:: Manuals Home   :: Contact us   :: SG1 Website   :: Site Map  
WEB Forms
| AttendanceNET | DeveloperNET | KeyNET | ProjectNET | WorkNET

Sections

   
Table of Contents    
Access & Restrictions    
Your Desktop    
     
PEOPLE Module    

 

   

KEY ISSUE Module

 
   

LOCKSHOP Module

   
   Key Operations    
   Display Inventory    
   Modify Key Definition    
   Add/Remove Hooks    
   Add/Remove Location    
   Add/Remove Masters    
   Add/Cut NEW Key    
   Billing & Cost Centers    
   Bulk Transfer    

   Recall a KeyID

   

Masterkey Systems

   
   2 Step Progression    
   1 Step Progression    
   SFIC A2    
   SFIC A3    
   SFIC A4    
   Assa    

   Medeco

   

   Custom Developed

   
     
System Manager    
   People Configuration    
   Lockshop Config    
   Key Machine Config    
     

Features

   
Authorizations    
eKeyRequest    
   Request Methods    
   WEB Forms    
eKeyOrder    
ePhotoID    
eSignature    
iKeyID    
Keyrings    
Multiple Key Issue Sites    
     

F.A.Q.

   
     

eKeyRequest from the Web

eKeyRequest is a licensable add-on to KeyNET PRO, but is included with KeyNET ULTRA.  When licensed, eKeyRequest provides a number of customizable methods to use this AUTHORIZATION add-on.  This page describes the HTML required to produce an eKeyRequest from the WEB.  This method allows anyone who can access the web-form to request a key electronically.  The form is also highly customizable allowing a customer to create and arrange fields to be used in completing the request form.  KeyNET tracks the entire process so that individuals receive email at each stop along the authorization process; or authorized personnel can view the CURRENT status of each eKeyRequests.

A link to MY REQUESTS is available to all users with login privileges.  This feature allows a user to view their entire eKeyRequest history and the current status of those requests.

Authorizers will see another link called "List", which allows the Authorizer to see those eKeyRequests which still require action and the location of the eKeyRequest.  An Authorizer then has the ability to deny the issue, return the request for more or different information, or approve it and send it on to the next level for authorization.  Each step of the process is time and date stamped for historical recovery.

System Managers Setup - CRITICAL INFORMATION

When setting up eKeyRequests, there is a field named "User must have an account", this field is set to "yes", each user must also be set so that they may login.  

When you choose "no", the system will accept eKeyRequests from specially-configured forms that may exist elsewhere on the customer website, and which can be filled out by anyone, without requiring a user account and/or a user login.  KeyNET will not automatically generate such forms - Spectrum Group will created the form for you or provide you with the HTML format for your use.  System Managers can generate eKeyRequests - but setting the field to "no" tells KeyNET to accept submissions from such forms.  When set to yes, KeyNET will only accept requests from its own, internally-generated-for-a-logged-in-user form, and not from external forms.

Be sure and follow the Special Systems Notes at the bottom of this page during setup of eKeyRequests.

Setting up the HTML:

e-KeyRequest is an OPTIONAL and powerful feature which can be licensed in KeyNET.  It is designed to automate the requesting of keys and the obtaining of  authorizations for keys (or other assets) to be issued.  This module is email intensive.  No processing takes place without sending email and performing the associated tracking.  Your System Administrator will determine if email addresses are restricted to your facility, or if they may be Global.  Typically, email addresses are restricted to a facility, and users may only use addresses with the same facility (i.e., @KeynetU.edu, @keynet.k12.ca.us @knhospitals.org, knmil.net, or @gemco.gov)

Requesting a Key (or other asset) - In most cases, a link will be placed on your facility website which will take the web user to our AUTO-JOIN web-page.  The User will be presented with a login using their  USER ID, and Password.  In ALL cases...the User ID is the individuals complete email address, and the associated password will be a word of their choosing. 

System Users at the Department level who have been granted PEOPLE privileges may also enter information for other individuals.  This common practice is used by Department and School Secretaries to maintain the information database for those at their site.

bullet

If the individual information of the person requesting keys is not in the database, the information my be added by a PEOPLE USER or the system will AUTO-JOIN the person (if eAuto-Join has been licensed), sending their information to the appropriate DEPARTMENT AUTHORIZER they have indicated they belong too.  The department will approve or deny the fact that this individual is associated with their department.
bullet

If the department recognizes and acknowledges that the NEW requestor is part of their department, a email will be sent to the REQUESTOR, informing the requestor that it is OK to request keys.

bullet

If the department refuses to recognize or allow issuing through their department, an email will be sent to the REQUESTOR, informing the requestor that department will not allow items to be issued to them through that department.

bullet

If the individuals information is in the database, the system will prompt the person for Building and Room(s) to which they require access.  When the Key Request is complete, the requestor simply clicks on the SUBMIT button, and the request will be routed for proper authorizations.

Authorization Routing - eKeyRequest are routed based on the assignments of keys in the LOCKSHOP portion of the program.  However, the actual assigning of the authorizations is performed from the Authorizations Area of the People portion of the program.  The routing is made to the individuals who are authorized to approve access to those areas being requested.

  • The first stop in the process should be defined as a "Department" stop.  SYSTEM CHANGE (May 7, 2005), department authorizations are no longer sent to the person named in the code table for that department. This worked fine when there was only one authorizer, but customers we asking for more than one department authorizer. So, department authorizers have been removed from the code table, and the department authorization workspace module has been removed from the workspace system.

    Department stops now work exactly the same as other stops. People who are department authorizers now get added to the department stop as stop members, just like any other stop would be set up. These individuals then automatically inherit the ability to add that stop to their workspace, just like any other stop member could add their stop to their workspace.

    The only difference now is that, for department stops:
    1. Only those stop members whose personal department (as set in their personnel record) matches the incoming request will receive arrival alerts (and department stops are still always set for arrival alerts in version 1.)
    2. Only those requests whose departments match the user's personal department will show up in that user's workspace module for handling.

    This is the first filter in determining if the requestor should actually have the key.  If approved, the approver simply sends the eKeyRequest to the next level.  If denied, the requestor will be notified via email that the request has been denied.

  • If the eKeyRequest is approved and MKI is being used, the request will be electronically forwarded to Key Issue if keys are available.  If keys are available, the request can be forwarded for the final authorizations. 

  • Should you need multiple places to complete the eKeyRequest, that feature is set up by your Systems Administrator in the eKeyRequest Channel Management.

  • If the eKeyRequest is denied, and email will be sent to the requestor informing them that the request has been denied.

Processing the Key Request -

  • The eKeyRequest when submitted will be routed to the first stop in the chain of authorization as created by the Systems Manager in the eKeyNET Channel Management portion of the program.

    Spectrum Group recommends that the first stop be configured to be a "Department" stop.  This will allow preliminary approval or denial of keys, and will make give  subsequent authorizers the benefit of knowing that others have performed their checks and balances before sending the request on to them. 

    NOTE: Department Authorizations are predefined by your Systems Manager entering an email address in the Code Management portion of the program under "Departments".  Each Department has one email address available for preliminary approvals.

  • Further authorizations are defined in the Channel Management under eKeyRequest Configuration and using the "Configure Channel Path".

  • When the eKeyRequest has come to the last stop in the path - it should be at a Key Issue Point.

    • Systems with ONE Key Issue Point.  All eKeyRequests will end up at this Key Issue Point.  Issuers can then fill the request if keys are available on the hook.  If keys are not available on the hook and key issue is in another location, away from the lockshop, they should use the eKeyOrder feature to obtain additional keys.

    Spectrum Group recommends setting a low inventory limit for each KeyID, thereby reducing or eliminating the possibility of no keys being available at the time of a request being made.

    REMEMBER: The low inventory can be set for an entire masterkey system during the initial development of the system.

    • Systems with Multiple Key Issue Points (MKI), have a set of hooks specifically for each MKI location.  eKeyRequests are then processed and completed at that MKI site.

    • eKeyRequest are handled at the local level.  Yet, the Lockshop and Systems Administrators have oversight, audit and reporting capabilities.

    Many facilities choose not to allow Department Masterkeys to reside at the Department level.  Typically, a key must be Authorized by by someone above the level of key being issued.  Therefore these facilities require an Authorization above the Department level for a Department Master.

Notifications - when configured, an email notification will be sent to the appropriate individuals who are associated with the eKeyRequest.  The originator is always notified of approvals, and Authorizers are notified via email when there is an authorization in KeyNET which requires their attention.

If you have this feature, please refer to the documents provided to you by your instructor at the time of training or your training video.

Some special notes about this system:

1. System administrators who add the department stop to their workspace will see ALL requests, regardless of which department the request or the system administrator belongs to.

2. Users who are members of a department stop MUST have a department set in their personnel record. If they do not (and they are not system admins) they will not see ANY requests or receive ANY alerts for incoming requests at that stop.

3. In version 1 channels, e-key requests require the entry of a department.  Department authorization stops, however, can now be used in normal channels as well. In those cases (and in version 2), if you're going to have a department stop, you want to ensure that entry of a department field is REQUIRED to ensure that requests to vanish (going only to system admins without email alerts) when those department-less requests hit the department authorization stop.

If you need copies, contact Spectrum Group at support@sg1.us or 877-560-2457

 
Copyright ⓒ 1996-2006 The Spectrum Group. All rights reserved