Access Control Management Software Guide

By: Brian Rhodes, Published on Jan 06, 2015

In access control, the locks, readers and credentials may be what most see but its the management software where everything is controlled. In this guide, we cover the most common parts of this software and provide an overview of how the pieces relate to managing an access system.

Basic Purpose

The function of Access Control Management software is fourfold, with distinct functions and management focuses:

  1. Live View: Displaying the current state of the access system; if doors are locked/unlocked, and which users are interacting with doors.
  2. Door Management: Configuring every opening is critical, to ensure it opens and remains locked on schedule or depending on credential.
  3. Cardholder Management: Administering all potential users for their needed access privileges, and updating those records as needed.
  4. Reporting: This offers users to forensically review log details collected by the system - when and where credentials were used, and when openings were unlocked.

We examine each of these four areas inside.

** ****** *******, *** locks, ******* *** *********** may ** **** **** see *** *** *** management ******** ***** ********** is **********. ** **** guide, ** ***** *** most ****** ***** ** this ******** *** ******* an ******** ** *** the ****** ****** ** managing ** ****** ******.

Basic *******

*** ******** ** ****** Control ********** ******** ** fourfold, **** ******** ********* and ********** *******:

  1. **** ****: ********** *** ******* state ** *** ****** system; ** ***** *** locked/unlocked, *** ***** ***** are *********** **** *****.
  2. **** **********: *********** ***** ******* is ********, ** ****** it ***** *** ******* locked ** ******** ** depending ************.
  3. ********** **********: ************* *** ********* users *** ***** ****** access **********, *** ******** those ******* ** ******.
  4. *********: **** ****** ***** to ************ ****** *** details ********* ** *** system - **** *** where *********** **** ****, and **** ******** **** unlocked.

** ******* **** ** these **** ***** ******.

[***************]

Essential ********

***** **** ********** ******** varies ***** ** ********** and ***********, ** ******** the **** ***** ********. These *******:

  • ********** *********
  • *********** ***** & ***********
  • ****** **** ******** *** Application
  • ****/********** ********** 
  • ****** ******** *************
  • ****** *******

** **** *****, ***** elements *** ********* ** a ****** ** ********* separate **** **** ***********. System ******** *** ******* numbers ** ******* *** doors *** ** ****** on * ********* *****, but ********** ******* *** require ******* ******* ** host *** ******** *** integrations ** ***** ******* of *****.

Monitoring *********

 **** **** ****** ********* to **** ** ** the ******* ***** ** doors ** **** ****.  Exact ********* ******** *** layout ****, *** **** include:

  • **** ******: ***** **** ******* requests ******* ******* * door, * **** ********, or * **** ** opened *** ***** ** logged.
  • ***** ******: ** ******* ***** a **** **** *** long, ****** * **** open, ** *************** ******* **********, *** interface ***** ** ***** or ***** ******** ********* to *** *****.
  • ****/****** ********: ** ******** *** the ****** ** ******** unlock ** **** * door ********, ***** ** all ***** ** * single '********' *********.

**** ********** ***** *** this *********** ** ********* displayed *** *********, ******* in * ******** ** event ********:

*** ***** ***** ***** an ******** ** **** element:


***** *********** ******* ******** live ***** ***** **** to ***** ****** ** operators *** ******** ****** the ****** ******** ** valid:

Configuring ***** *** ***********

*** ********** ******** ******** the ******* ** *** new *********** *** ** tweak************* ** ***** ******* to *** **** *******. Because **** ******* ** used ***********, **** ***** consisting ** *** **** hardware *** **** ** be ******** ******* *** efficient ***. *** ****** below ***** *** '*******' features ** ****** **** doing ***** *******:


Access ***** *** *********

*** *** ********* ** electronic ****** ******* ****** mechanical ***** *** **** keys ** *** ******* to ******** **** *** when *********** *** ** used. **** ********* ******* these ***** ******* *****, while ****** ********* **** with ******** ***********. ********* and ****** *** ******** configurable down ** ***** *******:

