Key Control Cabinets

How It Works

The following timeline illustrates how a CyberKey Vault programs, distributes, and manages CyberKey smart keys.

8:00 a.m. Credential Is Presented

CyberKey smart keys are stored securely in a CyberKey Vault, in an unprogrammed state. An authorized PIN or RFID card is presented to the cabinet.

8:00 a.m. CyberKey Is Programmed and Released

The Vault communicates with the CyberAudit software and:

  • Programs a CyberKey with specific access permissions
  • Unlocks the cabinet door and releases the key

8:01 a.m. to 4:59 p.m. Daily Duties Are Performed

The programmed CyberKey is used to access authorized CyberLock cylinders throughout the organization based upon the permissions loaded in the key.

5:00 p.m. Credential Is Presented and CyberKey Is Returned

The authorized PIN or RFID card is presented again to the cabinet. The door unlocks and the CyberKey is returned to any available slot.

5:00 p.m. Audit Trail Downloaded and CyberKey Unprogrammed

The cabinet downloads the key activity, returns the CyberKey to an unprogrammed state, and reports back to the software all cabinet and key activity.

5:01 p.m. Notifications Are Sent

Designated supervisors and managers receive email notifications on vault and key activity.