Lock-Out Process (Lop); Authorization Monitoring Process (Amp); Cleanup Visitor Data (Clv) - Bosch BIS 2.3 Installation Manual

Access engine
Table of Contents

Advertisement

BIS 2.3 - Access Engine
In addition to the type designation, these entries distinguish
themselves from the other processes by the additional
parameters batchStart and batchPeriod, which determine the
time of day and the intervals at which this process is started by
the master.
Using the ProcessControl application of the master, these
processes can also be started at any time to check their
runtime behavior.
10.3.2

Lock-Out Process (LOP)

For each person different identity card locks can be set up
based on time intervals and other reasons. These locks are
checked and administered by this process. The process checks
the data and sets the corresponding locks or removes them
again by informing the access control system about the locks
using the loggifier. All locks are removed as soon as they have
expired.
10.3.3

Authorization Monitoring Process (AMP)

The validity of access authorizations is restricted by a time
interval, that determines the first and last day on which the
access authorization is valid. The time interval is defined by the
database fields AuthFrom and AuthUntil in the ACPersons table
or in the Visitors table for visitor identification cards. The
process checks the data and informs the access control system
via the loggifier when a person's access authorization begins or
expires. All access authorizations for a person are deleted
depending on the system parameters KeepAuthPerPerson (for
the table AuthPerPerson) and KeepAuthPerVisitor (for the table
AuthPerVisitor) as soon as they have expired.
10.3.4

Cleanup Visitor Data (CLV)

External visitors' data is stored for a time period of six months
(system parameter VisitStorTime). After the end of this period,
Bosch Sicherheitssysteme GmbH
DMS - Data Management System | en 105
Installation manual
F.01U.028.713 | V 2.3.0.1 | 2009.11

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents