Skip to main content

 

Eptura Knowledge Center

Configure the Access Control System

After the client has been installed and connected to the ACS, the Proxyclick access control integration will create Proxyclick-specific data structures within the access control system.

Items created by Proxyclick, such as access levels, departments, groups, etc. will be recreated on the next setting scan if they are renamed or deleted. Deleted access levels will be recreated with no access applied — they will need to be configured again.

Token/card-number range

Proxyclick can generate tokens in the range of 10,000,000 to 99,999,999. Depending on your access control system, it could be a requirement that Proxyclick only operates within a certain range, for example, 10-30 million. Make sure to align this before connecting access control with your Proxyclick visitors.

After tokens are issued to visitors, the token range can't be changed.

A range of at least 10 million is required for secure entry.

Department

If the access control system supports a grouping of profiles, Proxyclick will try to create those automatically. A workaround might be available for systems without grouping, or visitors will be grouped with the other profiles.

Access levels

Access levels set by the Proxyclick Access Control Integration will match the status of a visitor in Proxyclick.

  • Additional Access Level Information  

    Visitors will have an "Expected" access level applied at a *set time prior to their visit. By default, this will be applied two hours before the visit is set to commence - please contact your Proxyclick operative to modify these settings. Access levels of “On-site,” "Checked-in," and "Checked-out" will also be applied as their status changes in Proxyclick. This makes the current level of access clear to the front desk, as the status of the visitor (Expected, Checked-in, etc.) will denote their currently allowed movement around the building.

    *An early arrival on site, a check-in, or a check-out event will override the time set and apply the appropriate access level.

    The Proxyclick system creates access levels similar to the ones below. The access control administrator must configure these access levels and align them with your company’s visitor policy.

    • Proxyclick expected
    • Proxyclick on-site
    • Proxyclick checked-in
    • Proxyclick checked-out

    When multiple locations or tenants exist in one system, access levels can be created with the location name added to the access level. To enable this, Proxyclick custom fields can be mapped to create the required access levels. When inviting a visitor, you'd use the correct drop-down option for the tenant/location, which will then apply the related access level. Example:

    The following access level will be applied using the Proxyclick custom field to select the correct tenant when inviting a visitor.

    • Proxyclick expected - "tenant name"

    You would then configure this access level in the ACS to provide the correct access specific to this tenant.

Proxyclick - Expected

Depending on your settings, the Expected access level is granted a specific time before the meeting starts. This access level is supposed to give your visitors free access wherever they can go before their meeting, including departing and (potentially) returning.

Proxyclick - On-site

This will be applied when a visitor has the "On-site" status in Proxyclick. You may configure this to grant an alternative level of access to the Expected access level or be the same, depending on your requirements.

Proxyclick - Checked-in

The Checked-in access level must be set up to allow your visitor access wherever they need it for the duration of their visit.

Proxyclick - Checked-out

A specific time after the meeting ends, this access level is active. The visitor may only be allowed to depart here if the meeting takes longer than anticipated.

Users are added to the system with no access applied seven days before their visit time. If the access control system requires an access level with no access in use, we will set up a “Proxyclick - No Access” access level as well.

 

At the removal time (seven days after the visit), all data Proxyclick enters into the access control system will be removed where possible. For example, credentials issued to your visitors will be deleted from the system after the 7-day default removal time.