If you encounter a problem that is not discussed in available Avigilon Access Control Manager
user guides or online help files, and need technical support, please contact your local Value
Added Reseller (VAR) or Avigilon support (888.281.5182).
When contacting your VAR, please be sure to have your registration material, serial number, and
software version number available.
Thank you for your purchase of the Access Control Manager software.
This configuration and workflow guide will walk you through the steps required to connect and
configure your new Access Control Manager system.
This is not a comprehensive guide of every feature and field in the system. For that, you can
review the Access Control Manager online help files. This guide handles the initial setup of your
system through the Access Control Manager appliance and bypasses some of the advanced
features and tasks that you may want to use later but don’t really need initially.
To that end, we begin with a flowchart of the steps you should take to get your Access Control
Manager system up and running.
We hope you enjoy your user experience with the Access Control Manager.
1
Flowchart
page 3
page 93
page 21
page 19
page 37
page 35
page 33
page 44
page 41
page 53
page 76
page 13
page 49
page 71
page 57
page 77
page 88
page 46
page 31
page 96
page 94
page 90
page 55
page 73
page 65
page 98
page 101
page 87
page 51
page 39
The flowchart below shows the basic steps you should follow to complete the setup process.
2
Access Control Manager Workflow
1
Express
Enterprise
The following workflow is divided into sections and subsections representing the steps you will
take in configuring the Access Control Manager system.
Connecting and Accessing the Access Control Manager
Appliance
Required Items
This is a list of items you will need to configure your new Access Control Manager appliance:
•Access Control Manager Appliance (or Access Control Manager Virtual Appliance DVD
with License)
•Power Cable
•Crossover Cable (not included)
•Static IP address
•Domain Name Server that will be responsible for resolving the static IP address to a name.
Configuration Procedure
1. Connect the power cord to the power connector on the Access Control Manager
appliance then plug the other end into an available electrical outlet.
If this is a Access Control Manager virtual appliance, skip Steps 1 and 2.
3
2. Connect the Access Control Manager appliance to a computer using the crossover
Express
Enterprise
Crossover Cable
(sold separately through third-party retailers)
Connect to Port 2
Crossover Cable
(sold separately through third-party retailers)
Connect to Port 2
cable to Port 2 of the appliance.
3. On your connected computer, open a web browser and type the appropriate address
into the address bar.
For the express and enterprise appliance, enter this address:
https://169.254.1.250
For the virtual appliance, enter this address:
https://169.254.1.201
4
At this point, you will probably see a message indicating that you are trying to reach an
If this is Internet Explorer:
If this is Safari:
If this is Firefox:
If this is Chrome:
Enter admin
in each field
unknown or insecure site, like these examples:
4. Do one of these things:
5. Enter these default values in the corresponding fields:
•If this is Firefox, click the “Or you can add an exception...” or “I understand the
risks” link, click the Add Exception button, click Get Certificate, then click Confirm Security Exception button.
•If this is Windows Explorer, click the “Continue to this website (not recommended)”
link.
•If this is Safari, click the Continue button.
•If this is Chrome, click the Proceed Anyway button.
This brings you to the login screen like this example:
5
Login: admin
Password: admin
NOTE: We highly recommend that you change the login and password for the
system administrator account as part of the configuring of your new
appliance.
6. Press Sign in.
The home page appears like this example:
7. From the Setup section in the upper right corner, click Settings then System Settings.
8. Make changes as required to the language displayed as well as the token expiration
time and the password strength, as required.
9. From the Setup section, click Appliance.
The Appliance page appears like this example:
10. Enter a Name, Host Name, Domain Name, and any other values you need to set.
If you need to change any other fields, they include:
NameEnter a descriptive name for this appliance.
System NameThis read-only field designates the name of the entire Access
Control Manager system.
6
Host NameThis is the DNS name for this appliance and is identified as
such under the 'DNS Name' field on the Appliance Listing
page.
Domain NameEnter the domain name where this appliance resides.
Name ServerEnter the name of the domain server.
Time ServerEnter the time server connected to this appliance.
Time zoneFrom the drop-down pick list, specify the time zone where this
appliance resides.
Use Daylight Savings
Time
Enable Remote TCP/
IP Management
Enable SNMPClick this box to enable SNMP functionality for this appliance.
SNMP VersionFrom the pick list, select the version of SNMP being used for
SNMP ContactEnter the name of a contact that will oversee and collect
SNMP LocationEnter the location where the SNMP server resides.
Splunk URLEnter the URL where the Splunk application resides, if
Stored TransactionsEnter the maximum number of transactions that can be stored
Check this box to indicate that this appliance uses Daylight
Savings Time, when appropriate.
Check this box to indicate that this appliance can use remote
TCP/IP management. By default this feature is checked and
enabled, since the configuration or operator often needs to
access this appliance via the internet.
this appliance.
SNMP data.
appropriate.
on the appliance.
When the number of transactions exceeds this limit, new
transactions will start overwriting previously stored
transactions.
The default is 1,000,000 transactions.
Hardware TypeFrom the drop-down pick list, select the Access Control
Manager Appliance model. Available options are: Express,
Enterprise, and Virtual.
Web Server PortSpecify the port number that is used to connect the web
server to this appliance.
Service PortSpecify the port number that is used to access diagnostics
and service for this appliance.
Edge Listen PortSpecify the port number that accesses the listening feature on
this appliance for HID Edge panel communication.
Ldap Connect PortSpecify the port number that enables communications
between this appliance and other IP network-attached entities
using LDAP information service protocol.
This field is only applicable for LDAP devices.
Transactions Connect
Port
Specify the port number used for connecting to the Postgres
transaction database for ODBC connections.
7
Mercury Client PortSpecify the port number used to set the port you wish this
appliance to use in order to listen for IP client panel
connections.
Note: This must be the same port configured on all of the IP
Client panels that will connect to this appliance.
Mercury-Require TLSCheck this box, if required, to encrypt connections between
the appliance and the Mercury Panel.
Note: All IP client panels connecting to this appliance must be
configured for 'TLS Required' if this option is checked
SMTP ServerEnter the mailbox server for this system. This is the name of
the server that handles the transfer of email. This field and the
next four are required before email alerts can be sent
automatically in case of an alarm or event occurs.
SMTP PortEnter the name of the port that the Host uses to connect to the
SMTP Server.
SMTP Host NameEnter the name of the host used for SMTP traffic.
Use Start TLSCheck this box to indicate that this appliance uses Start TLS
cryptography to communicate with the SMTP server.
Use TLSCheck this box to indicate that this appliance uses generic
TLS cryptography to communicate with the SMTP server.
SMTP FromEnter the email address of the person or organization that
email will be from.
SMTP UserEnter the email addresses of persons or organizations to
which email alerts are sent in case of alarms.
SMTP PasswordEnter the password required to use the email server.
PartitionsFrom the window, click to highlight one or more partitions that
are assigned to this appliance.
Only those partitions previously defined for this system
appear in this window. If no partitions are defined for this
system, this field does not appear.
11. Click the button to save changes.
8
12. Click the button.
First click the Save
button then click
the Reboot
Appliance button.
EULA must be
completed before
you can install
the hardware
13. Once the appliance reboots, click the About tab.
The About page appears like the following example.
The essential information about this appliance, including the appliance license string
and key are displayed.
14. For initial setup, click the “View End User License Agreement Terms and Conditions”
link.
9
The Software Terms and Conditions form appears like this example:
15. Review the terms then enter the name of this company, the name of the administrator
or owner, and the title of the person whose name appears here, then click Back.
16. Reboot the appliance as explained in Step 10, then click Logout at the top of the page
to log out of the appliance.
17. Log in and click on Appliance.
The Appliance property sheet appears.
18. Click on the Ports tab.
The Ports page appears like this example:
19. Click on the Port-1 name.
The Port-1 edit page appears like this example:
20.At the ‘IP Address’ field, enter the selected static IP address.
This IP address should be in the range of your LAN. If needed, consult your IT
administrator for an appropriate address.
10
If you need to change any other values, they include:
Check the appropriate
boxes
All changes must be saved by pressing this button
before exiting a screen or changes will be lost
NameThis field contains the name of the Ethernet port. Initially, the name that
appears is the current or default name of the port; however, you can
enter a new name if you require.
Link StatusThis read-only field indicates whether the connection is currently up or
down.
IP AddressEnter the IP address for this port. If you aren't sure what the address is,
consult your IT administrator.
If you assign or change an IP address, make sure that any switches or
routers on the appliance's network recognize the changed address. To
do this, either reboot the appliance, or unplug the Ethernet cable, wait a
few seconds, then plug it back in
NetmaskSelect from the drop-down list the netmask required for addressing this
connection. The values are 0 - 32 bits where a 24-bit netmask is the
default value.
Network
Gateway
MAC AddressThis read-only field displays the MAC address for this field.
InstalledCheck this box to indicate that this Ethernet port is already connected to
Data rateThis read-only field specifies the current data rate detected for this
Enter the gateway address of this appliance.
a panel.
connection.
21. Save your changes, reboot the appliance, and log out.
22.Log into the appliance again and click on the Appliance link.
23.From the property sheet, click the Access tab.
The Access page appears like this example:
24.Place a check mark in each box you need under the ‘Installed’ column.
At present this means checking Mercury Security. This enables the appliance to allow
for the configuration of the Mercury Field hardware devices.
25.Click to save your changes.
26.Connect the appliance to the network in this manner:
11
a.Remove the crossover cable and move the appliance to its required position in the
Express
Enterprise
system.
b.Using a standard Ethernet cable, connect one end of the RJ-45 to an available RJ-
45 port on the appliance.
c.Connect the other end of the Ethernet cable to the network.
If this is a Virtual appliance, ignored this step.
NOTE: Access Control Manager only supports connectivity to Mercury controllers through IP.
Serial connectivity to these panels is not currently supported.
12
Panels
2
After setting up the appliance, your next step is to configure the panels to which this appliance is
connected. For this document, we are only interested in Mercury Security panels.
To configure Mercury Security panels:
1. From the icon task bar of the home page, click on Physical Access then click on Panels.
2. Click the button to add a panel.
The Panel Add page appears like this example:
3. Assign the new panel a name, choose an appliance, and select Mercury for vendor
type.
New fields appear like this example:
4. Place a check mark in the ‘Installed’ checkbox.
5. At the ‘Model’ pick list, select your panel model then choose your time zone.
While Mercury panels appear in this list, you can also configure Lenel panels. A table of
equivalency is shown below:
LenelMercury
LNL-500SCP-C
LNL-1000SCP-2
LNL-2000SCP-E
LNL-2200EP1502
LNL-3300EP2500
LNL-2210EP1501
LNL-1100MR16in
LNL-1200MR16out
13
LenelMercury
LNL-1300MR50
LNL-1320MR52
—MR51e
6. Leave the rest of the fields at their default settings and click to save your
settings.
The Sub-panels page appears like this example:
7. Choose the appropriate quantity of downstream panels attached to this master panel.
8. Click to save your settings.
The Panel Configure page appears like this example:
9. Make changes, if required, and click to save your settings.
The fields on this page include:
NameEnter a unique name that identifies the panel.Duplicate
names are not allowed.
Physical
Location
ApplianceThis read-only field displays the panel model to which the
VendorThe read-only field has the Mercury Security option selected
InstalledCheck this box to indicate that this panel is communicating
Enter a description of the location of this panel.
subpanel is connected.
from the drop-down list.
with the appliance.
14
PartitionsFrom the window, select one or more partitions to which this
panel will be assigned.
Only those partitions presently defined by this system appear
in this list.
ModelThis read-only field displays the Panel model to which the sub
panel is connected.
Time zoneIdentifies which time zone applicable to the panel.Select the
time zone from the drop-down list. Only those time zones
previously defined for this system can appear in this list.
Allocate space for:
CredentialsDefines the amount of credentials that can be in the
panel.Enter a number between 0 and 100,000 where the
default value is 10,000.
The more credentials you designate, the less room there will
be for events.
EventsDefines how many events to buffer in the panel.Enter a
number between 0 and 5,000 where the default value is
5,000.
The more events you designate, the less room there will be for
credentials.
DB VersionThis read-only field indicates the version of the Access Control
Manager database currently used by this panel.
10. Click on the Host tab and configure the host communication settings.
11. Enter the primary IP address for the panel.
Leave the rest of the settings as default. However, if you need to change any of them,
the fields on this page include:
NameIdentities the name of the present panel.
ApplianceRead-only field that Identities the name of the selected
appliance.
InstalledCheck this box to indicate that the panel is currently running
and the application can begin to poll it.
15
PartitionsFrom the window, select one or more partitions to which this
Click this button
panel will be assigned.
Only those partitions presently defined by this system appear
in this list.
IP AddressEnter the IP address of this panel.
Reply TimeoutFrom the list, select the number of milliseconds this panel is
allowed to wait for a reply from the primary Access Control
Manager host.
Offline TimeoutFrom the list, select the number of milliseconds this panel can
remain offline (disconnected from the host) before the panel
attempts to contact an alternative host, if one exists.
RetriesFrom the list, select the number of retries allowed before this
panel stops polling the host and attempts to connect the
alternative host, if one is configured.
Poll DelayDefines the number of milliseconds it is required for the panel
to wait between polls.
12. Click to save your settings.
Once the previous settings have been saved, the system returns to the Panels Listing
page. You should see that the panel you created is online.
13. Click on the Panel name to get to Panel Edit screen with the Panel Status page displays.
14. On the Status page, click on the Firmware button like this example:
16
The Firmware listing like this example:
Click this button
15. Locate the firmware for the panel you installed and configured, then click the green
check mark to download the firmware to the panel.
NOTE: For instructions on copying firmware to your host computer, refer to the
Access Control Manager online help.
The system asks you to confirm that you want to download the firmware to the panel.
16. Click Ye s .
The firmware is installed. This takes approximately five minutes.
17. Once the firmware is installed, click the Reset/Download button and allow one minute
for the panel to reset and an additional two minutes for the parameters and tokens to
download.
Panel Add Summary
To summarize the panel configuration process:
1. Add the Panel and configure required settings
2. Once installed go to the status screen for the panel and install the latest firmware
(approximately five minutes).
3. Once the firmware is installed click the reset button and allow 1 minute for the panel to
reset.
4. After the panel has completed resetting, click the download parameters button and
allow the parameters to download which takes approximately two minutes.
5. After the parameters are completed downloading click the download tokens button.
17
6. Proceed to add Areas (page 19).
If you do not require areas in order to define the doors, you can skip Areas and go
directly to Doors (page 21).
18
Areas
3
Areas are zones the Access Control Manager assigns to define a physical area within a secured
location. This area can be relatively small, like a lab or a store room, or large, like a collection of
buildings. Areas often incorporate one or more doors with their attached inputs and outputs. Once
an area is defined, it can be assigned to a role or policy indicating that portion of a facility or
company to which assigned users are limited.
For example, a scientist works in an area designated as Laboratory A. As long as he accesses
doors leading into or exiting that area, he is granted access. But if he attempts to enter an area
designated as Administrative A, he is denied access.
To define an area:
1. From the icon task bar on the home page, click or mouse-over Physical Access.
The Physical Access main page appears.
2. Click the Areas submenu option.
The Areas Listing page appears like this example:
3. Click the button.
The Area Add page appears like this example:
4. Fill in the fields as required.
19
These fields include:
ApplianceFrom the drop-down pick list, select one of the existing
appliances in which this area appears.
Only those appliances currently defined for this system appear in
this list.
NameEnter the name of this area
Maximum
Occupancy
Log Min ReachedRecord a transaction when the minimum count for this area is
Log Max ReachedRecord a transaction when the maximum count for this area is
Enable AreaCheck this box to enable use of this area definition.
2-Person ControlCheck this box to indicate a two-person rule is imposed for this
PartitionsSelect one or more partitions from the partitions list. This includes
Enter the maximum number of cardholders allowed in this area at
a specified time.
reached.
reached.
area.
When checked, two or more people must be in the area at times
when occupied. When the area is empty, two valid cardholders
must present their credentials to the entry reader before entry is
granted. Once occupied by two or more people, individual
access can be granted. The same rules apply for exit until two
cardholders are left in the area; at this point, both cardholders
must present their credentials and exit the area together.
those partitions in this area definition.
Only those partitions currently defined for this system appear in
this list.
5. Click to save these values.
A message appears “Area was successfully created” and the Areas Listing page
reappears with the newly added area on the list.
20
Doors
4
After you have configured both the appliance and the panels it controls, it is time to create and
configure each door associated with the created panels.
To create and configure doors:
1. From the icon task bar on the home page, click Physical Access.
2. Click Doors.
The Doors Listing page appears like this example:
3. Click the button.
The Door Add screen appears like this example:
4. Enter the following information:
• Door Name
• An Alternate name (optional)
• Location (optional)
5. From the ‘Appliance’ pick list, select the appliance to which this door is connected.
6. From the ‘Vendor’ pick list, select the vendor.
In this case, you should select Mercury Security.
21
The Door Add page expands to include basic door configuration values, like the
following example:
The fields on this page include:
NameEnter the name of this panel.
PartitionsFrom the window, select the partitions to which this door
should be added.
Only those partitions currently defined by the system appear
in this window.
Alt NameEnter a description of this panel, such as 'front door' or 'lab
door'.
AddressThis is a display-only field that is generated by the Access
Control Manager.
LocationEnter the location of this door.
ApplianceFrom the drop-down pick list, select a appliance to which this
door is connected.Only those appliances previously defined
by this system appear on this list.
PanelSpecifies the panel to which the door is to be assigned. Select
one of the previously defined panel from the drop-down list.
Ven dorSelect the appropriate door manufacturer from the drop-down
list.
Currently, the only option is Mercury Security.
InstalledCheck this box to indicate that this door is communicating with
the panel.
Access TypeSelect the Access Type from the drop-down list.
Note: If the access type is a paired door (paired master or paired
slave), the Door Add page re-displays with the additional
field, Paired Door. Select the Paired Door option from the
drop-down list.
Door ModeSpecifies the entry mode for the door when online with the
host. Select the Door Mode option from the drop-down list.
22
Offline ModeSpecifies the entry mode used for the door if the door
controller is no longer communicating with the panel.
Note: In many cases, the limited memory of most readers in offline
mode requires a very simple solution to entry or exit, such as
use of a facility code.
Select the Offline Mode option from the drop-down list.
Custom modeFrom the drop-down list, select the special mode to use during
a time zone specified in the 'Custom Schedule' field. For
example, during normal working hours, it might only be
necessary to use a card only entry at a particular door,
whereas after midnight, you would enforce PIN code and card.
Custom
Schedule
Mask Forced
During
Mask Held
During
Always Mask
Forced
Always Mask
Held
Door Processing Attributes
Log Grants Right
Away
From the drop-down list, select the interval during which the
custom mode specified above is activated. Only those time
zones previously defined for this system appear in this list.
From the drop-down list, select the time during which this door
is masked even when a forced open condition is detected.
Only those schedules previously defined for this system
appear in this list.
From the drop-down list, select the time during which Door
Held Open alarms from this door will be masked. Only those
schedules previously defined for this system appear in this list.
From the drop-down box, select TRUE to specify that Door
Forced Open alarms at this door are always masked. Normally,
this box is blank.
From the drop-down box, select TRUE to specify that Door
Held Open alarms at this door are always masked. Normally,
this box is blank.
When this box is checked, the system logs an extra event as
soon as there is a grant (that is, before entry / no entry is
determined). This event is not turned into a Access Control
Manager event. Check this box in order to initiate local I/O in
the panel using the panel triggers.
Certain customers may have a trigger they want to fire (to
execute a macro) as soon as there is a grant, but before entry
/ no entry is determined.
Deny DuressIf a user indicates duress at a door, checking this box denies
access.
Don't Pulse Door
Strike on REX
Require Two
Card Control
Check this box to disable the pulse of the door strike output
when the request-to-exit button is pressed.This can be used
to effect a 'quiet' exit. If this box is not checked, the output is
pulsed.
Check this box to specify that two tokens are required to open
this door. This enforces two-person rule at a specified door.
23
Door Forced
Filter
Check this box to enable the filter feature for door forced
alarms. There are instances when a door is either slow to
close or is slammed shut and bounces open for a few
seconds. With this filter, the monitor allows three seconds for a
door to close before issuing an alarm.
Log All Access as
Used
Detailed EventsCheck this box to generate detailed events of all hardware at
Enable Cipher
Mode
Use Shunt RelayCheck this box to enable the use of a shunt relay for this door.
Do Not Log Rex
Tra nsactions
Check this box to log all access grant transactions as if the
person used the door. If this box is not checked, the door
determines if it was opened and will distinguish if the door was
used or not used for grant.
the door including door position masking, timer expirations
and output status. Typically, five to ten detailed transactions
will be generated for each grant transactions. During the
normal course of operation, most guards don't need to see
extensive reports on events; however, after hours, it is often
useful to see every detail.
Check this box to enable cipher mode. Cipher mode allows
the operator to enter card number digits at the door’s keypad.
Check this box to indicate that return-to-exit transactions are
not logged by the system.
7. Choose the following for basic door configurations values:
• Access Type: Single
• Door Mode: Card Only
• Offline Mode: Facility Code Only
• Unlock During: Never Active
8. In the ‘Door Processing Attributes’ section, choose the appropriate settings.
9. Click to save your settings.
The Operations page appears like this example:
The fields on this page include:
NameIdentifies the door.Enter a unique name that identifies the door.
24
Alt NameIdentifies an alternate name for the door. If there is an additional
name the door is identified by, enter this alternate name.
LocationIdentifies the location of the door.Enter a description of the door’s
location.
ApplianceIdentifies the appliance of the door.This is a display only field when
in edit mode.
VendorIdentifies the vendor of the door.This is a display only field when in
edit mode.
InstalledCheck this box to indicate that this door is currently connected and
communicating with the panel and appliance.
PartitionsFrom the window, select the partitions to which this door should be
added.
Only those partitions currently defined by the system appear in this
window.
PanelSpecifies the panel the door is assigned to. This is a display only
field when editing the hardware (the panel can be changed when
editing the door operations).
APB ModeIndicates the anti-passback mode for the door. Select the APB
Mode from the drop-down list. The available options are:
No Selection – The specified door is not involved in APB at all.
Grants do not take APB into consideration at all.
Soft area APB – The specified door should have an area entering
and area leaving configured for it.
