Integrating ImproNet access control to Microsoft Active Directory

October 2012 Surveillance

Powell Tronics has announced its in-house development team has recently completed a fully integrated service with Microsoft’s Active Directory and Impro’s Impronet access control system.

“The PT-AD integration service maintains the tag holder information and active status in the ImproNet system by correlating the user information and status in Active Directory (AD). In addition to the single point of information entry benefit, PT-AD also allows the system administrators to link AD Security Groups to tag holder access groups in the Impronet system, ensuring an automated access group allocation to active tag holders,” advises Melissa Jacobs, product manager at Powell Tronics.

Melissa Jacobs
Melissa Jacobs

The request for this integration had come about with numerous requests by IT-driven companies for their AD system to be the master source of employee information, status and security allocation. Up until this time, HR departments would have to notify both the IT department and the security department simultaneously if a new employee was starting or if an employee’s employment had been terminated. In most cases a mismatch between the two systems would occur, resulting in a new employee not having access to the premises for the first few days or tags still being active on the access control system even though the tag holder was no longer an employee of the company – a major security risk.

PT-AD populates the ImproNet tag holder table with Active AD user details. Should a new user be added to the AD system, PT-AD will update the Impronet database with the new details within seconds. If a user’s account is suspended due to their password expiring or malicious activity not in line with company policy, their access tags will be suspended. Disabling a user account in the AD system due to termination of employment, will result in their tag being removed from the access control system and the tag holder being made Non-Current and ready for archive.

In the PT-AD user interface, AD Security Groups are linked to the relevant ImproNet Access Groups. A user’s security group(s) in AD is then automatically translated to an access group(s) in the ImproNet tag holder window from which the access control administrator can allocate a tag.

For more information contact Powell Tronics, +27 (0)21 448 0156, [email protected], www.p-tron.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Drones and a hint of access control
Surveillance Products & Solutions
Drones are an indispensable tool for security operations, with more functionality and capabilities than ever. Securex Cape Town 2025 will naturally have drone service providers available to light the way for interested parties.

Read more...
Innovations in video management
Arteco Global Africa Surveillance
Visitors to Securex Cape Town this year will have the opportunity to experience Arteco’s latest innovations in video management and integrated security technology, including uSee VMS, Arteco’s hybrid-cloud video management platform.

Read more...
Human-centric control rooms
Iritron Integrated Solutions Surveillance Residential Estate (Industry)
Iritron and Oculus show that when it comes to control rooms, people, not just technology, are at the centre of the most significant performance differentiators today, not just how efficiently the technology works.

Read more...
Smarter security for safer estate living
neaMetrics Suprema Integrated Solutions Surveillance Access Control & Identity Management Residential Estate (Industry)
The expansion of residential estates has led to many communities being constructed with security as an afterthought. Unfortunately, fencing, cameras, and a guard at the gate only create a false sense of safety, which vanishes after the first incident.

Read more...
Secure, long-distance thermal from Keenfinity
Products & Solutions Surveillance Residential Estate (Industry)
The DINION thermal 8100i camera is a bullet thermal camera built for mission-critical applications, prioritising long-distance monitoring and reliable perimeter intrusion detection with built-in Intelligent Video Analytics (IVA) Pro Perimeter video analytics.

Read more...
IVA AI Pro Visual Gun Detection
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of the IVA AI Pro Visual Gun Detection analytics based on deep learning. It is designed for automatic detection and classification of people and brandished firearms.

Read more...
IP-based horn loudspeakers
Products & Solutions Surveillance Security Services & Risk Management Residential Estate (Industry)
Bosch has announced the launch of its new IP-based horn loudspeakers and amplifier module: the high-output LHN-UC15L-SIP horn (for long-throw applications), the compact LHN-UC15W-SIP horn (for wide-angle coverage) and the AMN-P15-SIP amplifier module.

Read more...
Identity, Security & Access Alliance focuses on intelligence and integration
SMART Security Solutions Ideco Biometrics BoomGate Systems Bosch Building Technologies Technews Publishing Integrated Solutions Surveillance Access Control & Identity Management
The Identity, Security & Access Alliance (ISAA) hosted several launch events in Johannesburg in August, showcasing the participating companies’ technical solutions with a primary focus on the solutions made possible by integrating high-quality systems to deliver comprehensive solutions.

Read more...
Make BIG and COMPLEX small and manageable
neaMetrics Suprema AI & Data Analytics Surveillance Integrated Solutions
Traditional CCTV and access systems often operate separately, creating gaps in visibility and efficiency. TRASSIR and Suprema have partnered to develop an integrated platform that improves security, operations, and situational awareness.

Read more...
Get the AI fundamentals right
Leaderware Editor's Choice Surveillance AI & Data Analytics
Much of the marketing for CCTV AI detection implies the client can just drop the AI into their existing systems and operations, and they will be detecting all criminals and be far more efficient when doing it.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.