| 
 
eKeyRequest from the 
Web 
eKeyRequest is a licensable add-on to KeyNET PRO, but is 
included with KeyNET ULTRA.  
When licensed, eKeyRequest provides a number of customizable methods to use this 
AUTHORIZATION add-on.  This page describes the HTML required to produce an 
eKeyRequest from the WEB.  This method allows anyone who can access the 
web-form to request a key electronically.  The form is 
also highly customizable allowing a customer to create and arrange fields to be 
used in completing the request form.  KeyNET 
tracks the entire process so that individuals receive email at each stop along 
the authorization process; or authorized personnel can view 
the CURRENT status of each eKeyRequests. 
A link to MY REQUESTS is available to all users with 
login privileges.  This feature allows a user to view their entire 
eKeyRequest history and the current status of those requests. 
Authorizers will see another link called "List", which 
allows the Authorizer to see those eKeyRequests which still require action and 
the location of the eKeyRequest.  An Authorizer then has the ability to 
deny the issue, return the request for more or different information, or approve 
it and send it on to the next level for authorization.  Each step of the 
process is time and date stamped for historical recovery. 
System Managers Setup - CRITICAL INFORMATION 
When setting up eKeyRequests, there is a field named 
"User must have an account", this field is set to "yes", 
each user must also be set so that they may login.   
When you choose "no", the system will accept 
eKeyRequests 
from specially-configured forms that may exist elsewhere on the customer 
website, and which can be filled out by anyone, without requiring a user account 
and/or a user login.  KeyNET will not automatically generate such forms - 
Spectrum Group will created the form for you or provide you with the HTML format for 
your use.  System Managers can generate 
eKeyRequests - but setting the 
field to "no" tells KeyNET to accept submissions from such forms.  When set to 
yes, KeyNET will only accept requests from its own, 
internally-generated-for-a-logged-in-user form, and not from external forms. 
Be sure and follow the
Special 
Systems Notes at the bottom of this page during setup of 
eKeyRequests. 
Setting up the HTML: 
e-KeyRequest is an OPTIONAL and powerful 
feature which can be licensed in KeyNET.  It is designed to automate the 
requesting of keys and the obtaining of  authorizations for keys (or other 
assets) to be issued.  This module is email intensive.  No processing takes 
place without sending email and performing the associated tracking.  Your System 
Administrator will determine if email addresses are restricted to your facility, 
or if they may be Global.  Typically, email addresses are restricted to a 
facility, and users may only use addresses with the same facility (i.e., @KeynetU.edu, 
@keynet.k12.ca.us @knhospitals.org, knmil.net, or @gemco.gov) Requesting a Key (or other asset) - In 
most cases, a link will be placed on your facility website which will take the 
web user to our AUTO-JOIN web-page.  The User will be presented with a login 
using their  USER ID, and Password.  In ALL cases...the User ID is the 
individuals complete email address, and the associated password will be a 
word of their choosing.    System Users at the Department level who have been granted PEOPLE privileges 
may also enter information for other individuals.  This common practice is 
used by Department and School Secretaries to maintain the information database 
for those at their site. 
	
		|  | 
		If the individual information of the person requesting keys is not in 
    the database, the information my be added by a PEOPLE USER or the system will AUTO-JOIN the person 
    (if eAuto-Join has been licensed), sending their 
    information to the appropriate DEPARTMENT AUTHORIZER they have indicated they belong too.  The 
    department will approve or deny the fact that this individual is associated 
    with their department. 
			
				|  | 
				If the department recognizes and acknowledges that the NEW requestor is 
        part of their department, a email will be sent to the REQUESTOR, 
        informing the requestor that it is OK to request keys. |  
				|  | 
				If the department refuses to recognize or allow issuing through their 
        department, an email will be sent to the REQUESTOR, informing the 
        requestor that department will not allow items to be issued to them 
        through that department. |  |  
		|  | 
		If the individuals information is in the database, the system will prompt 
    the person for Building and Room(s) to which they require access.  When the 
    Key Request is complete, the requestor simply clicks on the SUBMIT button, 
    and the request will be routed for proper authorizations. |  Authorization Routing - eKeyRequest are routed 
based on the assignments of keys in the LOCKSHOP portion of the program.  
However, the actual assigning of the authorizations is performed from the 
Authorizations Area of the People portion of the program.  The routing is made 
to the individuals who are authorized to approve access to those areas being 
requested. 
  
