Check out our special report on Cybersecurity
HID pivCLASS Authentication Module
Technical Specification
- Make: HID
- Model code: pivCLASS Authentication Module
- Controller Type: Networkable
- Max No. of Doors per Controller: 2
- No of Cardholders: 100,000
Key Features One PAM supports up to two readers at one or two doors: Readers pass card information to the PAM, which performs the required authentication to validate (or invalidate) the cardholder's credentials. If validated, the PAM derives and sends the badge ID to the access control panel for the access authorization decision. Validates PKI-based smart cards: Authenticates PIV, PIV-I, CIV (a.k.a., PIV-C), TWIC, FRAC and CAC cards. Performs path validation and certificate revocation checking using CRL, OCSP or SCVP. Meets regulatory requirements: Enables facilities to perform one-, two- and three-factor authentication to meet all necessary authentication modes and assurance levels specified in NIST SP 800-116 and the TWIC Reader Specification.
Read more| Make | HID |
|---|---|
| Manufacturer | HID |
| Category | Access Control>Access control controllers |
| Model code | pivCLASS Authentication Module |
| Controller Type | Networkable |
| Max No. of Doors per Controller | 2 |
| No of Cardholders | 100,000 |
| Offline Capabilities | Yes |
| Networkable | Yes |
| Communication Type | 2 RS-485 serial ports (Interface to Readers) ; 2 Wiegand ports (Interface to PACS Controller) |
| Universal / Wiegand Reader Interface | Yes |
| Physical Specifications | Dimensions mm: 186 x 168 |
| Environmental Specifications | Protection: FCC, UL 294 |
| Additional info |
Key Features
|
You might be interested in these products
- See other HID products
- HID Access control readers
- HID Access control cards/ tags/ fobs
- HID Access control software
Related Whitepapers
The 2024 state of physical access trend report
The truth behind 9 mobile access myths
6 good reasons to embrace mobile credentialing
One system, one card
DownloadAligning physical and cyber defence for total protection
DownloadUnderstanding AI-powered video analytics
DownloadEnhancing physical access control using a self-service model
DownloadHow to implement a physical security strategy with privacy in mind
Download

