Access Control Management Software Guide

Published Jan 06, 2015 05:00 AM

In access control, the locks, readers and credentials may be what most see but its the management software where everything is controlled. In this guide, we cover the most common parts of this software and provide an overview of how the pieces relate to managing an access system.

Basic Purpose

The function of Access Control Management software is fourfold, with distinct functions and management focuses:

  1. Live View: Displaying the current state of the access system; if doors are locked/unlocked, and which users are interacting with doors.
  2. Door Management: Configuring every opening is critical, to ensure it opens and remains locked on schedule or depending on credential.
  3. Cardholder Management: Administering all potential users for their needed access privileges, and updating those records as needed.
  4. Reporting: This offers users to forensically review log details collected by the system - when and where credentials were used, and when openings were unlocked.

We examine each of these four areas inside.

Essential ********

***** **** ********** ******** ****** ***** on ********** *** ***********, ** ******** the **** ***** ********. ***** *******:

  • ********** *********
  • *********** ***** & ***********
  • ****** **** ******** *** ***********
  • ****/********** ********** 
  • ****** ******** *************
  • ****** *******

** **** *****, ***** ******** *** contained ** * ****** ** ********* separate **** **** ***********. ****** ******** for ******* ******* ** ******* *** doors *** ** ****** ** * dedicated *****, *** ********** ******* *** require ******* ******* ** **** *** features *** ************ ** ***** ******* of *****.

Monitoring *********

 **** **** ****** ********* ** **** in ** *** ******* ***** ** doors ** **** ****.  ***** ********* features *** ****** ****, *** **** include:

  • **** ******: ***** **** ******* ******** ******* through * ****, * **** ********, or * **** ** ****** *** event ** ******.
  • ***** ******: ** ******* ***** * **** open *** ****, ****** * **** open, ** *************** ******* **********, *** ********* ***** an ***** ** ***** ******** ********* to *** *****.
  • ****/****** ********: ** ******** *** *** ****** to ******** ****** ** **** * door ********, ***** ** *** ***** in * ****** '********' *********.

**** ********** ***** *** **** *********** is ********* ********* *** *********, ******* in * ******** ** ***** ********:

*** ***** ***** ***** ** ******** of **** *******:


***** *********** ******* ******** **** ***** feeds **** ** ***** ****** ** operators *** ******** ****** *** ****** entering ** *****:

Configuring ***** *** ***********

*** ********** ******** ******** *** ******* to *** *** *********** *** ** tweak************* ** ***** ******* ** *** each *******. ******* **** ******* ** used ***********, **** ***** ********** ** the **** ******** *** **** ** be ******** ******* *** ********* ***. The ****** ***** ***** *** '*******' features ** ****** **** ***** ***** actions:


Access ***** *** *********

*** *** ********* ** ********** ****** control ****** ********** ***** *** **** keys ** *** ******* ** ******** when *** **** *********** *** ** used. **** ********* ******* ***** ***** against *****, ***** ****** ********* **** with ******** ***********. ********* *** ****** are ******** ************ **** ** ***** *******:

 

***** ********* ******* ****** ******, ******** a ***** ** ******** ***** ** cardholders ******** ******** **********. *** ****** below **** *** *** ****** ** these ********:

****** *****


****** *********


 User **********

****** ********** ******* ****** **** *********** doors. ***** ****, *** *** *********** they *******, *** ******** ****** ** any ******. *** ****** **** ********** functions ******* ******** *******:

  • ****** ** ******** *****
  • *********** *********** **** *****
  • ******** ******

*** ****** ***** ******** ** ******** of ***** ********:

****** ***********


****** ***********


System *******

* *** ******* ** **********, ******** activity **** ** *** ********** ** searching *** ******** *****.  *** **** below ** * ***** ******** ** what ** ****** *** *** ** is ********* ** ** ****** ********** software:


 

Comments (31)
IK
Itamar Kerbel
Jan 06, 2015

"Published on Jan 14, 2015" ???

Avatar
Brian Rhodes
Jan 06, 2015
IPVMU Certified

Fixed. Thanks.

Avatar
Brian Anderson, CPP®
Jan 07, 2015
IPVMU Certified
Great post Mr. Rhodes. Very informative videos. Is this using HID AC software and VertX hardware?
(2)
JL
John Lineweaver
Jan 08, 2015

Very well done.

(2)
Avatar
Harun Seel
Jan 08, 2015
IPVMU Certified
Loved it!
Avatar
Joel Kriener
Jan 14, 2015
IPVMU Certified

Conceptually, could there be an IPVM tool similar to the camera calculator but for Access Control Systems? ACS finder? ACS Hardware Finder etc..

Food for thought.

[NOTE: This has been moved to its own discussion: IPVM Access Control Finder?]

(1)
(2)
DB
Donald Bowne
Feb 03, 2015
IPVMU Certified

designers need to spend a significant amount of time in the planning phase before setting up schedules...other wise you can end up with a massive disorganized set of schedules with duplication.

PS
Paul Salvato
Feb 03, 2015
  1. So Far I have only been exposed to one manufacturer’s hardware and software, and even at that one specific model. My only Security customer dictates the hardware and manufacturer. As a technician who came from the computer/server end before entering the security end, I wondered why the software didn’t do more. These videos and your explanation have given me some insight to what other manufacturers offer.
JG
James Gowan
Oct 27, 2015
IPVMU Certified

Thank you Brian. We use Security Desk for VMS now and it was good t see these demonstrated in a familiar setting.

TW
Timothy Wackford
May 10, 2016
IPVMU Certified

Thanks Brian, that was a really well done and highly informative presentation. I recently upgraded our Controller Management Software and one of the features I found on there that I think could be highly beneficial is a Threat Level tab which allows me to assign or limit access to specific users based on potential changes in activity at my site. Potentially very helpful in the case of say an Active Shooter situation where a lockdown is needed to be implemented, this can be performed almost instantaneously from the control center computer. I am not overly familiar with a variety of software platforms so is this a standard feature on most?

(2)
DD
Dan Droker
May 10, 2016
LONG Building Technologies • IPVMU Certified

I am not sure about most, but the access systems I am most familiar with do provide features for quick lockdowns. These can be triggered through software, through an input, or by using a specially programmed card. They provide for multiple levels of lockdown, so, depending on the situation, you can choose between locking some doors, locking all doors, disabling access levels, etc.

GC
Gilbert Ceja
May 10, 2016

Very interesting, it is amazing the control the end user has. I wonder what happens when there is a power failure that last for a long time and there is no back up generator. Do all doors unlock?

Avatar
Stephen Hannah II
May 01, 2017
IPVMU Certified

It would depend on whether the door hardware is a Fail-Safe or Fail-Secure set.  The course will cover the differences between the two in a later class.

TW
Timothy Wackford
May 10, 2016
IPVMU Certified

In most cases that depends on how the system is designed/programed. They can either fail safe where they unlock or fail secure where the doors remain locked and can be overridden with a manual key. I work for a US government agency that has police holding cells in some of our buildings so we have built in fail secure on any areas that houses prisoners but some of the other doors that are geared more towards dealing with the general public are fail safe so they can easily egress in case of emergency or power outages.

DD
Dan Droker
May 10, 2016
LONG Building Technologies • IPVMU Certified

More often, the best choice is usually fail secure hardware that allows free egress at all times. This way, people inside can always get out, but the space remains secure from outside in case of emergency/power failure.

TF
Tim Ford
May 19, 2016
IPVMU Certified

This reading did a great job of pointing out the differences in access functions.

UD
Undisclosed Distributor #1
Aug 31, 2016

Is some snapshot links broken above, as I can't only see long gaps between

Access Rules and Access Schedules etc. ?

Avatar
Brian Rhodes
Aug 31, 2016
IPVMU Certified

Thanks, the embedded videos have been fixed.

Avatar
Thomas Atkinson
Oct 24, 2016
IPVMU Certified

Great presentation. Just as you said, terminology is different from one access control system to another, but, the basic ideas are the same.

Avatar
Richard Hyde
May 02, 2017
IPVMU Certified

Thank you for posting these Brian. It was very informative. 

SD
Steven DiNoto
Sep 25, 2018
IPVMU Certified

Brian, thanks for supplementing with videos integrated into the readings. Interesting and good context.

JB
Jerrod Bussey
May 09, 2019
IPVMU Certified

Very nice.

Avatar
Ng Choy Mei
Sep 30, 2020
IPVMU Certified

Thank you for the wonderful report

(1)
Avatar
Ng Choy Mei
Sep 30, 2020
IPVMU Certified

Thank you for the wonderful info.

TT
Tom Taylor
Oct 01, 2020
IPVMU Certified

This was great help...

CH
Charng Haw Guo
Oct 26, 2020
IPVMU Certified

Great reports!! Thank you {^_^}

SB
Scott Bedney
Sep 27, 2021
IPVMU Certified

We have an old Sielox/Pinnacle platform and the basic features have not change very much over the years. We seem to agree we would like to add doors individually per person or per access level.

BH
Brad Hill
Nov 16, 2021

great use of videos to break up the reading. Thanks

DR
David Rasmussen
Mar 17, 2022
IPVMU Certified

These videos are a great "how to" with access control. Very informative.

Avatar
Isaiah Calvo
Jan 30, 2023
IPVMU Certified

Access control management software is becoming increasingly important as organizations look for ways to enhance their security and protect their assets. However, with the growing number of options available, it can be challenging for organizations to choose the right software that meets their specific needs and requirements. It's crucial for organizations to thoroughly evaluate their security goals and needs before making a decision on which software to use. By doing so, they can ensure they select a solution that can effectively manage and secure their access control systems while also being cost-effective and easy to use.

UE
Undisclosed End User #2
Jan 30, 2023

Is this ChatGPT or are you really writing these responses Isaiah?

(1)
UM
Undisclosed Manufacturer #3
Jan 30, 2023

I was going to say the same thing, but didn't have the nerve. Thanks for posting your response.

UE
Undisclosed End User #2
Jan 30, 2023

@Brian