User Authentication

These devices safeguard the stored items from unauthorized access. Login is carried out through strictly personal devices, such as Badges or EKS keys which make access operations extremely quick. These methods, compared to standard procedures like entering passwords, eliminate the risk of unauthorized personnel gaining access to the items stored. This user authentication system limits access to the machine or even to specific trays.



DO YOU WANT YOUR MODULA TO CONTROL ACCESS FOR EACH OPERATOR?

Contact us