SlideShare a Scribd company logo
1 of 7
Download to read offline
Access Control Integration Workflows
On-site
Proxyclick
Client
Software
Access
Control
System
Proxyclick
host
Pre-booked visitor invitation
4) Visitor profile
created in access
control system
3) Proxyclick communicates
with on-site client to issue
request to create visitor1) Host invites their visitor
2) Visitor emailed QR code
On-siteOn-site
1) The visitor arrives
and checks in at kiosk
Welcome
Kiosk
3) Visitor’s access
credentials made
active in ACS
Pre-booked visitor arrival workflow 1 - kiosk check in
Proxyclick
Client
Software
Access
Control
System2) Visit information
processed by Client
Software Visitor QR
Code
4) Visitor uses their
QR code invitation
as access token
On-siteOn-site
1) The visitor scans QR
code at access point
when they arrive
Visitor
QR Code
Pre-booked visitor arrival workflow 2 - access check-in
Proxyclick
Client
Software
Access
Control
System
2) Client software
monitors event / audit
trail stream from ACS
3) Notification of visitor
access event passed to
Proxyclick server
4) Visitor checked-in at
logbook, host notified
On-siteOn-site
1) The visitor arrives,
enters details and
checks in at the
Welcome app
Welcome
Kiosk
4) Visitor’s access
credentials entered into
ACS by client software
Visitor arrival - unexpected visitor
Proxyclick
Client
Software
Access
Control
System
2) Visitor emailed
QR code
3) Visit passed to
client software
Visitor QR
Code
5) Visitor gains
access at door /
turnstile with
QR code
On-site
1) The visitor scans QR
code at access point
when they depart
Visitor
QR Code
Visitor departure - access check-out
Proxyclick
Client
Software
Access
Control
System
2) Client software
monitors event / audit
trail stream from ACS
3) Notification of visitor
access event passed to
Proxyclick server
4) Visitor checked-out at
logbook, host notified
On-site
1) Time event triggered
(time after meeting, end
of day, etc)
Proxyclick
Client
Software
Access
Control
System
Visitor deactivation - end of day / custom time
2) Visits fitting criteria are
discovered
3) Client deactivates visitor
profiles in ACS
4) Visitor access
restricted as required

More Related Content

Similar to Proxyclick QR Code Access Control System Workflows

KYC API By SprintVerify powered by PaySprint .pdf
KYC API By SprintVerify powered by PaySprint .pdfKYC API By SprintVerify powered by PaySprint .pdf
KYC API By SprintVerify powered by PaySprint .pdf
PaySprint
 

Similar to Proxyclick QR Code Access Control System Workflows (13)

2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core
2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core
2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core
 
Web services security_in_wse_3_ppt
Web services security_in_wse_3_pptWeb services security_in_wse_3_ppt
Web services security_in_wse_3_ppt
 
The OAuth 2.0 Authorization Framework
The OAuth 2.0 Authorization FrameworkThe OAuth 2.0 Authorization Framework
The OAuth 2.0 Authorization Framework
 
Oauth 2.0 Security Considerations for Client Applications
Oauth 2.0 Security Considerations for Client ApplicationsOauth 2.0 Security Considerations for Client Applications
Oauth 2.0 Security Considerations for Client Applications
 
qr code (1).pptx
qr code (1).pptxqr code (1).pptx
qr code (1).pptx
 
WWPass Multi-factor Authentication - How It Works
WWPass Multi-factor Authentication - How It WorksWWPass Multi-factor Authentication - How It Works
WWPass Multi-factor Authentication - How It Works
 
zatca_workshop_24012023_R2.pptx
zatca_workshop_24012023_R2.pptxzatca_workshop_24012023_R2.pptx
zatca_workshop_24012023_R2.pptx
 
diagram_sources.pptx
diagram_sources.pptxdiagram_sources.pptx
diagram_sources.pptx
 
Visitor Management Software
Visitor Management Software Visitor Management Software
Visitor Management Software
 
zatca_workshop_24012023_R3.pptx
zatca_workshop_24012023_R3.pptxzatca_workshop_24012023_R3.pptx
zatca_workshop_24012023_R3.pptx
 
Securing APIs with OAuth 2.0
Securing APIs with OAuth 2.0Securing APIs with OAuth 2.0
Securing APIs with OAuth 2.0
 
Vehicle access system (two way)
Vehicle access system (two way)Vehicle access system (two way)
Vehicle access system (two way)
 
KYC API By SprintVerify powered by PaySprint .pdf
KYC API By SprintVerify powered by PaySprint .pdfKYC API By SprintVerify powered by PaySprint .pdf
KYC API By SprintVerify powered by PaySprint .pdf
 

Recently uploaded

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Powerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara LaskowskaPowerful Start- the Key to Project Success, Barbara Laskowska
Powerful Start- the Key to Project Success, Barbara Laskowska
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 

Proxyclick QR Code Access Control System Workflows

  • 2. On-site Proxyclick Client Software Access Control System Proxyclick host Pre-booked visitor invitation 4) Visitor profile created in access control system 3) Proxyclick communicates with on-site client to issue request to create visitor1) Host invites their visitor 2) Visitor emailed QR code
  • 3. On-siteOn-site 1) The visitor arrives and checks in at kiosk Welcome Kiosk 3) Visitor’s access credentials made active in ACS Pre-booked visitor arrival workflow 1 - kiosk check in Proxyclick Client Software Access Control System2) Visit information processed by Client Software Visitor QR Code 4) Visitor uses their QR code invitation as access token
  • 4. On-siteOn-site 1) The visitor scans QR code at access point when they arrive Visitor QR Code Pre-booked visitor arrival workflow 2 - access check-in Proxyclick Client Software Access Control System 2) Client software monitors event / audit trail stream from ACS 3) Notification of visitor access event passed to Proxyclick server 4) Visitor checked-in at logbook, host notified
  • 5. On-siteOn-site 1) The visitor arrives, enters details and checks in at the Welcome app Welcome Kiosk 4) Visitor’s access credentials entered into ACS by client software Visitor arrival - unexpected visitor Proxyclick Client Software Access Control System 2) Visitor emailed QR code 3) Visit passed to client software Visitor QR Code 5) Visitor gains access at door / turnstile with QR code
  • 6. On-site 1) The visitor scans QR code at access point when they depart Visitor QR Code Visitor departure - access check-out Proxyclick Client Software Access Control System 2) Client software monitors event / audit trail stream from ACS 3) Notification of visitor access event passed to Proxyclick server 4) Visitor checked-out at logbook, host notified
  • 7. On-site 1) Time event triggered (time after meeting, end of day, etc) Proxyclick Client Software Access Control System Visitor deactivation - end of day / custom time 2) Visits fitting criteria are discovered 3) Client deactivates visitor profiles in ACS 4) Visitor access restricted as required