Access Control Management Software Guide

Author: Brian Rhodes, Published on Jan 06, 2015

In access control, the locks, readers and credentials may be what most see but its the management software where everything is controlled. In this guide, we cover the most common parts of this software and provide an overview of how the pieces relate to managing an access system.

Basic Purpose

The function of Access Control Management software is fourfold, with distinct functions and management focuses:

  1. Live View: Displaying the current state of the access system; if doors are locked/unlocked, and which users are interacting with doors.
  2. Door Management: Configuring every opening is critical, to ensure it opens and remains locked on schedule or depending on credential.
  3. Cardholder Management: Administering all potential users for their needed access privileges, and updating those records as needed.
  4. Reporting: This offers users to forensically review log details collected by the system - when and where credentials were used, and when openings were unlocked.

We examine each of these four areas inside.

** ****** *******, *** *****, ******* *** *********** *** ** what **** *** *** *** *** ********** ******** ***** ********** is **********. ** **** *****, ** ***** *** **** ****** parts ** **** ******** *** ******* ** ******** ** *** the ****** ****** ** ******** ** ****** ******.

Basic *******

*** ******** ** ****** ******* ********** ******** ** ********, **** distinct ********* *** ********** *******:

  1. **** ****: ********** *** ******* ***** ** *** ****** ******; ** doors *** ******/********, *** ***** ***** *** *********** **** *****.
  2. **** **********: *********** ***** ******* ** ********, ** ****** ** ***** and ******* ****** ** ******** ** ********* ************.
  3. ********** **********: ************* *** ********* ***** *** ***** ****** ****** **********, and ******** ***** ******* ** ******.
  4. *********: **** ****** ***** ** ************ ****** *** ******* ********* by *** ****** - **** *** ***** *********** **** ****, and **** ******** **** ********.

** ******* **** ** ***** **** ***** ******.

[***************]

Essential ********

***** **** ********** ******** ****** ***** ** ********** *** ***********, it ******** *** **** ***** ********. ***** *******:

  • ********** *********
  • *********** ***** & ***********
  • ****** **** ******** *** ***********
  • ****/********** **********
  • ****** ******** *************
  • ****** *******

** **** *****, ***** ******** *** ********* ** * ****** or ********* ******** **** **** ***********. ****** ******** *** ******* numbers ** ******* *** ***** *** ** ****** ** * dedicated *****, *** ********** ******* *** ******* ******* ******* ** host *** ******** *** ************ ** ***** ******* ** *****.

Monitoring *********

**** **** ****** ********* ** **** ** ** *** ******* state ** ***** ** **** ****. ***** ********* ******** *** layout ****, *** **** *******:

  • **** ******: ***** **** ******* ******** ******* ******* * ****, * lock ********, ** * **** ** ****** *** ***** ** logged.
  • ***** ******: ** ******* ***** * **** **** *** ****, ****** a **** ****, ** *************** ******* **********, *** ********* ***** ** ***** ** ***** operator ********* ** *** *****.
  • ****/****** ********: ** ******** *** *** ****** ** ******** ****** ** lock * **** ********, ***** ** *** ***** ** * single '********' *********.

**** ********** ***** *** **** *********** ** ********* ********* *** organized, ******* ** * ******** ** ***** ********:

*** ***** ***** ***** ** ******** ** **** *******:


***** *********** ******* ******** **** ***** ***** **** ** ***** photos ** ********* *** ******** ****** *** ****** ******** ** valid:

Configuring ***** *** ***********

*** ********** ******** ******** *** ******* ** *** *** *********** and ** ****************** ** ***** ******* ** *** **** *******. ******* **** opening ** **** ***********, **** ***** ********** ** *** **** hardware *** **** ** ** ******** ******* *** ********* ***. The ****** ***** ***** *** '*******' ******** ** ****** **** doing ***** *******:


Access ***** *** *********

*** *** ********* ** ********** ****** ******* ****** ********** ***** and **** **** ** *** ******* ** ******** **** *** when *********** *** ** ****. **** ********* ******* ***** ***** against *****, ***** ****** ********* **** **** ******** ***********. ********* and ****** *** ******** ************ **** ** ***** *******:

