Since there is no detailed information about the software, you will have to contact the person or organization that installed the system. Typically, this should be handled by the security administrator. If you have the software that controls the system, access the About section and call the ones who have access to the deep core of the software. They will provide all the necessary access cards and instructions on how to create one.