Graphical user interface (GUI) overview Launching Access control system software Setting up Devices on CredoID Door configuration Access levels

Size: px
Start display at page:

Download "Graphical user interface (GUI) overview Launching Access control system software Setting up Devices on CredoID Door configuration Access levels"

Transcription

1 Graphical user interface (GUI) overview Launching Access control system software Setting up Devices on CredoID Door configuration Access levels configuration User configuration User import Creating user import file Notifications configuration Schedule and holidays configuration Anti Pass-back (APB) configuration Video and license plate recognition (LPR) configuration Time and Attendance configuration and T&A report generation Visitors configuration and preview Outputs/Triggers - arm/disarm on multi-swipe

2 Launching Access control system software After the installation Access control system, Service is launched by default. It Creates a necessary database and environment ready for operation, provided you have supplied valid database connection parameters. You can launch Access control system graphical user interface (GUI) from the start menu, by searching for CredoID. After launch, you will be greeted with a login window. The default administrator login name is admin and password is admin. It is advised to change the password immediately in User configuration tab. Troubleshooting If the user interface is unable to connect to the Service it will display an error message. There are many reasons why there could be connection issues while connecting to the service. One of the main reasons are: 1. CredoID service is not running (Access Control System Service is not running). To check if CredoID service is running, open Task manager and in Services tab check if service Access Control System Service is running. If it is not, right-click on it and press "Start". 2. MS SQL server packages are not installed (this reason is only valid if using MS SQL server 2014 or lower). Follow the CredoID installation manual on how to install MS SQL server needed packages. 3. Unable to connect to MS SQL database. Usually this issue happens due of incorrect network configuration with the MS SQL server. To check if CredoID service connects with MS SQL database, launch CredoID GUI in administrator mode and wait till the "Application failed to start" window appears. After that, click Settings button, which opens "Connection to service"

3 window. Here, Service connection can be tested, by clicking on Test connection button. Now to test if service is able to connect to the database, click on Database connection button and this will open "Set database connection" window. In the Database server field, enter the location where MS SQL databases are stored and select authentication mode. SQL authentication will require SQL login credentials. Click Check button and Database name field should become enabled if it connected to the MS SQL. In this field, database name can be filled. By clicking Connect button, it will restart CredoID service with the changed database. If problems persists, contact your installer and report the problem.

4 Setting up Devices on CredoID In CredoID, devices are add in Devices tab. There are 3 ways a device can be added to CredoID: CredoID finds the devices automatically. Only works with Suprema and HID devices on a simple network. By searching the devices using Search for new devices function. Adding the device manually. Devices can found automatically by pressing Search for new devices button in Devices tab, under List panel. Automatic search for devices will commence on a local network. It is recommended that only one network interface device should be enabled during this operation. In some cases, it is recommended to switch off Windows firewall during this operation. If the controllers on the network are Mercury controllers, Bonjour Print Services software has to be installed, to be able to automatically add them to CredoID. Bonjour can be downloaded from Apple official site: Automatic search function takes maximum of 5 minutes. The software will report how many devices have been found. All newly found devices will be in Offline or Out of sync state (depending on manufacturer). This is displayed in system status panel, located near the main menu tabs. Using automatic search function may not find all the devices. Results depend on network, switches, routers, and firewalls configuration. Note, that even when using automatic search function, some device fields have to be entered or modified manually, for the device to be able to connect with CredoID. To see which fields require modifications, check our manuals for configuring manufacturers devices. This also applies to manually added devices. Full upload to devices A full upload is required when a new device is added to the list or to save some settings that require devices reboot. There are several ways to upload all data to the controllers. a) For 1 controller A. Go to Devices tab, select the device that needs a full upload and in the device details panel, click Upload all data to controller button.

5 b) For 1 controller B. Click Online on the Systems status panel (top-right corner) or Out-of-sync, depending on controllers state. Find the controller that needs a full upload and click Details button. Click Upload all data to controller. c) For all controllers. To upload all data to all controllers, go to Settings tab and click Upload data to all controllers. Disabled devices If the added device is disabled in the Devices tab, it might mean two things: Not enough reader counts in the license. Devices communication module is disabled. To check license information, on the main menu panel, click About button and then select Manage license. Here, license information can be checked.

6 To check if device communication modules are enabled, go to Settings tab and click on Modules button. This opens Modules window, where every single CredoID module can be found. Find manufacturers module (Axis, HID, Suprema, Mercury, MuSDO, Otis) and check if they are enabled. If they are disabled, enable them and save the settings. After that, it should be possible to enable the devices.

7 Door configuration On Doors tab, controller readers are assigned as doors. Here doors are reviewed, created, modified and removed. On doors details panel, readers settings are changed. Doors are created by clicking on Add new item to list or Create new item buttons. On details panel, door configurations are made. While configuring doors, the most mandatory fields that has to be filled are Door name, Device IP address and Reader address. Depending on selected Controller type, different reader settings are available. Door name. The name of the configured door. Strike time. Indicates for how long the lock must remain unlocked after granting access. A full upload to controllers is required. Extended access. Indicates for how long the lock must remain unlocked after granting access for a user with extended time enabled. A full upload to controllers is required. Held open time. Indicates the time given for closing the door. If the door is not closed within this time period, Held open alarm event is generated. A full upload to controllers is required. Locations. Set up location for the door. Entry & Exit directions (button). There are 2 direction that can be configured for a door to be readers or an exit button.

8 Device IP address. Assign a controller to a door. The controllers displayed on the list depends on selected Locations and if it has free reader ports open (not yet added to any door). The information that is displayed on the device list: IP/IMEC; MAC; Status; Device type; Device name. Network configuration for this controller (button). Located on the right side of the Device IP address field. By clicking on it, opens Device tab and focuses on the selected device. Search for new devices (button). Located on the right side of the Network configuration for this controller button. This opens the Searching for devices and enables the device search function. Controller type. Displays the type of the controller that is assigned to the door. This field is not editable. Device type. Indicates the type of role the device should take: Reader or Exit button. Panel number. Indicates the port of the device it should use. This function only shows up for Mercury controllers EP1501, EP1502 and HID controllers VertX V1000 and VertX EVO V1000. For Otis elevator, DEC s IP address acts as a panel number. Reader address. Indicates which reader to use. Depending on the controller, the displayed options are different. If a controller only has 1 reader address, Single reader will be displayed. If the controller has multiple reader addresses Reader 1 and Reader 2 are displayed. Default mode. Select access credentials for the door. Depending on the device type, different selection options are presented. Keypad format. Select a keypad format for PIN identifications. This option appears when a Default mode is set for HID devices as PIN only, Card or PIN or Card & PIN. Only available for HID devices. Keypad format configuration (button). On the right side of Keypad format field, there is a Settings button, which opens Keypad format configuration window. In this window, it is possible to review built-in keypad formats and configure custom ones. Built-in keypad formats cannot be removed. Keypad format. Keypad format name. Keypad structure. Keypads button configuration. PIN length. The length of the PIN number. PIN entry timeout. Time interval which is given for a user to enter the PIN number from first to last digit. Number of retries. Number of times the PIN number can be entered incorrectly. After reaching this limit, the reader will not accept PIN number entries for a time period that is configured in Lockout time field. Lockout time. The locked time interval for the reader after the maximum number of Number of retries attempts have been reached. Enter button. Specify which button will have the Enter function. This button is used to confirm the PIN number or when a PIN number has to be entered that is shorter than PIN length. Cancel button. Specify which button will have the Cancel function. This button is used to cancel unfinished PIN number and reset it, that it would be entered from the start. Schedule mode. Indicates which mode is used during a specific schedule. Note, that this function only works after selecting a Schedule for the device. Schedule. A schedule is selected during which period the Schedule mode will be active. The door stays locked during nonschedule time. By default, it is possible to choose built-in schedules: Always and Never.

9 Reader mode override. Overrides the readers mode to either Lock, Unlock or default by leaving the field empty. High Security Mode. An option Two card mode can be selected to make a door more secure, by allowing access only when presenting two different cards. By default, High Security Mode is set on Off option. This setting not available for Axis A1001 controller and BioStation 2/A2/L2 devices. Time & attendance. Specifies if the reader uses Time & attendance feature and its calculations. Readers with T&A feature, generate different types of events, that include either Clock-in or Clock-out types. Work type. Assigns a configured work type, which is configured on Time & attendance schedule configuration tab. Monitored by cameras. Displays cameras that are configured on Video tab and are linked with the door. By clicking on the cameras name, it will go to the selected cameras configuration panel on Video tab. Set default camera (button). On the right side of the Monitored by cameras field, there is a button which brings Set default camera window. In this window, a default camera is selected from the cameras that are on the doors list. Set security areas for disarming (button). Sets security areas for disarming purposes for the reader.

10 Access levels configuration An Access level is like a set of key. It is a selection of doors that may be assigned to a user or visitor, which in turn defines the users access permissions. Access level can only use doors from the same location it is assigned to. There are built in access levels for every location, that cannot be removed or edited. Everywhere (location name). Access levels are set for every door on the specified location with schedules set as Always. This will allow to go through every door on the specified location. Nowhere (location name). Access levels are set for every door on the specified location with schedules set as Never. This won t allow to go through every door on the specified location. On the list panel, configured and built-in access levels are displayed. From here, access levels can be created and added to the list or removed. on Details panel, selected access levels details are displayed and can be configured. The most important settings while creating an access levels are Name, Location, Assigned schedules and Added doors. To add doors, click on Add door and a list of doors will be presented from which doors can be assigned to an access level. Assign schedules. Sets schedules for all added doors to the one selected from the list. This field is hidden if there are no doors added to the access level. Require operator confirmation (host mode) (checkbox). To be able to pass through the door with an access level with this function enabled, a host confirmation is required for a user to pass. This function only works with License plate recognition module enabled and configured. Default action if operator does not respond. A timeout of the confirmation event, generated when a host confirmation is required. After Time for operator to respond time has passed, user will be either Denied access or Granted access. This function only works when Host mode is enabled. Time (s) for operator to respond. A time interval for an operator to respond to after an event is generated that requires a host confirmation. Access level role. This function is deprecated. Price. This function is used for Billing purposes. When a unit is written down, each time a user passes through the access level, the configured unit is added to the sum. Billing report then an be made in the Reports tab. Add door (button). Adds doors to the access level. Opens an Add door window, where door(s) can be selected and added to the access level. Only doors from the selected location will be displayed on the list. Doors list (field). Displays added doors with reader directions and assigned schedules.

11 o On the left, a door name is displayed. o On the right, reader directions are displayed (Entry and Exit), with their assigned schedules. o Schedules can be manually assigned for reader directions by clicking on the drop down list near them and selecting a schedule. This as well can be done with Assign schedules function, to assign the same schedules to all readers. o On the far right, there is a remove button, which will remove the added door. o If an elevator door is added with configured floors, after saving the access levels, Floors button is displayed on that door. Pressing this button, opens Configure floor access window.