Hard area APB – The specified door should have an area entering
and area leaving configured for it.
Door-based timed APB – The specified door should not have an
area entering or area leaving configured for it. There should be a
timeout value configured for the door (a value entered in the 'APB
Delay' field).
Token-based timed APB – The specified door should not have an
area entering or area leaving configured for it. There should be a
timeout value configured for the door (a value entered in the 'APB
Delay' field).
Timed area APB – The specified door should have an area
entering, area leaving, and timeout configured for it.
APB DelaySpecifies the number of seconds before another entry is allowed.
Enter the number of seconds.
Area EnteringIdentifies the area the user enters when entering through the door.
If no area is specified, any location is valid. Select the area from the
drop-down list. Only those areas currently defined for this system
appear in this list.
Area LeavingIdentifies the area the user moves into when exiting the door.
Select the area from the drop-down list.In addition to the Don't
Care option, only those areas currently defined for this system
appear in this list.
25
Strike ModeDefines when a door should unlock. Specifies if the strike is
deactivated when the door is opened, when the door is closed, or
when the strike timer expires. Select the strike mode from the
drop-down list.
Cut short when open – the strike is deactivated on open
Turn off on close – the strike is deactivated on close.
LED ModeSpecifies how the reader LEDs are to be displayed. Select the LED
mode from the drop-down list.
Your choice is 1, 2, or 3.
Held Pre-AlarmSpecifies the number of seconds before the held open alarm is
generated. Once the number of seconds is reached, a transaction
will be generated which can be used to activate a warning signal.
Enter the number of seconds.
Access time
when open
Standard
Access time
Held OpenSpecifies the number of seconds before the held open door event
Extended
Access
Extended HeldSpecifies the number of seconds before the held open door event
Card FormatsSpecifies card formats compatible with the reader at the door.
Specifies the minimum number of seconds the strike will be
activated. Enter the number of seconds.
Specifies the standard number of seconds the strike will be
activated. Enter the number of seconds. If the door is not opened
within this interval, the door is automatically locked.
is generated. Enter the number of seconds.
Specifies the strike time for a door configured for persons that
require more time to enter. For example, persons covered under
the Americans with Disabilities Act may require extended access.
Enter the number of seconds.
is generated for tokens marked with extended access. Enter the
number of seconds.
10. Configure these door attributes as required:
•Anti-passback settings
• PIN attributes
•Strike Mode
• Access times
• Card format settings
Other fields on this screen, such as the ‘Simple Macros’ section, represent advanced
functions and should be consulted in the Access Control Manager Online Help.
11. Click to save these values.
26
The Hardware page appears like this example:
The fields on this page include:
If a sub-panel has been assigned as the option for any of the following
fields then saved, the edit sub-panel icon, , will appear as shown in
this example:
Click the icon to edit the sub-panel associated with the currently
displayed option.
There are three screens that can appear:
• If you click at the 'Reader' or 'Alt Reader' pick list, a subpanel reader edit page can appear.
• If you click at the 'Door POS' or the two 'REX' pick lists, a
sub-panel door edit page can appear.
• If you click at the 'Strike' pick list, a sub-panel output edit
page can appear.
ReaderSelect the reader you require from the drop-down list. This identifies the
subpanel and port number connected to the primary reader.
If you select a sub-panel, the appears to the right of this selection.
Click to bring up the edit page for this option.
Door POSSelect the option you require from the drop-down list. This identifies
the subpanel and input number connected to the door position switch.
If you select a sub-panel, the appears to the right of this selection.
Click to bring up the edit page for this option.
StrikeSelect the option you require from the drop-down list. This identifies the
subpanel and output number connected to the door strike.
If you select a sub-panel, the appears to the right of this selection.
Click to bring up the edit page for this option.
27
Alt ReaderSelect the option you require from the drop-down list. This identifies the
Click on the
appropriate button to
bring up the settings
for the specified input/
subpanel and reader number of a secondary reader. A secondary
reader is typically used for the secure side door or a biometric.
If you select a sub-panel, the appears to the right of this selection.
Click to bring up the edit page for this option.
REX #1Select the option you require from the drop-down list. This identifies the
subpanel and input number connected to the first request-to-exit switch.
If you select a sub-panel, the appears to the right of this selection.
Click to bring up the edit page for this option.
REX #2Select the option you require from the drop-down list. This identifies the
subpanel and output number connected to the second request-to-exit
switch.
If you select a sub-panel, the appears to the right of this selection.
Click to bring up the edit page for this option.
12. On this page, you can configure these door attributes:
• Reader (entry and/or exit)
• REX (Request-to-exit button or bar)
• Door Contact
•Strike
If you have made selections in any of the six bottom fields, notice the pencil/edit icon,
, to the right of the Reader, Alt Reader, Door POS, Rex, and Strike pick lists.
This edit icon enables you to bring up and edit the properties for the specified device
as shown in this door example:
For more on the fields each of these pages contains, refer to the Access Control
Manager online help.
13. Click to save these settings.
28
The Interlocks page appears like this example:
Interlocks allow you to configure inputs and outputs connected to this door.
NOTE: For more on interlocks, refer to the Access Control Manager online help.
14. Click the Cameras tab.
The Cameras page appears like this example:
The fields on this page include:
Camera TypeFrom the drop-down list, select the type of camera you want to add.
You can currently select from these options:
• Network
• Exacq camera server
• Pelco camera server
• Avigilon server
• Salient server
• Milestone server
The ‘Available’ window is populated with those cameras that fit this
definition.
AvailableFrom the window, select one or more cameras that are connected to
this door then click . The camera(s) are transferred to the
Members window.
Only those cameras previously connected to and configured for this
system's network can appear in this window.
MembersThis window displays all cameras previously added to this door
definition.
15. Proceed to additional pages as required.
•The Interlocks page provides a means to trigger this door using an alarm or event
from another part of the system.
29
•The Access page is a quick reference by door to show what access groups, roles
and identities have access to that door.
•The Events page provides a record of both local and global events this door has
detected.
•The Transactions page displays a list of all transactions that have included use of
this door.
For more on all these functions, refer to the online help.
16. When you’ve finished entering all relevant values on the required pages, click
to save these settings.
Perform this same step-wise procedure for each door you need to define for this panel.
30
EOL Resistance
5
Normal
Advanced
End-of-line resistance refers to resistance levels that must be maintained for input points. Input
devices used with doors from vendors, such as Mercury Security, measure resistance, in ohms, on
the circuit. This corresponds to a steady state. If the resistance drops across the circuit, an alarm is
sent back to the Access Control Manager.
To define a resistance level:
1. From the icon task bar on the home page, click Physical Access.
2. From the sub-options list, click EOL Resistance.
3. The EOL Resistance Listing page appears like this example:
4. Click one of the add buttons.
• If this is a normal circuit, use the Normal button.
• If this is a complex circuit, use the Advanced button.
The appropriate EOL Resistance Add page appears like these examples:
5. Enter information on this page as required.
These fields include:
NameEnter the name you want to give this input point.
AddressSelect from the drop-down list the address you want to assign this
input point.
Normal EOL Resistance
Inactive RangeSelect from the drop-down list the beginning value of the inactive
range.
Values range from 100 to 9950 ohms in 50-ohm increments.
31
to:Select from the drop-down list the ending value of the inactive
range.
Values range from 100 to 9950 ohms in 50-ohm increments.
Active RangeSelect from the drop-down list the beginning value of the active
range.
Values range from 100 to 9950 ohms in 50-ohm increments.
to:Select from the drop-down list the ending value of the active range.
Values range from 100 to 9950 ohms in 50-ohm increments.
Advanced EOL Resistance
PrioritySelect from the drop-down list the priority level for this input point.
The options are Low, Medium, and High.
StatusSelect from the drop-down list the input state you are defining. The
possible values are:
• Inactive
• Active
• Ground Fault
• Shorted
•Open
• Foreign
• Non-settling
Low rangeSelect from the drop-down list the beginning value of the low range.
High rangeSelect from the drop-down list the beginning value of the high
range.
6. When you're finished, click .
The EOL Resistance Listing page reappears with the newly defined option listed.
32
Schedules
6
A schedule is a time period defined for use by the system. It is an editable, reusable time template
that can be used to control such things as when a door is accessible or when a device is activated.
A user’s access privileges are the result of a three-way relationship that is created between a
•group of users
•secured device
•schedule
To create a new schedule:
1. From the Setup Links section of the home page, select Settings.
The Schedule Listing page appears like this example:
By default only the ‘24-Hour Active’ and ‘Never Active’ options appear. These are the
only options that cannot be changed or deleted.
2. Click the button.
The Schedule Add page appears like this example:
3. Enter information as required.
The available fields include:
NameEnter the name of the schedule.
Enter a brief, meaningful name for the schedule, such as “Graveyard
Shift”.
33
Mode Select the mode from the drop-down list. The options include:
ON – turns the current schedule on
OFF– turns the current schedule off
SCAN– runs the schedule using its current set of parameters
PartitionsSelect one or more existing partitions to which you want this
schedule assigned.
Only those partitions currently defined for this system appear in this
window.
Su - SaSpecify the days of the week that the schedule is active. Check the
boxes for each day the schedule is active.
1 - 8Specify the types of holidays for which the schedule is active.
The holiday type is a number, 1-8, where the number’s significance is
user-defined (up to eight holiday types such as government, cultural,
and company can be defined). Check the boxes for each type of
holiday for which the schedule is active.
ActiveSpecify the start time for the schedule.
Enter a start time using 24-hour clock format (for example, 1:00 p.m. is
13:00 in the 24-hour clock format).
InactiveSpecify the end time for the schedule.
Enter an end time using 24-hour clock format (for example, 1:00 p.m.
is 13:00 in the 24-hour clock format).
4. When you are finished, click the button.
If the schedule addition is successful, the Schedule Listing page appears the new
schedule listed and the confirmation message, “Time zone successfully updated” is
displayed.
34
Holidays
7
Holidays are those days during the year when normal security policy may not be followed, either
because it is a vacation or because a different entry and exit pattern is observed. Such days as
Christmas and New Year's Day are examples of holidays.
To add a new holiday:
1. From the Setups section of the home page, click or mouse-over the Settings option.
2. From the drop-down option list, click the Holidays sub-option.
The Holiday Listing page appears like this example:
By default, no vacations appear in this list initially.
3. Click on the button.
The Holiday Add page appears like the following example:
4. Enter information about the holiday as required.
The available fields include:
NameIdentifies the holiday.
Enter a brief, meaningful name for the holiday, such as “Labor Day.”
DateIdentifies the first date of the holiday.
Enter MM/DD/YYYY or click on the field to open a pop-up calendar and
select the date on which the holiday starts.
Additional DaysIdentities the additional consecutive days this holiday is active. A
setting of 0 indicates that the holiday is on for the single specified day
only.
Enter the number of consecutive days for this holiday.
35
PartitionsFrom the window, select one or more partitions to which you want to
assign this holiday.
Only those partitions previously defined for this system appear in this
window. If no partitions are defined for this system, this field does not
appear.
TypeIdentifies the type of holiday.
The holiday type is a number from 1 to 8. This number is user-defined.
For example, security might define 1 as government, 2 as cultural, and 3
as company.
Enter a value from 1 – 8.
