User Properties .............................................................................................................................................. 40
Models and Configurations ............................................................................................................................ 57
Door Properties ............................................................................................................................................. 75
The topics in this Introduction explain how to use the Web Management Application
generally.
The four main sections correspond to the four main navigation menus: Monitoring,
Access Control, Configuration, and Administration. These topics provide general
guidance, and have a sub-topic for each menu item.
Features and Tasks describes special features that are not centralized, and explains
tasks that are common to several screens.
Reference includes the Glossary and other reference material.
1Introduction
The Atlas Series by ZKTeco is a powerful, yet intuitive, electronic door access-control
system supporting the latest innovations in physical security and biometric access. Atlas
Series provides:
·
Secure and convenient fingerprint access using ZKTeco's industry-leading biometric
technology (Biometric Atlas Series models only)
·
Support for industry-standard Wiegand and OSDP card readers, with flexible card
format definitions
·
Powerful, intuitive, Web Management Application built in to the Controller — all you
need is a web browser; no PC software to install or maintain.
·
Scalability up to 84 Doors by adding Secondary Controllers, quickly and easily using
network-based discovery
·
Critical emergency functions: global lockdown, global emergency unlock, alarm
management, duress PINs, emergency codes, and muster reporting
Your Primary Controller should already be installed and configured. (If the Setup Wizard
appears when you log in, configuration is not complete. Complete the configuration
before continuing.)
To get started:
1. Open a web browser and log in to the Web Management Application.
2. Register the product and add any additional licenses you purchased. Registration is
required if you ever need to reset your system password, and optionally allows ZKTeco
to contact you about software updates and other information. Additional licenses
expand the capacity of your system.
3. Review the Home Screen and Menus.
4. Understand List Views and Property Views. Most screens use one of these views.
5. Take a look at the configuration of your Doors, particularly the Default Mode and
the Door Mode Schedule.
6. Learn about the different ways you can assign door access to Users.
7. Consider setting up access for mobile devices.
You now have a fully functioning access control system. Read about Monitoring and
Notifications so you can see what's going on in your system.
Important: After getting started, learn to use the Atlas Series Emergency Features.
Some of these require significant setup before you can use them to protect your Users.
15
Introduction7
122
15
7
1214
73
108
37
17
1.1Home Screen and Menus
The Home Screen displays a dashboard-style summary of your system, including recent
Event activity. The Menu Bar is available on this screen, as it is on every screen in the
application.
Potential security issues and problems are highlighted in red, including Lockdown and
Emergency Unlock counts. You can click the links for more information. You can always
return to this screen using the Home button towards the upper right on the Main Menu.
The dashboard summary squares include:
·
Controllers status summary — link takes you to Hardware
·
Doors status summary — link takes you to Door Status
·
Backup status (next scheduled backup, most recent backup) — link takes you to Backup
and Restore
·
Web/Mobile connected client count, and whether the Admin password has been
secured (Go to the Users module and change the Admin password to secure it.)
·
Recent Events — + View More link takes you to Events
The exact summary squares visible depend on your User Role. Also note that when
logging into a Secondary Controller, the summary squares are extremely limited due to
the fact that the Secondary Controller gets its data from the Primary Controller.
The Main Menu bar is at the top right of all screens.
Lockdown and
Clear
Lockdown
Click Lockdown to quickly lock
all Doors in an emergency
situation. When a global
lockdown is in effect, a
message is displayed
prominently in the Menu Bar.
Note that initiating a
lockdown will create an
Alarm by default.
Click Clear Lockdown to reenable access and return
Doors to their default or
Scheduled Door Mode.
See Lockdown for more
information.
Alarms
When there are active Alarms,
this icon will be red or yellow
and show the number of
current Alarms. Click to go to
the Alarms screen.
Notifications
Click to view the
Notifications you have
subscribed to. The number of
Notifications waiting for you is
displayed under the icon.
Layouts allow you to view
multiple features or screens at
a time. For example, select a
3-panel layout to work on
Access Levels and
Schedules while viewing
live Events. Each panel has
its own navigation menu.
Select the single-pane layout
to return to the standard
view.
Menu
Opens a menu showing several
miscellaneous options. See
below.
The exact Main Menu items available depend on your User Role. Also note that
when logging into a Secondary Controller, the menu items are extremely limited,
because it is mostly managed by the Primary Controller.
The Navigation Menu contains items for all of the main screens in the application,
organized under four subject buttons. The Navigation Menu is repeated in every panel of
multiple-panel layouts. This help manual is organized like the menu—four main sections
containing a subtopic for each menu item.
The subjects are Monitoring, Access Control, Configuration, and
Use the Back and Forward buttons to navigate through your own history of accessing the
screens. (The browser's navigation buttons do not work inside the Web Management
Application).
The exact Navigation Menu items available depend on your User Role. Also note that
when logging into a Secondary Controller, the menu items are extremely limited, because
it is mostly managed by the Primary Controller.
Menu Button Items
Language
Set's the language for the current User. Saved as the default for
this User.
Available languages depend on your software license. Contact
your authorized ZKTeco representative for license upgrades.
Preferences
Set's the preferences for the current User. Saved as the default for
this User. The preferences are
·
"Items per Page", the number of items shown in one page of a
list, and
·
"Card Enrollment Point."
Save Logs...
Creates a file containing program logs and other information for
investigating problems. Use when asked to by technical support. If
possible, save the logs right after you see a problem, and have it
available when contacting technical support.
You can move the displayed columns by clicking and dragging on the column title.
Click the triple bar icon to select which columns to show.
Lists run to extra pages when the number of items exceed your personal Items per Page
set in Menu: Preferences.
This box appears at the bottom of the list when there are pages. You can go forward or
back a page, go to the end or beginning, or enter a page number.
Most configuration is viewed or changed in Property Views. These screens display a list of
items you have created on the left, with their properties on the right.
The list can be searched using the same tools as in List Views.
12
Use the buttons above the properties to create new items, save changes, or delete items.
Many Property Views add additional action buttons to the menu bar. These are generally
specific to the kind of screen they are displayed on, and their functions are described in
the documentation for the specific screens. These are shown in gray if they don't apply to
the currently selected item.
1.4Logging In and Passwords
To access the Web Management Application, open a web browser and enter the IP
address of the Primary Controller provided by your Atlas Series administrator. (In some
browsers, you must type "https://" before the address.) You should "bookmark" this link.
Your browser might display an insecure site warning. The means to bypass this varies
among browser applications, but should be shown on the error page as a link labeled
"Advanced", "Details", "More Information", or something similar. You can prevent this
warning for all Users by installing a signed HTTPS certificate.
Introduction15
108
Enter the username and password provided by your administrator. If you have lost the
password for the "admin" user, see Password Reset.
You cannot change your password unless you have access privileges to edit Users. Ask
your administrator for password changes.
1.5Product Registration and Licenses
Registration is required if you ever need to reset your system password, and optionally
allows ZKTeco to contact you about software updates and other information.
Additional licenses let you increase the capacity of your Atlas Series system. You can
·
increase the number of Doors or Secondary Controllers allowed,
·
increase the number of mobile device connections, and
120
38
120
·
add to the languages the system supports.
(Note that "Out" Doors are not counted towards your maximum authorized doors.)
Follow these steps to register for the first time or to update your registration information.
1. Registration can be started in two ways:
a. When you log in the first time, click Register Now in the Register Your Product pop-
up window, or
b. Select Menu: About, and click the Register button. (If you have previously
registered, the link is Update Registration.)
2. Click the New Registration button in the next pop-up window. (If you have previously
registered, the button is View/Update Registration.)
3. Fill in the registration information. Asterisks indicate required information. The email
address you enter must be able to receive your registration information.
4. Submit your registration automatically or by email.
a. For automatic registration, click the Submit Online button. You will see a progress
window followed by a success message.
b. For email registration:
i. Click the Offline Registration button. Read the instructions in the following
window.
ii. Click the Download registration file link, and save the registration data file to
your computer.
iii. Create and send an email message by clicking the email link or entering it in your
email program. Your email must contain the registration data file as an
attachment, with its original name. The subject and text of the email do not
matter.
You will receive a registration confirmation file by reply email. When you do,
1. Open the email and save the attachment to your computer.
Contact your authorized ZKTeco representative for license upgrades. Current license
information can be viewed on the About screen.
2. Click the Upload Confirmation button. (If you have already exited from registration,
then return to this option by selecting Menu: About and clicking the Register button.)
3. Find and open the registration confirmation file you saved.
You should see a "Registration successful" message window.
How to Add Licenses
When you acquire an additional license, you will receive a license file from ZKTeco. Save
this file on your computer, then:
1. Select Menu: About.
2. Click the Upload Additional Licenses button.
3. Click on the Browse button, and Open the license file you received.
4. Click OK. Your new capabilities should be listed on the About screen.
·
Home Screen and Menus
·
Password Reset
Introduction17
Related Topics
7
120
1.6Notifications
Notifications allow each user to select certain Events they wish brought to their
attention. When one of these Events occurs, it will appear in the Notification window of
that User, and remain there until acknowledged.
Notifications can be copied to you by email.
Click the Notifications icon in the Menu Bar to open and close the Notifications Window
at the bottom of the screen.
Your Atlas Series system is designed with a number of important features used to aid in a
variety of emergency situations.
·
Lockdown can be configured and used to secure facilities against an active intruder
111
or threat.
·
Emergency unlock can be configured and used to aid access by emergency personnel
113
in the event of an active emergency condition signaled from another system
·
Duress PINs can be used to allow users to signal a duress condition during their
114
otherwise normal access
·
Emergency Codes can be configured and used to allow access to emergency or
48
security personnel using a PIN-code only, regardless of Door Mode (including lockdown),
or Multi-User Access Rules.
·
Muster can be used to aid in the tracking of users during an evacuation, or
30
evacuation drill
·
Alarms and Notifications can be configured and used to make sure the correct
2417
personnel are aware of potential emergency situations
Important: All emergency functions intended to be used in your system should be tested
ahead of time, to ensure that everything is configured and working correctly.
Important: These emergency functions are designed as a supplement to, but not a
replacement for, life-safety infrastructure for your facility. Life-safety functions are
regulated by country- and region-specific fire codes. Please refer to these when designing
and configuring your system to ensure compliance.
Events is a live view of everything that happens in the system.
Alarms shows Events that you have determined should be immediately reviewed and
action taken. Each Alarm must be acknowledged and cleared by someone who has
resolved the problem. Note that Events do not become Alarms until you set up Alarm
Triggers.
Door Status shows the current state of every Door, whether it be on line, locked,
alarmed, and so forth.
Maps show similar status as Door Status, with visual indicators displayed on a Map of
your facilities. The Maps must first be created in Maps (Configuration) .
Muster is a special report that can show you where Users are in an emergency or an
evacuation drill. To use the Muster report, you should first designate Muster Areas. Users
must check in at the Muster Areas to indicate that they are safely out of the facility.
The remaining menu items are simple reports.
Audits shows configuration changes and actions performed by Users logged into the
Web Management Application.
Event History is a report view of Events, with the ability to display a larger number
Events and export to CSV and PDF.
Alarm History shows all Alarms, including those that have been resolved (resolved
Alarms are not shown on the live Alarms screen).
User Access Level Report shows which Users have a specific Access Level.
Monitoring gives you live views of what's occurring in the system, and printable reports of
configuration and history.
User Door Report shows which Users have access to a specific Door. This report
includes Doors directly assigned to the Users as well as those assigned via an Access
Level.
·
Reports and Printing
Filter
Opens a panel where you can restrict the Events you wish to see in
the list view. Your filters remain in place each time you log in.
Settings take effect when you click the Search button, at the
bottom of the panel. The Reset button clears all filters.
User and Device Filters
The display shows only the Events that match all the filters you
specify. Note that the Name filters are case-insensitive, and will
find partial matches. For instance, if you enter "john", the display
will also show Events for "John", or "Johnny".
Event Type Filter
The display shows Events that match any of the Event Types you
have checked. If nothing is checked, all Events are displayed.
48
Related Topics
2.1Events
Events displays a real-time list of Events occurring within the system. Events that trigger
Alarms are displayed in a configurable color.
36
115
24
To receive an email when important Events occur, see Notifications.
Up 1000 Events can be displayed. To view more Events, use Event History.
Clear the current list of Events from the display, so only new Events
appear. Events are hidden, but not deleted.
Events Columns
Some columns will be empty for certain types of Events.
Icon
Category of Event
Occurred
When the Event actually occurred (determined by the Controller
on which it occurred)
Description
Text of the Event
User
The User associated with the Event. This could also be a Shared
Access Code, Emergency Code, or credential (card, PIN) that is
not assigned to a single User.
Source
The device that recorded the Event. For door access Events, this is
a Door. For other Events, this may be a Controller, input, output,
or other device.
Recorded
(Hidden by default) The time the Event was received and recorded
by the Primary Controller. This only differs from Occurred if the
Secondary Controller where it occurred was offline with the
Primary Controller at the time of the Event.
Controller
(Hidden by default) Controller where the Event occurred
Area
(Hidden by default) If the Event is associated with an Area (for
example a Door entering an Area), the Area is indicated here.
(Hidden by default) If the source is associated with a Location, it
is indicated here.
The oldest Events are are automatically archived to CSV files on the Primary Controller
when the maximum number is reached. To download the archived data, see Archive
Downloads.
To change the maximum number of Events in the system, go to System Settings and set
the Maximum Events in Database.
·
Using List Views
·
System Settings
·
Event History
Event Archiving
107
Related Topics
79
100
2.2Alarms
Alarms are issues that may indicate a potential security threat or other problem. They
cause a warning display on the Main Menu bar, and they remain in effect until they
are resolved by a User.
Alarms are triggered by Events. Some Event Types are set to trigger Alarms by
default. You can make more Events trigger Alarms, or change the defaults, in Alarm
Triggers.
To receive an email when an Event causes an Alarm, see Notifications.
12
100
33
7
22134
87
17
The color of an Alarm is determined by its state, which can be:
Indicates that a User is aware that the Alarm has occurred,
changing its state to "Acknowledged." The User is indicating they
have accepted an agreed level of responsibility for resolving the
issue.
Resolve
Indicates that any problem has been dealt with, changing its status
to "Resolved." The Alarm will be removed from this screen, but can
be viewed in Alarm History. Alarms must be acknowledged
before they can be resolved.
Acknowledge
All
Acknowledges all Alarms that are in the "New" state
Resolve All
Resolves all Alarms that are in the "Acknowledged" state
Description
Description of the triggering Event
Source
The device that recorded the Event. For door access Events, this is
a Door. For other Events, this may be a Controller, or other device.
·
Acknowledged (Yellow) — this means that some User has acknowledged the Alarm.
Resolved Alarms are removed from the list. They can be viewed in Alarm History.
Repeated Alarms are merged into a single Alarm. The Count column shows how many
times it has occurred, and Last Recorded shows the most recent time it occurred. Alarms
are merged when they are identical in all ways except for the date and time. Once
resolved, any new occurrence will make a new Alarm.
The Maps view is used to show the status of your Doors and Controllers on graphical
backgrounds, for example, on Maps of your building or campus. It highlights all problems
in red, and allows sending commands to Doors. Maps may also have links to other Maps
for easy navigation.
In this example there are two Doors and two Controllers. The "Rear Door" is offline and
should be checked on. They gray icons represent normal operation.
