To configure two-factor verification, do the following:

  1. On the Hardware tab of the System settings dialog box, create the Virtual access server object, based on the Computer object.
  2. Create the FACE verificator object, based on the Virtual access server object, and go to its settings panel.
  3. From the Camera drop-down list (1), select the camera that captures the faces. The camera should work as part of the Face Recognition Server.
  4. From the Server drop-down list (2), select the Face Recognition Server.
  5. From the Mode drop-down list (3), select the verifier operation mode:
  6. In the Timeout field (4), set the time to wait for a face to appear in the Face Recognition Server camera. If the face does not appear in front of the camera during this time, then the face verification will fail.
  7. From the Object type drop-down list (5), select the type of object that will initiate the face check. Typically, this is an access point, reader, etc.
  8. From the Object drop-down list (6), select the object of the type specified above.
  9. From the Event drop-down list (7), select the event by which the face check will be launched. The list of available events depends on the selected object type.
  10. From the Reaction for access drop-down list (8), select the command that will be sent to the initiating object upon the successful face verification. The list of available commands depends on the selected object type.

  11. From the Reaction for denial drop-down list (9), select the command that will be sent to the initiating object upon the unsuccessful check/face verification. The list of available commands depends on the selected object type.

  12. If necessary, in the Cache-parameter No.1-No.3 fields (10), specify the parameters that are individual for each ACS integration software module.

    For example, in the PERCo-S-20 v.2 integration module, each request to the operator is accompanied by the request_id parameter. This parameter must be returned when confirming the access, otherwise the command will be ignored. For Noder ACS, this parameter is param1.


  13. From the Mode drop-down list (11), select the access control mode:
    1. Access rights checking - activates checking the user access rights according to the parameters below. Only after the access rights verification, if successful, the face verification is performed.
    2. Only recognition - skips the access rights verification and proceeds immediately to face verification.
  14. Set the Locking checking checkbox (12) if it is necessary to check whether the user is blocked or not.
  15. Select the Antipassback checking checkbox (13) if it is necessary to check the antipassback control.
  16. Select a method for checking the validity period of a user access card (14):
  17. Click the Apply button (15) to save the settings.

    Parameters (1) through (9) are mandatory. If at least one of them is not specified, then all selected values ​​of these parameters will be reset to default even after clicking the Apply button.


An example of the two-factor verification configured for the PERCo-S-20 v.2 integration module is presented below.

The two-factor verification is configured.