Engineered Solutions | Access Management System V3.0
Access Management System V3.0
www.boschsecurity.com
u Combines high-end access control features,
performance and availability with intuitive
operation.
u Highly scalable: Up to 200,000 users and 10,000
doors.
Access Management System (AMS) is an access
control system for stand-alone application or for
integration with other systems, such as the Bosch
video management system BVMS.
• As a stand-alone system, it features a simple-to-use
map and alarm viewer for a rapid assessment of all
the devices and entrances on the site.
• As an integrated system, it allows the operator of a
video management system to perform door-related
tasks like video-based ID verification, to grant and
deny access, or to disable doors.
AMS combines the robustness, performance and
features of high-end access control products with a
modern UI that makes it faster to install and configure.
The existing portfolio of Bosch access control devices
can be easily scanned and integrated.
Data privacy and IT security is state-of-the-art, in order
to comply with the latest data-protection regulations.
System overview
Access Management Server
The server is the main component for processing all
data. It coordinates the activities of all the hardware
and software components described below.
u Easy to use: Intuitive GUI and built-in map viewer.
u Easy to configure: Pre-packaged licenses, simple
installation and set-up.
u Comprehensive security management: Integrates
with intrusion and video systems.
Master Access Controller (MAC)
The MAC is an additional security layer to increase
system availability. It holds its own database to
exchange information between AMCs, even if the main
server or the network is down.
Access Modular Controller (AMC)
The AMC is a robust and reliable field controller to
connect to up to 8 doors with readers and door
strikes. With its large on-board memory the AMC can
make autonomous decisions and store hundreds of
thousands of access events, regardless of network
interruptions.
Access Management Database
The SQL server holds all master data (cardholder,
cards, authorizations, schedules, etc.) and also all
access events. The latest version provides encryption
to protect personal information from misuse or theft.
Access Management Dialog Manager
The Dialog Manager is the main user interface for
configuring the system, and for collecting and
maintaining access-related information. In particular,
its personnel dialogs are used for enrolling new
cardholders, and maintaining their access
authorizations and credentials.
Page 2
HRReception
1
236
45
AMSBVMS
12
3
4
56
| Access Management System V3.0
2
Access Management Map View
The Map View is a simple-to-use application both to
visualize the overall security situation of the premises,
and zoom into close detail. It displays access
violations, tampering and malfunction alarms, and
allows the sending of commands directly from the
maps themselves.
Access Management BVMS Interface
The seamless integration with BVMS (version 10.1 or
higher) allows the video verification of cardholder
identities from the BVMS operator client: a person
requesting access with a valid card can be manually
verified through camera live stream and the
cardholder’s photo from the database. Camera events
can trigger door actions. Door events can trigger
camera actions.
Access Management Intrusion Interface
Management of up to 25 B and G Series intrusion
panels. Shows area states (e.g. armed, ready to arm),
detector states and intrusion events on Map View.
Allows the sending of commands (e.g. arm, disarm) to
panels.
Access Management SDK
This SDK facilitates the integration of 3rd party
systems with AMS, for instance an Identity
Management or Visitor Management system. A
particular advantage is its ability to re-use 3rd party
integrations initially written for BIS Access Engine.
Access Importer/Exporter
This tool facilitates data import and export from
external systems for 1-time data migration, such as
from Access PE systems, or regular data transfer from
Active Directory via the LDAP protocol.
Topology diagrams
The following diagrams illustrate AMS configurations
without and with BVMS.
Stand-Alone topology
(1)AMS server
(2)Client workstation for enrollment
(3)Client workstation for access control and intrusion monitoring
(4)Optional MAC servers (one MAC license is always included, on
the AMS server)
(5)AMCs for parking lot and door control
(6)Intrusion panel with detectors and touch-screen keypad
BVMS Integration
(1)AMS server
(2)BVMS management server or DIVAR IP all-in-one
(3)BVMS Client workstation for access and video management
(4)Optional MAC servers (one MAC license is always included, on
the AMS server)
(5)AMCs
(6)Entrances with cameras
Functions
• Registration of new cardholders:
– Use fully customizable enrollment dialogs to
streamline the process of cardholder enrollment.