***** ********* ******* ****** ******, ******** * ***** ** ******** doors ** *********** ******** ******** **********. *** ****** ***** **** off *** ****** ** ***** ********:

****** *****


****** *********


User **********

****** ********** ******* ****** **** *********** *****. ***** ****, *** the *********** **** *******, *** ******** ****** ** *** ******. The ****** **** ********** ********* ******* ******** *******:

  • ****** ** ******** *****
  • *********** *********** **** *****
  • ******** ******

*** ****** ***** ******** ** ******** ** ***** ********:

****** ***********


****** ***********


System *******

* *** ******* ** **********, ******** ******** **** ** *** equivalent ** ********* *** ******** *****. *** **** ***** ** a ***** ******** ** **** ** ****** *** *** ** is ********* ** ** ****** ********** ********:


Comments (16)

***** **** **. ******. **** *********** ******. ** **** ***** HID ** ******** *** ***** ********?

**** **** ****.

***** **!

************, ***** ***** ** ** **** **** ******* ** *** camera ********** *** *** ****** ******* *******? *** ******? *** Hardware ****** ***..

**** *** *******.

[****: **** *** **** ***** ** *** *** **********:**** ****** ******* ******?]

********* **** ** ***** * *********** ****** ** **** ** the ******** ***** ****** ******* ** *********...***** **** *** *** end ** **** * ******* ************ *** ** ********* **** duplication.

  1. ** *** * **** **** **** ******* ** *** ************’* hardware *** ********, *** **** ** **** *** ******** *****. My **** ******** ******** ******** *** ******** *** ************. ** a ********** *** **** **** *** ********/****** *** ****** ******** the ******** ***, * ******** *** *** ******** ****’* ** more. ***** ****** *** **** *********** **** ***** ** **** insight ** **** ***** ************* *****.

***** *** *****. ** *** ******** **** *** *** *** and ** *** **** * *** ***** ************ ** * familiar *******.

****** *****, **** *** * ****** **** **** *** ****** informative ************. * ******** ******** *** ********** ********** ******** *** one ** *** ******** * ***** ** ***** **** * think ***** ** ****** ********** ** * ****** ***** *** which ****** ** ** ****** ** ***** ****** ** ******** users ***** ** ********* ******* ** ******** ** ** ****. Potentially **** ******* ** *** **** ** *** ** ****** Shooter ********* ***** * ******** ** ****** ** ** ***********, this *** ** ********* ****** *************** **** *** ******* ****** computer. * ** *** ****** ******** **** * ******* ** software ********* ** ** **** * ******** ******* ** ****?

* ** *** **** ***** ****, *** *** ****** ******* I ** **** ******** **** ** ******* ******** *** ***** lockdowns. ***** *** ** ********* ******* ********, ******* ** *****, or ** ***** * ********* ********** ****. **** ******* *** multiple ****** ** ********, **, ********* ** *** *********, *** can ****** ******* ******* **** *****, ******* *** *****, ********* access ******, ***.

**** ***********, ** ** ******* *** ******* *** *** **** has. * ****** **** ******* **** ***** ** * ***** failure **** **** *** * **** **** *** ***** ** no **** ** *********. ** *** ***** ******?

** **** ***** **** ******* ** *** *** ****** ** designed/programed. **** *** ****** **** **** ***** **** ****** ** fail ****** ***** *** ***** ****** ****** *** *** ** overridden **** * ****** ***. * **** *** * ** government ****** **** *** ****** ******* ***** ** **** ** our ********* ** ** **** ***** ** **** ****** ** any ***** **** ****** ********* *** **** ** *** ***** doors **** *** ****** **** ******* ******* **** *** ******* public *** **** **** ** **** *** ****** ****** ** case ** ********* ** ***** *******.

**** *****, *** **** ****** ** ******* **** ****** ******** that ****** **** ****** ** *** *****. **** ***, ****** inside *** ****** *** ***, *** *** ***** ******* ****** from ******* ** **** ** *********/***** *******.

**** ******* *** * ***** *** ** ******** *** *** differences ** ****** *********.

** **** ******** ***** ****** *****, ** * ***'* **** see **** **** *******

****** ***** *** ****** ********* ***. ?

******, *** ******** ****** **** **** *****.

***** ************. **** ** *** ****, *********** ** ********* **** one ****** ******* ****** ** *******, ***, *** ***** ***** are *** ****.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

IP Networking Course January 2017 on Dec 08, 2016
This is the only networking course designed specifically for video surveillance professionals plus it includes live training, personal help and...
Paxton Drops US Reps, Plans Major Expansion on Dec 07, 2016
Paxton is gearing up to make a big run at  US access control success. The first step they have made is to cut all US Rep Firms, in anticipation of...
Power Drill Selection Guide on Dec 06, 2016
Boring holes is a basic part of running cables for most security system projects. To do so, you will need to choose the right drills for various...
Door Operators Access Control Tutorial on Dec 05, 2016
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
CODEC Guide 2016 on Nov 30, 2016
CODECs are core to surveillance, with names like H.264, H.265, and MJPEG commonly cited. How do they work? Why should you use them? What issues may...
Free Online NFPA, IBC, and ADA Codes and Standards on Nov 29, 2016
Finding applicable codes for security work can be a costly task, with printed books and pdf downloads costing hundreds or thousands. However, a...
Selecting Wood Drill Bits For Installers on Nov 29, 2016
Running cables through studs is common for roughing in residential and some older commercial installs. To do this, you will need to drill holes in...
Solutions to 5 Common Access Control Problems on Nov 21, 2016
Effective security is more than just good equipment. In fact, thousands of dollars in electronic access control can be wasted if they are not used...
Massively Strong Maglock (Securitron) on Nov 16, 2016
One of the market's strongest maglocks has a twist: the 4,000 pounds claimed bond power is not purely magnetic. Securitron's hybrid MM15 maglock...
Guide To Selecting And Using Ladders on Nov 15, 2016
Ladders are one of the most important pieces of worksite equipment for the surveillance technician. Too often, however, even highly experienced...

Most Recent Industry Reports

Knightscope - $122,509 Revenue, $2.5 Million Loss Seeks $20 Million Investment on Dec 09, 2016
The robot that ran over a child, Knightscope, wants money and they need it. Investors can invest as little as $1,000 to participate and...
The Russian SMP Security Robot on Dec 08, 2016
A Russian manufacturer, SMP, has a commercially available outdoor security robot, at a lower price and with much less marketing than their main...
How Hikvision Beats Its OEMs on Dec 08, 2016
Hikvision GM declared that they are not aggressive with their competitors. But some of their own OEM partners disagree. Inside, we reveal a key...
Dahua Discontinuing H.264 Only Products on Dec 08, 2016
Dahua has taken a stand for H.265 and is discontinuing its H.264 only products. We examine the shakeup inside this...
IP Networking Course January 2017 on Dec 08, 2016
This is the only networking course designed specifically for video surveillance professionals plus it includes live training, personal help and...
Hikvision vs Dahua Mobile Apps Tested on Dec 07, 2016
With smartphone use and low-cost video recorders surging, many user's main interface to their surveillance system is their phone. With mobile video...
Paxton Drops US Reps, Plans Major Expansion on Dec 07, 2016
Paxton is gearing up to make a big run at  US access control success. The first step they have made is to cut all US Rep Firms, in anticipation of...
Axis Partner Elder Care Video Analytics (Smartervision) on Dec 07, 2016
Can video analytics be used to improve the care of the elderly? Axis and a video analytics startup, Smartervision, are working together to do so....
Sony IP Camera Backdoor Uncovered on Dec 06, 2016
A backdoor has been uncovered in ~80 Sony IP camera models, attackers can remotely enable telnet on the camera, and then potentially login as root,...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact