Knowledgebase

Knowledgebase

Make your cool support today

Articles

Assign a key with an issue number or mission number Assign a key with an issue number or mission number.   If you have many keys you manage, you... CyberKey User Tips Conduct a training session for CyberKey users. Let them try their key in a lock... How are lost keys managed? There are two ways to manage lost keys: proactively and reactively. When programmed, keys can be... How are lost keys managed? There are two ways to manage lost keys: proactively and reactively. When programmed, keys can be... How do I know when a battery is running low? Low battery warnings are provided in the software every time a CyberKey is updated via a... How do keys communicate with the software? Keys are updated and programmed via communication devices. When a CyberKey and a communicator... How many locks can one key access? A key can access up to 12,000 locks with the purchase of the Lock List Filtering Software... How to set up a CyberKey How to Set up a CyberKey The start to finish setup for a CyberKey. We have two ways to set up a... Setting up a Bluetooth Key  Adding a Bluetooth Key     Step 1) Add the Bluetooth CyberKey to your system.   An... Steps troubleshoot issues with a Cyberkey. Here are some steps to get started troubleshooting a key. Step 1) Are the contacts clean, and... Using Cyberkey Templates Using Cyberkey Templates CyberKey Templates are an easy way to configure a CyberKey for a user... What happens if the key battery dies? The key permissions, access schedules, and audit trail are maintained even if the battery dies... What happens when a key touches a lock? In less than a second, the lock and key synchronize: they exchange unique IDs, compare access... Which key is right for me? To determine which key is best for you, click here to view our key specifications or contact us... How to update a CyberKey. How to update a CyberKey This article explains how to apply the settings to a Cyberkey once you...