Access Control Management Software Guide

Author: Brian Rhodes, Published on Jan 06, 2015

In access control, the locks, readers and credentials may be what most see but its the management software where everything is controlled. In this guide, we cover the most common parts of this software and provide an overview of how the pieces relate to managing an access system.

Basic Purpose

The function of Access Control Management software is fourfold, with distinct functions and management focuses:

  1. Live View: Displaying the current state of the access system; if doors are locked/unlocked, and which users are interacting with doors.
  2. Door Management: Configuring every opening is critical, to ensure it opens and remains locked on schedule or depending on credential.
  3. Cardholder Management: Administering all potential users for their needed access privileges, and updating those records as needed.
  4. Reporting: This offers users to forensically review log details collected by the system - when and where credentials were used, and when openings were unlocked.

We examine each of these four areas inside.

** ****** *******, *** *****, ******* *** *********** *** ** what **** *** *** *** *** ********** ******** ***** ********** is **********. ** **** *****, ** ***** *** **** ****** parts ** **** ******** *** ******* ** ******** ** *** the ****** ****** ** ******** ** ****** ******.

Basic *******

*** ******** ** ****** ******* ********** ******** ** ********, **** distinct ********* *** ********** *******:

  1. **** ****: ********** *** ******* ***** ** *** ****** ******; ** doors *** ******/********, *** ***** ***** *** *********** **** *****.
  2. **** **********: *********** ***** ******* ** ********, ** ****** ** ***** and ******* ****** ** ******** ** ********* ************.
  3. ********** **********: ************* *** ********* ***** *** ***** ****** ****** **********, and ******** ***** ******* ** ******.
  4. *********: **** ****** ***** ** ************ ****** *** ******* ********* by *** ****** - **** *** ***** *********** **** ****, and **** ******** **** ********.

** ******* **** ** ***** **** ***** ******.

[***************]

Essential ********

***** **** ********** ******** ****** ***** ** ********** *** ***********, it ******** *** **** ***** ********. ***** *******:

  • ********** *********
  • *********** ***** & ***********
  • ****** **** ******** *** ***********
  • ****/********** ********** 
  • ****** ******** *************
  • ****** *******

** **** *****, ***** ******** *** ********* ** * ****** or ********* ******** **** **** ***********. ****** ******** *** ******* numbers ** ******* *** ***** *** ** ****** ** * dedicated *****, *** ********** ******* *** ******* ******* ******* ** host *** ******** *** ************ ** ***** ******* ** *****.

Monitoring *********

 **** **** ****** ********* ** **** ** ** *** ******* state ** ***** ** **** ****.  ***** ********* ******** *** layout ****, *** **** *******:

  • **** ******: ***** **** ******* ******** ******* ******* * ****, * lock ********, ** * **** ** ****** *** ***** ** logged.
  • ***** ******: ** ******* ***** * **** **** *** ****, ****** a **** ****, ** *************** ******* **********, *** ********* ***** ** ***** ** ***** operator ********* ** *** *****.
  • ****/****** ********: ** ******** *** *** ****** ** ******** ****** ** lock * **** ********, ***** ** *** ***** ** * single '********' *********.

**** ********** ***** *** **** *********** ** ********* ********* *** organized, ******* ** * ******** ** ***** ********:

*** ***** ***** ***** ** ******** ** **** *******:


***** *********** ******* ******** **** ***** ***** **** ** ***** photos ** ********* *** ******** ****** *** ****** ******** ** valid:

Configuring ***** *** ***********

*** ********** ******** ******** *** ******* ** *** *** *********** and ** ****************** ** ***** ******* ** *** **** *******. ******* **** opening ** **** ***********, **** ***** ********** ** *** **** hardware *** **** ** ** ******** ******* *** ********* ***. The ****** ***** ***** *** '*******' ******** ** ****** **** doing ***** *******:


Access ***** *** *********

*** *** ********* ** ********** ****** ******* ****** ********** ***** and **** **** ** *** ******* ** ******** **** *** when *********** *** ** ****. **** ********* ******* ***** ***** against *****, ***** ****** ********* **** **** ******** ***********. ********* and ****** *** ******** ************ **** ** ***** *******:

 

***** ********* ******* ****** ******, ******** * ***** ** ******** doors ** *********** ******** ******** **********. *** ****** ***** **** off *** ****** ** ***** ********:

****** *****


****** *********


 User **********

****** ********** ******* ****** **** *********** *****. ***** ****, *** the *********** **** *******, *** ******** ****** ** *** ******. The ****** **** ********** ********* ******* ******** *******:

  • ****** ** ******** *****
  • *********** *********** **** *****
  • ******** ******

*** ****** ***** ******** ** ******** ** ***** ********:

****** ***********


****** ***********


System *******

* *** ******* ** **********, ******** ******** **** ** *** equivalent ** ********* *** ******** *****.  *** **** ***** ** a ***** ******** ** **** ** ****** *** *** ** is ********* ** ** ****** ********** ********:


 

Comments (18)

Great post Mr. Rhodes. Very informative videos. Is this using HID AC software and VertX hardware?

Very well done.

Loved it!

Conceptually, could there be an IPVM tool similar to the camera calculator but for Access Control Systems? ACS finder? ACS Hardware Finder etc..

Food for thought.

[NOTE: This has been moved to its own discussion: IPVM Access Control Finder?]

designers need to spend a significant amount of time in the planning phase before setting up schedules...other wise you can end up with a massive disorganized set of schedules with duplication.

  1. So Far I have only been exposed to one manufacturer’s hardware and software, and even at that one specific model. My only Security customer dictates the hardware and manufacturer. As a technician who came from the computer/server end before entering the security end, I wondered why the software didn’t do more. These videos and your explanation have given me some insight to what other manufacturers offer.

