Bosch Access Management System V3.0 User Manual

Engineered Solutions | Access Management System V3.0
Access Management System V3.0
www.boschsecurity.com
u Combines high-end access control features,
performance and availability with intuitive operation.
u Highly scalable: Up to 200,000 users and 10,000
doors.
Access Management System (AMS) is an access control system for stand-alone application or for integration with other systems, such as the Bosch video management system BVMS.
• As a stand-alone system, it features a simple-to-use map and alarm viewer for a rapid assessment of all the devices and entrances on the site.
• As an integrated system, it allows the operator of a video management system to perform door-related tasks like video-based ID verification, to grant and deny access, or to disable doors.
AMS combines the robustness, performance and features of high-end access control products with a modern UI that makes it faster to install and configure. The existing portfolio of Bosch access control devices can be easily scanned and integrated. Data privacy and IT security is state-of-the-art, in order to comply with the latest data-protection regulations.
System overview
Access Management Server
The server is the main component for processing all data. It coordinates the activities of all the hardware and software components described below.
u Easy to use: Intuitive GUI and built-in map viewer.
u Easy to configure: Pre-packaged licenses, simple
installation and set-up.
u Comprehensive security management: Integrates
with intrusion and video systems.
Master Access Controller (MAC)
The MAC is an additional security layer to increase system availability. It holds its own database to exchange information between AMCs, even if the main server or the network is down.
Access Modular Controller (AMC)
The AMC is a robust and reliable field controller to connect to up to 8 doors with readers and door strikes. With its large on-board memory the AMC can make autonomous decisions and store hundreds of thousands of access events, regardless of network interruptions.
Access Management Database
The SQL server holds all master data (cardholder, cards, authorizations, schedules, etc.) and also all access events. The latest version provides encryption to protect personal information from misuse or theft.
Access Management Dialog Manager
The Dialog Manager is the main user interface for configuring the system, and for collecting and maintaining access-related information. In particular, its personnel dialogs are used for enrolling new cardholders, and maintaining their access authorizations and credentials.
HR Reception
1
2 3 6
4 5
AMS BVMS
1 2
3
4
5 6
| Access Management System V3.0
2
Access Management Map View
The Map View is a simple-to-use application both to visualize the overall security situation of the premises, and zoom into close detail. It displays access violations, tampering and malfunction alarms, and allows the sending of commands directly from the maps themselves.
Access Management BVMS Interface
The seamless integration with BVMS (version 10.1 or higher) allows the video verification of cardholder identities from the BVMS operator client: a person requesting access with a valid card can be manually verified through camera live stream and the cardholder’s photo from the database. Camera events can trigger door actions. Door events can trigger camera actions.
Access Management Intrusion Interface
Management of up to 25 B and G Series intrusion panels. Shows area states (e.g. armed, ready to arm), detector states and intrusion events on Map View. Allows the sending of commands (e.g. arm, disarm) to panels.
Access Management SDK
This SDK facilitates the integration of 3rd party systems with AMS, for instance an Identity Management or Visitor Management system. A particular advantage is its ability to re-use 3rd party integrations initially written for BIS Access Engine.
Access Importer/Exporter
This tool facilitates data import and export from external systems for 1-time data migration, such as from Access PE systems, or regular data transfer from Active Directory via the LDAP protocol.
Topology diagrams
The following diagrams illustrate AMS configurations without and with BVMS.
Stand-Alone topology
(1) AMS server
(2) Client workstation for enrollment
(3) Client workstation for access control and intrusion monitoring
(4) Optional MAC servers (one MAC license is always included, on
the AMS server)
(5) AMCs for parking lot and door control
(6) Intrusion panel with detectors and touch-screen keypad
BVMS Integration
(1) AMS server
(2) BVMS management server or DIVAR IP all-in-one
(3) BVMS Client workstation for access and video management
(4) Optional MAC servers (one MAC license is always included, on
the AMS server)
(5) AMCs
(6) Entrances with cameras
Functions
• Registration of new cardholders: – Use fully customizable enrollment dialogs to
streamline the process of cardholder enrollment.
– Capture both conventional and biometric
characteristics, including photos and signatures. – Design and produce physical credentials. – Take advantage of dialogs for the mass import of
stored personnel data.
• Assigning of access authorizations: – Collect access authorizations into reusable
profiles, and assign these to predefined or customized personnel types.
• Door functions: – Use a comprehensive set of template door
models, including elevators and parking lots, to accelerate the configuration phase of your project.
– Office mode: unlock doors for free access during
office or shop hours.
– Combat theft and security threats by random
screening of cardholders.
Loading...
+ 4 hidden pages