Access Control System Data Structures
After the client has been installed and connected to the ACS, the Eptura Visitor access control integration will create Eptura Visitor-specific data structures within the access control system.
Items created by Eptura Visitor, such as access levels, departments, groups, etc. will be recreated on the next setting scan if they are renamed or deleted. Deleted access levels will be recreated with no access applied — they will need to be configured again.
Token/card-number range
Eptura Visitor can generate tokens in the range of 10,000,000 to 99,999,999. Depending on your access control system, it could be a requirement that Eptura Visitor only operates within a certain range, for example, 10-30 million. Make sure to align this before connecting access control with your Eptura Visitor visitors.
After tokens are issued to visitors, the token range can't be changed.
A range of at least 10 million is required for secure entry.
Department
If the access control system supports a grouping of profiles, Eptura Visitor will try to create those automatically. A workaround might be available for systems without grouping, or visitors will be grouped with the other profiles.
Access levels
Access levels set by the Eptura Visitor Access Control Integration will match the status of a visitor in Eptura Visitor.
-
Additional Access Level Information
Visitors will have an "Expected" access level applied at a *set time prior to their visit. By default, this will be applied two hours before the visit is set to commence - please contact your Eptura Visitor operative to modify these settings. Access levels of “On-site,” "Checked-in," and "Checked-out" will also be applied as their status changes in Eptura Visitor. This makes the current level of access clear to the front desk, as the status of the visitor (Expected, Checked-in, etc.) will denote their currently allowed movement around the building.
*An early arrival on site, a check-in, or a check-out event will override the time set and apply the appropriate access level.
The Eptura Visitor system creates access levels similar to the ones below. The access control administrator must configure these access levels and align them with your company’s visitor policy.
- Eptura Visitor expected
- Eptura Visitor on-site
- Eptura Visitor checked-in
- Eptura Visitor checked-out
When multiple locations or tenants exist in one system, access levels can be created with the location name added to the access level. To enable this, Eptura Visitor custom fields can be mapped to create the required access levels. When inviting a visitor, you'd use the correct drop-down option for the tenant/location, which will then apply the related access level. Example:
The following access level will be applied using the Eptura Visitor custom field to select the correct tenant when inviting a visitor.
- Eptura Visitor expected - "tenant name"
You would then configure this access level in the ACS to provide the correct access specific to this tenant.
Eptura Visitor - Expected
Depending on your settings, the Expected access level is granted a specific time before the meeting starts. This access level is supposed to give your visitors free access wherever they can go before their meeting, including departing and (potentially) returning.
Eptura Visitor - On-site
This will be applied when a visitor has the "On-site" status in Eptura Visitor. You may configure this to grant an alternative level of access to the Expected access level or be the same, depending on your requirements.
Eptura Visitor - Checked-in
The Checked-in access level must be set up to allow your visitor access wherever they need it for the duration of their visit.
Eptura Visitor - Checked-out
A specific time after the meeting ends, this access level is active. The visitor may only be allowed to depart here if the meeting takes longer than anticipated.
Users are added to the system with no access applied seven days before their visit time. If the access control system requires an access level with no access in use, we will set up a “Eptura Visitor - No Access” access level as well.
At the removal time (seven days after the visit), all data Eptura Visitor enters into the access control system will be removed where possible. For example, credentials issued to your visitors will be deleted from the system after the 7-day default removal time.