Simplify processes and save time with Command Macros A command macro is a predefined set of commands that execute as if they were a single command. They can be activated via Cogito’s quick tasks menu or scheduled to run at a predetermined date and time. A command macro has a number of uses, including when you need to override normal access control operations for a specific situation. For example, if a special event was being organized in the office outside normal business hours it would be important to ensure all invited attendees had access to the event, but not to other parts of the building. In Cogito a command macro can be created to unlock certain doors, but lock others, or perhaps grant access to persons with access cards who would not normally be able to enter that area of the building. Any combination of commands can be included in a macro so, for example, it can include allowing elevator access to that specific floor and disabling door held open alarms among many other options. These commands are set up in advance by following a series of simple steps to create the macro. The macro can then be executed from Cogito’s quick task menu. Alternatively, an added benefit is that a macro can be assigned a schedule, meaning it will run at a certain date and time. So in our example above, all the commands to prepare for the special event could be set up and tested well in advance. The security staff can then “set it and forget it” knowing the command macro will run automatically in advance of the event. Of course another macro can be set to run later to restore access to normal conditions. Command macros can also be used for more mundane tasks. The commands can be run on access points, controllers, as well as in the Cogito application itself to automate tasks. If you have a time consuming process that you would like your access control system to automate, please contact us for a demo and how this feature can work for your situation. March 3, 2016By Harmin Riarh Access Control, Feature Focus, Schedules , access control, processes, Command macros 0 Comment Read More »
Customizing User Profiles Cogito comes with a comprehensive set of identification criteria for each user’s access control profile. These include the standard name and title, address, employee number, title, department and so on. However, several customers have needed to add additional data to a cardholder’s profile. One major corporate client recently added 40 “custom fields” to their company's user database such as: Driver’s License number Whether they had any special accessibility needs Mother’s maiden name (to prove identity) Vehicle license plate, make, model and color Date of hiring Serial numbers of equipment issued (laptop and phone) Additional details of their office location All these were easily added through the Cogito’s Custom Field Editor. The Custom Field Editor enables fields to be created, edited and moved around the interface. Fields can be created in a number of formats: Text Time & Date Check Box Combo Box (drop down menu) Number Further features enable the content of a field to be made non-editable once it has been entered. A typical user profile appears on a number of tabs including: General (name and other identifying info) Credentials (information regarding cards, PIN access etc.) Pictures of user and their signature Absences schedule Fields can be added to an existing tab, or a new tab can be created. There is no limit to the number of tabs or the number of fields. Additionally, through our software development kit (SDK) we were able to link the Cogito integrated security system with other corporate systems such as the human resources management system which contained much of the identifying information for the users; and asset tracking for details on laptops and phones. Please contact us for more information on how we can create fully customized user profiles for your customer. June 14, 2015By Harmin Riarh Access Control, Cardholders and Credentials, Configuration, Feature Focus, Integration, User profile cardholders, credentials, human resource management system, integration, SDK, user management, web service, access control 0 Comment Read More »