Make the Map larger or smaller. When zoomed in, you can click
and drag on the Map to see different areas.
·
Using List Views
·
Maps (Configuration)
·
Manual Commands
Muster points can be created when creating 1-door model Controllers.
1. Go to Hardware.
2. Select a 1-door model.
3. For Configuration, select a Muster option, such as In Only + Muster Point.
You can also modify 1-door or 2-door Controllers or enrollment points into Muster Points.
For example:
1. Go to Hardware.
Related Topics
2.5Muster
The Muster report shows the last known location of Users who are not registered in a safe
Area. Use this report when evacuating a building or buildings or performing an evacuation
drill. This lets security personnel know who is still inside the building(s).
12
82
115
Users counted as "safe" are
·
Users who have exited to Global Out or reported at a Muster Point and
·
Users who have not used any Door within 24 hours.
Muster reports may or may not include Users who have used a Shared Access Code or
Emergency Code.
1. Go to Muster. A list of existing muster points is displayed at the bottom.
2. Select List By — Last Name or Area.
3. Select Orientation — Landscape or Portrait.
4. Click Generate.
·
Reports and Printing
·
Hardware
·
Emergency Features
Orientation
Displays the report in "Portrait" or "Landscape" view
Audit Type
·
Database Change — shows changes to items in the database
(Users, Doors, Access Levels, etc.), and enables further filtering
Related Topics
Monitoring31
2.6Audits
Audit reports list configuration changes and actions performed by Users of the Web
Management Application. Use these reports to see who unlocked a Door, gave access to a
User, configured Access Levels, and other system operations.
When generating the report, you are prompted for the following options. Options vary
based on the Audit Type selected. Click Generate to create the report.
Export the displayed Events to a data file appropriate for importing
into program like Excel. ("CSV" designates the "comma separated
values" file format.)
Export PDF
Save the displayed Events as a printable report in PDF format.
Settings take effect when you click the Search button, at the bottom of the panel. The
Reset button clears all filters.
Date and Time Filter
Shows only Events from the specified time period.
User and Device Filters
The display shows only the Events that match all the filters you specify. Note that the
Name filters are case-insensitive, and will find partial matches. For instance, if you enter
"john", the display will also show Events for "John", or "Johnny".
Event Type Filter
The display shows Events that match any of the Event Types you have checked. If nothing
is checked, all Events are displayed.
Event History displays a list of Events according to a filter, and allows export to CSV and
PDF. The maximum number of Events in this screen is limited only by the number of
Events in the database. For a real-time view, see Events.
The oldest Events are are automatically archived to CSV files on the Primary Controller
when the maximum number is reached. To download the archived data, see Archive
Downloads.
To define the maximum number of Events in the system, go to System Settings and set
the Maximum Events in Database.
·
Using List Views
·
Reports and Printing
·
System Settings
·
Events
Filter
Opens a panel where you can define the kind of Alarms you wish to
see.
22
Event Archiving
107
Related Topics
100
22
2.8Alarm History
Alarm History displays all Alarms, including resolved ones. Resolved Alarms are hidden in
the Alarms screen. This view does not update in real-time or allow you to acknowledge
Settings take effect when you click the Search button, at the
bottom of the panel. The Reset button clears all filters.
Date and Time Filter
Display Alarms from a range of dates and times.
User and Device Filters
The display shows only the Events that match all the filters you
specify. Note that the Name filters are case-sensitive. For instance,
if you enter "john," the display will not show Events for "John."
Event Type Filter
The display shows Alarms that match any of the Event Types you
have checked. If nothing is checked, all Alarms are displayed.
Export PDF
Save the displayed Alarms as a printable report in PDF format.
User Access Level Report creates a report of all Users who have a selected Access
48
Level.
This report does not include Shared Access Codes or Emergency Codes.
Related Topics
38
48
2.10User Door Report
User Door Report creates a report showing which Users have access to a specific Door.
This report includes Doors directly assigned to the Users as well as those assigned via an
Access Level.
This report does not include Shared Access Codes or Emergency Codes.
38
4648
115
38
4648
This report also excludes Users with no credentials (no cards, PIN, or biometrics).
Create Users to provide door access to individual Users who use a credential such as a
card, a PIN, or a biometric fingerprint. This is the most common door access method and
allows you to track who comes and goes. You can simply give each User unrestricted 24/7
access to Doors, or further restrict their access using the following features.
Set up Schedules to allow access only at certain times, such as during business hours.
Create Access Levels to predefine a set of Doors and Schedules that can be quickly
assigned to multiple Users.
Specify Special Days to restrict access more than usual for holidays, corporate events,
or other days when access rules should differ. Special Days are used in Schedules.
Create Shared Access Codes, which creates PIN codes that anyone can use to unlock
deisgnated Doors.
The following features are used in special situations:
Emergency Codes are PIN codes that unlock Doors in an emergency.
Multi-User Access requires more than one User to present credentials to unlock
sensitive areas. For example, a rule could be created such that three Users must present
their card to open a Door.
Door Mode Schedules function like normal Schedules but are used in the Doors
configuration to schedule Door Mode changes.
The Access Control menu is primarily for determining who can open Doors, when, and
how (cards, PINs, and biometrics).
You can also perform related tasks such as creating Users for the Web Management
Application and creating Door Mode Schedules.
A photo of the User. This is shown here, and can be printed on a
card. To add or change the photo, click the photo image and
select an image from your computer. Supported image formats are
PNG, JPEG, and GIF.
Role
Cardholder Only for cardholder. The other Roles provide access to
the Web Management Application. Each Role provides a different
level of access; see User Roles. Users with the ability to log in
also can have Door access.
Username and
Password
If Role is not Cardholder Only, this is the username/password used
to log in to the web application.
Cards
Add any number of cards that will be used for access. You can use
a Card Enrollment Point to add a card number.
Adding a card does not provide access; the User will also need
Access Levels or Doors assigned, below.
Fingerprints
Shows whether the User has any fingerprints enrolled, and allows
them to be enrolled. (Fingerprints are only available if the Primary
Controller supports biometrics.)
PIN
PIN (Personal Identification Number) for the User, numeric only.
Click Create New to generate a random, unique PIN. The length
must match the PIN length defined in System Settings. (The
default is 4 characters).
Access Levels,
Door Access
·
Add Access Levels that have been defined, and/or
·
Add Door Access entries to customize access for this User.
Displays whether the current User's status is Valid or Invalid. The
status will be Invalid if the current date is outside of the and ValidTo range, or if Disable User is checked.
First Name and
Last Name
The User’s first and last name. Both required, maximum 32
characters each.
Photo
A photo of the User. This is shown here, and can be printed on a
card. To add or change the photo, click the photo image and
select an image from your computer. Supported image formats are
PNG, JPEG, and GIF.
Related Topics
40
92
114
48
118
45
14
3.1.1User Properties
The following are the properties available on the Users screen:
A unique identifier, such as an employee ID. Maximum 32
characters
Role
Cardholder Only for cardholder. For Users with the ability to log in,
select another Role. See User Roles. Users with the ability to log
in also can have cards.
User Group
Select a User Group which will be used when applying Multi-User
Access rules. This is used if multiple Users are required to
present their credentials to open a Door.
Username
If Role is not Cardholder Only, this is the username used to log in to
the web application.
Password
If Role is not Cardholder Only, this is the password used to log in to
the web application.
Language
The User's preferred language, which will be
·
displayed on card readers that support multiple languages (such
as some OSDP readers), and
·
the User's default language in the Web Management Application.
Available languages depend on your software license. Contact
your authorized ZKTeco representative for license upgrades.
Valid From
The date when access should begin. The default is the current date.
This applies to both Door access and Web Management Application
access.
Until Further
Notice, Valid
To
If Until Further Notice is checked, then the User's access never
expires. If it is unchecked, then the Valid To date must be provided,
which determines when the User's access expires. This applies to
both Door access and Web Management Application access.
If checked, the User's access is disabled. This applies to both Door
access and Web Management Application access.
Vacation From,
Vacation To
If this date range is entered, it is a vacation date range during which
the User's Door access is suspended. Web Management Application
access is not affected by vacation dates.
Email
The User’s email address. This is required for the User to receive
system emails such as Notifications.
Mobile Phone
The User’s mobile phone number.
Custom 1-4
Custom fields corresponding to those configured in System
Settings.
Cards
Click Add to add card numbers for Door access. Click Enabled to
enable or disable a card. To enter a card number by swiping the
card, see Card Enrollment Points.
Fingerprints
Shows whether the User has any fingerprints enrolled, and allows
them to be enrolled.
Fingerprint enrollment requires a ZKTeco USB enrollment reader
and its Fingerprint Driver software (available on the Downloads
page at ZKTecoUSA.com).
The PIN (Personal Identification Number) used for Door access.
Numeric only. The length must match the PIN length defined in
System Settings (default is 4 characters).
·
PIN numbers must be unique, including Duress PIN codes, Shared
Access Codes, and Emergency Access Codes.
·
Click Create New to generate a random unique PIN number.
·
Click Clear to clear the PIN.
Duress PIN
The duress PIN generates a duress access Event when used in place
of the normal PIN. Access is still granted if all other normal access
conditions are met. See Duress for more details. For Duress PINType:
·
Select None if the Duress PIN is not used.
·
Select Add 1 to Last Digit to add one to the last digit, only, of the
normal PIN. For example, a normal PIN of 1111 would then have a
duress PIN of 1112, and a normal PIN of 9999 would have a duress
PIN of 9990.
·
Select Explicit to enter an specific Duress PIN for this User.
Numeric only. The length must match the PIN length defined in
System Settings (default is 4 characters).
Use Extended
Door Times
If checked, extended Door unlock and held times are used when this
User is granted access. This is for Users requiring additional time to
get through a Door, for example a person with a disability. The
amount of extra time is set on each Door.
Anti-passback
Exempt
If checked, the User is not subject to anti-passback rules.
You can print to a specialized printer that writes ID cards. You can also print a paper
receipt for your use as a record or to authorize pickup at a remote printer.
Access Control45
45
To do either, you must first create Card Designs.
83
To print, select a User, and:
1. Select a card design. (Your choice will be saved for this User.)
2. Click Print Card or Print Receipt.
3. Select a card number from the list.
4. Click Print and follow the prompts.
To complete the prompts, see Reports and Printing.
A CSV (comma-separated value) file can be add any number of Users using data from
another software program. The other program must be able to export to CSV or a format
you can convert to CSV. The CSV itself must be modified to exactly match the Atlas Series
import format using software such as a spreadsheet editor.
On the Users screen:
38
Page 46
Atlas Series User Guide46
·
Users
·
User Properties
1. Click Import.
2. Click the link to download a template file that includes a sample of the required data
format.
In your own software:
3. Open the file and read the included instructions.
4. Create a copy of the file.
5. Modify the file with data for the users you want to create.
6. Save the file in CSV format.
a. Make sure the file is in plain text and does not include any additional characters or
encoding.
b. For example, if using any non-ASCII characters, the file must be encoded as UTF-8.
On the Users screen:
38
7. Click Import.
8. In the dialog, click Import.
9. Select the file from your computer. The file must have the ".csv" extension.
10.Click Yes to verify and import the file.
11.The number of imported Users is displayed. Click OK, and you will see the newly
imported Users.
Related Topics
38
40
3.2Shared Access Codes
A Shared Access Code is a PIN that multiple people can use to access specified Doors.
An Emergency Code is a PIN that allows access to Doors regardless of other settings,
including the Door Mode. (Compare to Shared Access Codes). It is intended to be used
by emergency and security personnel to gain access in emergency situations.
46
This means that an Emergency Code can access a Door which is under Lockdown.
111
The successful use of an Emergency Code generates an Emergency Code Presented Event.
The Emergency Code Presented Event is configured as an Alarm Trigger by default,
generating an Alarm. The Emergency Code Presented Event can also be used as a
24
Linkage to trigger the activation of an auxiliary output on the Hardware screen.
Emergency Codes are exempt from anti-passback and Multi-User Access. (Compare
to Shared Access Codes.)
46
11852
Emergency Codes otherwise have the same properties as Shared Access Codes.
Use of Emergency Codes will impact the accuracy of a Muster report for the emergency
30
87
61
46
personnel who use them.
Related Topics
14
3.4Access Levels
46
48
20
An Access Level is a predefined list of Doors paired with the Schedules during which
access is allowed for each Door. When an Access Level is changed, the new definition
immediately applies to each User or code assigned that Access Level.
Access Levels can be applied to Users, Shared Access Codes, and Emergency
Codes. On each of those screens you can apply one or more Access Levels, and you can
48
3846
provide customized access to individual Door/Schedule pairs.
Click the Add and Remove buttons to add and remove Doors from the list.
Use the ellipsis buttons (...) to change the selected Doors and Schedules.
You can include the same Door multiple times with different Schedules. Access will be
allowed for a given Door during all the Schedules associated with it.
·
Using Property Views
·
Schedules
·
Users
·
Shared Access Codes
·
Emergency Codes
Access will be allowed during all the time periods you create. Click the Add and Remove
buttons to add and remove time periods from the list.
Times (Start-
Stop)
The left-side bar shows the time period access is allowed in
green. You can drag the ends of the green bar to change the time
range. You can also enter the exact times you want in the boxes
Related Topics
49
Access Control49
14
38
3.5Schedules
Schedules are used to limit access to certain days and times. They can be used in Access
Levels and anywhere Door access is assigned.
By default, access is not allowed on Special Days.
The built-in "24/7" Schedule allows access at all times, including Special Days.
under the bar. Times are entered and shown using a 24-hour
clock (as opposed to "a.m". and "p.m.") Each bar can only have
one time range; to have two time ranges on the same days, add
another entry. The All day button is a convenience to reset the
bar.
Days
The middle bar shows the days that access is allowed in green.
You can click each day to change access, or you can use the
convenience buttons to change the current selection. The
convenience buttons are Weekdays, All days, and Weekend.
Special Days
The right bar appears green if you have included any Special Days
for that time period. Click the bar to select Special Days to
include. In the Special Days selection screen, you may check one
or multiple Special Day types.
Access is normally denied on Special Days. Access will be allowed
if you include the Special Days in the Schedule. For more
information, see Special Days.
·
Using Property Views
·
Special Days
Related Topics
14
51
3.6Door Mode Schedules
Door Mode Schedules are used to change the mode of Doors at different times. For
instance, they are commonly used to automatically unlock public Doors during business
hours.
Click the Add and Remove buttons to add and remove time periods from the list.
In the left column, select a single Door Mode. A Door will automatically change to this
mode during the time period defined.
The time periods are defined the same way they are for Schedules. See Schedules.
·
Using Property Views
·
Door Modes
·
Special Days
·
Schedules
Door Mode Schedules are assigned to Doors on the Doors screen.
73
A Door Mode Schedule can have multiple time intervals with different associated modes.
Note that emergency Door Modes cannot be scheduled.
Using the Screen
49
Related Topics
14
142
51
49
3.7Special Days
Special Days are single calendar days (such as May 5th) where access is denied by default,
even if it would normally be allowed by a Schedule. They can be added to Schedules so
that certain Users do have access on those days.
Special Days are used for holidays, corporate events, and other cases where you do not
want your usual access to be granted. For instance, you might use Door Mode Schedules
to automatically unlock Doors during business hours Monday-Friday, but you do not want
to do that on holidays.
Note that the special Schedule, "24/7", allows access at all times and is not affected by
Special Days.
Special Days are grouped into a number of Special Day Types. A type is essentially a
calendar. For instance, one type might include all government holidays, while another
might be teacher work days. You can then set different access rules for the different
calendars.
Only Special Day Types can be added to a Schedule. So, you could add access on all
government holidays, but not on a single one, unless you made a type with just that one
day.
In the first section, Special Day Types, you can change the names of the types to
something useful, such as "Government Holidays" or "Teacher Workdays". You may also
change the color assigned to each type. The color has no effect except on this screen.
The second section, Special Days, shows a calendar highlighting all Special Days of all
types in their color. To add or remove a day, click on it.
The two options above the calendar change what happens when you next click on a day.
They cannot change the properties of current Special Days.
·
Select Special Day Type: days added on the calendar will be this type. You cannot add
days if no type is selected.
·
Set as Repeating: when checked, days added on the calendar will be repeating. This
means they will occur every year on the same calendar date. They are displayed with a
small "R", and can be seen on every year.
Note that any single day can only be in one Special Day Type.
·
Schedules
·
Door Mode Schedules
Using the Screen
Related Topics
49
50
3.8Multi-User Access
Multi-User Access is used to require multiple Users to present their credentials to open a
Door. This is often used for high security areas. For example, an area might require two
You must first create one or more User Groups whose members can cooperate to
access a specific Door.
Click the Add and Remove buttons to add and remove User Groups from the Rules list. If
multiple rules are created, they all must be satisfied in order for access to be granted. If
there are no rules in a specific Multi-User Access definition, associated Doors will behave
as if they have no Multi-User Access restriction.
Apply the Multi-User Access rule on the Doors screen.
·
Using Property Views
·
User Groups
·
Doors
managers and one security guard to present their credentials. The credentials they may
submit are those required by the Door's current Door Mode.
Shared Access Codes cannot access Doors with Multi-User Access rules in effect.
Emergency Codes are exempt from Multi-User Access rules.
Areas are used with anti-passback and airlock. They define physical regions where
you can restrict access using those features. The Muster Report also relies on Areas to
determine whether each User is at a known, safe Area (Muster or Global Out).
You can also create Maps of your buildings and campus. Monitor these Maps to watch
the live status of Doors and Controllers on an actual map of your facility.
Card Designs allows you to create the print layouts for Printing Cards.
Card Formats define what kind or brand of cards you use. Your Atlas Series system
includes all of the card formats you will likely need. Use this screen to create a format for
an unusual type of card, or to enter a "facility code" as instructed by your card vendor.
Create User Groups to use with Multi-User Access.
Set up Alarm Triggers to define which Events trigger Alarms.
Each system includes one Primary Controller. This is the one you log in to with your web
browser to manage or monitor the entire system. It maintains all the data and
configuration, and directs all Secondary Controllers.
Secondary Controllers are added to manage additional Doors. They receive their
configuration from the Primary Controller. However, they keep a copy of the data, so they
continue operate if the primary is not on line. You can log in directly to a Secondary
Controller through a link on its Hardware page, but only to change a few local values,
such as the Network settings.
Important: The Primary Controller must support biometrics if any biometric Controller
will be used in the system.
Every Controller has a built-in Sub-controller (I/O). It is displayed under the Controller in
Hardware with the additional label, "I/O", meaning "input/ouput". The Sub-controller
manages the advanced details of the readers, inputs, and outputs of the hardware.
Every card, PIN, and biometric reader in the system is represented as a Door—though you
might not think of some as doors at all! A Door in the Web Management Application
might represent one of many things:
·
A real, physical door that can be entered
·
A second reader that allows exit through a physical door. Notice that this means an
In/Out physical door is represented by two Doors, one for "In", and one for "Out".
·
Something that functions like a physical door, such as a turnstile or garage gate
·
A reader by itself, with no physical door, used as a Muster Point or Card Enrollment
Point
Doors are created on the Hardware screen, either automatically when the Controller is
created, or by customizing the Controller.
·
Hardware
·
Doors
Doors
57
30
117
56
60
Related Topics
56
73
4.2Hardware
Hardware represents the system's Controllers and all their physical connections to
readers, locks, door contacts, and other inputs and outputs. This is where you configure
electrical connections and Controller settings. Door behavior, such as Door Mode or
opening times, are configured in Doors.
Important: The Primary Controller must support biometrics if any biometric Controller
will be used in the system.
"In" Doors are automatically created and are permanent, though they need not be used.
Secondary Doors are Out Doors, Card Enrollment Points, and Muster Points. The Readers
of Secondary Doors are always paired with the Readers of In Doors in a defined way.
Controller
Type
"In" to
"Secondary"
Reader
Pairings
1 door
1 to 2
2 door
1 to 3
2 to 4
4 door
1 to 5
2 to 6
3 to 7
4 to 8
For example, on a 4 door Controller, Door 2 always uses reader #2 and is an "In" Door. If it
has an "Out" Door, that Door will always use reader #6.
The reader number is not necessarily the same as its address. For Wiegand, the reader
number is the same as the labels on the hardware, but any reader can be changed to use
any available RS-485 address.
Notice that 4 door Controllers only have enough Wiegand reader ports for the "In" Doors.
Any secondary Doors must use RS-485.
Configuration Property
The Configuration property of a Controller determines what the Controller's Doors will be
used for: authorizing Door entry, perhaps Door exit, or as special purpose readers.
Configuration options available depend on the Controller model. Each option will involve
one or more of the following possibilities. Each possibility determines the function of the
card, PIN, or biometric readers connected to the Controller.
In Only
This the most common configuration, where a reader is used to
gain entry, but no credentials are required to exit (although an exit
button may be configured for opening the Door from the inside).
In/Out
The physical door will have a reader both inside and outside.
Authorization is required to pass either direction.
+ Muster Point
The second reader will serve as a Muster Point, where Users can
register that they have reached a safe location.
+ Card
Enrollment
Point
The second reader will be used to easily enter card numbers when
adding Users. See Card Enrollment Points.
The available options do not cover all possibilities. For instance, 2 and 4 Door Controllers
do not offer Muster Points or Enrollment Points as standard Configurations. To tailor the
configuration to your needs, see Modifying Controller Configuration. Modifying might
be easier if you start with "In Only" as a baseline.
Select the number of the "In" Door which will have an "Out" Door
paired with it.
Add Muster
Point
Enter a Name for the new Door, and select the "In" Door number
to pair it with.
Add Card
Enrollment
Point
Enter a Name for the new Door, and select the "In" Door number
to pair it with.
Remove
Secondary,
Muster, or
Card
Enrollment
Point
Select the number of the "In" Door that will have its paired Door
removed.
4.2.2Modifying Controller Configuration
60
The "Modify" button on the menu bar is used to customize the Configuration property
of a Controller. You will need to understand Models and Configuration to effectively
customize a configuration.
Clicking "Modify" brings up a list of options. Some options will be disabled when they
cannot be applied to the Controller as its readers are currently configured.
All options present a dialog to enter specifics for your change. The options are:
The name of the Controller. Required, maximum 32 characters.
Model
The model of the Controller.
IP address
(Secondary Controllers only) IP address or hostname of the
Controller.
Port
(Secondary Controllers only) Port number for the Controller.
Disconnected
If checked, the Secondary Controller is treated as if it does not exist,
and communication is not allowed. This cannot be checked on the
Primary Controller.
This can be useful during the installation of hardware.
Status
Displays the current status of the device, including Online/Offline. If
any tamper, power, or battery problems are present, these will be
The body of the Hardware screen allows Controller configuration and displays data about
the Controller. Each Controller is represented by two components: (1) the Controller itself
for general configuration, and (2) a Sub-controller (I/O) for detailed settings of readers,
locks, door contacts, and other inputs and outputs.
Sub-controllers can be configured to a saved group of settings using Hardware
Templates.
90
Configuration61
57
Door behaviors, such as Door Modes and opening times, are configured in Doors.
A list of the Doors managed by the Controller, with links to their
configuration screens.
Managed Sub-
controllers
A list of Sub-controllers managed by this Controller, with links to
their hardware configuration.
Firmware
Download
(Secondary Controllers only) Select a previously uploaded firmware
file and download it to the Controller. Primary Controller firmware
is updated under Firmware Settings.
"Open admin
web page in
new window"
Click the link to log in directly to a Secondary Controller. You will
enter a simplified web management application allowing limited
Controller configuration options, such as Network settings.
Reboot Button
(Secondary Controllers only) Reboots the Controller
Resync Button
(Secondary Controllers only) Refreshes the configuration of this
Secondary Controller.
Name
(Read-only) The name of the Sub-controller.
Disconnected
(Read-only) Always unchecked and cannot be changed.
Status
(Read-only) Always Online for Atlas Series built-in Sub-controllers.
Select an existing template and click Apply Template. Deselect ApplyTemplate to edit the settings.
Click Create Hardware Template to create a new template from the
current settings. The template contains most of the Sub-controller
configuration. See Hardware Templates.
Address
If Wiegand, the address label printed on the Controller. Otherwise,
Address is an arbitrary label.
Managed By
The Door that the device is associated with
Model
The device model:
·
Custom — for Wiegand or OSDP readers
·
ZKTeco — for ZKTeco RS-485 readers
Reader Type
·
Data0/Data1 (Wiegand)
·
OSDP — for model Custom
·
ZKTeco RS-485 — for model ZKTeco. This is only available on
biometric Controller models.
Keypad Type
For Data0/Data1 (Wiegand) readers only.
·
If Auto, then PIN digits are accepted over Wiegand, automatically
decoding the format.
“None” is displayed for no PIN pad. (It generally makes sense to
leave this on Auto, unless you want to specifically disable a PIN
pad on a Wiegand reader.)
·
OSDP and ZKTeco RS-485 readers send their PIN data differently,
so this setting is not used for them.
Tamper
The type of tamper detection. Only OSDP is supported on OSDP
readers.
LED Type
The LED control type:
·
For Wiegand, this is either:
oNone — select this to disable LED control completely
o1-Wire (Green) — one wire wired to the green LED (red LED
generally lit when green is not)
o2-Wire (Red and Green) — Biometric Atlas Controllers only
·
For OSDP readers, this is OSDP.
OSDP/RS-485
Address
The "polling address" of the OSDP or ZKTeco RS-485 reader.
For most OSDP readers the default is 0. See Reconfigure, below, and
installation instructions from the reader manufacturer, for how to
change the address.
ZKTeco RS-485 readers have a DIP switch to configure the address.
Please refer to the ZKTeco RS-485 reader installation instructions on
how to set the address.
Reconfigure
Change the OSDP address that the reader itself is configured to use.
This is not the OSDP/RS-485 Address the Sub-controller is set to use,
though they must ultimately have the same value.
1. Set the OSDP/RS-485 Address to the reader's current address
3. Click the Reconfigure button. Select a new address number for
the reader.
4. Change the OSDP/RS-485 Address to the new number.
5. Click Save.
Some OSDP readers might not support Reconfigure.
Address
The printed address on the board.
Name
The name of the input. Required, maximum 32 characters.
Enabled
Check to enable, uncheck to disable.
Normally Open
Whether the input is normally open (NO). Normally open inputs are
active when the wires are normally not connected (open circuit).
This is generally true for exit buttons. Most other inputs like
tamper, power, and battery failure sensors are normally closed
(NC).
Function
What the input is used for. Not all options are available for all
inputs, and some cannot be changed. The Functions are:
For exit buttons and door sensors, this is the Door that the input is
a part of. For tamper, power monitor, and battery monitors, this is
the Controller they are a part of. For Linkage inputs, this is the
device affected by the policy. (See Policy Type.)
"Out" Doors cannot be used in linkages, nor to manage hardware.
Policy Type
For Linkage inputs, this is the policy to be executed when the input
becomes active. The options depend on the Managed By setting
·
Input-Triggered Alarm (Managed By: empty) — This will cause an
Alarm to be generated when the input becomes active. Do not
confuse this with a relay activating an audible alarm, which can be
configured for an output, below.
·
Input-Triggered Lockdown (Managed By: a Controller) — When
the input is activated, a Global Lockdown is initiated. The
lockdown will only end when a User clicks Clear Lockdown on the
Main Menu (with some exceptions*).
·
Input-Driven Emergency Unlock (Managed By: a Controller) —
Whenever the input is active, a Global Emergency Unlock
condition will be active. The emergency unlock will only end when
the input returns to inactive (with some exceptions*).
·
Input-Triggered Momentary Unlock (Managed By: a Door) — This
will cause a momentary unlock of the Door when the input
becomes active.
*Important: As with all emergency functions, you should thoroughly
understand the relevant topics before relying on lockdown and
emergency unlock.
(Linkage only) If Pulse, the Event activates this output briefly. If
Toggle, this output is active until the Event is "ended" by its reverse
Event. For example, "Door Held Open" is reversed by "Door Held
Open Restored". Toggle is not an option when the Event has no
reverse Event.
Pulse Time
(Linkage only) The pulse time in seconds.
Schedule
(Linkage only) If a Schedule is selected here, the Linkage will only be
applied during this Schedule.
There are two important qualifications about Discovery.
·
When using Discovery, you should connect and discover Controllers one at a time. This
is the only way you can know which one is which.
·
Discovery only works if all Controllers are networked on the same subnet. If you have a
simple network, this will almost always be true. In a larger corporate environment, you
might need to add Secondary Controllers manually.
To Discover Controllers:
1. Click Discover Controllers on the menu bar.
2. In a few moments, a form will display all Controllers discovered.
3. Click the link to add a Controller. The create controller screen will appear.
a. Select a Configuration.
79
73
4.2.4Adding Controllers
Secondary Controllers can be automatically found and added by the Web Management
Application. This is called “Discovery.” When Discovery cannot be used, you can add
Controllers manually. You can also use manual installation to add Controllers that have
not yet been installed.
Once a Secondary has been added, it cannot be reassigned to a new Primary, or a factory
reset Primary, until it itself has had a Factory Reset.
121
The number of Secondary Controllers you can add and the number of Doors you can
create are limited by your license. Contact your authorized ZKTeco representative for
b. Enter a Name, and select Custom Door Names so you can name the doors in the
box, below.
c. Leave all other settings as they are. These are the settings that were discovered.
4. Click Save on the menu bar.
Manually Adding Secondary Controllers
To add a Controller manually:
1. Click Create on the menu bar. The create controller screen will appear.
2. Select a Model.
3. Select a Configuration.
4. Enter a Name, and select Custom Door Names so you can name the doors in the box,
below.
5. Enter the Controller's IP Address.
6. Enter the default Port number, 443.
1. Click Save on the menu bar.
·
Models and Configuration
·
Modifying Controller Configuration
57
57
Configuration71
Related Topics
57
60
4.2.5Firmware Updates
"Firmware" means all the software running on a Controller, including both the Web
Management Application and the software that operates the Doors. Updating the
firmware installs upgrades received from ZKTeco.
3. Click Browse and select the firmware file from your computer.
4. Wait while the file transfers to the Controller.
5. When it completes, click Okay. There will be a delay while the update installs, then the
Controller will go offline while it reboots.
This method involves two steps: (1) send the update file to the Web Management
Application, then (2) download the file to Secondary Controllers.
1. Go to Hardware.
2. Click Upload Firmware in the menu bar.
3. Click Browse and select the firmware file from your computer.
4. Follow the prompts and the firmware image will be uploaded, but not applied to any
Controller.
5. Select a Secondary Controller.
6. Scroll down to Firmware Download and select the update file.
7. Click Download.
8. Follow the on-screen prompts to upgrade the firmware on the Secondary Controller
you selected.
You can update firmware in two ways: (1) log in to any Controller and update it directly,
or (2) use the Web Management Application to update any Secondary Controller
remotely. Note that only method 1 is used for the Primary Controller.
In either case, you must have an update file available on your own computer.
Both methods cause the updated Controller to reboot.
Upgrading the Firmware On The Controller You Are Logged Into
107
Upgrading the Firmware of a Secondary Controller from the Primary
Allows direct control of the selected Door using Manual
Commands to change Door Mode or unlock the Door.
For the complete list and details, see Door Properties.
107
4.2.6Resync Secondary Controllers
The Resync Secondary Controllers button on the menu bar causes a major reset of all
Secondary Controllers. All configuration from the Web Management Application (on the
Primary Controller) is freshly updated on all secondaries. This includes all hardware, Door,
and access configuration, including Users data. It does not include Network or Firmware
settings.
Individual Secondary Controllers can be resynced under Maintenance on their
61
Hardware
pages.
Configuration73
4.3Doors
Every card, PIN, and biometric reader in the system is represented as a Door (see
Understanding Controllers and Doors).
Doors are automatically created to match the Configuration property of Controllers in
Hardware. The number of Doors you can create are limited by your license. Contact
your authorized ZKTeco representative for license upgrades.
The name of the Door. Required, maximum 32 characters.
Type
Shows the Door's function: "In", "Out", "Card Enrollment Point", or
"Muster Point". This is determined in Hardware.
Door Template
Used to configure this Door with a template, which overrides
and disables some properties on this screen.
Default Mode
The Door Mode for this Door whenever not altered by a
Schedule, manual command, or Event. Door Mode determines
whether a Door is locked, and what kinds of access can unlock it.
Door Mode
Schedule
Pick a Door Mode Schedule to change the Door Mode according
to the day and time of day.
The name of the Door. Required, maximum 32 characters.
Status
The current status of the Door, including online/offline, Door
Mode, locked/unlocked, open/closed, or errors such as forced,
held, tamper, reader offline. Lockdown or Emergency Unlock
will be indicated here, when active.
Alarm
If any Alarm is pending at the Door, it is shown here.
Type
How the Door is used:
·
In — an entry Door. Either an entry-only Door, or an entry Door as
a part of an entry/exit (in/out) Door pair.
·
Out — an exit Door.
·
Muster Point — used to check in during an emergency for the
Muster report.
·
Card Enrollment Point — used only to enroll cards.
Controller
The Controller that this Door is managed by.
Sub-Controller
The Sub-controller (I/O) which manages this Door’s hardware.
Door Template
A Door Template defines common parameters. Once a Door is
linked to the template, the fields are read-only in the Door
Door properties differ based on the door type. For example, Muster and Card Enrollment
Points have far fewer properties since they do not control a door strike or have other
door hardware.
If the Door template is modified, the associated Doors are also
updated.
Location
Location of the Door.
Description
Description or comments
Default Mode
The Door Mode for this Door whenever not altered by a
Schedule, Manual Command, or Event. Door Mode determines
whether a Door is locked, and what kinds of access can unlock it.
Door Mode
Schedule
Pick a Door Mode Schedule to change the Door Mode according
to the day and time of day.
Multi-User
Access
The Multi-User Access configuration, if multiple Users are
required to open a Door.
Unlock Time (s)
The amount of time the lock is activated for an access (access
granted, exit requested, etc).
Held Open
Alarm Time (s)
The amount of time a Door can be held open before a held open
Event is generated.
This Event can be configured in the Sub-controller configuration
to drive an aux output, for example, to sound a beeper.
Minimum
Unlock Time (s)
If Re-lock On allows for the Door to be re-locked before the strike
time is up, then this is the minimum time the Door will stay
unlocked. This is to avoid an unlock pulse that is too brief, which
can be a problem for some hardware.
If a User has Use Extended Door Times checked, this time is used
instead of Unlock Time.
Extended Held
Time (s)
If a User has Use Extended Door Times checked, this time is used
instead of Held Open Alarm Time.
Held Open PreAlarm Warning
Time (s)
The amount of time before the Held Open Alarm Time is reached,
when a held open pre-alarm warning Event is generated.
This Event can be configured in the Sub-controller configuration
to drive an aux output, for example, to sound a beeper.
Suppress Exit
Button Events
When selected, exit requested Events are not created for this Door.
This can be used if the number of these Events is considered too
numerous and unimportant.
Unlock on Exit
Button
If checked, the Door is unlocked when the exit button is pressed.
This may not be required for systems where the exit button is wired
directly to cut off power to the door lock, for example.
Important: Exit button functions are regulated by country- and
region-specific fire codes. Please refer to these when designing and
configuring your system to ensure compliance.
Re-lock On
When the lock should be re-locked after access is granted:
·
End of Unlock Time
·
Door Open
·
Door Close
·
Door Close or End of Unlock Time (whichever is sooner)
Available if Anti-passback Method is Door-Based. The number of
minutes before the same credential can be used at the Door.
Related Topics
·
Doors
·
Door Templates
·
Door Status
·
Door Modes
·
Anti-Passback
·
Manual Commands
·
Hardware Properties
·
Locations
·
Areas
Name
The name of the Location. Required, maximum 32 characters.
Type
Category by Location size. From large to small, they are:
73
88
26
142
118
Configuration79
4.4Locations
115
61
79
80
Locations are labels you can apply to organize Doors and hardware on lists and reports,
particularly on Events and Alarms. Locations can be assigned to Doors,
Designates this Location as included in any larger Location. A
Building's parent could be a Campus or Region, but not a Floor or
Room.
When you filter Events to a Location, all the smaller Locations that
are included in it will also be displayed.
·
Using Property Views
·
Events
·
Alarms
There are two Areas that are predefined by the system and cannot be edited or deleted:
·
Global Out — Doors that enter from, or exit to, the “outside world” should use this as
the Exit Area or Entry Area, respectively.
·
Muster — An Area where all Muster Points “enter” to. Anyone who uses a Muster
Point will have their last known Area set to the Muster Area and will be excluded from
the Muster report.
Related Topics
22
14
4.5Areas
Areas are physical regions you define, and are used for Anti-Passback, Muster, and
airlocks. A column to show the Area can be added on Events and Alarms.
Areas are actually nothing but a label. They serve no function until you define which
Doors lead into and out of the Area. You do this by setting the Entering Area and ExitingArea of each relevant Door.
The name of the Map (required, maximum 32 characters)
Location
Optional Location of the Map.
Background
Click Upload to load an image from your computer. This will be the
canvas on which you can place devices. Large images will shrink to
fit the available space.
Elements
Elements, in three list boxes, can be clicked on and dragged to the
Map. When on the Map, their blue wrench icon provides options
to
·
delete the element, or
·
set the destination of a "Link" element from a list of other Maps.
Text entered in search filters all three element lists.
·
Using Property Views
·
Maps (Monitoring)
4.6Maps
Maps configuration is used to create the screens for the Maps view.
28
The Maps view is used to show the status of your Doors and Controllers on graphical
backgrounds, for example, on maps of your building or campus. It highlights all problems
in red, and allows sending commands to Doors. Maps may also have links to other Maps
for easy navigation.
The name of the Card Design. Required, maximum 32 characters.
Description
Description or comments.
Center Column
The center area is your canvas to "draw" your card on. It shows a standard size access
card, front and back sides.
