Engineered Solutions | Access Management System V3.0
Access Management System V3.0
www.boschsecurity.com
u Combines high-end access control features,
performance and availability with intuitive
operation.
u Highly scalable: Up to 200,000 users and 10,000
doors.
Access Management System (AMS) is an access
control system for stand-alone application or for
integration with other systems, such as the Bosch
video management system BVMS.
• As a stand-alone system, it features a simple-to-use
map and alarm viewer for a rapid assessment of all
the devices and entrances on the site.
• As an integrated system, it allows the operator of a
video management system to perform door-related
tasks like video-based ID verification, to grant and
deny access, or to disable doors.
AMS combines the robustness, performance and
features of high-end access control products with a
modern UI that makes it faster to install and configure.
The existing portfolio of Bosch access control devices
can be easily scanned and integrated.
Data privacy and IT security is state-of-the-art, in order
to comply with the latest data-protection regulations.
System overview
Access Management Server
The server is the main component for processing all
data. It coordinates the activities of all the hardware
and software components described below.
u Easy to use: Intuitive GUI and built-in map viewer.
u Easy to configure: Pre-packaged licenses, simple
installation and set-up.
u Comprehensive security management: Integrates
with intrusion and video systems.
Master Access Controller (MAC)
The MAC is an additional security layer to increase
system availability. It holds its own database to
exchange information between AMCs, even if the main
server or the network is down.
Access Modular Controller (AMC)
The AMC is a robust and reliable field controller to
connect to up to 8 doors with readers and door
strikes. With its large on-board memory the AMC can
make autonomous decisions and store hundreds of
thousands of access events, regardless of network
interruptions.
Access Management Database
The SQL server holds all master data (cardholder,
cards, authorizations, schedules, etc.) and also all
access events. The latest version provides encryption
to protect personal information from misuse or theft.
Access Management Dialog Manager
The Dialog Manager is the main user interface for
configuring the system, and for collecting and
maintaining access-related information. In particular,
its personnel dialogs are used for enrolling new
cardholders, and maintaining their access
authorizations and credentials.
| Access Management System V3.0
2
Access Management Map View
The Map View is a simple-to-use application both to
visualize the overall security situation of the premises,
and zoom into close detail. It displays access
violations, tampering and malfunction alarms, and
allows the sending of commands directly from the
maps themselves.
Access Management BVMS Interface
The seamless integration with BVMS (version 10.1 or
higher) allows the video verification of cardholder
identities from the BVMS operator client: a person
requesting access with a valid card can be manually
verified through camera live stream and the
cardholder’s photo from the database. Camera events
can trigger door actions. Door events can trigger
camera actions.
Access Management Intrusion Interface
Management of up to 25 B and G Series intrusion
panels. Shows area states (e.g. armed, ready to arm),
detector states and intrusion events on Map View.
Allows the sending of commands (e.g. arm, disarm) to
panels.
Access Management SDK
This SDK facilitates the integration of 3rd party
systems with AMS, for instance an Identity
Management or Visitor Management system. A
particular advantage is its ability to re-use 3rd party
integrations initially written for BIS Access Engine.
Access Importer/Exporter
This tool facilitates data import and export from
external systems for 1-time data migration, such as
from Access PE systems, or regular data transfer from
Active Directory via the LDAP protocol.
Topology diagrams
The following diagrams illustrate AMS configurations
without and with BVMS.
Stand-Alone topology
(1) AMS server
(2) Client workstation for enrollment
(3) Client workstation for access control and intrusion monitoring
(4) Optional MAC servers (one MAC license is always included, on
the AMS server)
(5) AMCs for parking lot and door control
(6) Intrusion panel with detectors and touch-screen keypad
BVMS Integration
(1) AMS server
(2) BVMS management server or DIVAR IP all-in-one
(3) BVMS Client workstation for access and video management
(4) Optional MAC servers (one MAC license is always included, on
the AMS server)
(5) AMCs
(6) Entrances with cameras
Functions
• Registration of new cardholders:
– Use fully customizable enrollment dialogs to
streamline the process of cardholder enrollment.
– Capture both conventional and biometric
characteristics, including photos and signatures.
– Design and produce physical credentials.
– Take advantage of dialogs for the mass import of
stored personnel data.
• Assigning of access authorizations:
– Collect access authorizations into reusable
profiles, and assign these to predefined or
customized personnel types.
• Door functions:
– Use a comprehensive set of template door
models, including elevators and parking lots, to
accelerate the configuration phase of your
project.
– Office mode: unlock doors for free access during
office or shop hours.
– Combat theft and security threats by random
screening of cardholders.