Genea Access Control Configuration
See the steps below on how to configure the Proxyclick Genea integration when using HID Mercury hardware.
Genea location
We need to know the name of the Genea location to connect to.
Multi-tenant locations
For multi-tenant locations we will need to know the name of each Genea tenant location to add the tenant company visitors to.
Generate a Global API Key
- A Global Admin in Genea must generate a Global API key which we will use to connect
- Navigate to API Keys from the global overview:
- Select "+New" from the top right hand corner
- Enter the name of the key and a description and then save
- Share this Global API key with the access control team during deployment
Reader setup - select the correct Wiegand format - for QR-based access
The Wiegand output QR reader you have chosen should be set to output the correct format for the user credentials in use in Genea. In our testing we used "H10302 - 37 bits without FC". A custom card format option is also available.
Further information can be found in the Access Control Overview. You may use the example QR code found there and add the token number for testing purposes:
- Add a test user
- Enter the token number from the example QR linked above as a Keycard under the test user profile
- You can then use the test QR code from our documentation to ensure the reader is working as expected.
Using Physical Credentials - RFID Cards/Fobs
Our Access Card Manager allows physical credentials to be assigned to a visitor via the Proxyclick dashboard. See Access Card Manager.
Access group creation
The required access groups will be created automatically by our integration. If they are renamed or deleted we will recreate them when we next scan the Genea settings.
Genea does not allow for blank access groups to be created and an associated door and time schedule must also be applied. To comply with this (and prevent you from having to manually enter all access groups) a "no access" door and schedule will also be created and applied automatically to any access levels we create.
You may then reconfigure the access groups to apply the correct access needed.