Overview
This guide is for admins configuring Envoy Visitors at data centers, including hyperscale, colocation, and edge facilities. The reference profile is a colo operator supporting multiple customer cages with mixed access for engineers, contractors, and vendors.
Compliance and operational requirements
Data centers meet SOC 2, ISO 27001, and customer contractual obligations in addition to physical security best practices. The defining feature of the work is that 24/7 personnel, such as engineers, electricians, and HVAC contractors, need controlled access to specific cages, with full audit evidence and zero tailgating.
Recommended features and configuration
Restricted access
Invite approvals: security review every invitation
Advanced Visitors Approvals [Beta]: create complex policies to acquire approvals across multiple departments
Strong identity verification
ID scanning: AI-driven government ID verification
Returning visitors and facial recognition: biometric match for repeat engineers, speeding up sign-in time
Cage-level access provisioning
Capture customer-specific terms
About legal documents: NDAs and acceptable use terms
Visitor assessments: security briefing acknowledgment
SOC 2-ready audit trail
Using the visitor log and exporting visitor data: a timestamped, exportable record for every audit
About visitor data: review retention behavior to comply with local policies
Case Study: Raxio Group
Learn how Envoy has helped Raxio scale their visitor management operations while maintaining strict entry requirements for its Tier III data centers across Africa.

