Access Control Integration
Level: Implementation Team / Client IT
This guide provides an overview of how Proxyclick integrates with an access control system.
By integrating your access control system with Proxyclick, you’re adding to the visitor experience by granting them controlled movement around your building. Visitors are automatically added to the access control system when they are pre-registered in Proxyclick.
Access control integration allows:
- QR codes that are emailed in the visitor’s invitation to be used as an access control token in.
- When used with compatible hardware (see below), the QR can be used to grant the visitor access straight from their email or mobile wallet.
- In most cases (depending on your access control system), your site’s access control tokens can also be added to the visitor’s access profile that is created, allowing you to grant your visitors access with your existing hardware.
- Multiple access levels are created during installation, which can be configured to restrict a visitor’s access around the site during and after their meeting.
- A visitor’s movement in and out of the building can trigger check-in and out events in Proxyclick, or, alternatively, a visitor can be made to check in at the Kiosk to activate their access profile.
This flexibility allows you to shape your visitors’ experience further to match your organization's vision and security requirements.
During your setup, a project checklist will be provided ensuring all requirements for the environment, access control systems, and visitor journey are covered