Access Control Management Software Guide

Author: Brian Rhodes, Published on Jan 06, 2015

In access control, the locks, readers and credentials may be what most see but its the management software where everything is controlled. In this guide, we cover the most common parts of this software and provide an overview of how the pieces relate to managing an access system.

Basic Purpose

The function of Access Control Management software is fourfold, with distinct functions and management focuses:

  1. Live View: Displaying the current state of the access system; if doors are locked/unlocked, and which users are interacting with doors.
  2. Door Management: Configuring every opening is critical, to ensure it opens and remains locked on schedule or depending on credential.
  3. Cardholder Management: Administering all potential users for their needed access privileges, and updating those records as needed.
  4. Reporting: This offers users to forensically review log details collected by the system - when and where credentials were used, and when openings were unlocked.

We examine each of these four areas inside.

** ****** *******, *** *****, ******* *** *********** *** ** what **** *** *** *** *** ********** ******** ***** ********** is **********. ** **** *****, ** ***** *** **** ****** parts ** **** ******** *** ******* ** ******** ** *** the ****** ****** ** ******** ** ****** ******.

Basic *******

*** ******** ** ****** ******* ********** ******** ** ********, **** distinct ********* *** ********** *******:

  1. **** ****: ********** *** ******* ***** ** *** ****** ******; ** doors *** ******/********, *** ***** ***** *** *********** **** *****.
  2. **** **********: *********** ***** ******* ** ********, ** ****** ** ***** and ******* ****** ** ******** ** ********* ************.
  3. ********** **********: ************* *** ********* ***** *** ***** ****** ****** **********, and ******** ***** ******* ** ******.
  4. *********: **** ****** ***** ** ************ ****** *** ******* ********* by *** ****** - **** *** ***** *********** **** ****, and **** ******** **** ********.

** ******* **** ** ***** **** ***** ******.

[***************]

Essential ********

***** **** ********** ******** ****** ***** ** ********** *** ***********, it ******** *** **** ***** ********. ***** *******:

  • ********** *********
  • *********** ***** & ***********
  • ****** **** ******** *** ***********
  • ****/********** ********** 
  • ****** ******** *************
  • ****** *******

** **** *****, ***** ******** *** ********* ** * ****** or ********* ******** **** **** ***********. ****** ******** *** ******* numbers ** ******* *** ***** *** ** ****** ** * dedicated *****, *** ********** ******* *** ******* ******* ******* ** host *** ******** *** ************ ** ***** ******* ** *****.

Monitoring *********

 **** **** ****** ********* ** **** ** ** *** ******* state ** ***** ** **** ****.  ***** ********* ******** *** layout ****, *** **** *******:

  • **** ******: ***** **** ******* ******** ******* ******* * ****, * lock ********, ** * **** ** ****** *** ***** ** logged.
  • ***** ******: ** ******* ***** * **** **** *** ****, ****** a **** ****, ** *************** ******* **********, *** ********* ***** ** ***** ** ***** operator ********* ** *** *****.
  • ****/****** ********: ** ******** *** *** ****** ** ******** ****** ** lock * **** ********, ***** ** *** ***** ** * single '********' *********.

**** ********** ***** *** **** *********** ** ********* ********* *** organized, ******* ** * ******** ** ***** ********:

*** ***** ***** ***** ** ******** ** **** *******:


***** *********** ******* ******** **** ***** ***** **** ** ***** photos ** ********* *** ******** ****** *** ****** ******** ** valid:

Configuring ***** *** ***********

*** ********** ******** ******** *** ******* ** *** *** *********** and ** ****************** ** ***** ******* ** *** **** *******. ******* **** opening ** **** ***********, **** ***** ********** ** *** **** hardware *** **** ** ** ******** ******* *** ********* ***. The ****** ***** ***** *** '*******' ******** ** ****** **** doing ***** *******:


Access ***** *** *********

*** *** ********* ** ********** ****** ******* ****** ********** ***** and **** **** ** *** ******* ** ******** **** *** when *********** *** ** ****. **** ********* ******* ***** ***** against *****, ***** ****** ********* **** **** ******** ***********. ********* and ****** *** ******** ************ **** ** ***** *******:

 

***** ********* ******* ****** ******, ******** * ***** ** ******** doors ** *********** ******** ******** **********. *** ****** ***** **** off *** ****** ** ***** ********:

****** *****


****** *********


 User **********

****** ********** ******* ****** **** *********** *****. ***** ****, *** the *********** **** *******, *** ******** ****** ** *** ******. The ****** **** ********** ********* ******* ******** *******:

  • ****** ** ******** *****
  • *********** *********** **** *****
  • ******** ******

*** ****** ***** ******** ** ******** ** ***** ********:

****** ***********


****** ***********


System *******

* *** ******* ** **********, ******** ******** **** ** *** equivalent ** ********* *** ******** *****.  *** **** ***** ** a ***** ******** ** **** ** ****** *** *** ** is ********* ** ** ****** ********** ********:


 

Comments (16)

***** **** **. ******. **** *********** ******. ** **** ***** HID ** ******** *** ***** ********?

**** **** ****.

***** **!

************, ***** ***** ** ** **** **** ******* ** *** camera ********** *** *** ****** ******* *******? *** ******? *** Hardware ****** ***..

**** *** *******.

[****: **** *** **** ***** ** *** *** **********:**** ****** ******* ******?]

********* **** ** ***** * *********** ****** ** **** ** the ******** ***** ****** ******* ** *********...***** **** *** *** end ** **** * ******* ************ *** ** ********* **** duplication.

  1. ** *** * **** **** **** ******* ** *** ************’* hardware *** ********, *** **** ** **** *** ******** *****. My **** ******** ******** ******** *** ******** *** ************. ** a ********** *** **** **** *** ********/****** *** ****** ******** the ******** ***, * ******** *** *** ******** ****’* ** more. ***** ****** *** **** *********** **** ***** ** **** insight ** **** ***** ************* *****.

***** *** *****. ** *** ******** **** *** *** *** and ** *** **** * *** ***** ************ ** * familiar *******.

****** *****, **** *** * ****** **** **** *** ****** informative ************. * ******** ******** *** ********** ********** ******** *** one ** *** ******** * ***** ** ***** **** * think ***** ** ****** ********** ** * ****** ***** *** which ****** ** ** ****** ** ***** ****** ** ******** users ***** ** ********* ******* ** ******** ** ** ****. Potentially **** ******* ** *** **** ** *** ** ****** Shooter ********* ***** * ******** ** ****** ** ** ***********, this *** ** ********* ****** *************** **** *** ******* ****** computer. * ** *** ****** ******** **** * ******* ** software ********* ** ** **** * ******** ******* ** ****?

* ** *** **** ***** ****, *** *** ****** ******* I ** **** ******** **** ** ******* ******** *** ***** lockdowns. ***** *** ** ********* ******* ********, ******* ** *****, or ** ***** * ********* ********** ****. **** ******* *** multiple ****** ** ********, **, ********* ** *** *********, *** can ****** ******* ******* **** *****, ******* *** *****, ********* access ******, ***.

**** ***********, ** ** ******* *** ******* *** *** **** has. * ****** **** ******* **** ***** ** * ***** failure **** **** *** * **** **** *** ***** ** no **** ** *********. ** *** ***** ******?

** **** ***** **** ******* ** *** *** ****** ** designed/programed. **** *** ****** **** **** ***** **** ****** ** fail ****** ***** *** ***** ****** ****** *** *** ** overridden **** * ****** ***. * **** *** * ** government ****** **** *** ****** ******* ***** ** **** ** our ********* ** ** **** ***** ** **** ****** ** any ***** **** ****** ********* *** **** ** *** ***** doors **** *** ****** **** ******* ******* **** *** ******* public *** **** **** ** **** *** ****** ****** ** case ** ********* ** ***** *******.

**** *****, *** **** ****** ** ******* **** ****** ******** that ****** **** ****** ** *** *****. **** ***, ****** inside *** ****** *** ***, *** *** ***** ******* ****** from ******* ** **** ** *********/***** *******.

