The TESA Access Control system is basically designed to manage electronic cylinders, electronic locks and/or off-line wall readers.

Size: px
Start display at page:

Download "The TESA Access Control system is basically designed to manage electronic cylinders, electronic locks and/or off-line wall readers."

Transcription

1 TS1000 Grant Names

2 Introduction The TESA Access Control system is basically designed to manage electronic cylinders, electronic locks and/or off-line wall readers. When an off-line system is running, every time the closure plan is modified the new data must be transferred to the doors involved using the Portable Programmer. The TESA Access Control system allows specific parameters to be established for granting or denying user access to a door (or group of doors) when the user credentials are registered, thus avoiding the need to physically go to the door. These parameters are known as Permits. Operating without Permits Once the installation is complete, when we work without permits, the operating sequence of the cylinders, locks and/or readers is as follows: The cylinders, locks and/or readers have a closure plan stored in the memories of their control units. When the user inserts or approaches with her or his credentials, a reader reads the information stored in the credentials and transmits it to the control unit. When a user wishes to open a door, the control unit will verify the credential complies with the following requirements: System code The system code recorded on the credential must coincide with the code recorded on the facility. Activation date and expiry If the coded credential has a start date activated, this must be earlier than the date and time when the attempt to open is made. If the coded credential has an expiry date, this must be later than the date and time when the attempt to open is made. Matrix The user must have access to the system matrix (closure plan). This can be Always or in accordance with one of the established Zone Times. If the credential complies with the three requirements, the user will be able to open the door. If not, the request to open it will be denied. ANEXO: PERMISSIONS 2

3 With this mode of operation, every time we need to grant or deny user access to a door, we must take the follow steps: Modify the closure plan: cross User/Door in the Matrix. Transmit the data to the Portable Programmer. Physically travel to the door with the Portable Programmer and update it, i.e. update the closure plan stored in the door s control unit. This process, depending on how often we need to repeat it, can be rather inconvenient. Nevertheless, it is something we can avoid having to do if we use the so-called Permits. Operating with Permits A permit is an additional parameter we voluntarily input on the system. This parameter becomes an additional condition required from the users by a door or group of doors, i.e. users need a permit to open a door, and must be in possession of the permit. Whether or not the user has the permit is stored on the user credential and therefore, is a factor we can decide on when we record it. The sequence is as follows: The cylinders, locks and/or readers, have the closure plan stored in their control units. When the user inserts or approaches with her or his credentials, the reader module reads the information stored in the credentials and transmits them to the control unit. For the user to be able to open the door, the control unit will verify the credentials meet the following requirements: System code. Activation and expiry dates. Matrix. Permission. The user credential must contain the permit required for the door. Therefore, when we want to deny a user access to a door for which she or he has an access permit, all we need to do is re-record the user credential, omitting the permit. There is no need to modify the closure plan, and therefore there is no need to travel to the door with the Portable Programmer. ANEXO: PERMISSIONS 3

4 Activating Permits Defining permits: To use permits, the first step we must take is to define the permits required. These are defined in the tab Grant Names in the Installation menu, where the system allows up to 14 different permits to be defined. Example: let s suppose we want to create a permit for the Warehouse door of a facility. We will type the word WAREHOUSE in field 1. ANEXO: PERMISSIONS 4

5 Assigning permits to doors: When we create a permit, a new option Requires permit will automatically appear in the System Doors menu. If this field is empty it means the door in question does not require any permits and therefore it will function according to the system described above in the section OPERATING WITHOUT PERMITS. Example: to assign a permit to a specific door. In this case we will choose the Warehouse door. The Requires Grant option is a drop-down menu of the permits defined by the system. In this group we will see the WAREHOUSE permit. This is the one to which we will assign the Warehouse door. WAREHOUSE Note: One permit can be assigned to several doors. For example, the FLOOR 1 permit can be assigned to all the doors on FLOOR 1. ANEXO: PERMISSIONS 5

6 Matrix: For the permit function to be really effective, it is recommended that all the users be granted access to doors requiring permission. Authorised access can be according to the Always time zone or according to time limitations established on the system (Zone Times). Therefore, a user will be granted or denied access to a door requiring permits depending solely on whether or not the user has been granted a permit. To continue with the example, we must give access to all users of the Warehouse door. Warehouse door: All users have access according the Always Time Zone. Updating doors: Once the above steps are complete and so that the permits start functioning, we must update the doors in question (When we first introduce the system, we must Start the doors instead of Updating them). To so this we must: Transmit the data to the Portable Programmer.Transmitir los datos al programador portátil. Update and/or start the affected doors. Continuing with the example: we must update the Warehouse door. ANEXO: PERMISSIONS 6

