14
Secure Setup Guidelines
Secure Setup Overview
1. Design an ID numbering system; see page 15.
A properly designed ID numbering system makes the reader faster and easier to use.
2. Add/Enroll your supervisory staff.
This includes users who are authorized to program the reader, users who monitor
the reader network, and users who will add new users to the reader. The process for
adding these users is the same as for adding other users; see page 21.
3. In the reader, set authority levels for your supervisory staff; see page 16.
This makes sure these users have access to the options in the reader that they need,
and it also prevents other users from being able to inappropriately access the reader
menu options. This step is critical in preventing unauthorized people from getting
around your security system.
4. Customize settings in the reader as needed; see
Programming the FingerKey
starting
on page 32.
This step is listed here because you would normally complete your reader setup
before adding users, but you can actually change the settings in the reader at any
time.
5. Teach your users how to use the reader and then add/enroll them in the reader.
See page 20 for more on teaching users how to use the reader; see page 21 for details
on enrolling them in the reader.
Содержание FingerKey
Страница 1: ...Terminal User s Guide FingerKey...