How It Works
The following timeline illustrates how a CyberKey Vault programs, distributes, and manages CyberKey smart keys.
8:00 a.m. Credential Is Presented
CyberKey smart keys are stored securely in a CyberKey Vault, in an unprogrammed state. An authorized PIN or RFID card is presented to the cabinet.
8:00 a.m. CyberKey Is Programmed and Released
The Vault communicates with the CyberAudit software and:
- Programs a CyberKey with specific access permissions
- Unlocks the cabinet door and releases the key
8:01 a.m. to 4:59 p.m. Daily Duties Are Performed
The programmed CyberKey is used to access authorized CyberLock cylinders throughout the organization based upon the permissions loaded in the key.
5:00 p.m. Credential Is Presented and CyberKey Is Returned
The authorized PIN or RFID card is presented again to the cabinet. The door unlocks and the CyberKey is returned to any available slot.
5:00 p.m. Audit Trail Downloaded and CyberKey Unprogrammed
The cabinet downloads the key activity, returns the CyberKey to an unprogrammed state, and reports back to the software all cabinet and key activity.
5:01 p.m. Notifications Are Sent
Designated supervisors and managers receive email notifications on vault and key activity.