7 Assigning permits to users: Similarly to the Doors menu, when we define permits on the system, a new field will automatically appear in the new field called Permits in the user menu. This field contains the list of permits available on the system. Each permit has a selection form, where a blank field means the user has not been granted permission. When we want to give a permit to a user, all we need to do is select the user and assign the permit to her or him. We can change the permits assigned as many times as we wish. All we need to do is record the user credentials again when we modify the assignment. Example: If we assign the WAREHOUSE permission to the user Bienvenido Calvo, we will see: That is how we finish setting up the permits for a facility. ANEXO: PERMISSIONS 7

8 Example of Application Managing the whole installation with permits When a facility has fewer than 14 doors, a permit can be defined for each door. This means we can design a matrix in which all users are granted access to all the doors. This can be Always or for a specific time zone. Therefore, whether or not a user has access to any given door at a facility will depend solely on the permits and not on the matrix. In a facility such as this, we only need to go to the doors with the Portable Programmer when we want to collect the opening register and/or when we need to add users to the system. Visit management Generally speaking, visitor management problems at a facility are: We do not know who the visitors will be. We do not know how many visitors there will be. We do not know whom the visitor is going to see and how long she or he will need access for. And we do not know how long the person will be on the premises. The use of permits helps with this management. To do this we will define a user group called Visitors. We will call them visitor 1, visitor 2, visitor 3.. visitor X, where X is the maximum number of visitors expected per day. Users in this group will be granted access according to the time zone for the door or doors we consider appropriate. These doors or groups of doors will require one of the permits defined. Therefore, when a possible visitor arrives, we just select the user number Visitor X available. We can give the visitor the permits necessary for the visit in question. And we assign the expiry time and date. When this date has passed, the Visitor X credential will be available for another visitor once more. Using this system, the only factor we are not managing is the visitor s name. But this is an aspect that can be managed using another programme. ANEXO: PERMISSIONS 8

9 ANEXO: PERMISSIONS 9

TS1000: Special Functions SPECIAL FUNCTIONS 1

TS1000: Special Functions SPECIAL FUNCTIONS 1 TS1000: Special Functions SPECIAL FUNCTIONS 1 Use PMS Interface The TS1000 management software give us the possibility to integrate the software in a Property Management System (PMS). In this field we

More information

TS1000: UOL Functional Specification. UOL Functional Specification 1

TS1000: UOL Functional Specification. UOL Functional Specification 1 TS1000: UOL Functional Specification UOL Functional Specification 1 0.-SCOPE... 3 1 SYSTEM ARCHITECTURE... 4 2 TS1000 UOL... 5 2.1 Activate UOL licence... 5 2.2 UOL: New door type... 7 2.3 Encode RF Initialization

More information

Getting Started with e-lab Solutions User Guide

Getting Started with e-lab Solutions User Guide Getting Started with e-lab Solutions User Guide Table of Contents Section I: Creating an Account and Logging In...3 Creating a Web Account...3 Logging In...6 Section II: Gaining Access to Laboratory Data

More information

Ohio Business Gateway Using the Gateway as a Service Provider: Understanding Filing Administrator Access

Ohio Business Gateway Using the Gateway as a Service Provider: Understanding Filing Administrator Access Ohio Business Gateway Using the Gateway as a Service Provider: Understanding Filing Administrator Access Contents Introduction... 3 Filing Administrator Role... 3 Confirm Your Role on a Client Business

More information

SMARTair Wireless Configuration & Setup.

SMARTair Wireless Configuration & Setup. SMARTair Wireless Configuration & Setup www. Scope The scope of this document is to explain the SmartAir Wireless system. This includes explanation of how the Wireless locks work, how they must be configured,

More information

SOCIAL NETWORK BASED AUTHENTICATION FOR SECURE ACCESS

SOCIAL NETWORK BASED AUTHENTICATION FOR SECURE ACCESS Technical Disclosure Commons Defensive Publications Series January 06, 2016 SOCIAL NETWORK BASED AUTHENTICATION FOR SECURE ACCESS SUDHANSHU RAWAL NISHA GANDOTRA Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

Defense Health Agency Protected Health Information Management Tool (PHIMT)

Defense Health Agency Protected Health Information Management Tool (PHIMT) Defense Health Agency Protected Health Information Management Tool (PHIMT) Training Reference: Privacy Specialist User Guide Version 3.0 March 2011 Any data herein that may be construed as personal information

More information

OTS TRANSPONDER SYSTEM

OTS TRANSPONDER SYSTEM OTS TRANSPONDER SYSTEM OTS TRANSPONDER SYSTEM LOCKING SOLUTIONS FOR LOCKERS Stand alone or as part of an access control system, the OTS transponder is a secure choice. Users can open or close lockers by

More information

Otis Compass Elevator Integration Guide

Otis Compass Elevator Integration Guide Otis Compass Elevator Integration Guide November 2015 SATEON Otis Compass Elevator Integration Guide Issue 2.0, released November 2015 Disclaimer Copyright 2015, Grosvenor Technology. All rights reserved.

More information

Virtual CD TS 1 Introduction... 3

Virtual CD TS 1 Introduction... 3 Table of Contents Table of Contents Virtual CD TS 1 Introduction... 3 Document Conventions...... 4 What Virtual CD TS Can Do for You...... 5 New Features in Version 10...... 6 Virtual CD TS Licensing......

More information

SharePoint AD Administration Tutorial for SharePoint 2007

SharePoint AD Administration Tutorial for SharePoint 2007 SharePoint AD Administration Tutorial for SharePoint 2007 1. General Note Please note that AD Administration has to be activated before it can be used. For further reference, please see our Product Installation

More information

Ohio Business Gateway Using the Gateway as a Service Provider: Removing Individuals from a Business Account

Ohio Business Gateway Using the Gateway as a Service Provider: Removing Individuals from a Business Account Ohio Business Gateway Using the Gateway as a Service Provider: Removing Individuals from a Business Account Contents Introduction... 3 User Roles and Permissions... 3 Removing Individuals from a Business

More information

OneStop Reporting OSR Budgeting 4.5 User Guide

OneStop Reporting OSR Budgeting 4.5 User Guide OneStop Reporting OSR Budgeting 4.5 User Guide Doc. Version 1.3 Updated: 19-Dec-14 Copyright OneStop Reporting AS Contents Introduction... 1 Two Different Setup Strategies and Use of OSR Budgeting...

More information

Real-time access control by your side!

Real-time access control by your side! Real-time access control by your side! SMARTair Pro Wireless Online, flexible online control for smart facilities. ASSA ABLOY, the global leader in door opening solutions 1 Be smart in a busy and constantly

More information

Endpoint Security webrh

Endpoint Security webrh Endpoint Security webrh Framework 3.0 HFA1 Administration Guide 2 January 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright

More information

Unique access control box. Usage scenarios

Unique access control box. Usage scenarios 2N Access Unit Unique access control box Usage scenarios Document: Příklady použití 2N Access Unit Page 1 of 8 Date of last revision: 2016-05-13 Content 1. Access Unit usage scenarios (premises entry only)...

More information

8 Processing Applications for Permanent Changes of Station (PCS) Transactions

8 Processing Applications for Permanent Changes of Station (PCS) Transactions 8 Processing Applications for Permanent Changes of Station (PCS) Transactions Military providers who receive orders for a permanent change of station (PCS) are required to re-apply for clinical privileges

More information

Defense Health Agency Protected Health Information Management Tool (PHIMT)

Defense Health Agency Protected Health Information Management Tool (PHIMT) Defense Health Agency Protected Health Information Management Tool (PHIMT) Training Reference: Regular User Guide Version 3.0 March 2011 Any data herein that may be construed as personal information is

More information

Knowledge Base Article

Knowledge Base Article Knowledge Base Article Crystal Matrix Sample Database Guided Tour Copyright 2007-2012, ISONAS Security Systems All rights reserved Table of Contents 1: INTRODUCTION... 3 1.1: CONFIGURATION OVERVIEW:...

More information

time. This feature saves time and cost of the personal. their various attendance and leave details.

time. This feature saves time and cost of the personal. their various attendance and leave details. Leave Requests and Approvals With just a single click of the mouse, employees instantly submit their leave request and those requests are routed to reporting officer and HR's window. Reporting office or

More information

PROXIMITY Encoding System

PROXIMITY Encoding System PROXIMITY Encoding System ins-206 Date code: 251103 Contents 2 Contents Setting up the system...4 Introduction...4 What s in the box...5 Installing the system...5 Initialising the program...6 Initialising

More information

Pro-Watch 3.8 Eco System Galaxy Dimension Integration Guide

Pro-Watch 3.8 Eco System Galaxy Dimension Integration Guide Pro-Watch 3.8 Eco System Galaxy Dimension Integration Guide Document Date : Aug 2010 Pro-Watch 3.8 Galaxy Integration Guide.doc Page 1 of 15 Table of Contends Chapter Page Scope of this document 3 Installation

More information

Antipassback, Parking and Access Areas. Technical Support Engineering Rosslare Security NA For more information please see

Antipassback, Parking and Access Areas. Technical Support Engineering Rosslare Security NA For more information please see Antipassback, Parking and Access Areas Technical Support Engineering Rosslare Security NA For more information please see www.axtraxng.com Antipassback prevents a user from using the same credential multiple

More information

Salto Offline Lock Integration Guide

Salto Offline Lock Integration Guide Salto Offline Lock Integration Guide August 2015 SATEON Salto Offline Lock Integration Guide Issue 1.0, released August 2015 Disclaimer Copyright 2015, Grosvenor Technology. All rights reserved. SATEON

More information

Now also available for iphone. AirKey. Simply smart.

Now also available for iphone. AirKey. Simply smart. Now also available for iphone AirKey Simply smart. AirKey Just as dynamic as our customers needs Everything about AirKey easily explained. George sends keys using the online administration George manages

More information

ImageNow Retention Policy Manager

ImageNow Retention Policy Manager ImageNow Retention Policy Manager Getting Started Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: September 2016 2014 Perceptive Software. All rights reserved CaptureNow, ImageNow,

More information

Elevator Control Configuration Guide

Elevator Control Configuration Guide Elevator Control Configuration Guide Date: 11/01/2016 Revision A Copyright, trademarks and disclaimer DISCLAIMER Continental Instruments LLC makes no representations or warranties with respect to the contents

More information

Allowing access to Outlook 2000 folders Version 1.00

Allowing access to Outlook 2000 folders Version 1.00 Allowing access to Outlook 2000 folders Version 1.00 Need to Know TM To allow another network user access to some or all of your Outlook folders you need to complete two processes. One in your Outlook

More information

1. Open Outlook by clicking on the Outlook icon. 2. Select Next in the following two boxes. 3. Type your name, , and password in the appropriate

1. Open Outlook by clicking on the Outlook icon. 2. Select Next in the following two boxes. 3. Type your name,  , and password in the appropriate 1 4 9 11 12 1 1. Open Outlook by clicking on the Outlook icon. 2. Select Next in the following two boxes. 3. Type your name, email, and password in the appropriate blanks and click next. 4. Choose Allow

More information

Visitor Management System Module Settings and Operation Guide

Visitor Management System Module Settings and Operation Guide Visitor Management System Module Settings and Operation Guide Visitor Management System Module Settings and Operation Guide. Introduction.. 4 Starting and stopping the Visitor Management System software

More information

Electronic Emergency Lockdown procedures (Gallagher Configuration Client and Command Centre)

Electronic Emergency Lockdown procedures (Gallagher Configuration Client and Command Centre) Electronic Emergency Lockdown procedures (Gallagher Configuration Client and Command Centre) Version 1.2 TRIM file number Short description Relevant to Authority Responsible officer Responsible office

More information

Aurora Client

Aurora Client Aurora Client 1.0.16.0 Added support for Keyscan Mobile Credentials. Added support for E-Plex standalone locks. Added a new user preference to automatically enroll credentials to all person s sites. Added

More information

Setting up Special Credentials:

Setting up Special Credentials: Setting up Special Credentials: Adding a Toggle Credential A toggle badge will allow a specific credential to toggle a door from an unlock state and then back to a locked state. For example: if a door

More information

InsideBusiness Payments Customer Self Service. Administrator guide

InsideBusiness Payments Customer Self Service. Administrator guide InsideBusiness Payments Customer Self Service Administrator guide Contents Manuals 1. New user - Configure permissions yourself 3 1. Enter user 3 2. Profiles and account permissions 4 3. Sign permissions

More information

VISO Mobile app (Android) Operating Manual

VISO Mobile app (Android) Operating Manual Roger Access Control System VISO Mobile app (Android) Operating Manual Software version: 1.4 Document version: Rev. B 1. DESCRIPTION VISO Mobile is a mobile app dedicated to control remotely the RACS 5

More information

Genesys Security Deployment Guide. System Level Guides 8.5.x

Genesys Security Deployment Guide. System Level Guides 8.5.x Genesys Security Deployment Guide System Level Guides 8.5.x 5/31/2018 Table of Contents Genesys Security Deployment Guide 4 Introduction 6 Authentication and Authorization 8 User Authentication and User

More information

BRIVO ACS USER GUIDE VERSION 1.0 DRAFT

BRIVO ACS USER GUIDE VERSION 1.0 DRAFT Brivo ACS User Guide June 2001 DRAFT NOTICE: This equipment has been tested and found to comply with the limits for a Class B digital device, pursuant to part 15 of the FCC Rules. These limits are designed

More information

REFERENCE GUIDE FOR MANUAL DATA INPUT v1.1

REFERENCE GUIDE FOR MANUAL DATA INPUT v1.1 REFERENCE GUIDE FOR MANUAL DATA INPUT v. TABLE OF CONTENTS Introduction User Roles Logging in to VIVO Site Administration Menu Navigating VIVO Data Input Overview Profile Fields Mapping a CV to a VIVO

More information

Configuring Cisco Access Policies

Configuring Cisco Access Policies CHAPTER 11 This chapter describes how to create the Cisco Access Policies assigned to badge holders that define which doors they can access, and the dates and times of that access. Once created, access

More information

Administration Guide

Administration Guide Administration Guide This guide will cover how to customize and lock down the SCOM 2012 Maintenance Mode Scheduler for your end users. Table of Contents Customize Look and Feel... 2 Enable Auditing of

More information

Luxor CRM Administrator s Guide

Luxor CRM Administrator s Guide Luxor CRM Administrator s Guide Atum Corporation 2003 version 0.1 September 3, 2003 416-410-8444 ext 114 Luxor CRM product support: 1-877-893-3266 ext 114 416-410-8999 luxorsupport@atum.com TABLE OF CONTENTS

More information

VISO WEB Server Application. Operating manual

VISO WEB Server Application. Operating manual Roger Access Control System VISO WEB Server Application Operating manual Software version: 1.4.2 Document version: Rev. C 1. DESCRIPTION VISO WEB is a network application which enables RACS 5 system management

More information

MICROTRAK EVOLUTION.NET USER GUIDE

MICROTRAK EVOLUTION.NET USER GUIDE MAN047-08 AUGUST 2016 GETTING STARTED Microtrak Evolution.NET consists of easy to use, intuitive modules. They cover the main areas of operation - User Management, Personnel Management, Facility Management,

More information

Central Depository System User Manual For Pledgee. (Ver 1.2)

Central Depository System User Manual For Pledgee. (Ver 1.2) Central Depository System User Manual For Pledgee (Ver 1.2) Table of Contents 1 INTRODUCTION...5 1.1 PURPOSE AND SCOPE...5 1.2 OPERATING DAY...6 1.3 UPDATING...6 1.4 DISTRIBUTION...7 2 GETTING STARTED...8

More information

PORT OF TAURANGA VISITOR REGISTER USER GUIDE

PORT OF TAURANGA VISITOR REGISTER USER GUIDE PORT OF TAURANGA VISITOR REGISTER USER GUIDE Table of Contents Port Entry Compliance... 3 Security Screening... 3 Access Requirements... 3 Bona fide Reason... 3 Access for Visitors... 3 The Visitor Register...

More information

DocShuttle Administrator

DocShuttle Administrator DocShuttle Administrator by Bytescribe, Inc. Additional Documentation For more information on using DocShuttle Administrator, please visit: DocShuttle Frequently Asked Questions (FAQ s) go to www.bytescribe.com/faqs.htm

More information

RSA Authentication Manager 7.1 Help Desk Administrator s Guide

RSA Authentication Manager 7.1 Help Desk Administrator s Guide RSA Authentication Manager 7.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

ASSA CLIQ. Electromechanical master keying

ASSA CLIQ. Electromechanical master keying ASSA CLIQ Electromechanical master keying If these are your problems... Lost or stolen keys, and illicit copies of keys in circulation Leading to an increased risk of theft, intrusion or attacks on staff

More information

To administer and edit information regarding your users and their access to the Masternaut system you should click on the Users tab.

To administer and edit information regarding your users and their access to the Masternaut system you should click on the Users tab. I INTRODUCTION This guide details the additional functionality available on the Masternaut website for system administrators. A system administrator is able to configure and edit user profiles including

More information

PROXY Pro Deployment Tool v10.0. User Guide October 2017

PROXY Pro Deployment Tool v10.0. User Guide October 2017 PROXY Pro Deployment Tool v10.0 User Guide October 2017 Table of contents 1. System Requirements...3 2. Target Computer Requirements...4 3. Deployment Tool Operation...5 3.1 Loading a Host Install File...6

More information

Choosing a sophisticated locking system: Where security is an issue, compromise is simply not an option

Choosing a sophisticated locking system: Where security is an issue, compromise is simply not an option Choosing a sophisticated locking system: Where security is an issue, compromise is simply not an option In a world increasingly challenged by mounting security threats, the need for comprehensive locking

More information

Release Notes SMS Notifications. Last Updated May 22, 2018

Release Notes SMS Notifications. Last Updated May 22, 2018 Release Notes SMS Notifications Last Updated May 22, 2018 What s New To automate and simplify the process of communicating Job progress to the appropriate contacts, FieldAware is adding the capability

More information

SCHOOL-TO-VISION PRO MIGRATOR S GUIDE

SCHOOL-TO-VISION PRO MIGRATOR S GUIDE SCHOOL-TO-VISION PRO MIGRATOR S GUIDE Table of Contents 1 Netop Vision Pro... 2 2 Install Vision... 2 3 Set up a classroom in Vision... 3 4 Teaching with Vision... 4 5 Vision toolbar... 7 6 Customizing

More information

6 Modification of Provider Credentials and Clinical Privileges

6 Modification of Provider Credentials and Clinical Privileges 6 Modification of Provider Credentials and Clinical Privileges Changes in a provider s professional credentials should be updated in CCQAS in a timely manner. The method for updating CCQAS with new credentialing

More information

Configuration and Operation Manual for the SALTO

Configuration and Operation Manual for the SALTO AxxonSoft Configuration and Operation Manual for the SALTO Integration Module Version 1.2 Moscow, 2011 Contents CONTENTS... 2 1 LIST OF TERMS... 3 2 INTRODUCTION... 4 2.1 Purpose of document... 4 2.2 Structure

