Configure access control system integrations and individual access control terminals. Figure 1. Access control configuration