	
	The first stop in the process should be defined as a "Department" stop.  
  SYSTEM CHANGE (May 7, 2005),
	department authorizations are no longer sent to the 
	person named in the code table for that department.
	This worked fine when there was only one 
	authorizer, but customers we asking for more than one department authorizer. So, department authorizers have been removed from 
	the code table, and the department authorization workspace module has been 
	removed from the workspace system.
 Department stops now work exactly the same as other stops. People who are 
	department authorizers now get added to the department stop as stop members, 
	just like any other stop would be set up. These individuals then 
	automatically inherit the ability to add that stop to their workspace, just 
	like any other stop member could add their stop to their workspace.
 
 The only difference now is that, for department stops:
 1. Only those stop members whose personal department (as set in their 
	personnel record) matches the incoming request will receive arrival alerts 
	(and department stops are still always set for arrival alerts in version 1.)
 2. Only those requests whose departments match the user's personal 
	department will show up in that user's workspace module for handling.
 
 This is the first filter in determining if the requestor 
  should actually have the key.  If approved, the approver simply sends the 
  eKeyRequest to the next level.  If denied, the requestor will be notified 
  via email that the request has been denied.
	
	If the eKeyRequest is approved and MKI is being used, the request will be 
  electronically forwarded to Key Issue if keys are available.  If keys are 
  available, the request can be forwarded for the final authorizations. 
  	
  
	
	Should you need multiple places to complete the eKeyRequest, that feature 
  is set up by your Systems Administrator in the eKeyRequest Channel Management.
	
	If the eKeyRequest is denied, and email will be sent to the requestor 
  informing them that the request has been denied. Processing the Key Request -
  
  
	
	The eKeyRequest when submitted will be routed to the first stop in the 
  chain of authorization as created by the Systems Manager in the eKeyNET 
  Channel Management portion of the program. 
  Spectrum Group recommends that the first stop be 
  configured to be a "Department" stop.  This will allow preliminary 
  approval or denial of keys, and will make give  subsequent authorizers 
  the benefit of knowing that others have performed their checks and balances 
  before sending the request on to them.    NOTE: Department 
Authorizations are predefined by your Systems Manager entering an email address 
in the Code Management portion of the program under "Departments".  Each 
Department has one email address available for preliminary approvals.
Further authorizations are 
defined in the Channel Management under eKeyRequest Configuration and using the 
"Configure Channel Path".
	
	When the eKeyRequest has come to the last stop in 
  the path - it should be at a Key Issue Point. 
    
	
	Systems with ONE Key Issue Point.  All 
    eKeyRequests will end up at this Key Issue Point.  Issuers can then 
    fill the request if keys are available on the hook.  If keys are not 
    available on the hook and key issue is in another location, away from the 
    lockshop, they should use the  
	eKeyOrder feature 
    to obtain additional keys. Spectrum Group 
recommends setting a low inventory limit for each KeyID, thereby reducing or 
eliminating the possibility of no keys being available at the time of a request 
being made. REMEMBER: The low inventory can 
be set for an entire masterkey system during the initial development of the 
system. 
    
	
	Systems with Multiple Key Issue Points (MKI), have 
    a set of hooks specifically for each MKI location.  eKeyRequests are 
    then processed and completed at that MKI site.
eKeyRequest are 
handled at the local level.  Yet, the Lockshop and Systems Administrators 
have oversight, audit and reporting capabilities. Many facilities 
choose not to allow Department Masterkeys to reside at the Department level.  
Typically, a key must be Authorized by by someone above the level of key being 
issued.  Therefore these facilities require an Authorization above the 
Department level for a Department Master. Notifications - 
when configured, an email 
notification will be sent to the appropriate individuals who are associated with 
the eKeyRequest.  The originator is always notified of approvals, and 
Authorizers are notified via email when there is an authorization in KeyNET 
which requires their attention. If you have this 
feature, please refer to the documents provided to you by your instructor at the 
time of training or your training video. 
Some special notes about this system:
 1. System administrators who add the department stop to 
their workspace will see ALL requests, regardless of which department the 
request or the system administrator belongs to.
 
 2. Users who are members of a department stop MUST have a department set in 
their personnel record. If they do not (and they are not system admins) they 
will not see ANY requests or receive ANY alerts for incoming requests at that 
stop.
 
 3. In version 1 channels, e-key requests require the entry of a department.  
Department authorization stops, however, can now be used in normal channels as 
well. In those cases (and in version 2), if you're going to have a department 
stop, you want to ensure that entry of a department field is REQUIRED to 
ensure that requests to vanish (going only to system admins without email 
alerts) when those department-less requests hit the department authorization 
stop.
 If you need copies, contact Spectrum Group at 
support@sg1.us or 877-560-2457 |