There are 3 components that are needed in order for Proxy to operate:
1. Proxy Mobile Reader
This is a physical device that is installed next to the access point. The BLE (Bluetooth Low Energy) module within the reader emits a signal from the user’s mobile phone to be recognized when it is within range. Once detected, the user’s mobile device will connect to the Proxy Mobile Reader for authentication.
Proxy has three types of mobile access readers:
- Mobile Reader Edge - This reader is a standalone mobile access solution. No access controller is needed. It requires only a power supply and electrified hardware. This reader does not work with traditional key cards/fobs or 3rd party controllers.
- Mobile Reader Pro - This reader works with both traditional key cards/fobs as well as with Bluetooth Low Energy (BLE) on your phone and works with most existing access control systems. With this setup, you can automatically sync Proxy with your existing access control system to automatically create/revoke/manage mobile access policies alongside keycard/fob access policies and take advantage of all the features that come with an access controller.
- Mobile Reader Nano - The module is a device with a small footprint (~1"x1") that is intended to run in parallel with an existing access device. It is designed to fit into small spaces, such as with turnstiles and elevator dispatch devices, without a need to replace the existing RFID reader.
2. Proxy ID app
The Proxy ID app can be downloaded onto your mobile device from the App Store or Google Play. The Proxy ID app will recognize when you are within range of a Proxy Mobile Reader and authorize your entry if you are granted the appropriate permissions.
3. Mobile Access Manager
This is a browser-based application where administrators can perform actions such as adding and removing users, creating groups and setting permissions. Alternatively, for Mobile Reader Pro and Edge Readers, administrators can use Proxy Mobile Access Connector to sync access control credentials and policies with existing access control systems.