Important: Review your card printer manual to understand its limitations, such as
whether it can print both front and back and whether you are allowed to print to the
edge of the card.
Left Column
Click and drag elements from the left panels onto the card area.
Click elements on the card area to select them. Shift-click to select multiple elements.
Drag selected elements to move them.
Images (only) can be sized by dragging on the corners.
Right Column
The first row of three icons performs standard delete, undo, and redo actions.
Configuration83
A Card Design is a print layout you create for use in Printing Cards. It can include User
information such as the name and expiration date and images such as the User photo
and logos.
The second row has six options for aligning elements, followed by four options
controlling which elements are on top of others. Hover over any icon to see its exact
function. You must select more than one item to enable the alignment options.
The rest of this panel shows the properties of the currently selected item.
For Images, click Select Image to load an image file from your computer.
For Text and User Fields, enter the Text. Text between "{{" and "}}" will be replaced
with the named property of the User. Additional text may be added outside the
brackets, but the text inside must be a valid field name.
The remaining options for text set the font and color.
X Origin and Y Origin are properties of both images and text. They determine which
direction the element will grow to fit the contents, by choosing which corner will nevermove. The default is top left, and the box will expand to the right and down when, for
instance, the name field is long or its font size increases. If you change the origin to
bottom right, the box will expand upwards and to the left, allowing you to place the
box on the right or bottom edge of the card.
Notes
Supported image formats are PNG, JPEG, and GIF.
Text will print over of images (if on top), and transparency in images is supported.
You must know which of the existing card formats matches your cards. Simply select that
format, enter the Facility Code number, and save.
Note: Start and location fields are number of the bit, where the first bit on the card is
number 0.
Name
The format name. Required, maximum 32 characters.
Bits
The total number of bits on the card, including parity bits, etc.
Enabled
Use or do not use the format.
Facility Code
(optional) If there is a facility code field (start/length specified), this is
the value that the facility code must be equal to for the format to be
matched.
Card Formats define what kinds or brands of cards you use. Your Atlas Series system
includes all of the card formats you will likely need, although you might want to enter a
"facility code" specified by your card vendor.
If you do use an uncommon type of card, you will have to create a custom card format.
This is quite technical, and requires exact specifications from the card vendor.
Notes
You can use more than one card format in your system.
Card formats are neither associated with specific Doors nor specific Users—they all are
used for all.
Two card formats with the same number of bits cannot be enabled at the same time,
unless they both have facility codes and those codes are different.
None/Even/Odd — None to not use this parity field at all, Even or
Odd for parity calculation method.
·
Start — The start bit of the parity source (the range of bits to be
checked for parity). Does NOT include the location of the parity bit
itself.
·
Length — The length in bits of the parity source.
·
Location — The bit number of the parity bit.
·
Mask — Normally, the entire source is used. If only some bits in a
pattern are to be used in the source, this is entered here as the
mask, as a string of 0s and 1s.
The importance of the Alarm created. The Priority can be used to
sort the Alarms screen.
Color
Triggering
Event
The triggering Event will be in this color on the Events screen.
This does not affect the Alarm color. (Some Event Types also have a
color, whether or not they are Alarm triggers.)
Configuration87
User Groups are used in Multi-User Access. A User Group is simply a name and a
description. Members of the group are added in Users.
Related Topics
38
4.10Alarm Triggers
Alarms are triggered by Events, meaning that whenever an Event of a specified type
occurs, an Alarm is also generated. The Alarm Triggers screen allows you to add to the
Events that trigger Alarms and modify or remove the default triggers.
3. Click the Create Door Template button in the Door's properties.
4. Enter a name (required, maximum 32 characters), and optionally, a description.
5. Click Save.
1. Go to the Doors screen.
24
22
4.11Door Templates
Door Templates can be created from existing Door configurations, then applied to other
Doors that require the same settings. Subsequent changes to the template are applied to
every Door using it. Only certain Door properties are controlled by the Template (see
below).
14
134
20
When a Door Template is applied to a Door, the properties which come from the
template are no longer editable on the Doors screen. To change them, you must either
edit the template, or remove the template from the Door.
A Door Template cannot be applied to a Door that has a different Type in its Door
3. Select a Door Template in the Door's properties.
4. Check Apply Template. The Door will use the settings from the template only when this
is checked. If you remove the check, the Door will keep the template settings unless
you change them.
5. Click Save.
Door Template Properties
A Door Template overrides these Door Properties. Some Door types do not use all of
these properties.
3. Click the Create Hardware Template button in the Sub-controller's properties.
4. Enter a name (required, maximum 32 characters), and optionally, a description.
5. Click Save.
1. Go to the Hardware screen.
2. Select a Sub-controller.
3. Select a Hardware Template in the Sub-controller's properties.
4. Check Apply Template. The Sub-controller will use the settings from the template only
when this is checked. If you remove the check, the Sub-controller will keep the
template settings unless you change them.
5. Click Save.
4.12Hardware Templates
Hardware Templates can be created from existing Sub-controller (I/O) properties, then
applied to other Sub-controllers that require the same settings. Subsequent changes to
the template are applied to every Sub-controller using it. Only certain Sub-controller
properties are controlled by the Template.
When a Hardware Template is "applied" to a Sub-controller, the properties which come
from the template are no longer editable on the Sub-controller screen. To change them,
you must either edit the template, or remove the template from the Sub-controller.
Creating a Hardware Template from an Existing Sub-controller
Unlimited; able to access all screens and functions.
5Administration
The Admin menu includes a variety of settings for the whole system.
User Roles lets you see the definition of the built-in User Roles for Users logging into
92
the web application and define new, custom roles.
Backup and Restore lets you backup and restore the system database and manage the
99
scheduled backups.
System Settings provides control over the archiving settings and the custom field
100
labels.
Network allows configuration of the networking settings.
Date and Time allows configuration of the time zone and network time settings.
Email Settings allows an SMTP mail server to be configured for the emailing of
Notifications.
Archive Downloads allows the download of archive files generated according to the
103
105
106
17
107
System Settings
Firmware Settings allows firmware upgrade, factory reset, and conversion between
107
primary and Secondary Controller functionality.
Web Server Settings allows the upload of an HTTPS certificate.
Authorized Mobile Devices allows you to provide access to mobile devices that have
108
108
the mobile app installed.
5.1User Roles
User Roles define what different Users can do within the Web Management Application.
The system comes with a number of built-in User Roles which may not be modified or
deleted. Custom User Roles can be created.
Provide access to Users and define the Doors, times, and other
access control rules that allow or deny access. Able to configure
Doors, but not Hardware. Able to execute all manual commands.
Basic
Monitoring
Most monitoring functions. Able to view Alarms but not
acknowledge or resolve them. Able to view Users but not create or
edit them.
User and
Credential
Management
Add and manage Users and their associated credentials. Also able
to perform some limited monitoring tasks. No Alarm management,
and no hardware or Door configuration.
Alarm
Monitoring
Similar to Basic Monitoring, but also able to acknowledge and
resolve Alarms.
Alarm
Monitoring
Biometric and PIN
(First Unlocks)
Yes
Yes
Biometric or PIN
(First Unlocks)
Yes
Yes
Card or Biometric
(First Unlocks)
Yes
Yes
Biometric or Card or
PIN (First Unlocks)
Yes
Yes
·
Using Property Views
·
Users
Related Topics
14
38
5.2Backup and Restore
Backup and Restore allows configuration of the scheduled backup settings and manual
backup or restore of the database.
Backup files are saved in the .dbbackup format. Up to three backups can be saved on
the Controller. Older backups are automatically deleted. You can also download backup
files to your computer.
By default, the database is automatically backed up to the Primary Controller every night
at midnight. You can also schedule a backup on a custom schedule. If a scheduled backup
is not enabled, the automatic backups do not occur.