01.09.2020 Views

Access_Control_QuickGuide

Access Control QuickGuide for AC2000

Access Control QuickGuide for AC2000

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

AC2000 QUICK START

GUIDE

AC2000 8.0

A2SE8-QG-0321-1


Notice

The information in this manual was correct at the time of publication. Tyco Security Products reserves the right to

modify this product. All specifications are subject to change without notice.

© Copyright 2017

Under copyright laws, the contents of this manual may not be copied, photocopied, reproduced, translated or reduced

to any electronic medium or machine-readable form, in whole or in part, without prior written consent of Tyco Security

Products. All Rights Reserved.

Trademarks

The trademarks, logos, and service marks displayed on this document are registered in the United States (or other

countries). Any misuse of the trademarks is strictly prohibited and Tyco Security Products will aggressively enforce its

intellectual property rights to the fullest extent of the law, including pursuit of criminal prosecution wherever necessary.

All trademarks not owned by Tyco Security Products are the property of their respective owners, and are used with

permission or allowed under applicable laws.

Product offerings and specifications are subject to change without notice. Actual products may vary from photos. Not

all products include all features. Availability varies by region. Contact your sales representative for more information.

Licence information

Your use of this product is governed by certain terms and conditions.

Support

If you require technical assistance using CEM products, please contact the CEM Support team using the following

telephone number:

Telephone:+44(0)2890 456656

Email: cem.support@tycoint.com

• Please provide our support engineers with as much information as possible. This may include:

• Site name

• Product name and model

• CEM software version

• Description of the problem

Publication Date

April 2017


Quick Start Guide

Contents

Using the guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

The AC2000 system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

Key AC2000 terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Guide structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

Initial Setup Process Flow. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

Floatbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Introduction to Floatbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Accessing Floatbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

Logging in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

The Floatbar applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26

My External Apps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29

Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Introduction to Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Controllers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

Adding an RTC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

Adding a lift controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

Configuring devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

Device inputs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

Mapping alarms to device inputs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Introduction to Validation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

Access Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

Introduction to Access Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

Access groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

Access levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

Adding an access group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

Adding an access level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40

Timezones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

3


Introduction to Timezones. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

Timezones. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

Pass Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

Introduction to Pass Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

Using a default pass design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

Creating a pass design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

Card Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

Introduction to Card Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

Adding a card type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

Adding a card format. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

Company . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

Introduction to Company. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

Opening the Company application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

Searching for a company record. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

Adding a company record . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

Assigning a default company . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

Authorisers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

Spare Fields tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

Adding an image to a company record . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

Adding a document to a company record . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

Company notes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

Generating Company Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

Printing a report. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

Printing a screenshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

Configuring the tabs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

Terminating a company. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

Deleting a company . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64

Personnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

Introduction to Personnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

Key features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

Setting system permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67

Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

Opening Personnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

Searching for a cardholder record. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

Adding a cardholder record. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70

Capturing a portrait . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

Editing a cardholder record. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

A2SE8-QG-0321-1


Quick Start Guide

Printing the card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78

Validating a card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78

Checking access level readers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

Performing an access level query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

Viewing the transaction history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

Deleting a cardholder record. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

Batch Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

Batch Update Temporary Extra Access (TEA) Expiry Date . . . . . . . . . . . . . . . . . . . 82

Batch Field Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

Batch Add Extra Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83

Batch Remove Extra Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84

Assigning extra access to one cardholder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85

Batch Printing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

Resetting Anti-Passback. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

Exporting card details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86

Imported Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87

Returning a card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87

Card parking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87

Permits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88

Configuring spare fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

Configuring limited usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90

Breach of Conditions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91

Referring a cardholder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

Tracing a cardholder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

User Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

Introduction to User Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

Opening User Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

User accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98

Adding a user account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98

Editing a user account. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

Deleting a user account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

Configuring user account settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99

System Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

Copying an existing user. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

Adding a user template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

Printing a user report. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

Exporting a user report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107

Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

5


Introduction to testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

Test Card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

Backing Up AC2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111

Introduction to Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111

Upload Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115

Restore Backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115

A2SE8-QG-0321-1


Quick Start Guide

1.1 Introduction

Chapter 1 Using the guide

This book can be used as an introductory step-by-step guide to setting up a basic AC2000

system, with the aim of validating a card and using it to achieve a valid swipe at an attached

reader for the first time. The guide covers only the most basic functions of each of the

applications used in this process. For information on additional application functionality, see

the AC2000 Setup Guide.

