It looks like there are often four ways to ....
There seem to be at least four more ways to get access through a locked door:
5) Con, Command, Intimidate or magically Control a legit user to let you in (or figure out the legit keycode, steal a legit keycard or cut off the finger, hand or head of a legit user etc)
6) Have the troll muscle in your team pry up the door up using superhuman strength + a crowbar.
7) Let your agile escape artist bypass the locked door by crawling through various air vents and service tunnels
8) Unleash the team's explosive expert and have her make her own doorways (combat spells, rocket launchers and Axes are also good alternatives).
Fake it out. Get a copied keycard, use a retinal duplicator, voice modulator, cellular glove molder, etc. The fake usually comes with a rating, which is used in an opposed test between the security device and the defeat device; it doesn't seem like your skill matters except in limited circumstances (disguise to fool a face scanner)
This used to be opposed tests in previous edition, but actually not clear if you always take an opposed test when using a copy of a legit thing here in this edition to be honest....
Take key card for example. To copy a keycard you first need to physically obtain a legit kecard long enough for you to copy it (it just take a few seconds). This typically involve some sort of palming test to first borrow it and then another palming test to place it back without getting noticed. Then you manufacture a copy of the card. This is resolved as an Electronics + Logic (2, 10 minutes) test. Once you have a copy of the legit card there doesn't seem to be a test when you later use it to trick the card reader.
If the door is locked with a voice activated passphrase then you can beat it by recording the phrase from a legit user and the play it back (which might involve a rather elaborate Con in order to trick the legit user into saying all the words in the pass phrase without suspecting anything so you later can edit it into a complete sentence, check the excellent movie 'Sneakers' for an example of this). Once you have an edited recording of a legit user reciting the full passphrase in the correct order there doesn't seem to be a test when you later replay the legit users voice to trick the voice scanner.
The hardware for faking out scanners looks cool, but doesn't seem very reliable
The idea is that you typically use your Matrix Specialist or your Face when dealing with security devices.
Hardware for faking is mostly just an alternative for characters that didn't invest into Engineering, Cracking or Con.
vs. 9 for the security device
Residential security devices, for example, typically have a rating of 2, not 9.
Devices
Most relevant devices are given a device rating in their description, but if not provided then use the following table as a general guideline as to what rating to use.
Device type | Rating | Examples |
Simple | 1 | General appliances, public terminals, entertainment systems |
Average | 2 | Personal electronics, basic cyberware, weapons, residential security devices, basic vehicles |
Smart | 3 | Security vehicles, alphaware, corporate security devices |
Advanced | 4 | High-end devices, betaware, military vehicles and security devices |
Cutting Edge | 5 | Deltaware, credsticks, black-ops vehicles and security devices |
Bleeding Edge | 6+ | Billion-nuyen experimental devices, space craft |