's bitting anchors the system. Every change key's bitting is determined by its relationship to the master key bitting and the master wafer heights in each cylinder.

The standard approach:

1. Start with the master key bitting. Select a bitting for the master key that uses moderate cut depths across all positions, leaving room for valid change key combinations above and below each position.

2. Calculate master wafer heights. For each change key, the master wafer height in each chamber is the difference between the change key's cut depth and the master key's cut depth at that position.

3. Validate the MACS. Adjacent cuts in both the change key bitting and the master key bitting must conform to the MACS.

4. Check for cross-keying. Before finalizing any change key bitting, verify that the combination of bottom pin plus master wafer in each chamber does not accidentally create a shear line alignment for any other change key in the system.

This is where manual management breaks down. Cross-keying checks require comparing every change key bitting against every other cylinder's pin stack — a calculation that grows quadratically with system size. For any system with more than 10–15 change keys, software-based conflict detection is not a luxury — it is a requirement for building a secure system.

Step 5: Generate Pinning Specifications

With bitting combinations validated, generate a pinning specification for every cylinder in the system. A complete pinning spec for a master-keyed cylinder includes:

  • Chamber count — Matching the cylinder's actual pin count
  • Bottom pin heights — One per chamber, based on the change key's bitting at each position
  • Master wafer heights — One per chamber, based on the difference between the change key and master key bitting
  • Driver pin heights — Calculated so the total stack (bottom pin + master wafer + driver pin) equals the chamber depth

Every number in every pinning spec must be verified before the cylinder is pinned. A single transposed digit in a pinning spec creates a cylinder that does not work — or worse, one that works for the wrong key.

Step 6: Pin the Cylinders

With pinning specifications in hand, pin each cylinder according to its spec. Work systematically:

  • One cylinder at a time. Do not pre-stage all cylinders simultaneously. Complete one, verify it, and move to the next.
  • Test before installing. Before installing any cylinder in a door, test it with its assigned change key and the master key. Both should operate smoothly. If either fails, recheck the pinning spec and the physical pin stack before proceeding.
  • Document the verification. Note which cylinders were tested, by whom, and when. If a callback occurs, this record establishes that the cylinder was working correctly at installation.

Step 7: Document the System

A master key system is only as good as its documentation. The documentation package delivered to the client should include:

  • Key hierarchy chart — Visual diagram showing every key's position in the system
  • Key schedule — Table showing which keys open which doors
  • Pinning specifications — Stored in your software, referenced in the client's file
  • Key issuance records — The initial issuance of all keys, with keyholder names, key symbols, and authorization signatures
  • Cylinder inventory — List of every cylinder in the system with its location, key symbol, and installation date

This documentation is your professional deliverable — and your liability protection. If a security question arises years later, the documentation is the record of what was installed, what was issued, and who authorized it.

Step 8: Issue Keys and Set Up Issuance Tracking

The final step is issuing keys to the client and establishing an ongoing issuance tracking process. Every key issued — including the initial issuances at installation — should be recorded with keyholder name, key symbol, date, and authorization.

Walk the building owner through the key control policy: how future issuances will be handled, who can authorize key requests, what to do when a key is lost, and how to request system expansion.

Set up a reminder for an annual key audit. The most professionally delivered master key system will drift over time if it is not maintained. An annual audit — confirming which keys are still active, which keyholders have left, and whether any cylinders need rekeying — is a service the client needs and will pay for.

Common Mistakes When Building Master Key Systems

Even experienced locksmiths make avoidable mistakes when building master key systems:

  • Skipping the site survey. Designing a hierarchy based on assumptions about access requirements leads to a system that does not match the building's real needs.
  • Not checking cross-keying. Every bitting combination must be validated against every other cylinder in the system. One skipped check is one potential security breach.
  • Losing pinning specs. Paper pinning specs get lost. Digital records stored in purpose-built software do not.
  • Not testing before installing. A cylinder that fails on the bench is an inconvenience. A cylinder that fails after installation is a callback.
  • Delivering no documentation. A master key system with no documentation delivered to the client is a system that will generate constant callbacks — and eventual account loss.

LockBench's master key system module handles every step of this process: hierarchy design, bitting validation, cross-keying conflict detection, pinning specification generation, key issuance tracking, and documentation export. The software does the math that is too error-prone to do manually, and stores the records that are too important to lose.

Frequently Asked Questions

What is the first step in building a master key system?

The first step is a site survey: cataloguing every door in the system, understanding access requirements by role, determining the depth of hierarchy needed, and planning for future expansion. A master key system built on assumptions about access requirements will need to be reworked when reality diverges from those assumptions.

How do you prevent cross-keying in a master key system?

Cross-keying is prevented by validating every change key's bitting against every other cylinder's pin stack before cutting any keys. In practice, manual cross-keying checks are feasible only for very small systems. Purpose-built master key system software performs these checks automatically and flags conflicts before keys are cut.

What should be included in master key system documentation?

Complete master key system documentation includes a key hierarchy chart, a key schedule showing which keys open which doors, pinning specifications for every cylinder, key issuance records with keyholder names and authorizations, and a cylinder inventory with locations and installation dates.

How many levels should a master key system have?

The number of hierarchy levels should match the building's actual access requirements — not more. A small office may need only master and change keys (two levels). A large commercial building or campus may need grand master, master, sub-master, and change key levels (four levels). Adding unnecessary levels reduces the available bitting combinations and complicates pinning without improving security.


Back to Blog