SlideShare a Scribd company logo
Access Control Integration Workflows
On-site
Proxyclick
Client
Software
Access
Control
System
Proxyclick
host
Pre-booked visitor invitation
4) Visitor profile
created in access
control system
3) Proxyclick communicates
with on-site client to issue
request to create visitor1) Host invites their visitor
2) Visitor emailed QR code
On-siteOn-site
1) The visitor arrives
and checks in at kiosk
Welcome
Kiosk
3) Visitor’s access
credentials made
active in ACS
Pre-booked visitor arrival workflow 1 - kiosk check in
Proxyclick
Client
Software
Access
Control
System2) Visit information
processed by Client
Software Visitor QR
Code
4) Visitor uses their
QR code invitation
as access token
On-siteOn-site
1) The visitor scans QR
code at access point
when they arrive
Visitor
QR Code
Pre-booked visitor arrival workflow 2 - access check-in
Proxyclick
Client
Software
Access
Control
System
2) Client software
monitors event / audit
trail stream from ACS
3) Notification of visitor
access event passed to
Proxyclick server
4) Visitor checked-in at
logbook, host notified
On-siteOn-site
1) The visitor arrives,
enters details and
checks in at the
Welcome app
Welcome
Kiosk
4) Visitor’s access
credentials entered into
ACS by client software
Visitor arrival - unexpected visitor
Proxyclick
Client
Software
Access
Control
System
2) Visitor emailed
QR code
3) Visit passed to
client software
Visitor QR
Code
5) Visitor gains
access at door /
turnstile with
QR code
On-site
1) The visitor scans QR
code at access point
when they depart
Visitor
QR Code
Visitor departure - access check-out
Proxyclick
Client
Software
Access
Control
System
2) Client software
monitors event / audit
trail stream from ACS
3) Notification of visitor
access event passed to
Proxyclick server
4) Visitor checked-out at
logbook, host notified
On-site
1) Time event triggered
(time after meeting, end
of day, etc)
Proxyclick
Client
Software
Access
Control
System
Visitor deactivation - end of day / custom time
2) Visits fitting criteria are
discovered
3) Client deactivates visitor
profiles in ACS
4) Visitor access
restricted as required

More Related Content

Similar to Proxyclick QR Code Access Control System Workflows

2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core
2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core
2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core
Vladimir Bychkov
 
Web services security_in_wse_3_ppt
Web services security_in_wse_3_pptWeb services security_in_wse_3_ppt
Web services security_in_wse_3_ppt
Harshavardhan Achrekar
 
The OAuth 2.0 Authorization Framework
The OAuth 2.0 Authorization FrameworkThe OAuth 2.0 Authorization Framework
The OAuth 2.0 Authorization Framework
Samuele Cozzi
 
Oauth 2.0 Security Considerations for Client Applications
Oauth 2.0 Security Considerations for Client ApplicationsOauth 2.0 Security Considerations for Client Applications
Oauth 2.0 Security Considerations for Client Applications
Kasun Dharmadasa
 
qr code (1).pptx
qr code (1).pptxqr code (1).pptx
qr code (1).pptx
ShrutiGargIIT
 
WWPass Multi-factor Authentication - How It Works
WWPass Multi-factor Authentication - How It WorksWWPass Multi-factor Authentication - How It Works
WWPass Multi-factor Authentication - How It Works
Joe McDonald
 
zatca_workshop_24012023_R2.pptx
zatca_workshop_24012023_R2.pptxzatca_workshop_24012023_R2.pptx
zatca_workshop_24012023_R2.pptx
MOHAMMED ISHAQ
 
diagram_sources.pptx
diagram_sources.pptxdiagram_sources.pptx
diagram_sources.pptx
UsmanShafi27
 
Visitor Management Software
Visitor Management Software Visitor Management Software
Visitor Management Software
RITESH HELONDE
 
zatca_workshop_24012023_R3.pptx
zatca_workshop_24012023_R3.pptxzatca_workshop_24012023_R3.pptx
zatca_workshop_24012023_R3.pptx
MOHAMMED ISHAQ
 
Securing APIs with OAuth 2.0
Securing APIs with OAuth 2.0Securing APIs with OAuth 2.0
Securing APIs with OAuth 2.0
Kai Hofstetter
 
Vehicle access system (two way)
Vehicle access system (two way)Vehicle access system (two way)
Vehicle access system (two way)
AOPL
 
KYC API By SprintVerify powered by PaySprint .pdf
KYC API By SprintVerify powered by PaySprint .pdfKYC API By SprintVerify powered by PaySprint .pdf
KYC API By SprintVerify powered by PaySprint .pdf
PaySprint
 

Similar to Proxyclick QR Code Access Control System Workflows (13)

2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core
2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core
2019 - Nova Code Camp - AuthZ fundamentals with ASP.NET Core
 
Web services security_in_wse_3_ppt
Web services security_in_wse_3_pptWeb services security_in_wse_3_ppt
Web services security_in_wse_3_ppt
 