Thank you Brian. We use Security Desk for VMS now and it was good t see these demonstrated in a familiar setting.

Thanks Brian, that was a really well done and highly informative presentation. I recently upgraded our Controller Management Software and one of the features I found on there that I think could be highly beneficial is a Threat Level tab which allows me to assign or limit access to specific users based on potential changes in activity at my site. Potentially very helpful in the case of say an Active Shooter situation where a lockdown is needed to be implemented, this can be performed almost instantaneously from the control center computer. I am not overly familiar with a variety of software platforms so is this a standard feature on most?

I am not sure about most, but the access systems I am most familiar with do provide features for quick lockdowns. These can be triggered through software, through an input, or by using a specially programmed card. They provide for multiple levels of lockdown, so, depending on the situation, you can choose between locking some doors, locking all doors, disabling access levels, etc.

Very interesting, it is amazing the control the end user has. I wonder what happens when there is a power failure that last for a long time and there is no back up generator. Do all doors unlock?

It would depend on whether the door hardware is a Fail-Safe or Fail-Secure set. The course will cover the differences between the two in a later class.

In most cases that depends on how the system is designed/programed. They can either fail safe where they unlock or fail secure where the doors remain locked and can be overridden with a manual key. I work for a US government agency that has police holding cells in some of our buildings so we have built in fail secure on any areas that houses prisoners but some of the other doors that are geared more towards dealing with the general public are fail safe so they can easily egress in case of emergency or power outages.

More often, the best choice is usually fail secure hardware that allows free egress at all times. This way, people inside can always get out, but the space remains secure from outside in case of emergency/power failure.

This reading did a great job of pointing out the differences in access functions.

Is some snapshot links broken above, as I can't only see long gaps between

Access Rules and Access Schedules etc. ?

Thanks, the embedded videos have been fixed.

Great presentation. Just as you said, terminology is different from one access control system to another, but, the basic ideas are the same.

Thank you for posting these Brian. It was very informative.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

FST Fails on Jul 17, 2018
FST was one of the hottest startups of the decade, selected as the best new product at ISC West 2011 and backed with tens of millions in...
Installing Dome Cameras Indoors Guide on Jul 16, 2018
IPVM is producing the definitive series on installing surveillance cameras. This entry covers one of the most common scenarios - installing dome...
Last Chance - July 2018 IP Networking Course on Jul 12, 2018
Registration ends today, Thursday. Register now. This is the only networking course designed specifically for video surveillance...
Belgium Bans Private Facial Surveillance on Jul 06, 2018
Belgium has effectively banned the use of facial recognition and other biometrics-based video analytics in surveillance cameras for private,...
GDPR For Access Control Guide on Jul 03, 2018
Electronic access control is common in businesses plus organizations are increasingly considering biometrics for access control. With GDPR coming...
Allegion Acquires Isonas on Jun 29, 2018
Isonas failed to 'revolutionize' access control as they regularly claimed. Now, nearly 20 years after their founding, they are being acquired by...
Replacing / Switching Access Control Systems Guide on Jun 28, 2018
Ripping out and replacing access control systems is hard for important reasons. Because users typically hold on to access control systems for as...
2018 Mid-Year Surveillance Industry Guide on Jun 28, 2018
2018 has been an explosive year for the video surveillance industry, with the industry becoming a global political issue, with the expansion of...
Free Online NFPA, IBC, and ADA Codes and Standards on Jun 27, 2018
Finding applicable codes for security work can be a costly task, with printed books and pdf downloads costing hundreds or thousands. However, a...
'Secure Channel' OSDP Access Control Examined on Jun 21, 2018
Despite claiming to be better than Wiegand, OSDP's initial releases did not address the lack of encryption between reader and controller, leaving...

Most Recent Industry Reports

Directory of Video Surveillance Startups on Jul 18, 2018
This directory provides a list of video surveillance startups to help you see and research what companies are new or not yet broadly known entity...
Ladder Lockdown and Ladder Levelizer Tested on Jul 18, 2018
Ladders are a daily necessity for surveillance and security installers, but working on an unstable surface can be extremely dangerous. In addition...
FST Fails on Jul 17, 2018
FST was one of the hottest startups of the decade, selected as the best new product at ISC West 2011 and backed with tens of millions in...
Axis ~$100 Camera Tested on Jul 17, 2018
Axis has released their lowest cost camera ever, the Companion Eye Mini L, setting their sights on a market dominated by Hikvision and Dahua. Can...
Amazon Ring Alarm System Tested on Jul 16, 2018
Amazon Ring is going to hurt traditional dealers, and especially ADT, new IPVM test results of Ring's Alarm system underscore. IPVM found that...
Hikvision Wins Chinese Government Forced Facial Recognition Project Across 967 Mosques on Jul 16, 2018
Hikvision has won a Chinese government tender which requires that facial recognition cameras be set up at the entrance of every single mosque...
Installing Dome Cameras Indoors Guide on Jul 16, 2018
IPVM is producing the definitive series on installing surveillance cameras. This entry covers one of the most common scenarios - installing dome...
Security Sales Course Summer 2018 on Jul 13, 2018
Based on member's interest, IPVM is offering a security sales course this summer. Register Now - IPVM Security Sales Course Summer 2018 This...
US Tariffs Hit China Video Surveillance on Jul 13, 2018
Chinese video surveillance products avoided tariffs for the first two rounds. Now, in the third round, many video surveillance products will be...
Last Chance - July 2018 IP Networking Course on Jul 12, 2018
Registration ends today, Thursday. Register now. This is the only networking course designed specifically for video surveillance...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact