You can deactivate lost or stolen keys by adding the related credential to a blocklist
and then distributing the blocklist to vulnerable cylinders. When the blocklisted key is
inserted in an updated cylinder, the cylinder remains locked and an access denied event is
recorded in the cylinder's audit log.
What you should know
There are three settings that can deactivate a key:
- expired validation period
- expired credential
- blocklist
The first two settings are stored on the key. The third setting is stored on a cylinder.
If a key with an extended validation period or no expiry date is lost, you can add the key to
a blocklist and upload the list to all vulnerable cylinders.
Procedure
To deactivate a lost or stolen key using the blocklist:
-
From the Security
Desk homepage, open the
Medeco XT blocklist management task.
-
Double-click the key's credential to move it to the blocklisted keys list.
-
Click Save blocklist.
To configure a setup key that will distribute the blocklist:
-
From the Credential Management task, select the credential of the key you will
use.
-
Change the Key function to Setup, and
then click Save.
-
Insert the setup key into a programming station.
This downloads the blocklist to the key.
To distribute the blocklist to cylinders:
-
Insert the setup key into the cylinders where you want to deactivate the lost
key.