5. When you're finished, click the button.
The Holiday Listing page reappears with the new holiday listed and the confirmation
message “Holiday was successfully created” displayed.
36
Policies
Policies are limits that can be imposed on people and security devices within the Access Control
Manager system. A policy is an aggregation of pre-selected hardware and software components
that can be applied to groups, and through those groups, assign them to persons.
For example, you can define a 'Technician' policy which restricts anyone who is a member of that
policy to specific doors and areas associated with the company's laboratories.
To bring up the policy module, click on the Policies icon from the main icon menu bar.
To create one or more policies:
1. From the icon task bar on the home page, select Policies.
The Policy Listing page appears like this example:
2. Click the button.
The Policy Add page appears like this example:
3. Enter information about the group as follows.
The fields on this page include:
Group PolicyIdentifies the name of the group.
PartitionIf required, select an existing partition from this pick list. Only
those people assigned this partition can use this policy.
Only those partitions that are currently defined for this system
appear in this list.
InstalledCheck this box to indicate that this policy is online and ready to
be used.
DoorCheck this box to indicate that this policy affects panels.
A Mercury page is added to this property sheet.
InputCheck this box to indicate that this policy affects inputs.
An input page is added to this property sheet.
37
OutputCheck this box to indicate that this policy affects outputs.
An output page is added to this property sheet.
4. Click the button.
The confirmation message, “Policy was successfully created.” displayed.
The Policy properties edit screen appears like this example:
Only those components you select on the policy page (plus the Mercury page) are
represented on this screen.
5. Click each page in turn and make changes to that page as required.
For information on using the fields on other pages of this property sheet, refer to the
Access Control Manager online help.
6. Click the button to save your changes and move to the next page.
7. When you’re finished, click the button to return to the listing page.
38
Groups
8
Groups combine one or more existing policies with the members (identities) who can use them.
In order to create a group, you must first create one or more policies and one or more identities
with which these policies are associated.
Policies can also be assigned to people through the Identities assignment feature.
In addition, the groups feature enables the operator to perform batch updates on groups
associated with a particular identity profile.
NOTE: Groups should not be confused with Access Groups or Routing Groups which are
concepts in Access Control Manager associated with Roles.
To create one or more groups:
1. From the icon task bar on the home page, click or mouse-over Policies.
The Policy Listing page appears.
2. From the sub-options bar, click Groups.
The Group Listing page appears like this example:
3. Click the button.
The Group Add page appears like this example:
4. Enter information about the group as follows.
The fields on this page include:
NameIdentifies the name of the group.
PartitionsIf required, select one or more existing partitions from this pick list.
Only those people assigned these partitions can use this group.
Only those partitions that are currently defined for this system
appear in this list. If no partition is defined for this system, this field
does not appear.
PoliciesIf relevant, this field displays the policies associated with this group.
MembersIf relevant, this field displays the members associated with this
policy group.
39
5. Click the button.
The confirmation message, “Group was successfully created.” displayed.
The Group properties edit screen appears like this example:
6. Click the Policies tab.
The Policies page appears like this example:
7. Assign policies to the newly created group as needed.
8. Click the button to save your changes.
9. Click the Members tab and the Member page appears like this example:
10. Assign members as required to the newly created group.
11. Click the button to save your changes.
12. If needed, click the Audit tab.
The Audit page appears like this example:
13. Review the audit history of this group.
14. Click the button to save your changes then click the button
to return to the listing page.
40
Card Formats
9
Readers that control access to and exit from doors come in many varieties and use many different
card protocols. The most commonly used card formats have been Wiegand and magnetic stripe;
however, newer cards, using embedded chips, like Smart Cards, and proprietary formats have
become more popular with the increase of security requirements.
The Access Control Manager supports the most popular card formats and enables the qualified
configurator or operator to define custom card formats to meet the requirements of many
businesses and governmental entities. The standard 26-bit Wiegand card format is provided as a
default setting.
To define additional card formats:
1. From the icon task bar on the home page, click or mouse-over the Physical Access
option.
The available suboptions are displayed.
2. From the sub-options list, click Card Format.
The Card Formats Listing page appears.
3. Click .
The Card Format Add page appears as shown in this example:
4. Fill in this page as required.
These fields include:
NameThe name of this card format
Card Format TypeFrom the drop-down list, select the card format type. The current
options are:
• Wiegand
•ABA Mag
The fields displayed below this change depending on which type
is selected.
Facility CodeThe facility code of this card format.
41
OffsetThe offset number for this code.
Max DigitsThe maximum number of digits this card format can possess.
Min DigitsThe minimum number of digits this card format can possess. ABA
Mag only.
Even Parity
Length
Event Parity
Location
Odd Parity LengthThe length of the odd parity bits on this card format. Wiegand
Odd Parity
Location
Facility Code
Length
Facility Code
Location
Card Number
Length
Card Number
Location
Issue Level LengthThe length of the issue level number in the number string.
Issue Level
Location
Step parity by 2Check this box to indicate that the parity must be stepped by 2.
The even parity length of the number on this card format.
Wiegand only.
The locationin the number string where the even parity bits
reside. Wiegand only.
only.
The locationin the number string where the odd parity bits reside.
Wiegand only.
The length of the facility code in digits.
The location in the number string where the facility code resides.
The total length of the card number on this card.
The location of the card number in the number string.
The location of the issue level number in the number string.
Wiegand only.
Suppress facility
check
Corporate card
mode
Enable 37 bit
parity w/4
Enable 37 bit
parity w/2
Enable 75 bit
transparent mode
Reverse card
format
Check this box to ignore a facility check. This operation will not be
performed.
Check this box to enable use of the corporate card format.
Check this box to enable 37-bit parity by 4. Wiegand only.
Check this box to enable 37-bit parity by 2. Wiegand only.
Check this box to enable 78-bit transparent mode.Wiegand only.
Check this box to enable reverse card format.Wiegand only.
5. When you're finished, click .
The Card Formats Listing page reappears with the new card format displayed.
42
Once you have defined a card format, the format appears on the Door Operators page as a card
format option, as shown in this example:
43
Event Types
10
Event Type Add PageEvent Type Edit Page
Event types are classifications of events that may occur during the operation of the Access Control
Manager system. Event types are associated with specific event sources, such as doors, panels,
and systems.
NOTE: Particularly for initial installation, you can accept the default event types.
To add or change event types:
1. From the Setup Links section of the home page, click or mouse-over the Settings
option.
2. From the available sub-options, select Event Types.
The Event Types Listing page appears like this example:
3. Do one of these:
• To add a new event type, click the button.
• To edit an existing event type, click the event name.
The Add Event Type or Edit Event Type screen appears like this example:
4. Make changes to these fields as required.
44
These fields include:
NameIdentifies the event type.Enter a brief, meaningful name for the
event type, such as “Door Held Open”.
Suppress
Schedule
PrioritySpecifies the alarm priority number. The Alarm Monitor stacks alarms
MaskedCheck this box to indicate that this event type is masked.
LoggedCheck this box to indicate that this event type is logged.
AlarmCheck this box to indicate that this event type is alarmed.
Send Email toIf this event type occurs, enter the email address to which an alert is
InstructionsIf this event type occurs, enter instructions you require the qualified
PartitionsIf required, select one or more existing partitions from this pick list.
Pick from the drop-down list a schedule that is suppressed when this
event type is triggered.
Only those schedules currently defined for this system appear in this
list.
on the screen according to their priority. Priority 1 alarms appear at
the top of the screen, priority 2 alarms appear below the priority
alarms, and so on.
The possible values are 1 - 99.
sent.
operator to follow.
These instructions are displayed in the alarm window.
Only those people assigned these partitions can view this event type.
Only those partitions that are currently defined for this system appear
in this list. If no partition is defined for this system, this field does not
appear.
5. When you're finished, click .
The Event Types Listing page reappears with a message saying the event was successfully
changed.
45
Events
11
Events include all messages and alarms issued by specific devices within the Access Control
Manager system. Events are categorized by Event Types within Access Control Manager. Both
events and event types can be modified or added as required for a specific installation.
NOTE: Particularly for initial installation, you can accept the default events.
All available events are provided by default. You cannot create additional events; however, you
can edit existing events.
To change one or more events:
1. From the icon task bar of the home page, click the Physical Access option.
The Physical Access Listing page appears.
2. From the available sub-options, click the Events sub-option.
The Events Listing page appears like this example:
3. To edit an existing event, click the event name.
46
The Edit Event screen appears like this example:
4. Make changes to these fields as required.
These fields include:
NameEnter a name for this event.
ReturnEnter a name for the return-to-normal (RTN) event.
Event TypeSelect from the drop-down list the event type for this event.
Only those event types current defined for this system appear in this
list.
Source TypeSelect from the drop-down list the device where this event originates.
PrioritySpecify the priority of this event. The Alarm Monitor stacks alarms on
the screen
according to their priority. Priority 1 alarms appear at the top of the
screen, priority 2 alarms appear below the priority alarms, and so on.
The priority range is 0 - 99.
Suppress TimeFrom the drop-down list, select the time period during which this
event is not reported.
Only those time periods currently defined for this system appear in
this list.
InstructionsType instructions for handling this event. These instructions will
appear on the operator's panel whenever this event occurs.
EmailEnter the email addresses of all those people who should be notified
when this event occurs.
You can enter more than one email address
Return EventSelect from the drop-down list the event type for this RTN event.
Only those event types current defined for this system appear in this
list.
Return PriorityEnter the priority number of this event.
The priority range is 0 - 99.
Has on/offCheck this box to indicate that this event is a toggle, involving an on/
off switch logic.
47
MaskedCheck this box to indicate that this a masked event.
LoggedCheck this box to log the event.
Show VideoCheck this box to auto-launch video camera feed on alarm.
This feature only works if video is enabled.
Two Persons
Required To
Clear
Roles
AvailableThis window lists all roles available for this event.
MembersThis window lists all roles that have been associated with this event.
Check this box to specify that two people are required to
acknowledge and clear this event.
If this box is checked then the operator that executes the clear cannot
be the same operator that executed the Acknowledge.If the same
operator attempts to clear the alarm then an error message will be
presented to the operator.If an operator is clearing a batch of alarms
then those that they may clear will be cleared and those that they
cannot clear will not be cleared.
From the list of available roles, select those roles which are
associated with this event and move them to the Members window.
To move one or more roles to the Members window, click to select
one role, Ctrl + click to select a non-consecutive group of roles, or
Shift + click to select a consecutive roles then click the button.
If this event is associated with a role, then any user trying to clear this
event must be included in this window. If the user is clearing more
than one alarm then those alarms for which they have permission will
be cleared and those for which they do not have permission will not
be cleared.
5. When you're finished, click .
The Events Listing page reappears with a message saying the event was successfully
changed.
48
Roles
12
Roles limit or regulate the number of tasks that a specific user can perform within the Access
Control Manager system. That is, use the Roles feature to associate a user with one or more
application tasks. If a user tries to perform a task, such as generating reports, for which their role
does not qualify them, the feature is not available to them.
To access this feature:
1. From the icon task bar on the home page, click the Roles option.
The Roles main screen appears with the Roles Listing page uppermost like this
example:
2. From the Roles Listing Page, click the button.
The Role Add page appears like this example:
3. Enter information about the role as required.
The fields on this page include:
NameIdentifies the name of the role.
ParentFrom the drop-down list, select a role that is the parent to this role. If
this is the parent role, leave this field blank. Only those roles
previously defined for this system appear in this list.
Start DateSpecify the date on which this role takes effect.
Enter MM/DD/YYYY or click in the field to open a pop-up calendar
to select the date on which this role begins.
Stop DateSpecify the date on which this role becomes inoperative.
Enter MM/DD/YYYY or click in the field to open a pop-up calendar
to select the date on which this role ends.
49
PartitionsClick to highlight those partitions you want to make members of this
role.
Only those partitions previously defined for this system appear in
this window. If no partitions are defined for this system, this field
does not appear.
InstalledCheck this box to indicate that this role is active and ready for use.
4. Click on the button.
Upon successfully adding a role, the Role Edit property screen appears like the
following example:
5. Click each of the remaining tabs in turn and move existing groups to the members
window as required for each of these pages:
• Click the Assign Grps tab to display the Access page and assign access groups.
• Click the Delegate tab to display the Delegate page and assign delegation groups.
• Click the Routing tab to display the Routing page and assign routing groups to this
role.
• Click the Asgn Roles tab to display the Assign Roles page and restrict which roles an
operator with a specified role can assign to others.
• Click the Access tab to display the Access page and review the access points
defined so far.
• Click the Audit tab to display and review the Audit History page.
6. When you're finished with this definition, click again. You are returned to the
Roles Listing page with the new role displayed.
For detailed instructions on using the fields and buttons on the Role Edit property screen, refer to
online help.
50
Access Groups
13
Before creating a role, we recommend that you define your required access groups. Access
Groups combine a schedule (time) with doors within the system. Access Groups define the doors
and times that can be accessed by a specified role.
To add one or more access groups:
1. From the icon task bar on the home page, click Roles.
The Roles Listing page appears.
2. From the sub-options bar, click Access Groups.
The Access Groups Listing page appears as shown in this example:
All currently defined access groups appear in this list.
3. Click .
The Access Group Add page appears like this example:
4. Enter the name for this new access group in the ‘Name:’ text field.
5. If necessary, from the ‘Appliance’ pick list, select one of the available appliances.
6. From the 'Schedule' pick list, enter the schedule option that currently fits this access
group.
Only those schedules previously defined for this system appear in this list.
7. When you're finished, click .
The Access Group edit page appears as shown in this example:
8. Enter all required additional information on the edit page.
51
This includes adding doors from the ‘Available’ window to the ‘Members’ window by
selecting the selected door, then click the icon.
9. Click the Access tab.
The Access page appears as shown in this example:
10. Review information as required.
11. If required, click the Audit tab.
The Audit page appears like this example:
12. Review the audit history on this page as needed.
13. When you're finished, click .
You are returned to the Access Groups Listing page with the newly-defined Access
Group listed.
Once you have defined all the access groups you require, associate these access groups with
delegation groups. For more on this, refer to Delegation Groups on page 53.
52
Delegation Groups
14
Delegation (permissions) authorizes certain persons or groups of persons within the Access
Control Manager database to perform predefined functions. In essence, this means that
delegation groups are associations of identities with assigned Access Control Manager features.
Before creating a role it is recommended that you determine the required delegations or
permissions for that role.
To add one or more delegation groups:
1. From the icon task bar on the home screen, click the Roles option.
The Roles main screen appears.
2. From the available sub-options, click Delegation.
The Delegation Groups Listing page appears like this example:
3. From the Delegation Groups Listing page, click .
The Delegation Group Add page appears like this example:
4. Enter the name of this delegation group.
5. If required, specify one or more partitions for this group.
If no partitions are required, go to Step 6.
6. Click .
53
The Delegation Groups Edit page appears like this example:
Move available features to
the ‘Members’ window as
required
7. Define this group by adding features in this manner:
a.In the ‘Available’ window, click to select a single function, click + Ctrl selects
multiple non-sequential functions, or click + Shift to select sequential functions.
If there are too many functions, use the Search section to enter a term that filters
the entries displayed in the 'Available' window then click to display the
resulting list.
b.With the functions highlighted in the Available window, click the button. The
selected functions are transferred to the Members window.
c.To move functions from the Members window back to the Available window, select
the functions in the same manner, then click the button. The selected functions
are returned to the Available window.
8. When you're finished, click .
You are returned to the Delegation Groups Listing page with a message indicating that
the group has been added successfully.
The new Delegation group appears in the list.
Once you have defined a delegation group, you can associate people or groups of people with it
by adding the delegation group to one or more roles. Once a role that includes this group is
created, you can then associate people or groups of people with this delegation group simply by
assigning the defined role to that person through the Identities feature.
For more on this, refer to Roles on page 49.
54
Partitions
15
Access Control Manager utilizes partitions to limit the access of operators, devices, and users to
only specified roles. This enables Access Control Manager to provide different levels of access to
almost any element of the system.
For example, say that only security guards are allowed to enter the Security Monitor room. All
security guards would then be assigned to the Security Guard partition and this partition could
then be assigned to a special Role that had access (through an access group) to that room.
To access this feature:
1. From the icon task bar on the home page, click the Roles icon.
The Roles main screen appears.
2. From the available sub-options, click Partitions.
The Partitions Listing page appears like this example:
3. Click .
The Partition Add page appears like this example:
4. Supply a name for this partition as required then click .
The Partition Edit page appears like this example:
Alternatively, you are returned to the Partitions Listing page and click on the newly
created partition to bring up the edit page.
5. Add to the ‘Members’ window from the ‘Available’ window by clicking one or more
names then click the button.
If there are more identities in the ‘Available’ window than can fit into the window, use
the Search field to narrow the list then click . (The Search criteria fields only
appear if there are more identities available than window space)
55
6. When, you're finished, click again.
You are returned to the Partitions Listing page with the newly-defined partition on the
list.
For more on this, refer to Roles on page 49.
56
Badge Designer
16
The Badge Designer is the utility the Access Control Manager uses to design badge templates for
inclusion in badge holder credentials.
The Designer consists of several features including:
•User-defined field definitions
•Background color selection for both badge and components
•Photo frame placement
•Text placement
•Logo and insignia placement
To create a badge template:
1. From the Setups section on the home page, click the Settings option.
The available menu sub-options drop down.
2. Click Badge Designer.
The Badge Template Listing page appears like this example:
3. Do one of these:
• To copy (clone) an existing badge template, click the duplicate icon, , to the right
of the badge template you want to copy. When the copy appears in the list, click on
it.
• To create a new badge template, click the icon.
57
The designated badge template add page appears like this example:
4. Enter a name for this badge template in the ‘Name’ field.
5. Specify the size of the badge you require in the ‘Size’ field.
6. If required, select one or more partitions this badge template is a member of.
Only those partitions previously defined for this system appear in this window.
7. Design the badge like this:
• To create a background, click the ‘BG Color’ field and specify a background for this
badge template. For more on this, refer to Changing a Background on page 59.
• To add one or more pictures, click the button and add pictures to this badge
template. For more on this, refer to Adding Pictures on page 60.
• To place database fields, click the button and place the required database
fields on this template. For more on this, refer to Adding Database Fields on
page 61.
• To place text, click the button and add text on this template. For more on this,
refer to Adding Text on page 62.
• To add graphics, click the button and place one or more graphics on this
template. For more on this, refer to Adding Graphics on page 64.
Make sure to save by clicking after each of these operations or your changes will
not be reflected on the canvas. The badge preview pane appears below the canvas.
8. If you need to delete an existing element from the badge template, click the button
to the right of the selected object.
The deleted object remains on the canvas until you click .
9. If you need to design a back side for this template, click and repeat Step 6 to
design the obverse side of this badge.
The back side will only print if you have a dual-side or duplex badge printer connected
to this appliance.
58
10. When you're finished customizing this template, click once again.
A message appears indicating the success of the badge template creation.
11. Click and you are returned to the Badge Template Listing page with the newly
defined badge template in the list.
Changing a Background
When you open a new badge template or edit an existing one, the canvas background like this
example appears:
To change the background:
1. Click on the ‘BG Color’ box.
The color palette appears.
2. From the HSV or RGB color fields, enter the general color you require.
All possible tints and variations of this color appear to the left in the tint area.
The new color you have selected appears on the right side of the horizontal bar above
the color element fields. The original color appears to the left.
3. To fine-tune the color, click within the tint area.
A cross appears. Drag the cross through the area to determine the exact color you
want. indicating the exact tint and shade you have selected like the following example:
59
The number in the Color field changes to reflect your choice.
4. If required, slide up or down the vertical slide bar to change the color still further.
5. When you're finished with this palette, click OK.
6. Click the icon to impose the new color on the canvas or other element.
Adding Pictures
When you click , an element entitled PHOTO is added to the Attributes list, like the
following example:
PhotoToggle this word to hide or reveal the fields.
Click this icon to delete the photo data and hide the fields associated with this for
this object.
The picture object remains on the canvas until you click the button.
Layer OrderEnter the number indicating the layer this graphic occupies on the badge, where
1 is the bottom layer, 2 is the next higher layer, and so on.
Layer ordering is useful when two or more objects are superimposed on each
other.
LocationEnter values to move the photo frame around on the canvas. As you change
values, the photo rectangle will change positions on the work board.
DimensionsEnter values to resize the photo frame, where the first value is the width and the
second value is the height. As you change the values, the size of the rectangle
will change to reflect it.
RotationEnter the value, in degrees, to rotate this object. The higher the number of
degrees the farther clockwise the object will be rotated. Default is 0 degrees.
Maintain
Aspect
Check this box to maintain the aspect ratio of the picture that appears in this
frame. If this feature is left unchecked, the picture will simply fill the available
frame space and skew the photo to match.
60
NOTE: None of the values entered here are reflected on the canvas until you have saved the
screen by clicking . Once saved, the preview pane displays the relevant image.
Adding Database Fields
Database fields are essentially placeholders for information that is supplied by the Identities
database. These fields are populated by data supplied for the specific badge holder. For example,
if you place a database field on this badge template that calls the Last Name data field, a badge
issued to William Smith assigned this badge template will automatically populate this field with the
value 'Smith'. The same holds true for birth date, badge expiration, eye color, and many others.
When you click the button, a Data Field attribute is added to the attributes list, like this
example:
The fields on this page are described below:
Data FieldSelect from a drop-down list the data field you want to include on this template. Only
those data fields previously defined for this system appear in this list, including all
user-defined data fields. When you click this field title, the attributes below appear.
Toggle Data Field to hide or reveal current fields.
Click this icon to delete the current data and hide the fields associated with this for
this object.
The picture object remains on the canvas until you click the button.
Layer OrderEnter the number indicating the layer this data field occupies on the badge, where 1
is the bottom layer, 2 is the next higher layer, and so on.
Layer ordering is useful when two or more objects are superimposed on each other.
LocationEnter values to move the data field around on the work board. As you change values,
the Data rectangle will change positions on the work board.
DimensionsEnter values to resize the data field rectangle, where the first value is the width and
the second value is the height. As you change the values, the size of the rectangle
will change to reflect it.
RotationEnter the value, in degrees, to rotate this database object. The higher the number of
degrees the farther clockwise the object will be rotated. Default is 0 degrees.
61
BG ColorEnter the color you require for the background of this DB field. When you click on this
You can drag this
placeholder to
another location...
... or use the
‘Location’ property
fields to reposition it
The result appears
in the Preview pane
field, a color palette appears. Select the general color, then fine tune it as required.
Each change you make to the color is reflected on the work space.
FontSelect from the drop-down list the font you want used for the text in this data field.
Font sizeSelect from the drop-down list the font size you want used for the text in this data
field.
AlignmentSelect the alignment you require for this data field.
Text C olo rEnter the color you require for the text used in this DB field. When you click on this
field, a color palette appears. Select the general color, then fine tune it with the slider
as required. Each change you make to the text color is reflected on the work space.
OpacityIn the text box, enter the percentage of opacity you want for the selected text color.
The lower the number, the fainter the color that appears.
When you select a Data Field option, the placeholder for that option appears on the canvas as
shown in the following example.
Use your mouse to drag this placeholder to another location on the canvas, or use the Location
options in the attributes list to relocate it.
NOTE: None of the values entered here are reflected on the canvas until you have saved the
Adding Text
screen by clicking . The Preview pane appears with the new data field reflected.
62
When you click the button, a Text field appears, like this example:
Text field and
associated
properties
You can drag this
placeholder to
another location...
Notice that a text placeholder appears on the canvas. Use your mouse to drag this text
placeholder to the required position on the canvas, or alternatively fine-tune the position using the
Location field.
The fields in this section are described below:
Te xt
Layer OrderEnter the number indicating the layer this text occupies on the badge, where 1 is the bottom
LocationEnter values to move the text field around on the work board. As you change values, the text
DimensionsEnter values to resize the text field rectangle, where the first value is the width and the
RotationEnter the value, in degrees, to rotate this object. The higher the number of degrees the
BG ColorEnter the color you require for the background of this text field. When you click on this field,
FontSelect from the drop-down list the font you want used for the text in this field.
Font sizeSelect from the drop-down list the font size you want used for the text in this field.
AlignmentSelect the alignment you require for this field.
Enter the text you want to appear on this template. Toggle
fields.
Click this icon to delete and hide the current text object fields.
The text object remains on the canvas until you click the button.
layer, 2 is the next higher layer, and so on.
Layer ordering is useful when two or more objects are superimposed on each other.
rectangle will change positions on the work board.
second value is the height. As you change the values, the size of the rectangle will change to
reflect it.
farther clockwise the object will be rotated. Default is 0 degrees.
a color palette appears. Select the general color, then fine tune it as required. Each change
you make to the text background color is reflected on the canvas only after you have saved
it.
Text to hide or reveal current
63
Text C olo rEnter the color you require for the text used in this field. When you click on this field, a color
palette appears. Select the general color, then fine tune it as required. Each change you
make to the text color is reflected on the canvas only after you have saved it.
OpacityIn the text box, enter the percentage of opacity you want for the selected text color.
The lower the number, the fainter the color that appears.
NOTE: None of the values entered here are reflected on the canvas until you have saved the
screen by clicking . The Preview pane appears with the new data field reflected.
Adding Graphics
When you click , a graphic property appears under Attributes like the following example:
Notice that a graphic placeholder appears on the canvas. Use you mouse to drag this placeholder
to another location on the canvas, or use the Location options in the attributes list to relocate it.
The fields in the attributes list include:
Click this icon to delete the current graphic data and hide the fields associated with
this for this object.
The picture object remains on the canvas until you click the button.
ImageEither enter the path and file name for the image you want to appear here, or click the
button to locate and identify the image file you want to use. The image you
need must be copied to an accessible directory before you can browse for it.
LocationEnter values to move the image around on the work board. As you change values, the
placeholder will change positions on the canvas. You can also use these fields to fine
tune the location of the graphic on this badge template.
DimensionsEnter values to resize the graphic rectangle, where the first value is the width and the
second value is the height. As you change the values, the size of the rectangle will
change to reflect it.
RotationEnter the value, in degrees, to rotate this object. The higher the number of degrees
the farther clockwise the object will be rotated. Default is 0 degrees.
64
Maintain
Select the camera to use
Aspect
Click to check this box designating that resizing this graphic will not change the
aspect ratio of the image. Using this feature you can avoid distorting the image.
NOTE: None of the values entered here are reflected on the canvas until you have saved the
screen by clicking . The Preview pane appears with the new data field reflected.
Badge Camera Configuration
The Access Control Manager enables the qualified operator to capture photos from a networked
camera. Most cameras are supported by this application as long as the output of the device is
digital and supports the jpg image format.
NOTE: Before the Access Control Manager can use the device, it must first be connected to a
LAN that is accessible to the Access Control Manager appliance.
To connect and configure a camera for capturing photos:
1. Using the instructions for your network-compatible camera, connect the camera to the
network and configure it.
2. At the User Links section of the home page, click the My Account link.
The My Account Profile page appears like this example:
3. At the 'Badge Camera' field, select from the drop-down list the device you plan to use to
capture pictures.
Only those devices previously defined for this system appear in this drop-down list.
4. When you're finished, click .
The selected camera is now the default capture device.
To further define the use of this camera within the Access Control Manager environment:
1. At the Setup links section of the home page, mouse-over Settings.
A pull-down option list appears.
2. From the available sub-options, select External Systems.
65
The IP Camera Listing page appears like this example.
3. Select one of the currently available device types:
• For an IP-based camera, go to step 4.
• For an Exacq server, click the Exacq tab and the Exacq Servers listing page appears.
• For a Pelco server, click the Pelco tab and the Pelco Server listing page appears.
• For a LifeSafety power supply, click the LifeSafety tab and the LifeSafety power
listing page appears.
• For an Avigilon server, click the Avigilon tab and the Avigilon server listing page
appears.
• For a Salient server, click the Salient tab and the Salient listing page appears.
• For a Milestone server, click the Milestone tab and the Milestone listing page
appears.
4. From the appropriate listing page, click the appropriate add button. For example, at the
IP-Based camera page, you would click .
The appropriate Add page appears like this example:
5. Fill out the fields on the page as required.
This page includes these fields and buttons:
IP-Based Camera
NameEnter the name of this device. Pick a name that will help
identify the camera.
TypeFrom the pick list, select the type of image device this is. You
can select from:
Web Camera - This is a network-attached camera.
RTSP - The Real Time Streaming Protocol is a network control
protocol designed for use in entertainment and
communications systems.
Device IPEnter the IP address for this device.
Still URLEnter the URL or web address, if required, of this camera's
web-based application showing the still picture this camera is
currently framing.
66
Preview URLEnter the URL or web address, if required, of this camera's
web-based application showing a preview of the finished
picture.
Device LoginEnter the login name that will enable access to this device.
Many cameras accessed over the network require security to
use.The Access Control Manager's device login is supplied by
default.
Device PasswordEnter the password that will enable access to this device.
Many cameras accessed over the network require security to
use.The Access Control Manager's device password is
supplied by default.
Exacq Server
ApplianceFrom the drop-down list, select the appliance to which this
server is connected or with which it is configured. Only those
servers previously defined for this system can appear in this
list.
AddressEnter the URL or IP address of this server. All servers have a
fixed address that must be entered here.
PortEnter the appliance port to which this server is connected.
UsernameIf required, enter the user name used to access this server.
This user name is automatically entered whenever the server
is accessed.
PasswordIf required, enter the password used to access this server. This
password is automatically entered whenever the server is
accessed.
Motion SmoothingFrom the drop-down list, enter the interval in seconds the
appliance uses to judge aberrations in the motion of the video.
This eliminates expected motion in the video, like a flickering
panel or background motion, and concentrates on that motion
which is unexpected and therefore suspicious.
Pass Through
Enabled
InstalledCheck this box to indicate that this server is installed and
Pelco Server
NameThe existing name of this video server.
Alt NameThe alternative name for this video server.
ApplianceFrom the drop-down list, select the appliance to which this
AddressEnter the URL or IP address of this Pelco server. All Pelco
Check this box to indicate that pass through is enabled for the
input connected to this server.
communicating properly with the Access Control Manager
appliance.
server is connected or with which it is configured. Only those
servers previously defined for this system can appear in this
list.
servers have a fixed address (assigned when this server was
configured) that must be entered here.
67
File to UploadEither enter the name of the file required to run this server or
click the button and find the required file.
UsernameIf required, enter the user name used to access this server.
This user name is automatically entered whenever the server
is accessed.
PasswordIf required, enter the password used to access this server. This
password is automatically entered whenever the server is
accessed.
InstalledCheck this box to indicate that this server is installed and
communicating properly with the Access Control Manager
appliance.
CamerasA list of cameras connected to and supported by this server.
LifeSafety Power
NameThe names of the power supplies for this system.
Alt NameThe alternative name for this component, usually a descriptive
name.
ApplianceFrom the drop-down list, select the appliance to which this
power supply is connected.
AddressEnter the web address defined for this power supply.
UsernameEnter the user name that enables the appliance access to this
component.
PasswordEnter the password that enables the appliance access to this
component.
InstalledCheck this box to indicate that this component is connected to
the appliance and working properly.
CamerasA list of cameras connected to and supported by this server.
Avigilon Server
NameThe names of the video recording devices for this system.
Alt NameThe alternative name for this server.
ApplianceFrom the pick list, select the appliance this server is connected
to.
AddressThe web address defined for this video recording device. Click
on this address to bring up the Avigilon Server Edit page for
this device.
PortThe Avigilon server port through which the Access Control
Manager appliance is communicating.
UsernameThe name the user enters in order to gain access to this
server.
PasswordThe password the user enters in order to gain access to this
server.
68
VidProxyUrlThe URL used as a translator between the appliance and the
server.
VidProxyImageUrlThe URL used to store the video captured by the Avigilon
server.
InstalledCheck this box to indicate that this server is connected and
working properly.
CamerasThe name and UUID of each camera this server accesses, their
current status, whether they are PTZ or not, and their zoom
capability.
Salient Server
NameThe names of the video server for this system.
Alt NameThe alternative name for this server.
ApplianceFrom the drop-down list, select the appliance to which this
server is connected or with which it is configured. Only those
servers previously defined for this system can appear in this
list.
HostnameEnter the network name, URL, or IP address of this Salient
server. All Salient servers have a fixed address (assigned when
this server was configured) that must be entered here.
PortEnter the port number to which this server is connected on the
appliance.
WebServicePortEnter the port number that this server uses to communicate
with its web service.
UsernameIf required, enter the user name used to access this server.
This user name is automatically entered whenever the server
is accessed.
PasswordIf required, enter the password used to access this server. This
password is automatically entered whenever the server is
accessed.
VidProxyUrlThe URL used as a translator between the appliance and the
server.
InstalledCheck this box to indicate that this server is connected and
working properly.
Milestone Server
NameThe names of the video recording devices for this system.
Alt NameThe alternative name for this server.
ApplianceFrom the pick list, select the appliance this server is connected
to.
AddressThe web address defined for this video recording device. Click
on this address to bring up the Milestone Server Edit page for
this device.
PortEnter the Milestone server port through which the Access
Control Manager appliance is communicating.
69
UsernameThe name the user enters in order to gain access to this
server.
PasswordThe password the user enters in order to gain access to this
server.
VidProxyUrlThe URL used as a translator between the appliance and the
server.
VidProxyImageUrlThe URL used to store the video captured by the Milestone
server.