1.2 Prerequisites

Following a successful installation, AC2000 is ready for configuration. The following hardware

is required:

• Devices, including a connection to the validation reader if you want to set up a VIPPS

(Visual Imaging and Pass Production System) workstation

• Readable card

The following hardware can be included as part of the system setup, but its use is not covered

by this book:

• Printer: To print a card design on to a card

• Camera: To record a personnel portrait on the system

Other information necessary is:

• Connection details for the validation reader

• Device address information

– It is important to carefully plan the setup for the devices, including physical location,

description, and IP address if ethernet readers are being used

• A company logo image file in JPEG, BMP, TGA, or TIFF format

– This logo file is included on the company record

7


CHAPTER 1

1.3 The AC2000 system

The AC2000 system can consist of multiple servers and devices that communicate with each

other using ethernet or serial communications.

s9032/64 Serial

Lift Controller

Figure 1 Illustration of an AC2000 network

8

A2SE8-QG-0321-1


Quick Start Guide

1.4 Key AC2000 terminology

This guide uses CEM specific terminology throughout, this list contains a brief description of

the most commonly used terms.

CDC

RTC

The Central Database Computer is the database that stores

all AC2000 data. It is central to the system. All device,

controller, user, cardholder, and alarm information is stored

on the server.

The Real Time Computer communicates with the ethernet

devices on the system. Configuration updates are made on

the CDC and passed through the RTC to relevant devices on

the AC2000 network. Alarms and real time events at the

devices are passed through the RTC to the CDC.

Lift Controller The s9032/64 lift controller can control 2 lift readers and 2

LCIs.

ECM

CDC / RTC

Workstations

AED Workstation

VIPPS Workstation

Validation Reader

1.5 Guide structure

The Ethernet Control Module provides a means of including

serial devices on an ethernet network. The ECM

communicates with the CDC/RTC or Lite Controller through

ethernet and can control up to 16 serial devices.

The majority of systems use a single server to host both the

CDC and RTC software. The CDC and RTC still operate as

separate entities, but with the benefits of only having one

server to purchase and maintain.

A workstation is a desktop PC that runs the AC2000 software

to set up, configure and administrate the system. These

workstations can be as generic or specialised as required,

with functionality limited per user. This means that a single

workstation may be an AED Workstation, a VIPPS

Workstation or any other possible connotation as controlled

by the applications that any given user can access.

The Alarm & Event Display Workstation is a reference to a

workstation that is specifically used for monitoring and

responding to alarms and events on the system.

The Visual Imaging and Pass Production System Workstation

is a reference to a workstation that is specifically used for

capturing images, creating cardholder records and printing

cards on the system.

A Validation Reader is a specialist reader that is used with a

VIPPS Workstation to validate a card. Validation is the name

given to the process of assigning a card to a specific

cardholder record.

The guide is structured to lead users through the steps required to set up a basic AC2000

system in the most efficient order.

Important: When using the Getting Started wizard, ensure that each step is completed before

moving on to the next. Initial setup involves many interconnected applications, many of which

are dependent on prerequisite steps being completed before they can be used.

9


CHAPTER 1

1.5.1 The Getting Started Wizard

Use Getting Started Wizard to set up AC2000.

To open Getting Started Wizard, complete the following steps:

1. Log in to the AC2000 application as user cem.

Note: If you do not know the password, contact CEM Support.

2. From the AC2000 Floatbar, click Administration, and click Getting Started.

Use the wizard to perform the following tasks:

• Configure the validation reader attached to the system.

• Perform the initial setup applications in the correct order.

Figure 2 The Getting Started Wizard interface

Important: The wizard is not used to configure the applications, but can be used to launch

them. For the purposes of this manual, the wizard is only used to configure the validation

reader.

1.5.2 Navigating through the wizard

Each step in the wizard must be navigated in order. The left pane highlights the name of

application that is currently open and the right pane contains information about the application.

Each application also has a button to launch the application and a button to open the help file.

To use the wizard, complete the following steps:

1. When the current step is complete, click Next to move on to the next step.

Figure 3 Example screen capture of an application screen in the wizard

2. To open the application, click the button with the application name. In the example show, in

Figure 3, Devices is the application.

10

A2SE8-QG-0321-1


Quick Start Guide

Note: The wizard launches the application with full functionality.

3. To open the help file for the selected application, click Help.

4. When all steps are complete, click Finish to close the Getting Started Wizard.

Important: This guide has been written to be used independently from the wizard. However, it

is recommended that the wizard be used for the validation step as this simplifies the process.

11


CHAPTER 1

1.6 Initial Setup Process Flow

The following flowchart describes the flow of the steps required to perform the basic

configuration of an AC2000 system.

Figure 4 The Getting Started process flow

12

A2SE8-QG-0321-1


Quick Start Guide

2.1 Introduction to Floatbar

Chapter 2 Floatbar

The AC2000 Floatbar provides access to applications that are assigned to your account.

Note: If you are using a partitioned system, see the Partitioning manual.

2.2 Accessing Floatbar

You can open AC2000 Floatbar in the following ways:

• Double-click the desktop icon.

• Click Start, All Programs, select CEM Systems, AC2000, and click AC2000 Floatbar.

• Add the application to the Startup in Windows.

2.3 Logging in

Log on to the AC2000 Floatbar after installation using the default admin login. If you do not

have the default login, contact CEM Support for the username and password.

Figure 5 AC2000 Login Screen

2.3.1 User login options

There are three login procedures that can be initialised on the AC2000 system.

If a user enters an invalid user name or invalid password, they are notified that an error has

occurred on entry, but the incorrect field will not be identified.

In addition to logging valid attempts, AC2000 records all unsuccessful attempts to log on to

AC2000.

Important: It is recommended that a site-specific administrative user is created as soon as

possible after installation. To avoid security issues, access to the CEM username and

password should be restricted and the password changed from the default.

13


CHAPTER 2

Standard login

This is the default setting that requires only a valid username and password. Upon successful

entry, the Floatbar displays.

Agreement login

This login method requires that the users read and confirm that they agree to the terms and

conditions displayed by selecting the agreement check box before logging in.

To configure the AC2000 login to operate in this way, consult the Workstation Config Tool

Manual, and turn on Floatbar Warning Message.

Single sign on

Where LDAP single sign on has been configured on the AC2000 server, two login icons

appear on the desktop. The main AC2000 Floatbar icon will log the user in automatically using

Windows login credentials. A second icon with an attached shield logs in using the standard

procedure as described above.

Desktop icon using

Single Sign On

Figure 6 AC2000 desktop icons

Desktop icon where user is

required to enter user name

and password

2.3.2 Limiting log on attempts

If you have activated log on attempt tracking using the Workstation Config Tool, you have the

option to view the workstation history report in the User Options application.

If you exceed the limit on log on attempts, your account is locked out and an alarm is

generated on the Alarm + Event Display application. If you enter your password and click OK

for the final time allowed by the limit on log on attempts, a warning message is displayed. Click

Yes to continue or No to cancel. If you continue with the incorrect password, you will be locked

out of the system.

Activating login attempts

To activate login attempts, complete the following steps:

1. From the workstation, click Start, click All Programs, click CEM Systems, click AC2000,

and click Workstation Configuration Tool.

2. Select Floatbar from the menu bar.

3. Check Login attempts and set the number of login attempts that will be allowed before

locking the account out.

Figure 7 Activating login attempts

14

A2SE8-QG-0321-1


Quick Start Guide

Enabling the account locked alarm

To view a locked account alarm in Alarm + Event Display or Security Hub, you must activate

the alarm in the Configured application.

To enable the account locked alarm, complete the following steps:

1. From the AC2000 Floatbar, click Advanced Configuration, and click Configured.

2. Select the enable_lockout_alarm setting.

3. In the Value field, type Y to enable the alarm.

4. Click Save.

Figure 8 Enabling the account lockout alarm

Any time an account is locked out, an alarm in Alarm + Event Display or Security Hub. This

must be acknowledged and cancelled manually.

Unlocking a locked account

To unlock a locked account, complete the following steps:

1. From the Floatbar, click Administration, then User Options.

2. From the Users menu, select the account to be unlocked.

3. Clear the Locked check box beside the Account Status label.

4. Click Save.

Figure 9 Unlocking a locked account

15


CHAPTER 2

2.4 The Floatbar applications

If a valid user name and password combination is entered, the AC2000 Floatbar appears. This

is a rectangular window showing the various AC2000 applications assigned to the user.