– Capture both conventional and biometric
characteristics, including photos and signatures.
– Design and produce physical credentials.
– Take advantage of dialogs for the mass import of
stored personnel data.
• Assigning of access authorizations:
– Collect access authorizations into reusable
profiles, and assign these to predefined or
customized personnel types.
• Door functions:
– Use a comprehensive set of template door
models, including elevators and parking lots, to
accelerate the configuration phase of your
project.
– Office mode: unlock doors for free access during
office or shop hours.
– Combat theft and security threats by random
screening of cardholders.
Page 3
3 | Access Management System V3.0
– Verify cardholder identity with biometric checks
at entrances, and with additional video-based ID
verification powered by BVMS.
– Disarm an intrusion area and grant access with a
single card swipe.
– Use the SimonsVoss SmartIntego technology to
enhance your system with card-programmable
remote online doors, as commonly used in hotels,
healthcare, offices and educational
establishments.
• Reporting:
– Take advantage of a large number of predefined
template reports.
• Guard Tours and patrols:
– Define up to 200 guard tours, and monitor up to
8 patrols simultaneously.
• Monitor car parks, visitors, muster points:
– Display customizable summaries of employees
and visitors on site.
– Monitor visiting times, including overstayed visits.
– Monitor the number of available parking spaces.
• Divisions:
– Provide unified access control for a facility that is
shared by any number of independent parties.
– Individual operators can be restricted to manage
only the persons, devices and entrances of those
divisions assigned to them.
• Alarm Monitor, Command & Control:
– The Map View supports up to 1000 maps, which
can be nested to provide both overviews and
close detail.
– Use the Map View to keep control of large
numbers of entrances simultaneously.
– Use the Map View to monitor incoming alarms
and alerts in real time.
AMS does not buffer intrusion alarms that occur
while the network or the system itself is down.
• BVMS and DIVAR IP Integration:
– Video verification at entrances.
– Camera actions (e.g. start recording, pan/tilt/
zoom) triggered by access events (e.g.
unauthorized door opening).
– Door events (e.g. unlock/lock door) triggered by
camera events (e.g. Intelligent Video Analytics).
– Requires version 10.1 or higher.
• Milestone XProtect Integration:
– Use AMS to support XProtect with access events
and alarms for further processing on XProtect
client.
• Intrusion Integration:
– Supports up to 25 Bosch B Series (Bx512) and G
Series (Bx512G) control panels for central user
management and command & control.
– A full contingent of panels provides up to 12,800
intrusion detectors.
• Mobile Device Integration:
– Supports HID Mobile Access (on MIFARE CSN via
NFC and Wiegand) and STid Mobile ID (on
MIFARE CSN via Wiegand and OSDP, NFC and
BLE).
Installation/configuration notes
The following tables illustrate hardware and software
requirements for running AMS.
Server
Supported
operating systems.
Installations on
other operating
systems may
succeed, but are
entirely without
warranty.
Minimum hardware
requirements
Client, including the Map View client
Supported
operating systems.
Installations on
other operating
systems may
succeed, but are
entirely without
warranty.
Minimum hardware
requirements
• Windows Server 2016 (64 bit,
Standard, Datacenter)
• Windows 10, version 1809 (LTSC)
• Ensure that the latest software
updates are installed.
• Note: The default database delivered
with this system is SQL Server 2017
Express edition with advanced services
• Intel i5 processor with at least 4
physical cores
• 8 GB RAM (32 GB recommended)
• 200 GB of free hard disk space (SSD
disks recommended)
• Graphics adapter with
• 256 MB RAM
• A resolution of 1280x1024 (Use the
graphic resolution recommended for
the client if you wish to run the Map
View client on the AMS server).
• At least 32 k colors
• 1 Gbit/s Ethernet card
• A free USB port or network share for
installation files
• Windows 10, version 1809 (LTSC)
• Ensure that the latest software
updates are installed.
