Skip to main content

How Kadence Agent Works

Kadence Agent enables automatic check-ins by securely verifying whether a user is connected to a trusted office network.

Liza avatar
Written by Liza
Updated this week

Network-based check-in

When Kadence Agent is running on a user’s device, it checks whether the user is physically in an office by comparing their public IP address against a list of approved IP ranges.

These approved IPs:

  • Are configured by Global Admins in Kadence

  • Represent known corporate networks for specific office buildings

  • Can be individual IP addresses or CIDR ranges

  • Are fully managed by the customer inside the Kadence platform


What happens during check-in

  1. The Kadence Agent sends a request to:
    https://api.onkadence.co/v1/ip-check-in

  2. Kadence determines the user’s public IP address as seen by Kadence’s cloud infrastructure

  3. That IP address is compared in real time against the configured trusted IP ranges

  4. If:

    • Kadence Agent is installed

    • A match is found

    • Automatic check-in is enabled

    • The user has an active booking

    The user is automatically checked in to the corresponding building


Privacy and security

Kadence Agent is designed with privacy and security as core principles:

  • The IP address is only used momentarily to perform the match

  • The IP address is not stored or retained beyond the request lifecycle

  • No GPS, location services, or geolocation data is used

  • No device metadata is collected

  • All communication is encrypted using TLS

  • Processing is limited strictly to enabling check-in functionality


What Kadence Agent does not do

  • It does not track a user’s location

  • It does not monitor browsing or network activity

  • It does not store IP addresses

  • It does not use Wi-Fi names, Bluetooth, or device identifiers


Summary

Kadence Agent works by confirming presence in an office through network verification, not location tracking. It provides a secure, privacy-first way to automate check-ins using trusted corporate IP ranges configured by your organization.

Did this answer your question?