InstalledCheck this box to indicate that this server is connected and
working properly.
6. Once you’ve selected the field values you need, click to save these changes.
The new device appears on the listing page.
70
User-Defined Fields and Lists
17
User-defined fields are custom fields added to the Identity or other custom forms that the user can
use to capture information the organization requires in order to define Identities.
User lists are data or user fields located within identities that are associated with a drop-down box
within the Identities configuration screens. User lists allow the system administrator to predefine
the contents of these drop-down boxes.
User-Defined Fields
To add a user-defined field:
1. From the Setup Links section of the home page, click or mouse-over Settings.
The sub-options list drops down.
2. From the sub-options list, click the User Fields option.
The User-Defined Fields Listing page appears like this example:
3. From the User-Defined Fields Listing page, click .
The User-Defined Field Add page appears like this example:
4. Fill out the fields on this page as required.
These fields include:
NameEnter the name of this user-defined field.
TypeFrom the drop-down list, select the type of field it is. Select from:
String – the field is a text string
Integer– the field is a number
Boolean– the field is a boolean string incorporating one or more fixed
values
Date– the field is a date arranged by month/day/year
5. When you're finished, click .
You are returned to the Listing page with the new field displayed.
71
You can also use this feature to create additional tabbed pages for an identity form. For more on
this, refer to the Access Control Manager online help.
User Lists
You cannot add new lists; however, you can add options to existing lists.
To add one or more items to an existing field:
1. From the Setup Links on the home page, click or mouse-over Settings.
The Settings main page appears.
2. From the drop-down option list, click User Lists.
The User-Defined User Selection List page appears like this example:
3. From the selection list, click the field to which you want to add option items.
The designated User List Edit screen appears like this example:
4. At the ‘New Value’ field, enter the new item you want to add to the current list.
5. Click .
The new item is added to the 'Current Values' window.
6. Repeat Steps 3 and 5 to add more items to the list as needed.
7. When you're finished, click . The Selection List reappears.
The new options appear in the pick list for the specified field on one of the Identities Properties
screen.
72
Routing
18
The routing group is a method for associating specific event types with designated access groups
that are effective during a specified time interval.
In other words, a routing group consists of the following components:
•A schedule indicating how routing should take place based on the transaction timestamp
•A schedule qualifier that indicates how the schedule should be interpreted.
•A list of event types. Only events of these event types will be routed based on the routing
group
•A list of access groups. Each group can contain zero, one, or more panels, doors, inputs,
outputs, external systems, cameras, and subpanels. When the event source is one of these
types of objects, the transaction is only routed based on this routing group if the source
exists in one of the groups associated with the routing group.
If the routing group is assigned no groups at all, then the Group criteria is considered as satisfied
and routing will occur if other criteria are met.
To create one or more routing groups:
1. From the icon task bar on the home page, click the Roles option.
2. From the available sub-options, click the Routing Groups sub-option.
The Routing Group Listing page appears like this example:
3. From the Routing Groups listing page, click .
The Routing Group Add page appears like this example:
4. Fill out the fields on this page as required.
The fields include:
NameEnter the name of this routing group.
73
ScheduleFrom the drop-down list, select the interval during which this routing
Move available event
types to the members
window as required
group is active.
The current options are:
• Never Active - This schedule is never active. Nothing is routed.
• 24 Hours Active - This schedule is always active. Everything is
routed
Schedule
Qualifier
InstalledCheck this box to indicate that this routing group is active and
PartitionsSelect one or more partitions to which this routing group belongs. Only
From the drop-down list, select the option that qualifies the schedule.
There are two options:
• Appliance - Relative to the local time on the appliance when the
transaction was actually created within the Access Control
Manager system.
• Event - Relative to the local time when the originating event
occurred.
available for the system.
those members of the selected partitions can access this page.
Only those partitions already created for this system and enrolled for
the current operator appear in this window; if no partitions are created,
this field does not appear.
5. When you're finished, click .
The Routing Group Edit property sheet appears like this example:
6. Check the values on the Schedule page and change them if required.
7. Click the Event Types tab.
The Event Types page appears like this example:
8. Associate available event types to this routing group as required.
9. Click the Groups tab.
74
The Groups page appears like this example:
Move available
access groups to
the members
window as required
10. Associate available access groups with this routing group as required.
11. When you're finished, click .
You are returned to the Routing Groups Listing page.
75
Collaboration
19
Collaboration provides the ability to exchange data between the Access Control Manager
appliance application and a large number of other database types.
NOTE: This is normally a second-level feature and need not be performed initially. For more on
this, refer to the Access Control Manager online help and the Collaboration Administration Summary.
76
Identities
20
The Identities feature is used to enroll employees and all other workers and service personnel
who require access to a facility or location maintained and overseen by the Access Control
Manager system.
Adding Identities
To add a new Identity:
1. From the home page icon task bar, click Identities.
The Identities Listing page appears like this example:
2. Click the button.
The Identity Profile dialog box appears like this example:
Only those identity profiles already defined for this system appear in this list. For more
on defining profiles, refer to Identity Profiles on page 87.
3. Do one of these:
• If you have defined one or more profiles for this system, select the profile you want
from the 'Identity Profile' pick list then click OK.
• If no profiles have been defined for this system or you want to bypass assignment of
profile values for this identity, click Cancel.
77
The Identity Add page appears like this example:
The fields on this page include:
Identity Information
PhotoIf you have either imported an image or captured an image for this
identity, the photograph appears to the left of the Identity
Information fields.
Last NameEnter the last name of the user. This field is required.
First NameEnter the first name of the user. This field is required.
Middle NameEnter the middle initial.
External System IDEnter the ID used by the company or issuer of the badge to indicate
this unique user.
AddressEnter the address of the user.
TitleFrom the drop-down list, select the title of this user.
To define more options, refer to “User-Defined Lists - Adding Items”
in Access Control Manager online help.
DepartmentFrom the drop-down list, select the department to which this user is
affiliated.
To define more options, refer to “User-Defined Lists - Adding Items”
in Access Control Manager online help.
DivisionFrom the drop-down list, select the company division with which this
user is affiliated.
Last UsedIndicates the time required for access (or attempted access) at the
last door where the user presented their card.
78
StatusSelect the option from the pick list that describes the current status
of this new user.
Active - this is a current user. Expired - this user's access has
expired.
Lost - this user's access card/badge is reported lost.
Stolen - this user's access card/badge is reported stolen.
This field is required.
TypeFrom the drop-down list, select the type of identity this is. Default
values include Employee, Contractor, and Visitor.
To define more options, refer to “User-Defined Lists - Adding Items”
in Access Control Manager online help.
Issue DateSpecify the date this identity was issued. Click the field to bring up
and use the calendar.
Last DoorIndicates the last door this identity accessed.
Sequence
Number
Address Information
Street AddressEnter the address of the user.
CityEnter the city where this user lives.
StateEnter the state where the user lives.
Zip CodeEnter the zip code where the user lives.
Site LocationFrom the drop-down list, select the location where this user works.
BuildingFrom the drop-down list, select the building where this user works.
PhoneEnter the phone number this user has. This can be either cell phone
Work PhoneEnter the phone number where this user works.
Email AddressEnter the user's email address.
Indicates the sequence number assigned by the system to this
individual. The initial count of this number is specified in the System
Settings.
To define more options, refer to “User-Defined Lists - Adding Items”
in Access Control Manager online help.
To define more options, refer to “User-Defined Lists - Adding Items”
in Access Control Manager online help.
or home phone.
Account Information
Remote
Authentication?
Check this box to indicate that this identity can access this system
remotely. The password and confirm fields disappear.
Remote authenticate is achieved by defining a default domain and
server from the Remote Authentication page.
79
Remote DomainFrom the drop-down list, select an external domain (a domain
outside this security system) from which this identity can seek
authentication.
Only those external domain previously defined by the system
appear in this list.
Record
Modification
Inactivity TimerFrom the drop-down list, enter the number of minutes this user's
Password
Strength
LoginEnter the name this user will use to log in to the Access Control
PasswordEnter the password this user will use to log into the Access Control
ConfirmEnter the same password to confirm the selection.
Allow Remote
Access?
PartitionsSelect one or more partitions from the list. Only those selected
This read-only field indicates the last time and date this user's
identity was modified.
activities can remain unrecorded before the user is logged out of
the application.
Below the password field a bar indicates how the system judges the
strength of the password you have entered above.
Manager.
Manager. A minimum of four characters is required.
Check this box to allow a specific identity remote access to the
Postgres (transaction) database.
partitions can access this page.
Only those partitions previously defined for this system appear in
this window.
4. Fill out the fields on this page as required.
5. When you've filled out the required field, click the button.
The extended Identities tabs appear with the Roles page displayed like this example:
6. Select the roles to which this person is a member.
7. Click the Tokens tab.
80
The Tokens page appears like this example:
The fields on this page include:
Embossed
Number
Internal NumberEnter the actual number encoded on the ID card.
PINEnter the number this card requires to be entered at a reader in
StatusFrom the pick list, select the current status option of the token
Issue LevelFrom the pick list, select the issue level this token possesses. The
APB ExemptCheck this box to designate that this token is exempted from the use
Tra ceCheck this box to enable tracing when this token is used.
Enter the number embossed on the card that will be issued to this
user. This is only required if a physical card is being issued.
order to grant access to this user or perform the function for which
the token was created. This number is only required if a keypad entry
is necessary.
assigned to this identity.
range is 0 to 9 where 0 is no issue level and 9 is the highest possible
issue level.
Click this button to download this token to all connected panels. This
button only appears after the token has been saved.
Click this button to grant the person assigned this token one free
pass through a door. This button only appears after the token has
been saved.
of anti-passback at doors or access points where APB is normally
enforced. This is generally used for executive override.
DownloadCheck this box to enable downloading of this token. This feature is
checked and enabled by default.
Never ExpireCheck this box to indicate that this token never expires.
Extended door
times
Issue DateClick inside this field and use the calendar to specify the date when
Activate DateClick inside this field and use the calendar to specify the date when
Check this box to indicate that this token can use extended door
times. This is particularly useful for token holders with special needs.
this token is issued.
Alternatively, enter the date using the keyboard.
this token is activated.
Alternatively, enter the date using the keyboard.
81
Deactivate DateClick inside this field and use the calendar to specify the date when
this token is deactivated.
Alternatively, enter the date using the keyboard.
Last DoorIndicates the last door at which this token was used to gain access.
Last TimeIndicates the last time this token was used to gain access.
Click this button to save the current settings.
Click this button to exit this page and return to the higher level
screen.
8. Customize tokens for this identity as required.
9. Click the Groups tab.
The Groups page appears like this example:
10. Assign groups to this person as required.
11. Click the Access tab.
The Access page appears like this example:
12. Review the roles that this person can currently access and the doors that these roles
support.
If necessary, you can return to the Roles page and redefine the roles this person is
assigned.
13. Click the Capture tab.
The Capture page appears like this example:
82
If the capture device has been secured by a user name and password, this page will not
appear until you have supplied the required values to the authentication prompt like
this:
14. Supply the required user name and password then click OK and the Capture page
should appear.
15. To capture a picture from this page using a previously attached and configured camera:
a.Click on the next to the identity that requires a photo.