• Intel i5 or higher
• 8 GB RAM (16 GB recommended)
• 20 GB of free hard disk space
• Graphics adapter
• 256 MB RAM
• To use the AMS Dialog manager, a
resolution of 1280x1024 is sufficient.
• For AMS Map view, a resolution of
1920x1080 (Full HD) is required.
• At least 32 k colors
• DirectX® 11
• 1 Gbit/s Ethernet card
• A free USB port or network share for
installation files
Page 4
4 | Access Management System V3.0
MAC server
Supported
operating systems.
Installations on
other operating
systems may
succeed, but are
entirely without
warranty.
Minimum hardware
requirements
• Windows Server 2016 (64 bit,
Standard, Datacenter)
• Windows 10, version 1809 (LTSC)
• Ensure that the latest software
updates are installed.
• Intel i5 or higher
• 8 GB RAM (16 GB recommended)
• 20 GB of free hard disk space
• Graphics adapter with
• 256 MB RAM
• A resolution of 1280x1024
• At least 32 k colors
• 1 Gbit/s Ethernet card
The complexity of security systems has increased
significantly over the last couple of years. At the same
time, you are still relying on your system to mitigate
security risks. With Bosch Software Assurance, you
can always approach us for help to ensure your system
keeps on running.
You can find the terms and conditions of Bosch
Software Assurance on the Bosch Building
Technologies website: https://
www.boschsecurity.com/xc/en/solutions/
management-software/bosch-software-assurance/
LITELicensed
number
SDK available✔
BVMS integration available✔
Intrusion integrationMaximum 25 panels B and G Series
Maximum
number
License bundle PLUS
PLUSLicensed
Number of doors (with 1 or 2
readers):
Number of cards:2000200,000
Number of divisions:1400
Number of clients
configurable:
Number of MACs310
Number of AMCsMaximum 125 per MAC
Number of authorizationsMaximum 1024 per MAC
Number of guard tours200
SDK available✔
number
32512
15
Up to 60 (on the network)
recommended for high performance
Maximum
number
Technical specifications
The following tables specify the dimensions of an AMS
access control system from two aspects:
• As per the respective license bundle: LITE, PLUS or
PRO.
• As a maximum, if the necessary licenses are
purchased.
License bundle LITE
LITELicensed
Number of doors (with 1 or 2
readers):
Number of cards:1000200,000
Number of divisions:1400
Number of clients
configurable:
Number of MACs11
Number of AMCsMaximum 125 per MAC
Number of authorizationsMaximum 1024 per MAC
number
16144
12
Up to 60 (on the network)
recommended for high performance
Maximum
number
BVMS integration available✔
Intrusion integrationMaximum 25 panels B and G Series
License bundle PRO
PROLicensed
Number of doors (with 1 or 2
readers):
Number of cards:5000200,000
Number of divisions:1400
Number of clients
configurable:
Number of MACs540
Number of AMCsMaximum 125 per MAC
Number of authorizationsMaximum 1024 per MAC
Number of guard tours200
SDK available✔
BVMS integration available✔
number
3210,000
140
Up to 60 (on the network)
recommended for high performance
Maximum
number
Number of guard tours200
Intrusion integrationMaximum 25 panels B and G Series
Page 5
5 | Access Management System V3.0
Languages of the user interface
• AR: Arabic
• DE: German
• EN: English
• ES: Spanish
• FR: French
• HU: Hungarian
• NL: Dutch
• PL: Polish
• PT: Portuguese
• RU: Russian
• TR: Turkish
• ZH-CN: Chinese (simplified)
• ZH-TW: Chinese (traditional)
Hardware devices supported
• The Bosch AMC2 family of access controllers
See corresponding datasheets in the product catalogs
at https://www.boschsecurity.com
• Bosch AMC2 extension boards
See corresponding datasheets in the product catalogs
at https://www.boschsecurity.com
• SimonsVoss SmartIntego remote online door
components