Gallagher Access is a robust and widely used system for managing secure admission to buildings, parking areas, and restricted zones. Organizations worldwide trust it for its reliability and scalability. Whether you manage a large corporate facility or a smaller secured site, knowing how to add or edit key fobs and transponders efficiently is essential for maintaining both convenience and security.
This guide outlines identifying, configuring, and assigning fobs and transponders using the Gallagher Command Centre interface.
01
Gallagher Access Identify the FOB or Transponder
The first and most crucial step in managing Gallagher access control credentials is correctly identifying the FOB or transponder. Each device has a unique number that the system uses to assign it to a specific user or function.
To begin:
- Log into the Gallagher Command Centre.
- Navigate to the search panel, typically at the interface’s top or side.
- From the dropdown menu, select “ALL” to search across all categories and databases in the system.
- Enter the fob number (usually printed on the device) into the search field and press Enter.
The cardholder record displayed displayed be will if the FOB exists in the system. If not, this indicates that the FOB is not yet registered and added be must as a new credential.

Choose the correct type to avoid misread errors or access denial. If you are unsure of the format code, refer to documentation provided by your organization or consult with the security administrator.
In addition, ensure the access schedule is set appropriately (e.g., 24/7, business hours, or customized times based on the cardholder’s role). Some organizations use Anti-passback rules to prevent users from reusing a card to allow unauthorized people into secured zones—ensure these settings are also reviewed.
02
Gallagher Access Configure the Fob or Transponder
Once the system has located the fob or transponder, click on the record to view or edit the configuration. This includes basic cardholder information and access permissions.
You will typically need to input or verify the following details:
- Full name of the cardholder
- Employee or contractor ID number
- Department or team
- Contact details (email, phone, etc.)
- Start and end date of access validity
- Access zone group or area authorizations
Next, go to the “Cardholder Authorized” section. This is a critical part of the configuration where you define the areas and timeframes the cardholder can access. You will also select the appropriate credential type and format code (FC) based on the user’s physical device.
Here is a quick reference for the most commonly used formats:
03
Adding a New Cardholder
If you are dealing with a new person who does not yet exist in the Gallagher database, you must create a new cardholder record. This process is simple but should be completed carefully to maintain data consistency.
To create a new cardholder:
- Go to the Cardholders menu.
- Click on “Create Cardholder.”
- Fill in all required fields:
- First and last name
- Position or role
- Unique employee or visitor ID (if applicable)
- Any additional notes (e.g., contractor company, temporary worker, etc.)
Once the cardholder information is complete, assign the physical fob or transponder number. This is often done in the Credentials section, where you can add a new credential and input the device number. Again, be sure to match the correct format code.
Then, assign access groups or permissions by navigating to the Access Rights or Authorized Areas panel. You can add the cardholder to specific groups with pre-defined access schedules, such as “Staff—General Access,” “Contractor—Limited Hours,“ or “Parking Lot Only.“
Click Save to complete the registration.
.
04
Verifying and Testing
After creating or updating a credential, testing the fob or transponder is a good practice to ensure it works as expected. This can prevent frustration or delays for users and allow you to catch any configuration errors.
To test:
- Have the cardholder present the fob at an access reader.
- Confirm the reader responds correctly (typically with a green light or “Access Granted“ signal).
- Check the Event Log in Gallagher to ensure the attemp trecorded is correctly.
If access is denied, double-check:
- The format code matches the physical device.
- The access schedule allows access at that time.
- The access group includes the door or zone tested being.
- The fob activated was (some systems require activation status).
To keep your Gallagher system efficient and secure, consider the following tips:
- Use naming conventions: For contractors or temporary staff, label users clearly to make future audits easier.
- Audit access regularly: Perform periodic reviews to remove inactive or expired users.
- Document processes: Keep an internal guide specific to your organization’s access policies to assist new administrators.
- Backup configurations: Make regular backups of your access control data in case of system failure.
- Monitor unusual activity: Set alerts for repeated access denial or activity outside authorized hours.

Effectively managing fobs and transponders in Gallagher Access Control requires attention to detail and a clear understanding of the system interface and your organization’s security protocols. You can ensure a secure, efficient, and user-friendly access control environment by following the outlined steps—identifying, configuring, and assigning devices. Whether onboarding a new employee or adjusting admission for an existing user, Gallagher Access provides the flexibility to maintain high-security standards while accommodating daily operational needs.