Techniques for managing access to a restricted setup are described. In an example, presence of a user device is detected within a predetermined range of the control device. Based on detecting the user device to be within the predetermined range, access permission data is received from the user device, where the access permission data comprises at least one of ticket and biometric data for entering a restricted setup. The access permission data is then compared with an access data, where the access data comprises at least one parameter indicative of validity of the access permission data. Access to the restricted setup is accordingly managed based on the comparison.