Access Control Management Software Guide

By: Brian Rhodes, Published on Jan 06, 2015

In access control, the locks, readers and credentials may be what most see but its the management software where everything is controlled. In this guide, we cover the most common parts of this software and provide an overview of how the pieces relate to managing an access system.

Basic Purpose

The function of Access Control Management software is fourfold, with distinct functions and management focuses:

  1. Live View: Displaying the current state of the access system; if doors are locked/unlocked, and which users are interacting with doors.
  2. Door Management: Configuring every opening is critical, to ensure it opens and remains locked on schedule or depending on credential.
  3. Cardholder Management: Administering all potential users for their needed access privileges, and updating those records as needed.
  4. Reporting: This offers users to forensically review log details collected by the system - when and where credentials were used, and when openings were unlocked.

We examine each of these four areas inside.

** ****** *******, *** locks, ******* *** *********** may ** **** **** see *** *** *** management ******** ***** ********** is **********. ** **** guide, ** ***** *** most ****** ***** ** this ******** *** ******* an ******** ** *** the ****** ****** ** managing ** ****** ******.

Basic *******

*** ******** ** ****** Control ********** ******** ** fourfold, **** ******** ********* and ********** *******:

  1. **** ****: ********** *** ******* state ** *** ****** system; ** ***** *** locked/unlocked, *** ***** ***** are *********** **** *****.
  2. **** **********: *********** ***** ******* is ********, ** ****** it ***** *** ******* locked ** ******** ** depending ************.
  3. ********** **********: ************* *** ********* users *** ***** ****** access **********, *** ******** those ******* ** ******.
  4. *********: **** ****** ***** to ************ ****** *** details ********* ** *** system - **** *** where *********** **** ****, and **** ******** **** unlocked.

** ******* **** ** these **** ***** ******.

[***************]

Essential ********

***** **** ********** ******** varies ***** ** ********** and ***********, ** ******** the **** ***** ********. These *******:

  • ********** *********
  • *********** ***** & ***********
  • ****** **** ******** *** Application
  • ****/********** **********
  • ****** ******** *************
  • ****** *******

** **** *****, ***** elements *** ********* ** a ****** ** ********* separate **** **** ***********. System ******** *** ******* numbers ** ******* *** doors *** ** ****** on * ********* *****, but ********** ******* *** require ******* ******* ** host *** ******** *** integrations ** ***** ******* of *****.

Monitoring *********

**** **** ****** ********* to **** ** ** the ******* ***** ** doors ** **** ****. Exact ********* ******** *** layout ****, *** **** include:

  • **** ******: ***** **** ******* requests ******* ******* * door, * **** ********, or * **** ** opened *** ***** ** logged.
  • ***** ******: ** ******* ***** a **** **** *** long, ****** * **** open, ** *************** ******* **********, *** interface ***** ** ***** or ***** ******** ********* to *** *****.
  • ****/****** ********: ** ******** *** the ****** ** ******** unlock ** **** * door ********, ***** ** all ***** ** * single '********' *********.

**** ********** ***** *** this *********** ** ********* displayed *** *********, ******* in * ******** ** event ********:

*** ***** ***** ***** an ******** ** **** element:


***** *********** ******* ******** live ***** ***** **** to ***** ****** ** operators *** ******** ****** the ****** ******** ** valid:

Configuring ***** *** ***********

*** ********** ******** ******** the ******* ** *** new *********** *** ** tweak************* ** ***** ******* to *** **** *******. Because **** ******* ** used ***********, **** ***** consisting ** *** **** hardware *** **** ** be ******** ******* *** efficient ***. *** ****** below ***** *** '*******' features ** ****** **** doing ***** *******:


Access ***** *** *********

*** *** ********* ** electronic ****** ******* ****** mechanical ***** *** **** keys ** *** ******* to ******** **** *** when *********** *** ** used. **** ********* ******* these ***** ******* *****, while ****** ********* **** with ******** ***********. ********* and ****** *** ******** configurable **** ** ***** seconds:

***** ********* ******* ****** option, ******** * ***** of ******** ***** ** cardholders ******** ******** **********. The ****** ***** **** off *** ****** ** these ********:

****** *****


****** *********


User **********

****** ********** ******* ****** just *********** *****. ***** user, *** *** *********** they *******, *** ******** pieces ** *** ******. The ****** **** ********** functions ******* ******** *******:

  • ****** ** ******** *****
  • *********** *********** **** *****
  • ******** ******

*** ****** ***** ******** an ******** ** ***** features:

****** ***********


****** ***********


System *******

* *** ******* ** management, ******** ******** **** is *** ********** ** searching *** ******** *****. The **** ***** ** a ***** ******** ** what ** ****** *** how ** ** ********* in ** ****** ********** software:


Comments (20)

Great post Mr. Rhodes. Very informative videos. Is this using HID AC software and VertX hardware?

Very well done.

Loved it!

Conceptually, could there be an IPVM tool similar to the camera calculator but for Access Control Systems? ACS finder? ACS Hardware Finder etc..

Food for thought.

[NOTE: This has been moved to its own discussion: IPVM Access Control Finder?]

designers need to spend a significant amount of time in the planning phase before setting up schedules...other wise you can end up with a massive disorganized set of schedules with duplication.

  1. So Far I have only been exposed to one manufacturer’s hardware and software, and even at that one specific model. My only Security customer dictates the hardware and manufacturer. As a technician who came from the computer/server end before entering the security end, I wondered why the software didn’t do more. These videos and your explanation have given me some insight to what other manufacturers offer.

Thank you Brian. We use Security Desk for VMS now and it was good t see these demonstrated in a familiar setting.