More information

Brighton-Le-Sands Public School BRING YOUR OWN DEVICE (BYOD) PROCEDURES

Brighton-Le-Sands Public School BRING YOUR OWN DEVICE (BYOD) PROCEDURES Brighton-Le-Sands Public School BRING YOUR OWN DEVICE (BYOD) PROCEDURES 2017 35 Crawford Road Brighton-Le-Sands NSW 2216 9567 5449 brightonle-p.school@det.nsw.edu.au www.brightonle-p.schools.nsw.edu.au

More information

AirKey. Simply smart. Now also available for iphone

AirKey. Simply smart. Now also available for iphone AirKey Simply smart. Now also available for iphone AirKey Just as dynamic as our customers needs George sends keys using the online administration George manages an advertising agency. His team consists

More information

4D WebSTAR V User Guide for Mac OS. Copyright (C) D SA / 4D, Inc. All rights reserved.

4D WebSTAR V User Guide for Mac OS. Copyright (C) D SA / 4D, Inc. All rights reserved. 4D WebSTAR V User Guide for Mac OS Copyright (C) 2002 4D SA / 4D, Inc. All rights reserved. The software described in this manual is governed by the grant of license provided in this package. The software

More information

New CostaClick User Manual

New CostaClick User Manual COSTA CROCIERE S.P.A. New CostaClick User Manual Costa Crociere S.p.a. Via XII ottobre, 2 16100 Genova, Italy Contents MAIN SERVICES Booking 1. Search for cruise 1 2. Select a cruise 2 3. Select category

More information

Keyscan Aurora Software

Keyscan Aurora Software Keyscan Aurora Software Advanced Features Multi-Threaded Communication: The dawn of a new age for access control. Aurora's all new communication structure provides simultaneous communication to all IP

More information

Protege WX End User Guide

Protege WX End User Guide PRT-WX-DIN Protege WX End User Guide The specifications and descriptions of products and services contained in this document were correct at the time of printing. Integrated Control Technology Limited

More information

Using triggers and actions

Using triggers and actions Using triggers and actions Important For Triggers and Actions to function correctly, the server must be running at all times. Triggers and Actions is a powerful feature. It can be used to report on specific

More information

WORKING IN TEAMS WITH CASECOMPLETE AND SUBVERSION. Contents

WORKING IN TEAMS WITH CASECOMPLETE AND SUBVERSION. Contents WORKING IN TEAMS WITH CASECOMPLETE AND SUBVERSION Contents Working in Teams with CaseComplete... 3 Need an introduction to how version control works?... 3 Exclusive Checkout... 4 Multiple Checkout... 4

More information

UNIVERSITY OF CALGARY Information Technologies COMMENTS DRUPAL 7 WEB CONTENT MANAGEMENT

UNIVERSITY OF CALGARY Information Technologies COMMENTS DRUPAL 7 WEB CONTENT MANAGEMENT UNIVERSITY OF CALGARY Information Technologies COMMENTS DRUPAL 7 WEB CONTENT MANAGEMENT Table of Contents Acquiring the Comments Feature... 1 Activating the Comments Section on a Page... 2 Submitting Comments...

More information

Our Commitment To Privacy PRIVACY POLICY. Last Modified July 26, 2018

Our Commitment To Privacy PRIVACY POLICY. Last Modified July 26, 2018 Our Commitment To Privacy PRIVACY POLICY Last Modified July 26, 2018 Please read this Privacy Policy carefully before using this online entertainment service. Access to and use of this online entertainment

More information

IS2000. Administrative Operator s Guide. AOG-101 (07/2005) Software Version 7.45

IS2000. Administrative Operator s Guide.  AOG-101 (07/2005) Software Version 7.45 IS2000 Administrative Operator s Guide www.imron.com AOG-101 (07/2005) Software Version 7.45 Table of Contents INTRODUCTION...6 Overview...6 GENERAL INFORMATION...6 Logging On...7 Logging Off...9 Event

More information

Apollo Online Assessment Environment

Apollo Online Assessment Environment Apollo Online Assessment Environment Guide for Registered Users Apollo is a trademark of PSI Services LLC. All rights reserved. talentteam@psionline.com +44 (0)1483 752 900 1 Contents 1. Introduction 3

More information

Users Guide. Kerio Technologies

Users Guide. Kerio Technologies Users Guide Kerio Technologies C 1997-2006 Kerio Technologies. All rights reserved. Release Date: June 8, 2006 This guide provides detailed description on Kerio WebSTAR 5, version 5.4. Any additional modifications

More information

INTELLIGENT LOCK CYLINDERS. Features. Key-centric access control system. Battery-less lock

INTELLIGENT LOCK CYLINDERS. Features. Key-centric access control system. Battery-less lock Making IT Affordable Features Key-centric access control system Battery-less lock Direct replacement of existing lock, ideal for retrofitting. No wiring required INTELLIGENT LOCK CYLINDERS Configurable

