Skip to main content

 

Eptura Knowledge Center

Brivo Access Configuration

The Brivo Access integration has the following prerequisites:

Register for a Brivo API key

This is a chargeable step (API tiers begin at around €35 per month). Pricing will need to be discussed with your Brivo dealer.

Each Brivo account will require an API key to be issued, so we may associate your Proxyclick account with the correct Brivo account.

Contact your Brivo dealer to request a "Brivo Onair API Account Authorization" form to register for a Brivo API key:

  • Complete the required details *- Some sections must be completed by your Brivo supplier
  • The correct API tier should be selected*
  • Enter details relevant to Proxyclick: - "Which solution will be using the API?": Proxyclick
  • Developer account username: Proxyclick
  • Once completed and returned to Brivo they will then associate your API key with Proxyclick
  • We will use this API key during deployment.

Reader setup and testing - for QR-based access

The Wiegand output QR reader you have chosen should be set to output the correct format as selected for the credential types in use in Brivo. Various Wiegand output formats are available to select.

Further information is available in the Access Control Overview . You may use the example QR code found there and add the token number for testing purposes:

Ensure the test user is in a Group that will allow them access - you can then use the test QR code from our documentation to ensure the reader is working as expected.

Share the Wiegand format with the access control team and we will configure our integration to input tokens in the correct format.

  • If you add the token number as a card in Brivo using the format "HID 37 bit" (for example) you need to ensure the reader is configured to send 37 bits of data to your controller.
  • Set up a test user
  • Add the token number from our example in the Access Control Overview as a card via Credentials > Cards > Add Cards
  • Select the Card Format suitable for your reader output settings
  • The number can be entered into both the first and last card number boxes as we are not adding a range of cards for this test
  • Leave the Optional Card Offset as not selected
  • This card may then be assigned to your test user in Brivo via the user record

Using Physical Credentials - RFID Cards/Fobs

Our Access Card Manager allows physical credentials to be assigned to a visitor via the Proxyclick dashboard. To configure this, we will need to know the Card Format and Facility Code configured for your RFID readers. See Access Card Manager.

Reader Direction

To facilitate (optional) automatic Proxyclick check-in/out events via access control, you can specify the name of the reader we should use to trigger this event. This will be listed as a door under the Devices menu

Share the name of the doors that allow people to enter and exit and we can set this to trigger check-in and check-out events in Proxyclick.

Set up a Proxyclick Admin account

  • We recommend you set up an admin account named "Proxyclick Service Account" (or similar), so it is clear what this account is for
  • This account should be configured to use the "Super Administrator" permissions
  • You will need to log in once with this "Proxyclick Service Account" to activate it

Note down your Administrator ID

  • Navigate to Brivo Access Login page: access.brivo.com
  • Log in with the "Proxyclick Service Account" details
  • When logged in, click the circular icon next to the username and note the Admin ID

clipboard_eef19f3b6ffbef50f72fdcc67a01ee59e.png

Authorize the Proxyclick connection

When the above steps are completed you may request that we complete the integration. During deployment we will assist you with authorizing the Proxyclick connection:

  • We use your API key which generates a login URI which we will send to you
  • You will need the Admin ID you noted in the previous step
  • Log in via this URI using the Administrator ID as the username and use the password associated with the Proxyclick Service Account
  • These login details do not need to be shared with the Proxyclick access control team
  • Confirm you want to allow Proxyclick to connect - you will see a page similar to the below:

clipboard_e49dc01d0e20e6b3012f632de488b2de4.png

  • You will see a confirmation message once complete.

Employee-specific setup steps

Employee "Profile Linking"

See here for further information on Proxyclick employee access management.

If you are making use of Proxyclick employee features and managing employee access using our Profile Linking feature, a custom field must be entered in Brivo.

This field will need to contain the employee email address. We will use this custom field so we may search for the employee profile in Brivo and link it to their respective profile in Proxyclick.

If we find a match between the address used in Proxyclick and a profile in Brivo, we will then create a link between those profiles and manage (turn on and off) their access based on their booking status.

The employee email address must only be listed against a single profile in Brivo.

Visits created in Proxyclick will automatically trigger the adding of a user in Brivo. The user profiles in Brivo will automatically be assigned to the correct group, so their access level is managed in line with their visit status.