The OAuth 2.0 Authorization Framework
The OAuth 2.0 Authorization FrameworkThe OAuth 2.0 Authorization Framework
The OAuth 2.0 Authorization Framework
 
Oauth 2.0 Security Considerations for Client Applications
Oauth 2.0 Security Considerations for Client ApplicationsOauth 2.0 Security Considerations for Client Applications
Oauth 2.0 Security Considerations for Client Applications
 
qr code (1).pptx
qr code (1).pptxqr code (1).pptx
qr code (1).pptx
 
WWPass Multi-factor Authentication - How It Works
WWPass Multi-factor Authentication - How It WorksWWPass Multi-factor Authentication - How It Works
WWPass Multi-factor Authentication - How It Works
 
zatca_workshop_24012023_R2.pptx
zatca_workshop_24012023_R2.pptxzatca_workshop_24012023_R2.pptx
zatca_workshop_24012023_R2.pptx
 
diagram_sources.pptx
diagram_sources.pptxdiagram_sources.pptx
diagram_sources.pptx
 
Visitor Management Software
Visitor Management Software Visitor Management Software
Visitor Management Software
 
zatca_workshop_24012023_R3.pptx
zatca_workshop_24012023_R3.pptxzatca_workshop_24012023_R3.pptx
zatca_workshop_24012023_R3.pptx
 
Securing APIs with OAuth 2.0
Securing APIs with OAuth 2.0Securing APIs with OAuth 2.0
Securing APIs with OAuth 2.0
 
Vehicle access system (two way)
Vehicle access system (two way)Vehicle access system (two way)
Vehicle access system (two way)
 
KYC API By SprintVerify powered by PaySprint .pdf
KYC API By SprintVerify powered by PaySprint .pdfKYC API By SprintVerify powered by PaySprint .pdf
KYC API By SprintVerify powered by PaySprint .pdf
 

Recently uploaded

Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
Javier Junquera
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
christinelarrosa
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
ScyllaDB
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
Enterprise Knowledge
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
ssuserfac0301
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
UiPathCommunity
 

Recently uploaded (20)

Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)GNSS spoofing via SDR (Criptored Talks 2024)
GNSS spoofing via SDR (Criptored Talks 2024)
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
Christine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptxChristine's Supplier Sourcing Presentaion.pptx
Christine's Supplier Sourcing Presentaion.pptx
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
A Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's ArchitectureA Deep Dive into ScyllaDB's Architecture
A Deep Dive into ScyllaDB's Architecture
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Demystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through StorytellingDemystifying Knowledge Management through Storytelling
Demystifying Knowledge Management through Storytelling
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
Taking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdfTaking AI to the Next Level in Manufacturing.pdf
Taking AI to the Next Level in Manufacturing.pdf
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Session 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdfSession 1 - Intro to Robotic Process Automation.pdf
Session 1 - Intro to Robotic Process Automation.pdf
 

Proxyclick QR Code Access Control System Workflows

  • 2. On-site Proxyclick Client Software Access Control System Proxyclick host Pre-booked visitor invitation 4) Visitor profile created in access control system 3) Proxyclick communicates with on-site client to issue request to create visitor1) Host invites their visitor 2) Visitor emailed QR code
  • 3. On-siteOn-site 1) The visitor arrives and checks in at kiosk Welcome Kiosk 3) Visitor’s access credentials made active in ACS Pre-booked visitor arrival workflow 1 - kiosk check in Proxyclick Client Software Access Control System2) Visit information processed by Client Software Visitor QR Code 4) Visitor uses their QR code invitation as access token
  • 4. On-siteOn-site 1) The visitor scans QR code at access point when they arrive Visitor QR Code Pre-booked visitor arrival workflow 2 - access check-in Proxyclick Client Software Access Control System 2) Client software monitors event / audit trail stream from ACS 3) Notification of visitor access event passed to Proxyclick server 4) Visitor checked-in at logbook, host notified
  • 5. On-siteOn-site 1) The visitor arrives, enters details and checks in at the Welcome app Welcome Kiosk 4) Visitor’s access credentials entered into ACS by client software Visitor arrival - unexpected visitor Proxyclick Client Software Access Control System 2) Visitor emailed QR code 3) Visit passed to client software Visitor QR Code 5) Visitor gains access at door / turnstile with QR code
  • 6. On-site 1) The visitor scans QR code at access point when they depart Visitor QR Code Visitor departure - access check-out Proxyclick Client Software Access Control System 2) Client software monitors event / audit trail stream from ACS 3) Notification of visitor access event passed to Proxyclick server 4) Visitor checked-out at logbook, host notified
  • 7. On-site 1) Time event triggered (time after meeting, end of day, etc) Proxyclick Client Software Access Control System Visitor deactivation - end of day / custom time 2) Visits fitting criteria are discovered 3) Client deactivates visitor profiles in ACS 4) Visitor access restricted as required