More information

Supporting Networked Computers

Supporting Networked Computers CHAPTER 7 Supporting Networked Computers After completing this chapter, you will be able to: Define the main concepts of networking, including the roles of TCP/IP, IP addresses, and subnet masks. Set up

More information

Enterprise Vault Guide for Outlook Users

Enterprise Vault Guide for Outlook Users Enterprise Vault Guide for Outlook Users (Full Functionality) 12.3 Enterprise Vault : Guide for Outlook Users Last updated: 2018-03-29. Legal Notice Copyright 2018 Veritas Technologies LLC. All rights

More information

Minimum requirements for Portal (on-premise version):

Minimum requirements for Portal (on-premise version): Minimum requirements for Portal (on-premise version): Windows Server 2012 R2 Windows 10 (licensed) with the latest updates (64 bit only). All Windows applications must be licensed and activated. SQL Server

More information

XMLmind XML Editor - Using Google Drive as an XML Document Repository

XMLmind XML Editor - Using Google Drive as an XML Document Repository XMLmind XML Editor - Using Google Drive as an XML Document Repository Hussein Shafie, XMLmind Software September 07, 2017 Abstract This document explains how the XMLmind

More information

Getting started with ActiveSecurity MyLogin

Getting started with ActiveSecurity MyLogin 1 (5) Getting started with ActiveSecurity MyLogin 1 Introduction This document contains instructions for starting to use Aventra s ActiveSecurity MyLogin software and explanations of the basic settings.

More information

Laserfiche Rio 10.3: Deployment Guide. White Paper

Laserfiche Rio 10.3: Deployment Guide. White Paper Laserfiche Rio 10.3: Deployment Guide White Paper January 2018 Table of Contents How Laserfiche Licensing Works... 4 Types of Licenses... 4 Named User Licenses... 4 WebLink Public Portal Licenses... 6

More information

AKCess Pro Server Access Control User Manual

AKCess Pro Server Access Control User Manual www.akcp.com AKCess Pro Server Access Control User Manual Help Version updated till version 118 Copyright 2012, AKCess Pro Co., Ltd.. 1) Introduction A) What is the AKCess Pro Server / Access Control?

More information

Configuring Cisco Access Policies

Configuring Cisco Access Policies 11 CHAPTER This chapter describes how to create the Cisco Access Policies assigned to badge holders that define which doors they can access, and the dates and times of that access. Once created, access

More information

User Databases. ACS Internal Database CHAPTER

User Databases. ACS Internal Database CHAPTER CHAPTER 12 The Cisco Secure Access Control Server Release 4.2, hereafter referred to as ACS, authenticates users against one of several possible databases, including its internal database. You can configure

More information

the processing of personal data relating to him or her.

the processing of personal data relating to him or her. Privacy Policy We are very delighted that you have shown interest in our enterprise. Data protection is of a particularly high priority for the management of the Hotel & Pensionat Björkelund. The use of

More information

The HAUSSMANN RIRI keypad

The HAUSSMANN RIRI keypad The HAUSSMANN RIRI keypad YOUR HAUSSMANN RIRI KEYPAD IS EVOLVING Until now, you could only use the keypad itself, but now it is possible to connect other equipment to it enabling you to control keypad

More information

ParkIT Application User Manual Page 1/63

ParkIT Application User Manual Page 1/63 ParkIT Application User Manual Page 1/63 Version: v1.5 Document version: 2016.07.28 Table of Contents 1 Application overview... 5 1.1 Basic handling methods... 5 2 Main screen... 6 3 User authentication...

More information

AVS Portal Security User Guide

AVS Portal Security User Guide AVS Portal Security User Guide Oregon Department of Human Services 2018 TABLE OF CONTENTS I. ACCESS OVERVIEW...2 II. AVS PORTAL.4 2.1 AVS PORTAL LOGIN. 4 2.2 SECURITY USER PORTAL VIEW..5 2.3 SECURITY USER

More information

Resource Management Surplus Property Program Surplus Property Program Database PCT User s Manual. Online Database. Property Custodian User s Manual

Resource Management Surplus Property Program Surplus Property Program Database PCT User s Manual. Online Database. Property Custodian User s Manual Database PCT User s Manual Online Database Property Custodian User s Manual Last Updated 16 September 2015 Database PCT User s Manual Table of Contents Database overview 3 process 4 System access and roles

More information

Access Control Models

Access Control Models Access Control Models Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University E-mail: natarajan.meghanathan@jsums.edu Access Control Models Access Control to regulate

More information

SAS Viya 3.3 Administration: Mobile

SAS Viya 3.3 Administration: Mobile SAS Viya 3.3 Administration: Mobile Mobile: Overview The SAS Mobile BI app enables mobile device users to view and interact with reports that can contain a variety of charts, graphs, gauges, tables, and