The connected capture device takes a picture of the designated person and places
it on the Capture page.
b.To create additional pictures, repeat Step a.
c.To view all captured pictures for this person, click on the person's name.
The Identities Edit screen appears.
d.Select the Capture tab to view the Identity Capture page.
e.Click to select the image you want to use for the person.
f.Click to save this image.
16. Click the Photos tab.
The Photos page appears like this example:
17. Click the button.
The screen expands to include two fields like this example:
18. At the 'Photo' text box, either enter a file name complete with path, or click the
button and, using the Choose File dialog box, navigate to the directory and
file containing the image you want to upload.
If you need to remove this dialog box, click the button.
19. Click Open to confirm the choice.
20.If this is the primary photo to be used for this person, click to check the Primary box.
83
21. If you need to upload another photo, repeat Steps 17 through 19.
Once a photo is uploaded, it appears on this page as shown in this example:
22.When you’re finished, click .
23.Click the Badge tab.
The Badge page appears like this example:
The fields on this page include:
Badge PhotoSelect the picture to assign to this page.
Only those pictures previously captured or uploaded appear in this list.
For more on these topics, refer to the Identity Enrollment and Credential Guide or online help.
Badge TokenSelect a token to associate with this badge.
Only those tokens previously defined by the system appear in this list.
For more on creating tokens, refer to the Identity Enrollment and Credential Guide or online help.
Badge frame
Front
Back
This frame contains the picture you have either uploaded from an
existing picture or captured through a connected camera and
subsequently marked as 'Primary'.
Whatever size the picture appears here, the application will resize it to
fit the badge frame specified in the Badge Designer.
84
Badge
Te mp la t e
Select an available badge template from the drop-down list.
Only those badge templates previously defined by the system appear
in this list. For more on creating badge templates, refer to “Badge
Designer” starting on page 57.
Badge Back
Photo
Select an available picture to place on the back of this card.
Only those pictures previously captured or uploaded appear in this list.
This field is not enabled unless the designated template allows both
front and back design.
Click this button to print the badge to a designated badge printer.
Click this button once you've selected all of the groups you want to
save your selections.
Click this button to ignore changes made during the present session
and return to the previous page.
24.Enter the required fields.
25.Click the Transactions tab.
The Transactions page appears like this example:
This page enables the qualified operator to review past alarms and events that this
identification has caused. The information in this table is listed by these columns:
WhenThe date and time when this event occurred.
PriorityThe importance of this event where 0 is least important and 99 is most
important. Priority numbers are assigned through the 'Priority' text box
on the Events Add page.
Event NameThe name of the event. Names are specified in Events - Adding.
Source NameThe name of the person causing the event. This name is assigned to
the token that caused the event as specified in Identities - Adding.
Source
Location
Card NoIf this token was assigned to a card, this displays the card number.
MessageThis displays the message associated with the event. Messages are
Displays the location where this event or alarm occurred.
assigned through the Events Add page.
26.Review the transactions on this page, if required.
27.To print a badge, from the Badge page click the button.
85
A badge for this person is printed to the designated badge printer.
28.If needed, click the Audit tab to display and review the Audit page.
29.When you're finished, click .
30.Click either the Identities > linked bread crumb above the page or click .
You are returned to the Identities Listing page.
Searching for Identities
To search for previously created identities, or all identities:
1. In the 'Last Name' text box, enter the last name of the person you are looking for.
If required, in the 'First Name' text box, enter the first name of the person you are
looking for.
If required, in the 'Token' text box, enter the internal number of the identity you are
seeking. In whichever field you type, the program will attempt to assist you by finishing
your search term with an existing name or token, such as if you are placed a wildcard
after your entry.
2. In the pull-down box to the right of these three boxes, select whether the values
entered in the Last Name, First Name, and Token fields should be combined into a
single search criteria (And) or used as separate search criteria (Or).
If the And value is selected, only those identities to fit all entered conditions will appear.
If the Or condition is selected, each entered value is employed as a separate criteria.
For example, if you entered Smith in the 'Last Name' field and William in the 'First Name'
field, selecting And as your condition instructs the application search engine to find
only those identities in the database that are named William Smith. If you select the Or
condition instead, all identities that have the last name of Smith or the first name of
William are listed.
NOTE: At any point, you can clear values you have already entered and start over by clicking the
.
3. Click .
The search engine processes the request and displays all people in the database who
fit the entered information.
NOTE: For more on creating valid search terms, refer to the Access Control Manager online help
or the Identity Enrollment and Credentialing Guide.
86
Identity Profiles
21
Defining an identity can take a long time. The identity page alone contains more than 25 fields.
Assigning attributes to that identity, such as roles, groups, tokens, and badge templates adds still
more time. Identity profiles provide a shortcut that can speed up the process.
Identity profiles are pre-defined templates that can be assigned to an individual identity. Once
assigned, the field values assigned in the profile are used to populate the same fields for the
individual identity.
Simply create an Identity Profile then impose that profile on one or more identities through either
the batch update feature in Groups or Identities add feature.
Adding Identity Profiles
To add an Identity Profile:
1. From the icon task bar on the home page, click Identities.
The Identities Listing page appears.
2. From the sub-menu, select .
The Identity Profiles Listing page appears. If no profiles are currently defined, no
profiles appear in the list.
3. Click the button.
The Identity Profile Add page appears.
4. Fill out the required fields on the Identity page.
5. When you're finished, click .
The Properties screen for this identity profile appears.
6. Add values to the following pages as required:
•Identity Page
• Roles Page
•Tokens Page
•Groups Page
• Access Page
7. When you're finished adding features to this identity profile, click again.
The Identity Profiles Listing page appears.
8. Assign one or more groups to this identity profile as required.
9. Schedule this identity for updating, if required.
NOTE: For more on creating identity profiles, refer to the Access Control Manager online help or
the Identity Enrollment and Credentialing Guide.
87
Reports
22
The qualified operator can generate reports, in either PDF or CSV format, concerning many areas
of Access Control Manager system function including:
•Access Grant via Operator
•Access Groups
•Action Audit
•Alarms
•Appliance
•Area
•Audit Log
•Cameras
•Collaboration
•Delegation
•Delegation Comparison
•Door Configuration
•Door/Identities with Access
•Events
•Event Type
•Group
•Holiday
•Identities Photo Gallery
•Identity/Doors Access
•Identity Summary
•Panel
•Policy
•Role
•Schedule
•Tokens
•Tokens Pending Expiration Date
•Transaction
To view and generate standard reports:
1. From the home page icon task bar, click the Reports option.
88
The Reports Listing page appears like this example:
2. At the required report line, do one of these:
• Click the icon to generate a PDF.
• Click the icon to generate a spreadsheet (in CSV format) based on the report.
If you select as a PDF format, a dialog box like this example appears:
If you select a spreadsheet format, a dialog box like this appears:
3. Do one of these:
89
• Click OK to display immediately the required report in the specified format.
• Select the ‘Save File’ radio button then click OK. This will save the report to the
browser's download utility from where it can be retrieved and viewed as required, or
moved to another location.
For information on how to customize a report, refer to Reports section in the Access Control
Manager online help.
90
Maps
23
Using the Access Control Manager’s Map Designer, the qualified operator can import maps and
blue prints into the application, place the inputs, outputs, and other alarm points on that map in the
location where they exist, then display the map for use by operators seeking to locate the source
of a specific alarm or event.
To create a map:
1. Using a drawing program, create a map or, alternatively, import a map from another
source, such as a blueprint or architectural design.
The drawing can be a representation of a building, floor, or room. Access Control
Manager can use a drawing that is in one of these formats: GIF, JPG, or BMP.
2. Open the Map Designer by selecting the Maps icon from the Settings module.
The Map Templates Listing page appears.
3. Click the button.
The Add Map Template page appears like this example:
4. At the 'File' combo box, click and navigate to the location on your computer
where you have created or imported the required map as specified in Step 1.
5. If required, at the 'Re-Size to:' text boxes, specify the dimensions of this map.
6. Click .
The map is saved and you are returned to the Map Listing page.
7. Click the name of the map you just created.
91
The Map Edit page appears like this example:
8. Using the Map Details on the left side, click next to the point category you want to
specify.
A pick list appears for the specified type. You can choose from Doors, Panels, SubPanels, Inputs, Outputs, Cameras, Zoom In, or Zoom Out. Each point is represented by a
different icon:
Panel or subpanel
Door
Input
Output
Camera
Zoom in
Zoom out
For more on the Zoom In and Zoom Out point types, refer to “Linking Maps” in the
online help.
9. From the pick list, select the point you want to place on this map.
Only those points that have been previously defined for this system appear in their
appropriate list.
The point icon appropriate to that type appears on the map. Each point type has its own
icon.
10. Drag the point to the required position on the map.
For example, if you have just selected a door, drag the door point to the appropriate
door. Normally, you will want to place the appropriate point in the location where it
actually exists.
11. Repeat Steps 8 – 10 to select and place more points as required.
You can select more than one point from each point type and place as many points on
the map as are consistent with the actual alarm system representation.
92
12. When you're finished, click to save your modifications.
At any point, you can expand the Map Details panel on the left to review the points you
have defined, like this example:
(To expand the point category, simply click the button to the left of the point type; to
contract the category, click the button.)
13. Click to return to the Map Listing page.
For more on using this function, refer to “How to Use Maps” in the Operators Guide.
93
Global Actions
24
Global actions enable the qualified operator to associate an action -- defined by either a macro or
a Exacq soft trigger -- with a trigger on one or more panels. In this way, you can cause an action to
occur simultaneously at a large number of doors connected to more than one panel. One or more
global actions must be defined before you can create Global Linkages.
To define global actions:
1. At the icon task bar on the home page, select Physical Access.
The Physical Access screen appears with the Doors listing page uppermost.
2. From the available sub-options list, select Global Actions.
The Global Actions Listing page appears like this example:
3. Click the button.
The Global Actions Add page appears like this example:
4. Fill out the fields as required.
5. When you're finished, click .
The new global action is saved and appears on the Global Actions Listing page.
Once you have defined as many global actions as required, proceed to the Global Linkages
feature where these global actions are associated with various doors and input devices.
94
Global Linkages
25
Global linkages are the final step in the process that defines specific actions for triggering events
at specific doors. What separates this procedure from the Macro or Trigger features available for
specific doors or panels, is that this feature is capable of connecting many doors and inputs
spread across many panels.
For example, you could lock down an entire building simply by issuing a single trigger. At a more
sophisticated level, you can use global linkages to plot a complex scenario, like a sally port or a
man trap, in which a series of doors are opened in sequence, inputs associated with those doors
are sequentially masked and unmasked, and cameras are turned on as each door is opened.
Global linkages enable the qualified operator to plan a cascade of triggers and their resulting
actions with only a single code entry or command.
To create a global linkage:
1. At the icon task bar on the home page, select Physical Access.
The Physical Access screen appears with the Doors listing page uppermost.
2. From available sub-options list, select Global Linkages.
The Global Linkages Listing page appears like this example:
3. Click the button.
The Global Linkages Add page appears like this example:
4. Fill out the fields on this page, then click .
The Global Linkages edit screen appears like this example:
5. Fill out the fields as required on each of the following pages:
95
• Linkages page
• Devices page
• Events page
•Actions page
For more information on each page, refer to the online help.
6. When you're finished, click .
96
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.