Thanks Brian, that was a really well done and highly informative presentation. I recently upgraded our Controller Management Software and one of the features I found on there that I think could be highly beneficial is a Threat Level tab which allows me to assign or limit access to specific users based on potential changes in activity at my site. Potentially very helpful in the case of say an Active Shooter situation where a lockdown is needed to be implemented, this can be performed almost instantaneously from the control center computer. I am not overly familiar with a variety of software platforms so is this a standard feature on most?

I am not sure about most, but the access systems I am most familiar with do provide features for quick lockdowns. These can be triggered through software, through an input, or by using a specially programmed card. They provide for multiple levels of lockdown, so, depending on the situation, you can choose between locking some doors, locking all doors, disabling access levels, etc.

Very interesting, it is amazing the control the end user has. I wonder what happens when there is a power failure that last for a long time and there is no back up generator. Do all doors unlock?

It would depend on whether the door hardware is a Fail-Safe or Fail-Secure set. The course will cover the differences between the two in a later class.

In most cases that depends on how the system is designed/programed. They can either fail safe where they unlock or fail secure where the doors remain locked and can be overridden with a manual key. I work for a US government agency that has police holding cells in some of our buildings so we have built in fail secure on any areas that houses prisoners but some of the other doors that are geared more towards dealing with the general public are fail safe so they can easily egress in case of emergency or power outages.

More often, the best choice is usually fail secure hardware that allows free egress at all times. This way, people inside can always get out, but the space remains secure from outside in case of emergency/power failure.

This reading did a great job of pointing out the differences in access functions.

Is some snapshot links broken above, as I can't only see long gaps between

Access Rules and Access Schedules etc. ?

Thanks, the embedded videos have been fixed.

Great presentation. Just as you said, terminology is different from one access control system to another, but, the basic ideas are the same.

Thank you for posting these Brian. It was very informative.

Brian, thanks for supplementing with videos integrated into the readings. Interesting and good context.

Very nice.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Average Frame Rate Video Surveillance 2019 on May 23, 2019
What is the average frame rated used in video surveillance systems? In IPVM's 2011 statistics, the average was 6-8fps increasing to ~10fps in...
Access Control Job Walk Guide on May 22, 2019
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
Facial Recognition Systems Fail Simple Liveness Detection Test on May 17, 2019
Facial recognition is being widely promoted as a solution to physical access control but we were able to simply spoof 3 systems because they had no...
Maglock Selection Guide on May 16, 2019
One of the most misunderstood yet valuable pieces of electrified hardware is the maglock. Few locks are stronger, but myths and confusion surround...
Milestone XProtect 2019 R1 Tested on May 15, 2019
For the past few years, Milestone has released quarterly software updates XProtect VMS platform. What is new and how much impact do the updates...
Access Control Request to Exit (RTE) Tutorial on May 13, 2019
For access controlled doors, especially those with maglocks, 'Request to Exit', or 'RTE' devices are required to override electrified locks to...
Mining Company Security Manager Interview on May 10, 2019
First Quantum Minerals Limited (FQML) is a global enterprise with offices on 4 continents and operations in 7 countries with exploratory operations...
10 Facial Recognition Providers Review (Secutech) on May 09, 2019
Adding to our 19 Facial Recognition Providers Profiled report from ISC West, IPVM focused on facial recognition technology for our Day 2 coverage...
Proxy Access Control Tested on May 09, 2019
Silicon Valley Access Startup Proxy raised $13.6 Million in May 2019, focusing on mobile physical access control. Beyond the fund raising, Proxy...
Restaurant Security Manager Interview on May 06, 2019
Wright’s Gourmet House in Tampa, Florida has been around for over 50 years. During most of that time, there were no security measures in place. Now...

Most Recent Industry Reports

NJ Law Requires Apprenticeship For Public Works Integrators on May 24, 2019
Few integrators do a formal apprenticeship program. However, now a NJ law is requiring any integrator on public works projects (such as state...
Security / Privacy Journalist Sam Pfeifle Interview on May 24, 2019
Sam Pfeifle is best known as the outspoken former Editor of Security Systems News. After that, he was publications director at the International...
Verkada Video Quality Problems Tested on May 23, 2019
Verkada suffers from numerous video quality problems, not found in commercial IP cameras, new IPVM testing of Verkada vs Axis and Hikvision...
Average Frame Rate Video Surveillance 2019 on May 23, 2019
What is the average frame rated used in video surveillance systems? In IPVM's 2011 statistics, the average was 6-8fps increasing to ~10fps in...
Access Control Job Walk Guide on May 22, 2019
Significant money can be saved and problems avoided with an access control job walk if you know what to look for and what to ask. By inviting...
ASCMA / Monitronics Declares Chapter 11 Bankruptcy Plan on May 22, 2019
Monitronics is entering into Chapter 11 bankruptcy. The company, also called Ascent Capital Group Inc., aka ASCMA, aka Brinks Home Security,...
US Considers Sanctions Against Hikvision and Dahua on May 22, 2019
The US government is considering blacklisting "up to 5" PRC surveillance firms, including Hikvision and Dahua, Bloomberg reported, with human...
Dahua USA Celebrates 5 Years of Errors on May 21, 2019
Dahua USA is, in their own words, 'celebrating' 5 years in North America or as trade magazine SSN declared: Dahua Technology finds success in...
Axis ~$150 Outdoor Camera Tested on May 21, 2019
Axis has released the latest in their Companion camera line, the outdoor Companion Dome Mini LE, a 1080p integrated IR model aiming to compete with...
Covert Facial Recognition Using Axis and Amazon By NYTimes on May 20, 2019
What if you took a 33MP Axis camera covering one of the busiest parks in the US and ran Amazon Facial Recognition against it? That is what the...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact