Knowledgebase

What is a Tag?

  • 0

..//assets/img/kb/tag.png What is a Tag?

In CyberAudit-Web, a tag is a free-form way to classify People and Locks. Tags help organize People and Locks into logical categories by providing an unlimited number of ways to describe them. There is no "wrong" choice for how to use them. Instead of belonging to one "group," People and Locks may have any number of tags.

Here are some examples how tags may be used.


ABC Enterprises

Uses people tags to organize their employees by department. The departments are Accounting, Engineering, Human Resources, Maintenance, Marketing, Production, and Support. Employees of each department have a set of locks they must be able to open.

ABC creates lock tags to group CyberLocks for access. Finally, using the Access Matrix, ABC grants each people tag access to each of the groups of CyberLocks it requires.

"Maintenance" is a lock tag. It tags CyberLocks needed to do the Maintenance functions at ABC. The "Maintenance" tag also includes some locks that are tagged with Production and Human Resources because all three departments require common access to some locks.

Gail Ash, as supervisor of Marketing and Support, is tagged with both "Marketing" and "Support" people tags. This allows her to access both "Marketing" and "Support" tagged CyberLocks. And Norman Cooper, normally tagged with Production, temporarily gets the "Maintenance" tag when Eric Montoya, the regular Maintenance employee, goes on vacation.

Green Construction Company

Employs electricians, plumbers, carpenters, and other specialists. Each employee serves a role in the construction process. Green uses CyberLocks to help them maintain control on their supply of raw materials. They use people tags to classify their employees by the role they play in the company. They use lock tags to identify the CyberLocks each employee group must access.

When Green adds a new electrician, Kashif Saleem, they simply tag his record with the "Electrician" people tag. When they issue him a CyberKey, it will automatically be programmed to open the locks that electricians at Green Construction need to open.

Wilson Vending

Uses CyberLocks on their vending machines to prevent key duplication and to maintain an audit trail of activity for each vending machine asset. Most key holders are either route drivers or service technicians. Wilson uses lock tags to identify the assets and CyberLocks on each route. Then they use people tags to identify the drivers that will service each route.

The service technicians must be able to open a broader group of locks. Wilson again uses lock tags, this time to identify the assets that fall into each service area. As a result, each asset (CyberLock) gets two tags; one for its route and one for its service area. The service technicians are then tagged with a descriptor for their service area and access is granted to the appropriate group of locks.

Finally, auditors for Wilson want to classify the vending assets by the "type" of product they dispense (snacks, cold beverage, hot beverage, money token). They create additional lock tags that add these additional descriptors and apply them to the locks. They now use the descriptors to help them create customized reports for audit trails from these locks.

Was this answer helpful?