Make your cool support today
Articles
Assign a key with an issue number or mission number
Assign a key with an issue number or mission number.
If you have many keys you manage, you...
CyberKey User Tips
Conduct a training session for CyberKey users. Let them try their key in a lock...
How are lost keys managed?
There are two ways to manage lost keys: proactively and reactively. When programmed, keys can be...
How are lost keys managed?
There are two ways to manage lost keys: proactively and reactively. When programmed, keys can be...
How do I know when a battery is running low?
Low battery warnings are provided in the software every time a CyberKey is updated via a...
How do keys communicate with the software?
Keys are updated and programmed via communication devices. When a CyberKey and a communicator...
How many locks can one key access?
A key can access up to 12,000 locks with the purchase of the Lock List Filtering Software...
How to set up a CyberKey
How to Set up a CyberKey
The start to finish setup for a CyberKey.
We have two ways to set up a...
Setting up a Bluetooth Key
Adding a Bluetooth Key
Step 1) Add the Bluetooth CyberKey to your system.
An...
Steps troubleshoot issues with a Cyberkey.
Here are some steps to get started troubleshooting a key.
Step 1) Are the contacts clean, and...
Using Cyberkey Templates
Using Cyberkey Templates
CyberKey Templates are an easy way to configure a CyberKey for a user...
What happens if the key battery dies?
The key permissions, access schedules, and audit trail are maintained even if the battery dies...
What happens when a key touches a lock?
In less than a second, the lock and key synchronize: they exchange unique IDs, compare access...
Which key is right for me?
To determine which key is best for you, click here to view our key specifications or contact us...
How to update a CyberKey.
How to update a CyberKey
This article explains how to apply the settings to a Cyberkey once you...