Bosch Access Management System V3.0 User Manual

Bosch Access Management System V3.0 User Manual

Engineered Solutions | Access Management System V3.0

Access Management System V3.0

www.boschsecurity.com

Access Management System (AMS) is an access control system for stand-alone application or for integration with other systems, such as the Bosch video management system BVMS.

As a stand-alone system, it features a simple-to-use map and alarm viewer for a rapid assessment of all the devices and entrances on the site.

As an integrated system, it allows the operator of a video management system to perform door-related tasks like video-based ID verification, to grant and deny access, or to disable doors.

AMS combines the robustness, performance and features of high-end access control products with a modern UI that makes it faster to install and configure. The existing portfolio of Bosch access control devices can be easily scanned and integrated.

Data privacy and IT security is state-of-the-art, in order to comply with the latest data-protection regulations.

System overview

Access Management Server

The server is the main component for processing all data. It coordinates the activities of all the hardware and software components described below.

uCombines high-end access control features, performance and availability with intuitive operation.

uHighly scalable: Up to 200,000 users and 10,000 doors.

uEasy to use: Intuitive GUI and built-in map viewer.

uEasy to configure: Pre-packaged licenses, simple installation and set-up.

uComprehensive security management: Integrates with intrusion and video systems.

Master Access Controller (MAC)

The MAC is an additional security layer to increase system availability. It holds its own database to exchange information between AMCs, even if the main server or the network is down.

Access Modular Controller (AMC)

The AMC is a robust and reliable field controller to connect to up to 8 doors with readers and door strikes. With its large on-board memory the AMC can make autonomous decisions and store hundreds of thousands of access events, regardless of network interruptions.

Access Management Database

The SQL server holds all master data (cardholder, cards, authorizations, schedules, etc.) and also all access events. The latest version provides encryption to protect personal information from misuse or theft.

Access Management Dialog Manager

The Dialog Manager is the main user interface for configuring the system, and for collecting and maintaining access-related information. In particular, its personnel dialogs are used for enrolling new cardholders, and maintaining their access authorizations and credentials.

2 | Access Management System V3.0

Access Management Map View

The Map View is a simple-to-use application both to visualize the overall security situation of the premises, and zoom into close detail. It displays access violations, tampering and malfunction alarms, and allows the sending of commands directly from the maps themselves.

Access Management BVMS Interface

The seamless integration with BVMS (version 10.1 or higher) allows the video verification of cardholder identities from the BVMS operator client: a person requesting access with a valid card can be manually verified through camera live stream and the cardholder’s photo from the database. Camera events can trigger door actions. Door events can trigger camera actions.

Access Management Intrusion Interface

Management of up to 25 B and G Series intrusion panels. Shows area states (e.g. armed, ready to arm), detector states and intrusion events on Map View. Allows the sending of commands (e.g. arm, disarm) to panels.

Access Management SDK

This SDK facilitates the integration of 3rd party systems with AMS, for instance an Identity Management or Visitor Management system. A particular advantage is its ability to re-use 3rd party integrations initially written for BIS Access Engine.

Access Importer/Exporter

This tool facilitates data import and export from external systems for 1-time data migration, such as from Access PE systems, or regular data transfer from Active Directory via the LDAP protocol.

Topology diagrams

The following diagrams illustrate AMS configurations without and with BVMS.

1

HR

 

Reception

2

3

6

4 5

Stand-Alone topology

(1)AMS server

(2)Client workstation for enrollment

(3)Client workstation for access control and intrusion monitoring

(4)Optional MAC servers (one MAC license is always included, on the AMS server)

(5)AMCs for parking lot and door control

(6)Intrusion panel with detectors and touch-screen keypad

1

2

AMS

BVMS

4

5

6

3

BVMS Integration

(1)AMS server

(2)BVMS management server or DIVAR IP all-in-one

(3)BVMS Client workstation for access and video management

(4)Optional MAC servers (one MAC license is always included, on the AMS server)

(5)AMCs

(6)Entrances with cameras

Functions

Registration of new cardholders:

Use fully customizable enrollment dialogs to streamline the process of cardholder enrollment.

Capture both conventional and biometric characteristics, including photos and signatures.

Design and produce physical credentials.

Take advantage of dialogs for the mass import of stored personnel data.

Assigning of access authorizations:

Collect access authorizations into reusable profiles, and assign these to predefined or customized personnel types.

Door functions:

Use a comprehensive set of template door models, including elevators and parking lots, to accelerate the configuration phase of your project.

Office mode: unlock doors for free access during office or shop hours.

Combat theft and security threats by random screening of cardholders.

Loading...
+ 4 hidden pages