A Restricted Key System allows the end user to monitor all keys. Once you install a restricted system only a person listed as an authorised signatory can have keys cut.