 

***** ********* ******* ****** option, ******** * ***** of ******** ***** ** cardholders ******** ******** **********. The ****** ***** **** off *** ****** ** these ********:

****** *****


****** *********


 User **********

****** ********** ******* ****** just *********** *****. ***** user, *** *** *********** they *******, *** ******** pieces ** *** ******. The ****** **** ********** functions ******* ******** *******:

  • ****** ** ******** *****
  • *********** *********** **** *****
  • ******** ******

*** ****** ***** ******** an ******** ** ***** features:

****** ***********


****** ***********


System *******

* *** ******* ** management, ******** ******** **** is *** ********** ** searching *** ******** *****.  The **** ***** ** a ***** ******** ** what ** ****** *** how ** ** ********* in ** ****** ********** software:


 

Comments (20)

Great post Mr. Rhodes. Very informative videos. Is this using HID AC software and VertX hardware?

Very well done.

Loved it!

Conceptually, could there be an IPVM tool similar to the camera calculator but for Access Control Systems? ACS finder? ACS Hardware Finder etc..

Food for thought.

[NOTE: This has been moved to its own discussion: IPVM Access Control Finder?]

designers need to spend a significant amount of time in the planning phase before setting up schedules...other wise you can end up with a massive disorganized set of schedules with duplication.

  1. So Far I have only been exposed to one manufacturer’s hardware and software, and even at that one specific model. My only Security customer dictates the hardware and manufacturer. As a technician who came from the computer/server end before entering the security end, I wondered why the software didn’t do more. These videos and your explanation have given me some insight to what other manufacturers offer.

Thank you Brian. We use Security Desk for VMS now and it was good t see these demonstrated in a familiar setting.

Thanks Brian, that was a really well done and highly informative presentation. I recently upgraded our Controller Management Software and one of the features I found on there that I think could be highly beneficial is a Threat Level tab which allows me to assign or limit access to specific users based on potential changes in activity at my site. Potentially very helpful in the case of say an Active Shooter situation where a lockdown is needed to be implemented, this can be performed almost instantaneously from the control center computer. I am not overly familiar with a variety of software platforms so is this a standard feature on most?

I am not sure about most, but the access systems I am most familiar with do provide features for quick lockdowns. These can be triggered through software, through an input, or by using a specially programmed card. They provide for multiple levels of lockdown, so, depending on the situation, you can choose between locking some doors, locking all doors, disabling access levels, etc.

Very interesting, it is amazing the control the end user has. I wonder what happens when there is a power failure that last for a long time and there is no back up generator. Do all doors unlock?

It would depend on whether the door hardware is a Fail-Safe or Fail-Secure set.  The course will cover the differences between the two in a later class.

In most cases that depends on how the system is designed/programed. They can either fail safe where they unlock or fail secure where the doors remain locked and can be overridden with a manual key. I work for a US government agency that has police holding cells in some of our buildings so we have built in fail secure on any areas that houses prisoners but some of the other doors that are geared more towards dealing with the general public are fail safe so they can easily egress in case of emergency or power outages.

More often, the best choice is usually fail secure hardware that allows free egress at all times. This way, people inside can always get out, but the space remains secure from outside in case of emergency/power failure.

This reading did a great job of pointing out the differences in access functions.

Is some snapshot links broken above, as I can't only see long gaps between

Access Rules and Access Schedules etc. ?

Thanks, the embedded videos have been fixed.

Great presentation. Just as you said, terminology is different from one access control system to another, but, the basic ideas are the same.

Thank you for posting these Brian. It was very informative. 

Brian, thanks for supplementing with videos integrated into the readings. Interesting and good context.

Very nice.

Read this IPVM report for free.

This article is part of IPVM's 6,380 reports, 860 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Use Access Control Logs To Constrain Coronavirus on Apr 09, 2020
Access control users have included capabilities that are not commonly used that can help zero-in and discover potential Coronavirus hotspots in a...
Access Control ADA and Disability Laws Tutorial on Feb 17, 2020
Safe access control is paramount, especially for those with disabilities. Most countries have codes to mandate safe building access for those...
Wyze Smart Door Lock Test on Jan 14, 2020
Wyze's inexpensive cameras have grabbed the attention of many in the consumer market, but can the company's new smart lock get similar...
Multipoint Door Lock Tutorial on Jan 23, 2020
Despite widespread use, locked doors are notoriously weak at stopping entry, and thousands can be misspent on locks that leave doors quite...
Help Security End Users Facing Coronavirus Improve Remote Access on Mar 24, 2020
Many end-users and integrators are struggling with the impact of coronavirus lock downs but remote access can help both sides during this...
Breaking Into A Facility Using Canned Air Tested on Jan 28, 2020
Access control is supposed to make doors more secure, but a $5 can of compressed air may defeat it. With no special training, intruders can...
Convergint Coronavirus Cuts on Mar 25, 2020
One of the world's largest security integrators, Convergint, has made a major move to handle the impact of coronavirus, with cuts across the...
Access Control Course Spring 2020 - Register Now - Last Chance on Apr 21, 2020
IPVM offers the most comprehensive access control course in the industry. Thursday, April 23rd is the last day to register, as the course will...
Access Credential Form Factor Tutorial on Feb 10, 2020
Deciding which access control credential to use and distribute, including form factor, can be a difficult task. Knowing the limitations and...
Vehicle Gate Access Control Guide on Mar 19, 2020
Vehicle gate access control demands integrating various systems to keep unauthorized cars out. Everything from high voltage electrical, to...

Most Recent Industry Reports

ZeroEyes Presents Firearm Detection Video Analytics on Jul 09, 2020
ZeroEyes presented its Firearm detection Video Analytics system at the May 2020 IPVM Startups show. A 30-minute video from ZeroEyes...
Clinton Public View Monitor (PVM) Mask Detection Tested on Jul 09, 2020
Face mask detection, or more specifically not wearing one, is expanding amidst the pandemic. Clinton Electronics has added this capability to their...
These Florida Real Estate Agents Are Now Selling "SafeCheck USA" Temperature Detectors on Jul 09, 2020
The "Kakon Brothers", William and Nathan, are self-described "south Florida Power Agents specializing in Luxury Real Estate" who "have closed over...
Avigilon ACC Cloud Tested on Jul 08, 2020
Avigilon merged Blue and ACC, adding VSaaS features to its on-premise VMS, offering remote video and health monitoring that was previously limited...
Hikvision's India Dominance Faces Threat on Jul 08, 2020
While Hikvision has become a dominant video surveillance provider in India, recent tension between the governments of India and the PRC is...
The US Fight Over Facial Recognition Explained on Jul 08, 2020
The controversy around facial recognition has grown significantly in 2020, with Congress members and activists speaking out against it while video...
Sperry West / Alibaba Tablet Temperature Measurement Tested on Jul 07, 2020
In April, we ordered a ~$500 temperature tablet from Alibaba. We set it to the side while doing 18 other temperature screening tests but, after...
Facial Recognition: Weak Sales, Anti Regulation, No Favorite, Says Security Integrators on Jul 07, 2020
While facial recognition has gained greater prominence, a new IPVM study of security systems integrators shows weak sales, opposition to...
Video Surveillance 101 Book Released on Jul 07, 2020
IPVM's unique introduction to video surveillance series is now available as a 145-page eBook. Designed for managers, salespeople, and engineers new...
Startup Duranc Presents AI VSaaS on Jul 06, 2020
Duranc presented its system at the May 2020 IPVM Startups show. A 30-minute video from Duranc including IPVM Q&A Background on the...