Key Administration/Access Control; 4.0 Key Administration; Personnel Database - Bosch K2200 Series User Manual

Readykey controllers
Table of Contents

Advertisement

K2200 Series | User Guide | 4.0

4.0 Key Administration/

Access Control
This section deals with the Personnel database and
covers the following:
Adding new keys to the database.
Deleting keys (voiding) from the database.
Editing key parameters (access rights etc).
The use of PIN codes.
Controlling access - who goes where and when.
Also covered in this section are the following
associated topics:
Manual lock/unlock facility.
Setting the system date and time.
4.1
Key Administration
Each key that is issued will allow the keyholder
access through certain doors at certain times. This
section describes how to add, delete (or void), and
edit keys.
4.1.1

Personnel Database

Identifying Personnel
There are two ways in which individual keyholders
can be identified in the system. The first is to use an
automatically generated ID number, between 1 and
4000. The second method allows the operator to
assign a name, up to 12 characters, to each
keyholder.
Note:
You should decide before you start issuing keys which
method you will use. The system has to be set up to use
one method or the other by the installer. Although this
can be changed later without losing information, it is
not recommended.
Four-Digit Number
The main advantage of this method is speed of entry
because you will not have to enter a different name
for every key that is issued. The disadvantage is that
all references within the system, including printed
reports, are to the 4-digit number. This can make
identification of keyholders difficult, as you will have
to keep looking up your own records. You are not
able to select the number that is issued, the system
will always issue the first free number. For instance, if
you issue 120 keys, they will be automatically
identified as 0001 to 0120 when added. If you were
to delete, say, numbers 25 and 42, the next keys
issued would be identified as 0025, 0042 followed by
0121, 0122 and so on.
Bosch Security Systems | 7/03 | 17376 v1.1 / 47491C
Key Administration/ Access Control
If you use this method, it is vital that you keep an
accurate record of the 4-digit ID issued to each key
and to whom the key is issued. If a keyholder loses a
key, unless you have an accurate record, you will not
be able to delete the lost key from the system.
Twelve Character Name
A better method is to use the 12-character name.
This method is easier to administer once all the keys
are issued, In this case whenever a key is issued, a
unique name can be entered. The name may consist
of up to 12 characters using A-Z, 0-9 and space (SPC
on the keypad.) Names should not start with a space
or a number. You will probably use the keyholder's
name and initials, e.g. SMITH AB or JONES SL.
You may use any naming system you feel is
appropriate, such as payroll or employee numbers.
Remember names must be unique - you will be
warned if a duplicate name is entered.
Token Code
This is the unique code stored in each Readykey
credential. It is written permanently into the key
during manufacture and never changes. In routine
use, you will not have to use this code. However,
there are some occasions on which it can be used.
One of these is the adding of keys without physically
being in possession of the key. This may come about
if one or more keys are accidentally removed from
the system and it may not be possible or convenient
to recall the lost keys from the keyholders. If a record
has been kept of the token codes of all keys, these
can be entered instead of presenting the key itself.
The personnel printout (P1 command) contains the
token code of each key and is an ideal record for
such purposes.
Access Codes
The access that a key is allowed is determined by
assigning it an access code. Access codes are fully
described in see Section 4.2.6 Access Codes – The AC
Command. When routinely adding keys, you should
know the access code that will need to be assigned to
each key.
Please read Section 4.2 Controlling Access to understand
how access codes work.
Holiday Profiles
Each keyholder can be assigned a holiday profile.
This is a range of date on which the person will not
be allowed access. There are 24 different holiday
profiles, each of which may contain up to 20 holiday
periods. A holiday period consists of a start date and
number of days' duration. There are not enough
holiday profiles to give every keyholder their own.
For this reason, you are not advised to attempt to
control individual access using holiday profiles.
However, they may be used to cover periods such as
a temporary factory closure.
EN | 17

Advertisement

Table of Contents
loading

Table of Contents