12 User configuration There are many functions that can be done here, concerning user configuration. Created users can be viewed, modified, deactivated or re-activated. Identifications, such as cards, fingerprints, PIN or license plate numbers, can be assigned or removed from the user. Automatic notifications can also be configured on this tab, which will send a notification (SMS, , HTTP) after certain events are generated. Automatic notification license is required for this function to work. By default, an Admin user (Admin Admin) is created in CredoID, with whom first logins to the software can be made. This user cannot be disabled nor removed, will always have User type set as Administrator and its User name for login purposes set as admin. User List panel On the list panel, configured users are displayed, as well displays how many identifications are selected and how many there are in total. Also, it is possible to review information of the selected users, by hovering over a user. From this panel, users can be created and added to the list, as well can be deactivated or re-activated. Also, automatic notifications can be configured from this panel.

13 User details panel In Details panel, user information is divided to 4 sub-panels: Employee. User configuration settings. Identification. For adding or removing assigned credentials for the user. Intruder detection. For specifying security profiles for the user. This function is deprecated. Billing. For billing information. After selecting a user from the List panel or by creating a new one, users information is showed on this panel. Here, user configurations can be made, such as details about the user, its location or what access levels it has, expiration date and much more. To create a user, 3 main fields has to be filled: Family name, First name and Location. Other fields are not mandatory to be able to save user settings.

14 User photo configuration A user photo is not mandatory while creating a user. A user photo aspect has to be 3:4. If the added photo has a different aspect than 3:4, it will fit the photo with the default aspect. Load photo from disk Capture photo from camera Opens a window, where a photo file can be selected from a folder and assigned to a user. This window also opens up when pressed on the Users photo. Supported formats: PNG, JPG, JPEG, GIF and RMP. Opens a window, where a photo can be captured from a device with a camera.

15 Save photo Delete photo Saves the photo of the user to a folder with a selected format. If no photo is added to the user, this button is disabled. Deletes the photo of the user. General user information Family name. Users family name. This field is required to be filled in. First name. Users first name. This field is required to be filled in. Middle name. Users middle name. Phone & Secondary phone. Users phone numbers. Send SMS (button). Located at the right side of Phone & Secondary phone fields. Opens up a window, where it is possible to send a SMS message to a phone number. Note, that Automatic notifications license and a presence of a modem is required for the feature to work. Additional configuration settings have to be configured in the Settings tab, under Notifications module. . Users address. An address must be: [symbols]@[symbols].[symbols 6] (example: Your 1@domen.com). Multiple address can be assigned to a user, by separating them with a comma. Send (button). Located at the right side of Send s field. Opens up a window, where it is possible to send an e- mail message manually. Note, that Automatic notifications license is required and notification settings have to be configured in the Settings tab, under Notifications module. Messenger. Additional field, which is used to indicate different ways of communicating with the user. Department. Select a configured department. Departments are created, modified or removed in the Department configuration window, which is reachable by clicking on Department configuration button, located on the right side of the Department field. Company. Select a configured company. Companies are created, modified or removed in the Company configuration window, which is reachable by clicking on Company configuration button, located on the right side of the Company field. Title. Select a configured title. Titles are created, modified or removed in the Title configuration window, which is reachable by clicking on Title configuration button, located on the right side of the Title field. Employee number. Users unique employee number. It is not possible to enter an employee number that is already entered on another user. User locations and access levels

16 Locations. Assign location(s) to a user. At least 1 location has to be assigned to a user to be able to save settings. "Main office" is the default system location, so you do not have to do any additional setup for a system with one location only. Access level. Assign access levels to a user. Assignable access levels depend on assigned location(s) to the user. By default, it is allowed to select Everywhere or Nowhere access levels per location. By assigning any of the default access levels (Everywhere or Nowhere), it will remove all of the access levels (from that location) in the process that are assigned to the user. Validity of the access level is displayed near the assigned access levels. Access level configuration (button). This button is located on the right side of assigned access levels in the Access level field, which opens Access level configuration window. Extended access (checkbox). When a credential is presented by the user on the reader that has Extended access enabled, the door will operate using the Extended time, rather than the Strike time. The time interval depends on the door configuration. Activation date. Indicates the date and time when the user starts to be active. By default, when a user is created, Activation date is set the moment it was created. Expiration date. Indicates the date and time when the user expires. By default, a user does not have an expiration date when created, it is set as No date has been set. When clicked on the field, it will generate an expiration date and time the moment when it was done. Note, that expired users are moved to deactivated state. User type and login configuration User type identifies user s permissions when the user is logged in to CredoID, such as: what menu tabs are enabled, if a user can read or edit fields. By default, when a user is created, it is given a built-in User type User, which has very limited permissions. Only the built-in admin user (Admin Admin) has a default User type Administrator and it is unchangeable. When a user is created, it does not have login credentials. User login credentials are created in Login details configuration window. Only built-in admin user (Admin Admin) has a built-in login credentials (User name: admin; Password: admin). Its User name is unchangeable, but Password is configurable. It is recommended to change the password for the Admin Admin

17 user when CredoID is installed for security reasons. User type. Indicates a User type that is assigned to user. By default, User type User is assigned to a user when it is created. There are already built-in User types that can be assigned to users: Administrator, System operator, User, User administrator and Visitor. User types can be created in User types configuration window. Configure user types (button). Located on the right side of the User type field. Opens User type configuration window, where user types can be viewed, created, modified or removed. There are built-in user types which are used on every location and can be viewed, but cannot be modified nor removed. Time & attendance type and additional information On this section, Time & attendance type can be selected for a user, as well additional information can be written down, which will be displayed on the events. T&A type. Indicates what type of time & attendance type a user uses. The type indicates which schedules it will use for T&A calculations. There are two types: o Simple. Uses schedules from Schedule tab. A schedule is selected from Work schedule field. o Advanced. Uses schedules from Time and Attendance tab. When this type is assigned to a user, the user can be seen in the Time and attendance tab, where schedules can be assigned to him. Work schedule. Assign a schedule, that are from Schedules tab, to a user. This field only appears if T&A type is selected as Simple. Additional field #1 & #2. Information fields, that can be displayed on events. Only 60 symbols can be entered in the field. Additional field #3. Information field, that is only displayed on User tab. Identification sub-panel Identifications, such as cards, fingerprints, PIN numbers and license plate numbers can be created and added to a user in

18 Identification sub-panel. When creating identifications, they are placed in sets, containing one of each identification and called ID set [number]. Identification or a full set can be removed by clicking on Remove button. Icon Name Description Card Fingerprint An icon, symbolizing a card identification. By clicking on Add new card button, it will create a new card identification. An icon, symbolizing a fingerprint identification. By clicking on Add new fingerprint button, it will create a new fingerprint identification. PIN License plate An icon, symbolizing a PIN identification. By clicking on Add new PIN button, it will create a new PIN identification. An icon, symbolizing a License plate identification. By clicking on Add new license plate button, it will create a new license plate identification. If there are fields that are not filled in, but they required to be, additional identifications cannot be added until those fields are filled in or the identification is removed. Card identification Card can either be added manually or by scanning it from a device. Configured cards cannot be modified, only can be printed out or removed. Card format. Indicates the card format, which is either assigned automatically when a card is added by scanning from a device or is manually set adding a card manually. By default, there are many built-in card formats, but only 4 are enabled by default: 26, 32, 47 and 56-bit formats. Additional formats can be enabled in Card formats window. Configure card format (button). Opens Card formats window, where card formats can be viewed, created, modified or removed. By default, there are many built in card formats that can be used, but they are not editable nor they can t be removed, only enabled or disabled. Facility code. Indicates the cards facility code number. This field is not displayed if a card format does not have facility codes configured. After entering facility code, hex code is generated/updated. The maximum facility code number that can be entered is the 2x, where x stands for the number of bits that are assigned to it (8 bits assigned, in total 255 numbers starting from 0). Number. Indicates the cards number. After entering a card number, a hex code is generated/updated. The maximum card number that can be entered is the 2y, where y stands for the number of bits that are assigned to it (8 bits assigned, in total 255 numbers starting from 0). Get number from scanner (button). Button located on the right side of Number field. By clicking on this button, it will open Scanning card window. In the Scanner field, a device is selected that can scan cards and scanning process starts. After a successful scan, the window closes and the card information will be saved automatically. If there is an error or a timeout, a warning message is displayed and the window is closed. Select a number from the list of unused cards (button). Button located on the right side of Number field. By clicking on this button, it will open Unused cards window. Here, unused cards can be added to the user. Unused cards are generated after an unregistered card is scanned by a device and it is registered in the Monitoring tab. By adding a card from the list, the window closes and the card information will be saved automatically. Hex code. Cards hex number, which is sum of a facility code and card number. While writing a Hex code, it will constantly update Facility code and Card numbers. It is not recommended to fill in Hex code first while a card format has a facility code as it might generate incorrect numbers.

19 Design. Select a card design for a card, that are configured on Card design tab. Print card (button). Located on the right side of the Design field. After selecting a card design from Design field, a configured design can be printed on the card. After clicking on the button, it will open an review image (as.xps file) of the card with the implemented information (First name, Family name, Card number ), depending on the configured design. After that, printing can be done. Fingerprint identification To add a fingerprint, a fingerprint scanner is required to be connected to CredoID or if it is a USB fingerprint scanner, it only has to be connected to the system. It is possible to add 2 fingerprint templates per fingerprint identification. Trigger duress alarm (checkbox). By checking this box for a fingerprint template, when that fingerprint is registered in the system, it will generate an alarm. This should be placed only on 1 fingerprint template per fingerprint identification. If an error appears during a fingerprint scan, the scan will be canceled and the Scanning fingerprint window will close. Scanning might instantly fail either when opening Scanning fingerprint window or by selecting a device. This can happen due of these reasons: Unstable connection with the device. The device is disabled. Hardware issues. PIN identification A PIN identification is entered for a user. The PIN numbers are written in the PIN and Reenter PIN fields. The maximum length of a PIN number can only be 6 digits. Settings are not allowed to be saved if PIN numbers in the PIN and Reenter PIN fields are entered incorrectly or the entered PIN number is already registered in the database. License plate identification While configuring license plate identification, Plate number and Matching rule are the main fields that has to be configured, while other fields are informational. Plate number. The license plate number of a vehicle. If a license plate number is entered that is already registered in the database, it will open a window, displaying to which user the license plate number is assigned to and if an override should be made. Maximum length of a Plate number is 10 symbols. Matching rule. Indicates a matching rule for the license plate. Make. Car manufacturer name. Model. Car model name. Color. Cars color.

20 Billing configuration Billing information for the user is described here. This information is presented in the Billing reports. Contact number. Indicates users contact number. Contract date. Indicates the date when the users had signed the contract. This opens a calendar where a date is selected. Payment condition. Payment conditions can be described here.

21 User import A manual on how to import user information to CredoID is displayed below. On how to create a correct user import file, please follow up Creating user import file manual. User data can be imported through Settings tab and then selecting Import users. To import user data properly, follow given instructions:

22 1. Data import settings. Configure the Source from where users will be imported, as well as primary key and additional settings, such as Has header row. Select a Primary key, by which CredoID will treat the users by this field. Same primary key duplicates will be treated as the same user, but with additional information. Possible import sources: Spreadsheet. Import users from.csv or.xls type files. Active directory. Users are imported from server "Active Directory User and Computer" list. Other database. Users are imported from Orucul or MS SQL database libraries. For this manual, a Spreadsheet source type will be used. 2. Press Open sample file button and select the file that will be imported. 3. Check the box Has header row in the upper-right corner if the import file contains header row. Bound all columns in the Preview tab, either manually or using Auto button in Data binding tab, which will bound most or all columns correctly. Note, that all headers must be bound to be able to import users.

23 4. Select how the imported data will be treated in the Duplicate record treatment panel. Possible actions: Overwrite. Get all data from source file. Remove existing settings before importing. Modify. Add settings, but leave the existing ones. Do not modify. Leave the settings as it is. Settings are not changed. Active and update. If a user is deactivated and an updated information is imported related to that user, it will active that user. Skip and log. Leaves the setting unchanged and logs about this action. Activate latest. If a Card/PIN is being imported that is already in the system, it will over-right it to the newest imported user. 5. After all settings have been checked and headers are bound, click Import button to import users. (Optional) If you wish to use automatic imports, check the checkbox Activate automatic imports in the Automatic import settings panel and configure automatic imports for the selected source type. In Get import files from: select the file from which users will be imported, insert File mask and the time interval of automatic import in Directory scan interval. click Save button to save automatic import settings. Note: if using automatic import function, it is advisable to restart CredoID service (Access Control System Service) and GUI, to fully configure automatic imports. Active Directory user import To import users using Active directory, on Source field, select Active Directory type. On the Connection section, fill in these fields:

24 LDAP Connection string. The connection string to the Active Directories user library. Either an IP address is used (example: LDAP:// ) or a Domain name (example: LDAP://domain.com). User name. User name which is used to connect to the Active Directory. A Domain name and the user has to be given (example: DOMAIN\User). Password & Reenter password. Password which is used to connect to user on Active Directory. After the settings have been set, click TEST to test the connection to the Active Directory. If the connection is successful, on Preview section, the users will be displayed. On the Preview section, bound the user data and then click Import button to import the users. Note, that not all bounds are required to be bound to be able tot import users. Note on card number formats during user import When importing users without specified "Card format name", CredoID automatically selects 32 bit card format. Format mismatch in most cases will end import procedure with an error message "Card number is too long / short for card format". Therefore when importing users, please make sure the source database carries card format information for each user. If it does not, and card numbers are not 32 bit, make sure you add appropriate format data for each user before importing.

25 Creating user import file Supported import format files Excel spreadsheet; LDAP (active directory user import); Database source (ODBC database source); For a successful import, it is recommended to use.xls or.csv formats. Requirements before creating an import file To create a correct user import file and to be able to upload it, some configurations on CredoID has to be done before hand: Devices; Locations; Doors; Access levels; Card formats; Schedules; These configurations are required as some information will be used to create a user import file from them. If these configurations are not made, when importing the a user import file, not everything data could be imported. Import file preparation The given import files below, shows how an import file would look like. Using this example file, you can create your own import file. The most important fields in the import file are users FirstName and LastName, as these settings are enough to create a user in CredoID. Other fields can be left blank or filled in, depending on what information is being imported. Most of the fields are self explanatory, such as FirstName, LastName, EmployeeNumber, but some fields require a specific format or key words . A full address has to be presented. Example: example@mail.com; UserTypeID. A full name of configured user type has to be presented in the import file. The built in user types are: Administrator, System operator, User, User administrator and Visitor. If this field is left empty, by default the imported user will have User type as User. ActivationDate & ExpirationDate. The date depended on time format that is on the windows system. Example: yyyy:mm:dd HH:MM. Photo. A file location where photos are located has to be presented. Example: C:/photos/user.png. TAType. Time & attendance schedule type. There are 2 types: Simple and Advanced. Simple uses schedules from Schedules tab, while Advanced Time & attendance configured work schedules. WorkSchedule. This field has to be filled in only if schedule type is selected as Simple. A configured schedules name from Schedules tab has to be filled in. By default, CredoID has 2 hard coded schedules: Always and Never.

26 CardsFacilityCode. Indicates the cards facility code number. If there is no facility code for the card, leave the field empty. CardCode. Indicates the cards number of the card credential. CardFormatName. Card format is presented. The name of the format should be the same as the ones that are configured in CredoID. By default, CredoID has these card formats already enabled: 26 bit format, 32 bit format, 37 bit format, 56 bit format. AccessLevel. Applies access levels to users. If no access level is typed in, the imported user will not have any access levels. By default, CredoID has hard coded access levels which can be assigned to users: Everywhere and Nowhere. Locations. Applies a location to the user. If no location is typed in, the imported user will not have any locations. By default, CredoID has a hard coded location Main office Main. To be able to add multiple credentials or access levels, additional row has to be created in the import file with the same user information, but with different credentials or access levels. An example on how to add multiple credentials and access levels can be found in the given Import_example.xls/csv files. Note, it is recommended to use Font Calibri, with a Font size 11. Using different or multiple fonts, might cause issues while importing. Limitations We officially support import files with rows. Customers should be noted that importing users with files larger than the official supported amount may encounter significantly longer import times or even crashes.

27 Notifications configuration Notifications are used to send data to a specified locations or user, using SMS, messaging or type of notifications, whenever a configured notification is triggered, such as by received events. It is also possible to send notifications manually with desired information. There are 4 types of notifications that are possible on CredoID: SMS, , and Video server. Automatic notification license is required to be able to use this feature. Important note: Please restart service (not GUI) after enabling modules. We support GSM/UMTS gateways which support 2SMS, SMS2 . 2N VoiceBlue Next GSM/UMTS Gateway configuration: Configuring SMS notifications Before configuring SMS, be sure that the modem or a device that will be sending SMS messages is connected to the PC, with installed drivers and is functional. As well, most modems use software, given by the modem provider. This software has to be closed at all times for the modem to have a stable connection with CredoID, as the modem can only communicate with one software only. Note, that the maximum length of a SMS message is 160 symbols, with Unicode enabled - 70 symbols. 1. In CredoID, go to Settings tab and click on Modules button, to open Modules window. 2. Find Notifications module" and configure SMS section. The SMS settings have to be the same as the modems settings and has to use the right COM port. 3. (Optional) Enable Use Enicode checkbox, to be able to send unicoded messages. Note, that this will decrease the

28 messages length from 160 symbols to 70 symbols. The modem hardware parameters that are to applied in CredoID, are located in Device manager, through Control panel. Configuring notifications To be able to send messages, a configured is required and correct configurations on CredoID has to be done. Each provider might have different settings, limitations or requirements. For this manual, Gmail provider is used. 1. In CredoID, go to Settings tab and click on Modules button to open Modules window. 2. In Modules window, find "Notifications module", enable section. 3. Configure parameters. Server. outgoing mail server (SMTP for Gmail: smtp.gmail.com). TCP service port. servers port (TLS for Gmail: 587). From. The address that will send the message. User name. login user name. Password. password. Gmail might ask to enable access for less secured apps, if this is the case, go to this site and enable it: Manually sending a SMS or message After SMS and configurations are completed, it is recommended to test if the settings are configured correctly. Best way to do so, is to send an SMS or an message manually. To do so, go to Users tab and click on Send SMS or Send E- mail button and send a message to designated address. After that, on Monitoring tab, an event will be displayed which will indicate if the message was sent or the process has failed. If the message was not sent, check your setting again and repeat the process.

29 Configuration of automatic notification Automatic notifications feature allows to send a message automatically (SMS, , HTTP or Video server) after certain event is received to trigger the automatic notification feature, such as receiving certain events, such as access granted or a user passing through a certain reader. Automatic notifications are configured on Users tab.

30 1. Click on Configuration of automatic notifications button to open Configuration of automatic notifications window, where automatic notifications can be created, modified or removed. 2. Create a new automatic notification by clicking on Create new item button. 3. Configure a notification filter and apply it. This will determine when will the automatic notification triggers. 4. Add an action and clicking on Add new item on the list button. 5. Select the type of notification (SMS, , Video server or 6. Configure to whom the message will be sent to. Either choose the users phone number or address who triggered the automatic notification, or select Custom and in the next field type in a custom receiver. These options are only available for SMS and notifications. 7. Indicate what information will be sent to the receiver. After automatic notifications are configured, save the settings. Don't forget to Enable the configured notification by checking Is active box Configuration of HTTP notification To configure HTTP notifications, there are only few things that needs to be done: HTTP notification has to be enabled in the notifications module. Correct HTTP URL is presented with wanted fields while configuring automatic notifications. In the HTTP configuration notification screen, in the URL field, a HTTP address is typed in. Sample URL displays an example on how the HTTP URL can look like. From the list below, it is possible to add fields straight to the URL (such as %EventTime%, %UserName% and so on). After configurations are done, the URL can be tested by clicking on Test URL button, which will open a browser with the configured URL. After all is done, click OK.

31 Schedule and holidays configuration Schedule configuration Schedules (also known as Time zones) are universal and are used throughout all Access Control System: in Access Levels, Door locking, Time and attendance. Mostly, schedules configured on Schedules tab are assigned to readers, to determine its working hours. It can also be used for T&A work time calculations, but the feature is limited. Time schedule is a user-configured combination of time intervals for a duration of one week. It may be used to define readers access times or at which times users will be able to access doors. Each schedule consists of 9 day-schedules: 7 weekdayschedules and 2 holiday-schedules. There are two built in Schedules named Always and Never which are used internally in the system and cannot be changed. Always. Devices allow access all the time on everyday. Never. There are no schedules blocks and so, the devices would not allow access all the time.

32 Schedule name. Indicates the name of the schedule. Locations. Indicates the assigned locations to the schedule. Selected interval begins at. Indicates the start time of the selected interval. This field is editable and changes the start of the selected schedule interval. Selected interval ends at. Indicates the end time of the selected interval. This field is editable and changes the end of the selected schedule interval. Blue circles. Represent workdays. By default, work days are from Monday to Friday, as defined in Regional settings on Settings tab. Red circles. Represent weekends. By default, weekend days are Saturday and Sunday, as defined in Regional settings on Settings tab. Yellow circles. Represent holidays work schedules. Holidays are defined on Holidays tab. Weekday-schedules. Up to 5 intervals in each day-schedule can be created. Holiday-schedules. There are 2 types of holidays: National and Other holidays. If a certain day of month is marked as one of these holidays, the system will use holiday-schedules instead of normal weekday-schedules. New workday starts at. Indicates when the day ends and a new day starts. This option is used for Time & attendance calculations. There is a limit of total number of intervals in one schedule depending on specific hardware used in the system. Multiple intervals can be selected in several days by holding Ctrl key on the keyboard and selecting each schedule interval. Then the start and end times can be adjusted in one go. Note: If Simple T&A is used on users to calculate Time and attendance, be sure that the schedules has only 1 work interval per day. Multiple work intervals on the same day ( for example, to create an impression of a brake interval, by splitting work interval into 2) may cause some bad calculations in the time and attendance reports. Holiday configuration Holidays are configured after schedules. Holidays classifies as a non-working day that can be applied to nullify work days or specify different schedules for holiday days that are configured on Schedules tab. Note, that this doesn t apply to Time and Attendance configured schedules.

33 Holidays can be configured on Holidays tab. Specific holidays can be used in specific Locations. There can be multiple day holidays. There is an option to configure holiday to repeat each year. Name. Indicates the name of the holiday. Holiday starts on. Indicates the start date of the holiday interval. Holiday ends on. Indicates the end date of the holiday interval. Select the same date as in Holiday starts on field to make it a single-day interval. Holiday type. There are 2 types of holidays: National holidays and Other holidays. National holidays type is used for holidays defined for your country. Other holidays type is used for any non country-wide holidays (e.g. holidays celebrated only in your company). Repeat each year (checkbox). Check this setting if the holiday should be repeated at the same date every year. CredoID will automatically recalculate its date once the holiday ends. If there are holidays configured in your system, they will override normal time schedule operation and will use day-schedules of National holidays or Other holidays for any weekday while the holiday is active.

34 Anti Pass-back (APB) configuration APB (Anti-Pass-Back) areas are used for identifying how many users are in certain areas and to prevent users from entering or leaving the APB areas several times. As well can be used for generating an alarm or to prevent a user to enter through a door if the user is already registered in the APB area already. There are built in Outside APB areas for every location. These APB areas cannot be removed or edited. An Outside area is where a user ends up after they have exited an APB area. Though, if a user is inactive for over 48 hours, he will be moved out from Outside area to Unknown. There are few important rules that have to be known while configuring APB areas: Different manufacturer controllers cannot be added to the same APB area. Only one type of manufacturer devices can be in the same APB area. Doors which have an exit button, cannot be used for APB areas due that the system can t track if a user has left the area or not. About devices and need to know information. Not mentioned manufacturers or device, either does not support APB functionality or is not implemented. HID. APB is supported up to 5 HID controllers (each V1000 supports 32x V100 which each supports 2x readers) through RS-485 cable. Does not allow to have different anti-passback types for one controller, only one type should be used per controller. Mercury. APB is supported for EP1501 and EP1502 controllers (16 entry readers). APB only work per controller, as Mercury controllers do not communicate with each other. Suprema. Currently not support with CredoID. Axis. APB is supported on A1001 Axis controller. APB only works per controller, as Axis controllers don t communicate with each other. Axis controllers do not require a full data upload when APB settings are set, only when removing APB areas, a full upload is required. Name. Indicates the name of the APB area.

35 Location. Indicates the location that the APB area is assigned to. Only one location can be specified and only doors from that specific location can be included into the APB area. APB exempt. With a selected access level, users which have the selected access level, will be excluded from this APB areas rules and restrictions. Due of this, a user will be able to enter or leave the APB area for unlimited number of times. Only one exempt access level can be chosen per APB area. Only works with HID and Axis controllers. APB reset schedule. If a schedule is selected, APB area user count will be reset at the end of a schedule block. APB reset will continue untill next schedule block start. This feature does not work with Axis controllers. Reset APB if door does not open. If the door is not opened during the specified time interval after a user has presented a credential, the APB is reset for that user. This function only works for HID controllers. Axis has this feature built in and enabled, as APB registered only after a door contact has changed. Daily time limit. The amount of time a user is allowed to be in the APB area daily. If the daily time is reached, it will generate an alarm event for that user. By the right side, there is a button Clear, which sets the time back to 00:00:00. Single entry time limit. The amount of time a user is allowed to be in the APB area. If the time limit is reached, alarm event is generated for that user. By the right side, there is a button Clear, which sets the time back to 00:00:00. Add door (button). Adds doors to the APB area. Opens an Add door window, where door(s) can be selected and added to the APB area. Only doors from the selected location will be displayed on the list. Anti-passback type. Indicates an anti-passback mode for the reader. Full upload to controller, except Axis controllers, is required after changing this setting. There 3 possible modes: Soft. After violation is done by the user, it grants access for the user and generates an alarm event of anti-passback violation. Hard. After violation is done by the user, it denies access for the user and generates an alarm event of anti-passback violation. Disable. After violation is done by the user, it grants access for the user and does not generate an alarm event of antipassback violation. This setting does not work for Axis controllers, it will act as Soft mode. Leads from & Leads to. Indicates from which APB area each reader leads to. Remove door from APB area (button). On the right side of the added door, there is a button which will remove the door from the list.

36 Video and license plate recognition (LPR) configuration Video configuration Video tab is used to connect to a video server (DigiFort or NumberOK) and connect with its cameras. After a connection is established, these cameras can be assigned to monitored doors or inputs, from which then the received events will have snapshots taken for them and added to the event. A video tutorial on how to add a configured video server to CredoID, as well as on how to configure License plate recognition (LPR) feature, can be found here. Before configuring video settings, it is recommended to configure doors in Doors tab or/and inputs in Inputs tab and to be sure that the video server (DigiFort or NumberOK) is configured correctly. For this manual, DigiFort video server is used. For DigiFort video server configuration, follow their user manual. After preparations are made, video configurations can be made on CredoID Camera name. Enter a name for the camera.

37 Video server name. A configured video server connection is selected from this field. To create a new connection to a video server, click on Create new video server buttons, located on the right side of the Video server name field. This opens Video server configuration window. Edit video server button, located on the right side of the Create new video server button, opens Video server configuration window and with settings of the selected configured video server connection. Name. Create a name for video server. Type. A video server type is selected here. Types of video servers: DigiFort or NumberOK. IP address or hostname. The IP address of video server. Port. The port of video server. User name, password & Reenter password. The login credentials that are used to connect to the video server. Video camera on server. Select a camera that is configured on video server. If there are no cameras on the list, click on the Search video cameras on video servers button, located on the right side of the Video camera on server field and wait until cameras are listed in the list. Show camera view (button). Opens a Camera view window, where it displays the cameras image. Located on the right side of the Search video cameras on video server button. Video server IP address. Displays the IP address of video server. Camera Type. Displays the type of camera is being used. Location. Configure locations for Camera. Camera description (optional). Type in a description for the camera. Snapshot resolution. Select the resolution of the snapshot. This snapshot is saved on the designated location, that is defined on Settings tab, as well this defines the resolution of the snapshot which is displayed on Camera view window. (Checkbox) Store snapshot for ever. Stores every snapshot taken. By default, snapshots are stored in C:\ProgramData\Access Control System\DBFileStreamData\Photos\. The location can be changed on Settings tab. Thumbnail resolution. Select the resolution for thumbnail. The thumbnails are added to the events. Monitored doors. Indicates doors which will have cameras snapshots taken, depending on the filter that is being used, which is defined by created filter in Monitored doors filter. Monitored door filter (button). By right side of added monitored door, there is a button Edit filter, which will open a filter window. Here, a filter has to be created and assigned that will define, when a snapshot is taken and added to the event. Note, that filters that are defined for monitored doors, can be used for monitored inputs too. By the right side of Edit filter button, there is a checkbox, which enables or disables the filter. Monitored inputs. Indicates inputs which will have cameras snapshots taken, depending on the filter that is being used, which is defined by created filter in Monitored doors filter. Monitored input filter (button). By right side of added monitored input, there is a button Edit filter, which will open a filter window. Here, a filter has to be created and assigned that will define, when a snapshot is taken and added to the event. Note, that filters that are defined for monitored inputs, can be used for monitored doors too. By the right side of Edit filter button, there is a checkbox, which enables or disables the filter.

38 To check if the camera is working and it is transferring images, in click on Show camera view button and a Camera view window will show up, where it shows the cameras live image. As well, in this window it is possible to refresh the live image, show the image in browser and export the image. It is also possible to view live video feed from cameras if Live stream settings are configured. On Live stream settings, cameras connections have to be configured or a link to the cameras live view has to be presented. Note! That VLC media player is required to be installed on the system to be able to view live stream from the cameras. When video configurations are configured, on Monitoring tab, events should show up with an thumbnail of a taken image from the camera(s). License plate recognition configuration License plate recognition (LPR) feature allows to take vehicles plate number from the camera and use it as an identification, such as letting a car through a gate. This feature requires DigiFort and CredoID's LPR license to work, as well, it might require to have specialized cameras which support LPR capabilities. Before configuring LPR module on CredoID, be sure that LPR is configured on the video server. To configure LPR module on Digifort server, follow their user manual # page 242. On CredoID, firstly check if LPR module is enabled on CredoID, by going to Settings tab and clicking on Modules button, which will open Modules window. Find License plate server module and check if it is enabled. If it is not, enable it, save it and click OK on Settings tab. Secondly, a video camera has been created on Video tab, as well as a door from Doors tab. After a video server connection has been established and a door configured, LPR settings can be configured. To do so, go to Inputs tab and create a new input.

39 1. Select License plate recognition server from Device type list. 2. Configure the inputs name and assign a location. 3. Select the video server from which the license plates will be received. 4. Select a door which will have LPR support. After configurations have been made, LPR events should pass through. To view LPR events, it is recommended to use the Occupancy tab, as it displays events in more detail and host confirmation events are done on that tab.

40 Time and Attendance configuration and T&A report generation Time and Attendance feature is used to calculate work time for created users, able to display when the user enters and leaves and calculate the total work hours. Possible features of Time and Attendance module: Calculate users work time, when he arrives and leaves, and other key details, such as Regular work time, Late arrivals, Early departures, Time before schedule, Time after schedule, Additional work time, Over break time. Absences can be created for users to identify its absents in work days. These details are then added to the T&A reports. Able to create different and more detailed schedules for each user individually. An ability to create night time schedules. T&A reports display: Summary. Displays a summary of worked days and report fields for selected users. Details. More detailed page, where selected users T&A work schedules are presented in detail, depending on the selected T&A report settings and report fields. Schedules. Displays all created T&A work schedules, presenting them in detail. Absences. Displays users who were absent on specific dates and reason for them. Time card. A time card of selected months is displayed for selected users, displaying when the users worked, how many hours, total hours, absences and much more. This guide will show how to configure Time and Attendance settings on CredoID and how to generate T&A reports correctly. For T&A to work correctly, these settings have to be configured: Doors. User settings. Schedules. T&A report configuration. Door configuration

41 While configuring doors, it is important to configure Time & attendance setting, by choosing correct Clock-in/out functions: None. Generates normal events for the reader. This is set by default. Clock-in reader. Generates events with clock-in events for the reader. It is advised to use on Entry directions. Clock-out reader. Generates events with clock-out events for the reader. It is advised to use on Exit directions. Clock-in/Clock-out reader. Generates events with either clock-in or clock-out events for the reader. This feature can only be used on readers with interactive screens, such as Suprema devices like BioLite Net, BioStaion 2, where a user can select to either clock-in or clock-out. Mercury controllers can use this function as well if configured correctly. After T&A setting has been configured for doors, T&A events will be generated from these doors. User configuration Secondly, users have to have their T&A type selected correctly. By default, a new user will have T&A type set as Advanced, meaning that it will use schedules from Time and attendance tab.

42 In User tab, it is important to select T&A type for users that it will be using: Simple. Uses configured schedules from Schedules tab. If this type is selected, a schedule has to be selected as well. Advanced. Uses configured schedules from Time and Attendance tab. Time and Attendance configuration On Time and attendance tab it is possible to configure and review work days for individual users. Custom schedules can be created and many additional features that helps to calculate work days more efficiently and with better results. Time and attendance tab is separated into 3 sub-panel: Individual schedules. For reviewing and making changes to the user s calendar / schedules. Assign or modifying created schedules to users, manage absences, review user information. Work schedule configuration. Work schedules are created, modified or removed on this panel. Settings. Night work time can be configured here, which determines when the night shift starts and ends. To fully configure a schedule for a user, a schedule has to be created on the Work schedule configuration sub-panel and then that schedule has to be assigned to the user on the Individual schedules sub-panel. Individual schedules

43 Individual schedules sub-panel is divided to 3 sections: User information field. Here, selected user s information as well as selected months schedules are presented. The user information fields are not editable, only the schedule field is editable. 1. User information, which are configured on Users tab, are displayed here. These fields are not editable. 2. The selected months schedules are displayed below. This field is editable and schedules can be assigned, modified or removed. If the month is shorter than 31 days, those days are colored yellow and are not editable. Calendar. Displays all users who has T&A type set on Users tab as Advanced and their calendar field. Work schedules can be assigned, modified or removed, as well it is possible to manage absences on the calendar field. 1. Selected year and month. Displays which year and month is currently displayed on the calendar. 2. Filter. These fields filter the user list. 3. Export to XML (button). This function is deprecated. 4. Import from XML (button). Import schedules on the calendar. After clicking on it, Data import window shows up,

44 where data can be selected and imported. As well it is possible to configure automatic imports. 5. Calendar. Displays users list and their calendar. Here, for the selected user, schedules and absences are added, modified or removed. Work schedules. Displays created work schedules and their time interval with additional information. From here, schedules are assigned to users by dragging the selected schedule on the calendar. To add schedules manually, work schedules have to be configured first on Work schedule configuration sub-panel. After that, in Individual schedules sub-panel, from Typical work schedules list, select a work schedule, hold-click with left mouse button and drag on the calendar on the desired date and user. For more configuration options on calendar display, click right-click. Work schedule configuration Work schedules can be reviewed, created, modified or removed on this sub-panel. On the list panel, created schedules are displayed with their representative colors, while on details panel schedule configurations are made.

45 To create work time interval, hold-click and drag on work time interface. This will create a green bar, which indicates Normal work time. It can be configured by either dragging the slider, which is above the Normal work time schedule on or by configuring Starts at and Ends at time intervals on work times settings below. To create break time interval, hold-click and drag inside the Normal work time interval, creating an orange bar, which indicates Break time. By selecting a work time interval, its settings are displayed below. Report scheduled work time (ignores actual work time). Ignores the actual work time and applies full work schedule time. This function is deprecated. Unless user is absent. Applies an absent day to the user unless a clock-in or a clock-out was done during any time of the work schedule. This function is only available if Report scheduled work time is checked. This function is deprecated. Use first and last events only. Only uses the first and last events during the day while creating a report. Flexible. Grants flexibility for the work schedule. This will add extra configuration for the work schedule on the Work interval (represented as green arrows on the bottom of the interval) and Selected interval settings. This function is deprecated. Get work type from reader. Receives work type from readers. Work types are configured on Selected intervals sections, by clicking on Edit work type button, located on the right side of the Work type. After a work type has been configured, it can be assigned to a door on Doors tab. This function is deprecated. Regular work time during weekends and holidays. The schedule will act as a normal work day during weekend and holiday days. Settings Night work time can be configured here, which determines when the night shift starts and ends. Generating Time and Attendance reports

46 Time and attendance reports are generated on Reports tab, under Time & attendance sub-tab. In this tab, either create a new report template or use the default template. Configure report settings, time interval, filters (users, departments or companies) and click on Generate report button to create a report file. The report file will be generated in Microsoft Excel format.xlsx. Event type. Indicates what type of events will be used while generating a T&A report. TA clock in/clock out events. Uses clock-in and clock-out events. These events are generated when readers door setting Time & attendance is set on Clock-in, Clock-out or Clock-in/Clock-out. Access control events. Uses Access granted events. When a report is generated, only the first and the last Access granted events are used for every single day. PC logon events. Uses events generated by logon programs. Access control and PC logon events. Uses the first and last Access granted of the day and logon programs generated events. Use first and last events only (checkbox). While generating a T&A report, only the first and the last events will be used of the day. This function is only available for TA clock in/clock out events and PC logon events types. Order report details & summary sheets by. Orders the users by the selected order, on reports Summary and Details tabs. When T&A report is generated, the report file can be opened with Microsoft Excel. In the report file, 5 sheet tabs are displayed: Summary, Details, Schedules, Absences and Time card.

47 Summary. Displays a summary of worked days and report fields for selected users. Details. More detailed page, where selected users T&A work schedules are presented in detail, depending on the selected T&A report settings and report fields. Schedules. Displays all created T&A work schedules, presenting them in detail. Simple schedules from Schedules tab are not presented in the report. Absences. Displays users who were absent on specific dates and reason for them. Time card. A time card of selected months is displayed for selected users, displaying when the users worked, how much hours, total hours, absences and much more.

48 Visitors configuration and preview Visitors can be created, viewed, modified or removed on the Visits tab. Unlike users, visitors have limited permissions and may require host user interaction. On the List panel, configured visitors are displayed. These visitors are ordered by date. By selecting one of the visitors from the list, in the details panel, its information is presented. On the List field, created visitors are presented with an additional information: Visitors First and Family name. The assigned hosts First and Family name. Presents the Activation date. The visitors state. Possible states: Registered. A visitor that has been recently created. In this state, the visitor is inactive until it has been approved. Canceled. The visitor becomes inactive after the visitor has been canceled. Time Expired. Indicates that the visitors time has been expired. This does not make the visitor inactive. Recreated. Indicates that the visitor has been recreated after it has expired or was canceled. State acts similar to Registered. Deprecated visitor states: Approved. A visitor that is approved, will be active until Duration time. CheckIn. Indicates that the visitor has checked in. This is done through CredoID GUI after a visitor has been approved. Does not change any credentials.

49 CheckOut. Indicates that the visitor has checked out and becomes inactive. NoShow. Indicates that the visitor did not checked in nor checked out during after the Duration time has been expired. Visitor configuration process 1. Create a visitor by clicking on Create new item and configure the main settings. To create a user, 7 main fields has to be filled in: Host, Document type, ID number, Family name, First name, Location and Access level. Other fields are not mandatory to be filled in to be able to save visitor settings. It is recommended to configure identifications after the basic settings have been saved (step 2). After the visitors has been configured, save the settings. Host. Select a host (user), to whom the visitor is assigned to visit. This field is mandatory. Document type. Select a configured document type for a user, describing the ID number. This is an information field, which describes the visitors ID number type (example: pass number, vehicles license plate, custom ID). Document types are configured by clicking on the Configure document type button, located on the right side of the Document type field. This field is mandatory. ID number. The assigned visitors ID number. It represents an ID number depending on the Document type. This field is mandatory. Family name. Visitors family name. This field is mandatory. First name. Visitors first name. This field is mandatory. Phone & Secondary phone. Visitors phone numbers. . Visitors address. An address must be: [symbols]@[symbols].[symbols 6] (example: Your 1@domen.com). Multiple address can be assigned to a visitor, by separating them with a comma. Locations. Assign a location(s) to a visitor. At least 1 location has to be assigned to a visitor to be able to save settings. This field is mandatory. Access level. Assign access levels to a visitor. Assignable access levels depend on assigned location(s) to the visitor. By

50 default, it is allowed to select Everywhere or Nowhere access levels per location. By assigning any of the default access levels (Everywhere or Nowhere), it will remove all of the access levels (from that location) in the process that are assigned to the visitor. Validity of the access level is displayed near the assigned access levels, displaying: Date and time when the access level starts to be active. By default, displays the date and time of the Activation date. Expiration of access level date and time, which by default is Duration Status of access level: Active, Inactive, Expired. Activation date. Indicates the date and time when the visitor starts to be active. By default, the activation date is set when a visitor is created. Duration. Indicates the date and time when the visitor access levels expire. After Duration time has expired, access levels and identifications become inactive. By default, the Duration is set for 1 hour after its activation. Remarks. An informational field. 2. The configured visitor will be in Registered state and its identifications and access levels will be activated. During this state, it is advised to configure its identifications. After the visitors settings have been configured and identifications added, a visitor is then fully activate for the Duration of time. Note #1. Visitors can also be viewed and configured on Users tab. They will have Visitor User type. Though created users with User type Visitor on Users tab, won't be seen on Visitors tab. Visitor processes After a visitor has been created and activated, there are two different scenarios that can happen: 1. Visitor Duration time expires. This changes the Visitors state to Time Expired and will deactivate its Access levels and remove every identification that was assigned to the visitor. 2. The visit is manually canceled by clicking Cancel visit button. This changes the Visitors state to Canceled and will deactivate its Access levels and remove every identification that was assigned to the visitor. During this state, no settings

51 can be changed. In these states, visitor does not have any access. To re-enable the visitor and to be able to configure it again, click on Recreate visitor button which is replaced by Cancel visit button (If the visitor was expired, it first has to be canceled and then the Recreate visitor button will be available). This changes the visitors state to Recreated, where it acts similar like Registered state, where visitors settings can be configured and activated again. Note #2. If the user is removed, it will be removed from the Visitors tab and will change its activate state to Deactivated. This visitor won't be able to configured on Visitors tab after this.

52 Outputs/Triggers - arm/disarm on multi-swipe Outputs are used for configuring security alarms, fire alarms or used as triggers, to send a signal to other connected devices. Outputs on devices: HID. Controllers, such as VertX EVO V2000 or EH400-K, do not need slave devices to be able to configure outputs, with an exception for VertX V1000 and VertX EVO V1000 which require VertX V100 modules. Mercury. EP1501 controller requires MR16out module to be able to add outputs, while EP1502 has additional built-in outputs (6 outputs in total), that can be used for output configuration without the need for MR16out module, although it can be still be added. Suprema. All Suprema devices require Secure I/O 2 module to be able to configure outputs. Axis. Axis can use Auxiliary outputs for output configuration. Outputs are configured on Outputs tab. Possible output configurations: Output. A simple output that is used for security alarms, fire alarms or custom output configuration. Weight is OK. This function is deprecated. Weight is not OK. This function is deprecated. Trigger. A trigger output that after a controller receives a specific event(s), it will either open the output for a short time, turns it on or turns it off. Arm/Disarm on Multi-swipe configuration This feature is possible with Trigger output, as triggers main purpose is to trigger an output after certain events are received, for example a card credential is presented on the reader twice in a shot period of time.

53 1. Create a new output by clicking on Create new item button. 2. Select Device type as Trigger and configure its Name. 3. Select the Location the output belongs to. Select a connected device from the Device IP address field and then select the output which will be used from the Output field. 4. Configure a filter, which will determine when the output is triggered. Select a created filter from the Apply filter field. If no filter is yet created, on the right side of the Apply filter filed, select Create new filter button to open Filter window. After the filter has been created, select it from the Apply filter field.

Midpoint Security,

Midpoint Security, User Manual Revision: 6, Date: October 4, 009 Midpoint Security, UAB, Kaunas, Lithuania www..emssa.net TABLE OF CONTENTS Copyright notice... Liability waiver... Introduction... 4 Overview... Settings tab...

More information

Configuring Cisco Access Policies

Configuring Cisco Access Policies CHAPTER 11 This chapter describes how to create the Cisco Access Policies assigned to badge holders that define which doors they can access, and the dates and times of that access. Once created, access

More information

Configuring Cisco Access Policies

Configuring Cisco Access Policies 11 CHAPTER This chapter describes how to create the Cisco Access Policies assigned to badge holders that define which doors they can access, and the dates and times of that access. Once created, access

More information

USER MANUAL. Disclaimer

USER MANUAL. Disclaimer USER MANUAL Disclaimer The instructions in this document have been carefully checked for accuracy and are presumed to be reliable. Smart I Electronics Systems Pvt. Ltd. and its writers assume no responsibility

More information

First Access Express OPERATOR GUIDE

First Access Express OPERATOR GUIDE First Access Express OPERATOR GUIDE October 2016 Cutting edge simplicity Table of Contents Introduction... 4 PC Requirements... 5 Step 1. Software Installation... 5 Complete Installation Server and Client...

More information

Configuring Personnel and Badges

Configuring Personnel and Badges CHAPTER 10 This chapter describes how to create the personnel records and badges used to access doors in the Cisco Physical Access Control system. Note For instructions to synchronize Cisco PAM with personnel

More information

Portals 14 What is a portal? 14 Hardware 15 RS232 to RS USB to RS TCP/IP to RS Add a Serial Portal 16 Add a Network portal 16

Portals 14 What is a portal? 14 Hardware 15 RS232 to RS USB to RS TCP/IP to RS Add a Serial Portal 16 Add a Network portal 16 PROS LITE User Manual Version 2.0.0 www.visual-plus.com Table of Contents Getting Started 5 Starting PROS Lite 5 Create a Portal 5 Adding a control panel 6 Adding a user 7 Upload users to a controller

More information

IS2000. Administrative Operator s Guide. AOG-101 (07/2005) Software Version 7.45

IS2000. Administrative Operator s Guide.  AOG-101 (07/2005) Software Version 7.45 IS2000 Administrative Operator s Guide www.imron.com AOG-101 (07/2005) Software Version 7.45 Table of Contents INTRODUCTION...6 Overview...6 GENERAL INFORMATION...6 Logging On...7 Logging Off...9 Event

More information

Visitor Management System Module Settings and Operation Guide

Visitor Management System Module Settings and Operation Guide Visitor Management System Module Settings and Operation Guide Visitor Management System Module Settings and Operation Guide. Introduction.. 4 Starting and stopping the Visitor Management System software

More information

Webpass IP Reader. WEB Configuration Manual

Webpass IP Reader. WEB Configuration Manual Webpass IP Reader WEB Configuration Manual WEBPASS version : v0.09 Aug-24 th -2009 (HW.1.0) WEBPASS Web version : v1.4 Build date : Aug-18 th -2009 Revision History 1. Newly added Event Type : Alarm and

More information

IS2000. Administrative Operator s Guide

IS2000. Administrative Operator s Guide IS2000 Administrative Operator s Guide Table of Contents Logging Off... 7 Event Manager... 7 HARDWARE MANAGER... 8 Maneuvering the Hardware Tree... 8 Unlocking the Module... 8 Viewing the Hardware Tree...

More information

ACCESS CONTROL SOFTWARE V3.1 REFERENCE MANUAL

ACCESS CONTROL SOFTWARE V3.1 REFERENCE MANUAL ACCESS CONTROL SOFTWARE V3.1 REFERENCE MANUAL 01/2004 Centaur is a registered trademark of Position Technology INC. Pro-Report, Tracker, FrontGuard and FrontView are trademarks of Position Technology Inc.

More information

BioStar 2. Revision Notes KO BS2 V Version 2.7.1

BioStar 2. Revision Notes KO BS2 V Version 2.7.1 BioStar 2 Revision Notes Version 2.7.1 Version 2.7.1 (Build No. 2.7.1.13) Release: 2018-12-20 1. Important Bug Fix 1.1. Fixed a security vulnerability: Cross Site Scripting. 1.2. The row setting changes

More information

SEMAC-D1. WEB Configuration Manual

SEMAC-D1. WEB Configuration Manual SEMAC-D1 WEB Configuration Manual For SEMAC-D Series Only: 1.00.00,Dec 23 2013(HW1.1) SEMAC Web Ver1.0 / Build Date 12/23/2013 Contents WEB Configuration...1 Logon WEB...1 Premise... 1 WEB IE Browser...1

More information

Installation & operation manual SUPERVISOR SOFTWARE KaDe Premium Plus II

Installation & operation manual SUPERVISOR SOFTWARE KaDe Premium Plus II Installation & operation manual SUPERVISOR SOFTWARE KaDe Premium Plus II V 1.1.0026.138B Update: 15-05-2018 R2 CONTENTS Chapter 1 Introduction 1.1 General information................. 5 1.2 System functions

More information

GV-ASManager. User's Manual V ASMV40-A-EN

GV-ASManager. User's Manual V ASMV40-A-EN GV-ASManager User's Manual V4.2.0.0 ASMV40-A-EN 2012 Guardian Security Solutions, L.C. All rights reserved. Under the copyright laws, this manual may not be copied, in whole or in part, without the written

More information

Wednesday, October 07, WebBrix. Admin Guide

Wednesday, October 07, WebBrix. Admin Guide Wednesday, October 07, 2015 WebBrix Admin Guide Contents 3 Table of Contents Foreword Part I Web Client 0 4 1 Monitor/Command... 5 Events... 5 Status... 7 HID Edge and... Edge EVO 8 HID V1000 and... V1000

More information

Equitrac Integrated for Océ

Equitrac Integrated for Océ Equitrac Integrated for Océ 1.2 Setup Guide 2014 Equitrac Integrated for Océ Setup Guide Document History Revision Date Revision List November 2, 2012 Updated for Equitrac Office/Express version 4.2.5

More information

1. Launch and Log into Citrix and the CCURE 800 Application

1. Launch and Log into Citrix and the CCURE 800 Application The IS&T Campus Safety and Security Infrastructure Team (CSSI) provides a unified campus security infrastructure and environment, which brings together many systems under a single roof. CSSI uses the CCURE800

More information

Access Control Unit User s Guide

Access Control Unit User s Guide NetAXS Access Control Unit User s Guide The configurations described in this document have not been reviewed by Underwriters Laboratories Inc. June 2007 2007 Honeywell. All rights reserved. 800-00233,

More information

AKCess Pro Server Access Control User Manual

AKCess Pro Server Access Control User Manual www.akcp.com AKCess Pro Server Access Control User Manual Help Version updated till version 118 Copyright 2012, AKCess Pro Co., Ltd.. 1) Introduction A) What is the AKCess Pro Server / Access Control?

More information

SmartLock Surf OPERATOR GUIDE

SmartLock Surf OPERATOR GUIDE SmartLock Surf OPERATOR GUIDE May 2015 Table of Contents Introduction... 5 Server PC Requirements... 7 Client PC Requirements... 7 Step 1. Software Installation... 8 Step 2. Firewall... 8 Step 3. Port

More information

Integrated for Océ Setup Guide

Integrated for Océ Setup Guide Integrated for Océ Setup Guide Version 1.2 2016 OCE-20160914 Equitrac Integrated for Océ Setup Guide Document History Revision Date September 14, 2016 Revision List New supported devices/card reader web

More information

MICROTRAK EVOLUTION.NET USER GUIDE

MICROTRAK EVOLUTION.NET USER GUIDE MAN047-08 AUGUST 2016 GETTING STARTED Microtrak Evolution.NET consists of easy to use, intuitive modules. They cover the main areas of operation - User Management, Personnel Management, Facility Management,

More information

MorphoManager User Manual. Table of Contents

MorphoManager User Manual. Table of Contents User Manual Table of Contents Introduction... 4 Support... 4 Overview... 5 What is a client?... 5 What is a server?... 5 What is a fingerprint enrollment device?... 5 What is a MorphoAccess?... 6 What

More information

Time Reorder Utility User Manual

Time Reorder Utility User Manual Time Reorder Utility User Manual Revisions...3 Introduction...4 Getting Started...5 Running Modes...7 Tray icon menu...7 Enter Password...8 Connections...8 Define Connections...8 Verify Connections...9

More information

AgentWorks Administrator and Manager User Guide - Release 12.5

AgentWorks Administrator and Manager User Guide - Release 12.5 AgentWorks Administrator and Manager User Guide - Release 12.5 March 21, 2013 2012 MoneyGram InternationalAll rights reserved. Table of Contents Registration Overview... 2 1. Initial Log In AgentWorks

More information

Controlsoft Identity and Access Management Software Controlsoft Identity Access Management Software

Controlsoft Identity and Access Management Software Controlsoft Identity Access Management Software Controlsoft Identity Access Management Software IA Server Software Installation Guide v8.0.229 2018 Controlsoft Ltd 9010-0050 Issue 6 Page 1 of 39 29/10/2018 Contents 1. Introduction... 3 1.1. PC Specifications...

More information

ADMINISTRATOR PORTAL MANUAL

ADMINISTRATOR PORTAL MANUAL ADMINISTRATOR PORTAL MANUAL TABLE OF CONTENTS SIGNING IN... 5 HOME SCREEN... 6 GENERAL SETTINGS... 7 WORKING HOURS TAB... 9 HOLIDAYS TAB... 11 Shortened hours for the Holidays... 12 Holiday Message...

More information

Equitrac Integrated for Konica Minolta. Setup Guide Equitrac Corporation

Equitrac Integrated for Konica Minolta. Setup Guide Equitrac Corporation Equitrac Integrated for Konica Minolta 1.2 Setup Guide 2012 Equitrac Corporation Equitrac Integrated for Konica Minolta Setup Guide Document Revision History Revision Date Revision List November 1, 2012

More information

SP2+ Swing Handle Lock Manual

SP2+ Swing Handle Lock Manual www.akcp.com SP2+ Swing Handle Lock Manual Copyright 2016, AKCP Table of Contents Introduction... 3 Hardware features... 4 LED status description for the Handle Lock & Door Sensor... 4 Specifications FAQ

More information

Nexus Lite (Web Interface)

Nexus Lite (Web Interface) Nexus Lite (Web Interface) QUICK START GUIDE Scope of Document This document gives a brief overview of operation of the Nexus Lite Controller s Web user interface. Document Conventions We use the following

More information

S2 NetBox v4.8 Basic End-User Admin Training

S2 NetBox v4.8 Basic End-User Admin Training S2 NetBox v4.8 Basic End-User Admin Training 4/8/16 S2 Security 1 Table of Contents Introduction... 3 Log into your NetBox System... 3 Person Records... 5 Accessing Person Records... 5 Content of a Person

More information

STONELOCK NETWORK USER MANUAL Version

STONELOCK NETWORK USER MANUAL Version STONELOCK NETWORK USER MANUAL Version 17.2.1 Table of Contents About StoneLock Pro...4 1.0 Overview 1.01...System Introduction...4 1.02...System Components...4 1.03...Installation...5-6 1.04...Uninstall...6

More information

Equitrac Integrated for Konica Minolta

Equitrac Integrated for Konica Minolta Equitrac Integrated for Konica Minolta 1.2 Setup Guide 2014 Equitrac Integrated for Konica Minolta Setup Guide Document Revision History Revision Date Revision List August 9, 2013 Updated for Equitrac

More information

BioStation. Firmware Revision Notes EN BST V1.93. Biometrics & Security. Version 1.93

BioStation. Firmware Revision Notes EN BST V1.93. Biometrics & Security. Version 1.93 BioStation Firmware Revision Notes Version 1.93 Biometrics & Security Firmware Version 1.93 (Build No.1.93_140228) Release: 2014-02-28 1. Save logs when card authentication fails 2. Relay Off log added

More information

R A D I O N I C S. READYKEY K6100 Readykey for Windows. User Guide. Logging In. Logging Out. If an ID device has been issued:

R A D I O N I C S. READYKEY K6100 Readykey for Windows. User Guide. Logging In. Logging Out. If an ID device has been issued: R A D I O N I C S READYKEY K6100 Readykey for Windows User Guide Logging In If an ID device has been issued: 1. Use your ID device with the desktop administration or Central Network Controller (CNC) reader,

More information

Access Control Manager Release Notes

Access Control Manager Release Notes Access Control Manager 5.10.0 Release Notes Version 5.10.0 Released Wednesday, April 05, 2017 Files Released Avigilon Access Control Manager Physical Appliance Files 5.10.0-upgrade Avigilon Access Control

More information

AUTOMATED APPOINTMENT REMINDER AND ANNOUNCEMENT SYSTEM

AUTOMATED APPOINTMENT REMINDER AND ANNOUNCEMENT SYSTEM SARS Messages AUTOMATED APPOINTMENT REMINDER AND ANNOUNCEMENT SYSTEM USER MANUAL 2011-2015 by SARS Software Products, Inc. All rights reserved. COPYRIGHT Copyright 2011-2015 SARS Software Products, Inc.

More information

D3000.Lite User s Guide

D3000.Lite User s Guide D3000.Lite User s Guide 2011 Datawatch Systems, Inc. Datawatch Systems is a registered trademark of Datawatch Systems, Inc. For Datawatch D3000.Lite Version 1.2 Manual release date: March 1, 2010 Datawatch

More information

Equitrac Embedded for Sharp OSA. Setup Guide Equitrac Corporation

Equitrac Embedded for Sharp OSA. Setup Guide Equitrac Corporation Equitrac Embedded for Sharp OSA 1.4 Setup Guide 2012 Equitrac Corporation Equitrac Embedded for Sharp OSA Setup Guide Revision Date Revision List November 1, 2012 Updated for Equitrac Office/Express 4.2.5

More information

System Integration. Contents CHAPTER. This chapter describes how to integrate the Cisco PAM data and actions with enterprise or third-party systems.

System Integration. Contents CHAPTER. This chapter describes how to integrate the Cisco PAM data and actions with enterprise or third-party systems. CHAPTER 12 This chapter describes how to integrate the Cisco PAM data and actions with enterprise or third-party systems. Contents Configuring URL Actions, page 12-2 Creating or Modifying URL Actions,

More information

First Access OPERATOR GUIDE

First Access OPERATOR GUIDE First Access OPERATOR GUIDE June 2018 Cutting edge simplicity Table of Contents Introduction...4 PC Requirements...5 Step 1. Software Installation...5 Step 2. Host Server Definition...9 Step 3. Panel and

More information

Salesforce Classic Guide for iphone

Salesforce Classic Guide for iphone Salesforce Classic Guide for iphone Version 35.0, Winter 16 @salesforcedocs Last updated: October 27, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 Router Monitor Quick Start Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector

More information

USER MANUAL. smartengine 30 RELEASE DATE: 15/06/2010

USER MANUAL. smartengine 30 RELEASE DATE: 15/06/2010 USER MANUAL smartengine 30 RELEASE DATE: 15/06/2010 Disclaimer The instructions in this document have been carefully checked for accuracy and are presumed to be reliable. Smart I Electronics Systems Pvt

More information

Grandstream Networks, Inc. IPVideoTalk Cloud Conferencing System IPVideoTalk Portal User Guide

Grandstream Networks, Inc. IPVideoTalk Cloud Conferencing System IPVideoTalk Portal User Guide Grandstream Networks, Inc. IPVideoTalk Cloud Conferencing System IPVideoTalk Portal User Guide IPVideoTalk Portal User Guide Index INTRODUCTION... 4 OVERVIEW... 5 SIGN UP... 5 SIGN IN... 6 DEFINITIONS...

More information

TCS Access Control System Cheat Sheet

TCS Access Control System Cheat Sheet TCS Access Control System Cheat Sheet Access Control Main Screen 1 Toolbar 2 Device View Toolbar No. Name Function 1 Login Logs in the ASServer. 2 Logout Logs out the ASServer. 3 Devices Defines controllers

More information

SETUP GUIDE BioStar 2 Integration for Milestone XProtect English

SETUP GUIDE BioStar 2 Integration for Milestone XProtect English www.supremainc.com SETUP GUIDE BioStar 2 Integration for Milestone XProtect English Contents Target Audience... 3 Introduction... 4 System diagram... 4 Structural differences between BioStar 2 and XProtect...

More information

Salesforce Classic Mobile Guide for iphone

Salesforce Classic Mobile Guide for iphone Salesforce Classic Mobile Guide for iphone Version 41.0, Winter 18 @salesforcedocs Last updated: November 30, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered

More information

EC-11 Ethernet Converter

EC-11 Ethernet Converter EC-11 Ethernet Converter PSTN Contact ID to TCP Converter Installation and Operations Manual Version 8.H3.MID 1 Table of Contents About EC-11 Ethernet Converter... 3 Circuit Board Layout and Wiring Diagram...

More information

Cisco Unity Express Windows and Menus

Cisco Unity Express Windows and Menus Last updated: June 21, 2007 This chapter describes the windows, menus, and icons available in the Cisco Unity Express voice-mail system and contains the following sections: Navigating Through the Cisco

More information

AxTraxNG Access Control Management Software Software Manual (Version 27.x)

AxTraxNG Access Control Management Software Software Manual (Version 27.x) AxTraxNG Access Control Management Software Software Manual (Version 27.x) Copyright 2015 by Rosslare. All rights reserved. This manual and the information contained herein are proprietary to ROSSLARE

More information

USER MANUAL. BioPro SA50 Fingerprint & Palm Terminal. Version: 1.0 Date: August Inch TFT Terminal User Manual 1

USER MANUAL. BioPro SA50 Fingerprint & Palm Terminal. Version: 1.0 Date: August Inch TFT Terminal User Manual 1 USER MANUAL BioPro SA50 Fingerprint & Palm Terminal Version: 1.0 Date: August. 2017 2.4 Inch TFT Terminal User Manual 1 About This Manual This manual introduces the operation of user interfaces and menu

More information

SMS4Act! User Guide. Revision 3.22 Date: 18 April 2018

SMS4Act! User Guide. Revision 3.22 Date: 18 April 2018 SMS4Act! User Guide Revision 3.22 Date: 18 April 2018 support@sms4act.com www.sms4act.com SMS4Act! User Guide Contents What is SMS4Act!?... 3 SMS4Act! Features... 3 Who is MessageMedia?... 3 How to Install

More information

U-FLASH Setup Guide U-FLASH.

U-FLASH Setup Guide U-FLASH. U-FLASH Setup Guide Thank you for purchasing the U-FLASH. This guide will assist you in the setup of the system. You can call for FREE technical support to get help anytime at 757-258-0910. Please note,

More information

Android User Guide. for version 5.3

Android User Guide. for version 5.3 Android User Guide for version 5.3 Contents 1. Installation... 3 1.1. How to install Babelnet... 3 1.2. Enter Babelnet in the search field.... 3 1.3. Safety precautions when using Babelnet on your Android...

More information

Raptor University. Building Admin Training. Instructor: RAPTOR TECHNOLOGIES, LLC

Raptor University. Building Admin Training. Instructor: RAPTOR TECHNOLOGIES, LLC Raptor University Building Admin Training Instructor: RAPTOR TECHNOLOGIES, LLC This presentation includes the following topics to get you started using Raptor: Learning Objectives Create and Manage Users

More information

Smart Access Control System Software User Manual (Client Version)

Smart Access Control System Software User Manual (Client Version) Disclaimer Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced

More information

Embedded for Sharp OSA Setup Guide

Embedded for Sharp OSA Setup Guide Embedded for Sharp OSA Setup Guide Version 1.4 2016 SHP-20160315 Equitrac Embedded for Sharp OSA Setup Guide Revision Date Revision List March 15, 2016 Updated for Equitrac Office/Express 5.6 September,

More information

The following device commands are used most frequently: Lock/Unlock device O - O O. Reset screen password O - O - Factory reset + Initialize SD Card

The following device commands are used most frequently: Lock/Unlock device O - O O. Reset screen password O - O - Factory reset + Initialize SD Card 10 Device management Administrators can install apps on an activated device using device commands and check the profiles settings. Moreover, they can update, delete, or re-install apps installed on users'

More information

CLIENT DASHBOARD. With Cloud Communication Solution (C.C.S).

CLIENT DASHBOARD. With Cloud Communication Solution (C.C.S). CLIENT DASHBOARD. CLIENT DASHBOARD Content CCS Presentation... 3 SMS... 3 Channels... 3 Requirement... 3 1.1 To read before connect... 4 1.2 Glossary of symbols... 5 1.3 CONNECTION... 6 1.3.1 Choice of

More information

EMS WEB APP Configuration Guide

EMS WEB APP Configuration Guide EMS WEB APP Configuration Guide V44.1 Last Updated: August 14, 2018 EMS Software emssoftware.com/help 800.440.3994 2018 EMS Software, LLC. All Rights Reserved. Table of Contents CHAPTER 1: EMS Web App

More information

LockState RL 4000 User Guide

LockState RL 4000 User Guide LockState RL 4000 User Guide www.resortlock.com Table of Contents Section 1: General Overview 1. Foreword... 3 2. Important Information.. 3 3. Software Installation.. 4 Section 2: Initial Lock Setup Manual

More information

Administrator Quick Guide

Administrator Quick Guide 1 Administrator Quick Guide Login Screen The first page employees will see when visiting their training site is the login screen. This is where employees must enter their username and password to access

More information

V-CUBE Meeting 5. User Manual V-CUBE, INC. 2015/09/01

V-CUBE Meeting 5. User Manual V-CUBE, INC. 2015/09/01 V-CUBE Meeting 5 User Manual V-CUBE, INC. 2015/09/01 This document is the user manual for the V-CUBE Meeting 5 (or 'Meeting'), a web conferencing system. Revision history Revision date Details 2015/09/01

More information

ACCESS CONTROL. infinias Access Control and Integrated Video Installer s Guide

ACCESS CONTROL. infinias Access Control and Integrated Video Installer s Guide ACCESS CONTROL infinias Access Control and Integrated Video Installer s Guide BEFORE YOU BEGIN infinias Access Control and Integrated Video Table of Contents BEFORE YOU BEGIN... 3 1.0 Hardware Installation...

More information

Business Online Banking User Guide

Business Online Banking User Guide Business Online Banking User Guide Table of Contents Contents Overview... 2 Logging In... 2 Additional Login Information... 5 Home/Dashboard... 6 Top Line Tool Bar... 6 Bulletins... 7 Dashboard... 8 Accounts...

More information

Integrated Security and Access Control. User Manual

Integrated Security and Access Control. User Manual Integrated Security and Access Control User Manual Introduction Table of Contents Introduction About Inception 3 Site Details 4 System Notes 5 User Interfaces Connecting to the Web Interface 6 Elite /

More information

Appendix A The Cardholder Record Screen

Appendix A The Cardholder Record Screen The Cardholder Record Screen The Cardholder Record Screen is where you will do most of your work. Just about everything you do to maintain the Entry-Master System is done in the Cardholder Record Screen.

More information

Configuring Personnel and Badges

Configuring Personnel and Badges CHAPTER 8 This chapter describes how to create the personnel records and badges used to access doors in the Cisco Physical Access Control system. Note For instructions to synchronize Cisco PAM with personnel

More information

User Guide Online Backup

User Guide Online Backup User Guide Online Backup Table of contents Table of contents... 1 Introduction... 2 Getting Started with the Online Backup Software... 2 Installing the Online Backup Software... 2 Configuring a Device...

More information

Car Park Control System Software User Manual

Car Park Control System Software User Manual Disclaimer Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document may be reproduced

More information

ivms-4200 Access Control Client User Manual UD00895N

ivms-4200 Access Control Client User Manual UD00895N ivms-4200 Access Control Client User Manual UD00895N User Manual About this Manual This Manual is applicable to ivms-4200 Access Control Client. The Manual includes instructions for using and managing

More information

TIDOMAT smartone version 2. - User manual -

TIDOMAT smartone version 2. - User manual - TIDOMAT smartone version 2 - User manual - Copyright information 2008 Tidomat AB. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any

More information

Installation Guide. Cimatron Site Manager 2.0 Release Note

Installation Guide. Cimatron Site Manager 2.0 Release Note Installation Guide Cimatron Site Manager 2.0 Release Note Installation Guide i Table of Contents Introduction... 1 Cimatron Site Manager Components... 2 Installation... 3 Hardware Requirements... 3 Software

More information

BeAware Corporate Edition Admin Console Version 6.8 Ascentive LLC

BeAware Corporate Edition Admin Console Version 6.8 Ascentive LLC User Manual BeAware Corporate Edition Admin Console Version 6.8 Ascentive LLC User Manual 1 Copyright Notice Copyright 2006 Ascentive LLC All Rights Reserved This document is protected by copyright law

More information

LastPass Enterprise Recommended Policies Guide

LastPass Enterprise Recommended Policies Guide LastPass Enterprise Recommended Policies Guide This document will help guide you through common scenarios and selecting policies to enable on your LastPass Enterprise account. We will not cover all policies

More information

4.2. LockView N. Instruction Man

4.2. LockView N. Instruction Man 4.2 Manual n io t c u r t s TC In LockView N ual Instruction Man Table of Contents LockView NTC 4.2 Operator s Manual LockView NTC Instruction Manual LockView NTC Instruction Manual Introduction... 4 Operation...

More information

Configuring Personnel and Badges

Configuring Personnel and Badges 9 CHAPTER This chapter describes how to create the personnel records and badges used to access doors in the Cisco Physical Access Control system. Note For instructions to synchronize Cisco PAM with personnel

More information

Raptor University. Raptor System Training. Instructor: RAPTOR TECHNOLOGIES, LLC

Raptor University. Raptor System Training. Instructor: RAPTOR TECHNOLOGIES, LLC Raptor University Raptor System Training Instructor: RAPTOR TECHNOLOGIES, LLC Log In and Log Out 1. In your browser, enter https://apps.raptortech.com. 2. On the Raptor Login screen, enter your assigned

More information

ACCESS CONTROL QUICK INSTALL GUIDE. tel: +44 (0) fax: +44 (0) web:

ACCESS CONTROL QUICK INSTALL GUIDE. tel: +44 (0) fax: +44 (0) web: ACCESS CONTROL QUICK INSTALL GUIDE tel: +44 (0)1457 874 999 fax: +44 (0)1457 829 201 email: sales@cop-eu.com web: www.cop-eu.com WIRING CONFIGURATION - ACS CONTROLLERS CONNECTIONS Dahua access controllers

More information

Understanding Door Configuration

Understanding Door Configuration CHAPTER 5 This chapter describes the concepts used to configure doors and templates. A door configuration is a collection of devices, such as locks and readers, connected to a Cisco Physical Access Gateway

More information

RescueAssist. Administrator Guide. LogMeIn, Inc. 320 Summer St., Boston MA LogMeIn, Inc. All rights reserved.

RescueAssist. Administrator Guide. LogMeIn, Inc. 320 Summer St., Boston MA LogMeIn, Inc. All rights reserved. RescueAssist Administrator Guide LogMeIn, Inc. 320 Summer St., Boston MA 02210 2018 LogMeIn, Inc. All rights reserved. https://support.logmeininc.com Contents Using the Admin Center... 1 Log in to the

More information

owncloud Android App Manual

owncloud Android App Manual owncloud Android App Manual Release 2.0.0 The owncloud developers December 14, 2017 CONTENTS 1 Using the owncloud Android App 1 1.1 Getting the owncloud Android App...................................

More information

Auto Attendant. Blue Platform. Administration. User Guide

Auto Attendant. Blue Platform. Administration. User Guide Blue Platform Administration User Guide Contents 1 About Auto Attendant... 3 1.1 Benefits... 3 2 Accessing the Auto Attendant Admin Portal... 4 3 Auto Attendant Admin Portal Interface... 5 4 Auto Attendant

More information

SIMSme Management Cockpit Documentation

SIMSme Management Cockpit Documentation Introduction SIMSme Management Cockpit Documentation Version 2.1 February 2018 Table of Contents 1 INTRODUCTION... 2 2 USERS... 3 3 LICENSES... 5 4 GROUPS... 7 5 CHANNELS... 8 6 DASHBOARD...10 7 APP SETTINGS...12

More information

Release Notice. Version Release Date: June 12, (440)

Release Notice. Version Release Date: June 12, (440) Release Notice Version 5.7.57 Release Date: June 12, 2017 www.sedonaoffice.perennialsoftware.com (440) 247-5602 Table of Contents About this Document... 5 Overview... 5 Applications Enhancements/Improvements...

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

Alarm Monitoring User Guide

Alarm Monitoring User Guide Alarm Monitoring User Guide ReadykeyPRO Unlimited, Version 6.5 Bosch ReadykeyPRO Unlimited Alarm Monitoring User Guide, product version 6.5 This guide is part 1 of a 2-document suite, item number DOC-201-01-2-026,

More information

Contents Using the Primavera Cloud Service Administrator's Guide... 9 Web Browser Setup Tasks... 10

Contents Using the Primavera Cloud Service Administrator's Guide... 9 Web Browser Setup Tasks... 10 Cloud Service Administrator's Guide 15 R2 March 2016 Contents Using the Primavera Cloud Service Administrator's Guide... 9 Web Browser Setup Tasks... 10 Configuring Settings for Microsoft Internet Explorer...

More information

LUCITY SECURITY. This manual covers managing users, groups, and permissions for Lucity. Version: 2017r2

LUCITY SECURITY. This manual covers managing users, groups, and permissions for Lucity. Version: 2017r2 LUCITY SECURITY This manual covers managing users, groups, and permissions for Lucity. Version: 2017r2 CONTENTS SECURITY... 1 Security Program... 2 Getting Started... 3 Setting up a Security Admin User...

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 IIS Monitor Quick Start Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT

More information

Interactive Voice Response (IVR) Extension Type Guide

Interactive Voice Response (IVR) Extension Type Guide 4PSA VoipNow 2.0.3 Interactive Voice Response (IVR) Extension Type Guide For more information about 4PSA VoipNow, check: http://www.voipnow.com Copyrights 2002-2009 Rack-Soft, LLC. VoipNow is a registered

More information

Demonstration Instructions

Demonstration Instructions Demonstration Instructions Digital Defence Ltd. Secure Mobile Version 10.2.1 19 th July 2010 Table of Contents TABLE OF CONTENTS... 2 1. DEMONSTRATION INSTRUCTIONS... 3 1.1 PREREQUISITES... 3 1.2 PROCEDURE...

More information

Vendor Registration and Training

Vendor Registration and Training Vendor Registration and Training Bid Express Registration Guide Bid Express Vendor Guide February 2015 Prepared By Address: 5700 SW 34th Street, Suite 1235, Gainesville, Florida 32608-5371 Web: www.infotechfl.com

More information

Version: 1.1 Software Version: For Access 4.5.8/5.0.8 and above Version Date: July, 2011

Version: 1.1 Software Version: For Access 4.5.8/5.0.8 and above Version Date: July, 2011 User Manual Version: 1.1 Software Version: For Access 4.5.8/5.0.8 and above Version Date: July, 2011 About This Manual This document introduces the main function, the user interface and operations of the

More information

BeAware Corporate Edition Admin Console. User Manual. BeAware Corporate Edition Admin Console Version 7.1. Ascentive LLC.

BeAware Corporate Edition Admin Console. User Manual. BeAware Corporate Edition Admin Console Version 7.1. Ascentive LLC. User Manual BeAware Corporate Edition Admin Console Version 7.1 Ascentive LLC User Manual 1 Copyright Notice Copyright 2008 Ascentive LLC All Rights Reserved This document is protected by copyright law

More information

owncloud Android App Manual

owncloud Android App Manual owncloud Android App Manual Release 2.7.0 The owncloud developers October 30, 2018 CONTENTS 1 Release Notes 1 1.1 Changes in 2.7.0............................................. 1 1.2 Changes in 2.6.0.............................................

More information

SECTION 5 USING STUDENT

SECTION 5 USING STUDENT SECTION 5 USING STUDENT EMAIL 5. USING STUDENT EMAIL On enrolling at the University all students automatically have an email account created. Account creation depends on a student successfully enrolling

More information