Once an authorized PIN or RFID card is presented, a CyberKey is then programmed with the users access permissions and released from the cabinet. With the programmed key, the user can access approved ...