**** ******* *** * ***** *** ** ******** *** *** differences ** ****** *********.

** **** ******** ***** ****** *****, ** * ***'* **** see **** **** *******

****** ***** *** ****** ********* ***. ?

******, *** ******** ****** **** **** *****.

***** ************. **** ** *** ****, *********** ** ********* **** one ****** ******* ****** ** *******, ***, *** ***** ***** are *** ****.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Splicing Alarm Circuits Guide on Apr 24, 2017
Alarm installers commonly connect multiple sensors to a single zone. They do this by splicing the wires together. In this report, we will explain...
IP Networking Course May 2017 on Apr 21, 2017
NOTE: Registration ends this Thursday. This is the only networking course designed specifically for video surveillance professionals plus it...
Lenel President Is Out on Apr 20, 2017
Lenel's challenges continue. Now, Lenel's President is out, suddenly. This follows increasing challenges for the company who has broadly upset...
Access Control Course Spring 2017 on Apr 14, 2017
IPVM offers the most comprehensive access control course in the industry. Unlike manufacturer training that focuses only on a small part of the...
Bosch B-Series Intrusion Tested on Apr 10, 2017
Bosch is one of the biggest names in intrusion but their B-Series panels, targeted at smaller site installs and available through distribution, are...
Milestone / Lenel Resell Partnership on Apr 03, 2017
Lenel has never found success in video management. Nearly a decade ago Lenel OEMed an OEM of Milestone. Now, in an equally uncommon move,...
Burglar Alarm Strobes Guide on Mar 31, 2017
Strobes provide visual notification of alarm incidents, as sirens are used to give audible notification. Using a strobe gives alarm users and alarm...
ConvergenceTP (CTP) Claims VMS Integrations Simplified on Mar 30, 2017
Developing integrations with 3rd party systems can be expensive and time consuming, especially in the physical security market with hundreds of...
2Gig Intrusion Megatest (GC2 & GC3 Panels Tested) on Mar 28, 2017
2Gig is one of the most widely used intrusion systems, with two product lines that are the main offering of many alarm companies, huge national...
Burglar Alarm Sirens Guide on Mar 27, 2017
Sirens are used to alert users to an alarm condition. In this note, we examine how to choose, locate, and install alarm sirens, including Siren...

Most Recent Industry Reports

IP Networking Course May 2017 on Apr 21, 2017
NOTE: Registration ends this Thursday. This is the only networking course designed specifically for video surveillance professionals plus it...
PureTech Video Analytics Examined on Apr 21, 2017
PureTech's analytics were chosen for a US border protection system (see related post), which the company claims no other analytics vendor was able...
US Border RVSS / Video Analytics System Examined on Apr 21, 2017
US Customs and Border Protection has been rolling out a video analytics-based detection system along the US/Mexico border, with detection ranges...
Beware The "Hit List" Ranking on Apr 21, 2017
The hit list. Kirschenbaum's recent newsletter complained about a 'hit list', bemoaning how a company took aim at ADT. Alas, that's the Google...
Ring Floodlight Cam Tested on Apr 20, 2017
Ring has released their latest entry, the Floodlight Cam, calling it the "Evolution of Outdoor Security", touting motion activated floodlights,...
Lenel President Is Out on Apr 20, 2017
Lenel's challenges continue. Now, Lenel's President is out, suddenly. This follows increasing challenges for the company who has broadly upset...
Dell EMC Surveillance Division Profile on Apr 20, 2017
With revenue growth from traditional IT customers slowing, Dell has set a focus on the security industry as a market where the company can offer...
PatriotOne Deep Neural / Radar Weapon Detection Examined on Apr 19, 2017
The bodyscanner/weapons detection sector has seen several new products, some using advanced approaches like metamaterials (Evolv) or terahertz...
Failing at Marketing, "ALL HIKVISION PRODUCTS" On Sale on Apr 18, 2017
The ballerinas are out. The price cuts are back. Hikvision is struggling to build a premium brand (i.e., 'The Art of Video Surveillance') so...
Axis Network Horn Tested on Apr 18, 2017
We bought and tested the Axis network horn C3003-E, examining setup and calibration, event audio, VMS integration, and sound pressure levels...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact