EN - Checklists

Access Control checklist for end users

Issue link: https://resources.genetec.com/i/1502522

Contents of this Issue

Navigation

Page 3 of 6

Access Control checklist 5 Integrations to other systems Cardholder and access rules Total number of cards Number of read in/out doors Number of single doors Card format Is your access integrated into other systems? How does data get transferred from other systems? What kind of data does it receive? Are cardholders being imported from a third source? Is it real-time data or scheduled push-pull data? Are other systems receiving data from your ACS? Custom card formats Is the data scheduled or real time? Megastripe credentials No Scheduled No Yes, please specify: Yes Push-pull Yes, please specify below Not sure Real-time Yes No Real-time No No Yes Number of panel locations Multiple card formats How many of these have main controllers? What is the format of the data? What is the source of the data? Standard 26 bits HID Azure Active Directory H10304 37 bits CSV file HID10306 34 bits Microsoft SQL Server HR HID Corporate 1000 (35 bits HID H10302 37 bits On-prem Active Directory Oracl HID Corporate 1000 (48 bits) Database Other, please specify: 1-card system

Articles in this issue

view archives of EN - Checklists - Access Control checklist for end users