More information

User Manual. Hotel Lock System. Software Version: Document Version: V2.0 Date: August, Contents

User Manual. Hotel Lock System. Software Version: Document Version: V2.0 Date: August, Contents Contents User Manual Hotel Lock System Software Version: 1.1.9.6 Document Version: V2.0 Date: August, 2014 All design and specification declared are subject to change without notice in advance. I Contents

More information

COSEC Visitor Management. Right People in Right Place at Right Time

COSEC Visitor Management. Right People in Right Place at Right Time COSEC Visitor Management Right People in Right Place at Right Time WHY Visitor Management? Lack of Professional Approach towards Visitors Require Easy, Fast and Error Free Visitor Registration No Proper

More information

INTRODUCTION TO WEB RESOURCES Part 2: Access to local campaign web pages

INTRODUCTION TO WEB RESOURCES Part 2: Access to local campaign web pages INTRODUCTION TO WEB RESOURCES Part 2: Access to local campaign web pages In this second installment of our how-to manual for the new 40 Days for Life web system, our focus will be on the local page you

More information

Version 1.4. FaxCore User Manual

Version 1.4. FaxCore User Manual Version 1.4 FaxCore User Manual Table of Contents Introduction... 1 Contacting FaxCore... 1 Getting Started... 2 Understanding FaxCore s User Interface... 4 Settings: Your User Profile... 4 Personal Information

More information

Sales Reps and Dealers for Magento 2

Sales Reps and Dealers for Magento 2 Last update: 2018/02/02 11:01 magento_2:sales_reps_and_dealers https://amasty.com/docs/doku.php?id=magento_2:sales_reps_and_dealers For more details see the Sales Reps and Dealers extension page. Sales

More information

S2 NetBox v4.8 Basic End-User Admin Training

S2 NetBox v4.8 Basic End-User Admin Training S2 NetBox v4.8 Basic End-User Admin Training 4/8/16 S2 Security 1 Table of Contents Introduction... 3 Log into your NetBox System... 3 Person Records... 5 Accessing Person Records... 5 Content of a Person

More information

7 Processing Applications for Interfacility Credentials Transfer Briefs (ICTBs)

7 Processing Applications for Interfacility Credentials Transfer Briefs (ICTBs) 7 Processing Applications for Interfacility Credentials Transfer Briefs (ICTBs) Military providers who perform temporary duty (requiring an inter-facility credentials transfer brief [ICTB]) at another

More information

Managing Company Information and Contacts

Managing Company Information and Contacts Managing Company Information and Contacts You can manage your company's information, such as editing location information or adding new locations, or editing or adding contact persons. To begin, please

More information

Welcome to the Guest Access Portal

Welcome to the Guest Access Portal Welcome to the Guest Access Portal The Guest Access Portal allows students to grant a guest, such as a parent or spouse, access to view their education records in Banner Self-Service. Only students may

More information

AUTHENTICATION APPLICATION

AUTHENTICATION APPLICATION AUTHENTICATION APPLICATION WHAT IS KERBEROS? Kerberos is a network authentication protocol. It is designed to provide strong authentication for client/server applications by using secret-key cryptography.

More information

*Please see the example sheets for more information.

*Please see the example sheets for more information. How to use the Search Feature on Workforce Solutions Alamo Provider Map 1. Locate the search icon in the upper right corner of the map. It looks like this: 7. To see your full results, click the x of the

More information

Facilities Module for System Administrators

Facilities Module for System Administrators The Facilities Module is designed for the public to view, reserve, and pay rent on any facility your organization may have. As with all CivicPlus Modules, the User Group level can be set at as Author,

More information

Contactless solutions. networked locking system ONE CARD, ONE TECHNOLOGY UNLIMITED POSSIBILITIES

Contactless solutions. networked locking system ONE CARD, ONE TECHNOLOGY UNLIMITED POSSIBILITIES Contactless solutions networked locking system ONE CARD, ONE TECHNOLOGY UNLIMITED POSSIBILITIES ONE CARD, ONE TECHNOLOGY... UNLIMITED POSSIBILITIES Introducing the new XS4 RFID system, a new concept in

More information

IVS 2.0 Software Manual for Air, Vac & Water Machines

IVS 2.0 Software Manual for Air, Vac & Water Machines IVS 2.0 Software Manual for Air, Vac & Water Machines Development Draft Ver. 7.13.07 Table of Contents PREFACE...1 CHAPTER 1-INCORPORATING IVS 2.0 INTO YOUR BUSINESS...2 Overview... 2 Menu Selections...

More information

AOS Aftersales Online System

AOS Aftersales Online System User's Guide Version 1.0 AOS Aftersales Online System BMW Group Page 2 Contents Chapter Page 1 Technical requirements... 3 2 Registration and login... 4 2.1 Registration... 4 2.2 Login... 6 2.3 Problems

More information