For security, when the Floatbar or any other AC2000 application is running, they time-out and

close down if they are unused for a default period of 10 minutes. Users are required to log in to

the Floatbar and select the required applications again. To change the default time-out period,

consult the Workstation Config Tool manual.

Figure 10 AC2000 Floatbar screen

2.4.1 Recent

The Recent panel displays the five most recently used applications by a user, with the most

recent being displayed on the left of the panel. This is only available when the user has been

assigned more than eight applications.

2.4.2 Floatbar categories

AC2000 Floatbar is divided up into nine main application categories:

• Enrolment

• Alarm + Event Monitoring

• Administration

• Device Configuration

• Advanced Configuration

• CCTV/DVR (If installed)

• Favourites

• Settings

• My External Apps

Each category has been defined by CEM Systems. Favourites and My External Apps can be

tailored by users. Categories and associated applications are discussed in the next section.

Note: Categories and Recent are not displayed when a user is assigned less than eight

applications.

16

A2SE8-QG-0321-1


Quick Start Guide

2.4.3 Floatbar categories (continued)

The applications and the category each is associated with are displayed in the following table.

Enrolment

Company

Alarm + Event

Monitoring

AED Configuration

Data Import Tool

Ack/Can Alarms

Personnel

Alarm Configuration

Vehicles

Alarm Filtering

Visitors

Alarm Panel Control

Alarm+Event Display

Broadcast

Contact ID Config

DSC Virtual Keypad

Guard Tours

Oneshot

Overview Mimic

Rolling Trans Disp

Zone Monitor

Security Hub

Table 1: Application key for Enrolment and Alarm + Event Monitoring categories

17


CHAPTER 2

2.4.4 Categories (continued)

Administration

Device Configuration

Access Permissions

Alarm Panel Config

Anti-Passback Zones

BACnet Configuration

Card Setup

Configure Reader Messages

Extended Reports

Devices

Getting Started

External Systems

Pass Design

Lockdown

Temp Extra Access

Muster Zones

Time + Attendance

Timezones + Holidays

User Fields

User Options

Table 2: Application key for Administration and Device Configuration categories

18

A2SE8-QG-0321-1


Quick Start Guide

2.4.5 Categories (continued)

Advanced Configuration

BOC

CCTV / DVR

DVR Import

Configured

DVR Viewer

Keypad Commands

Video Configuration

Lift Control

Video Popup

Lift Mimic

Notifications

Occupancy Zones

Set Threat Level

Smart Card Utility

Standard Link

Threat Level Def

Translation Tool

Utilities

X-Partition Access

Table 3: Application key for Advanced Configuration and CCTV / DVR categories

19


CHAPTER 2

Note: All of the applications in Table 1:, Table 2:, and Table 3: are available to a system

administrator. However, there are restrictions for partition users. Partition users can only

access the following applications:

Enrolment group

• Company

• Data Import Tool

• Personnel

• Vehicles

• Visitors

Alarm+Event Monitoring group

• Ack/Can Alarms

• Alarm+Events Display

• Oneshot

• RTD

• Security Hub

Administration group

• Access Permissions

• Card Setup

• Extended Reports

• Pass Design

Device Configuration group

• Devices

Advanced Configuration group

• X-Partition Access

2.4.6 Description of applications

The following section identifies each available application providing a brief description of its

purpose.

Note: In a partitioned system, the functionality or availability of these applications is affected.

For more information on the impact of partitioning, see the Partitioning manual.

Access Permissions

The Access Permissions application is used to create and configure access groups and

access levels. Access groups are meaningful groups of devices which are added to staff

access levels.

Ack/Can Alarms

Acknowledge and/or cancel Alarms. The Ack/Can Alarms application is used to acknowledge

and cancel a group of alarms in one operation instead of individually selecting the alarms as

per the Alarm and Event Display application.

20

A2SE8-QG-0321-1


Quick Start Guide

For example, if a door is forced open the alarm must be acknowledged and cancelled before

the alarm is cleared. However, in some cases, (for example, during installation) it can be

necessary to acknowledge and cancel a large number of alarms in bulk. This is handled by the

Ack/Can Alarms application.

AED Config

This application is used to setup the Alarm and Event Display application with maps and

sounds to enhance alarm notification and make it more meaningful.

Alarm and Event Display (AED)

The Alarm and Event Display or AED application is a real-time graphical alarms processing

application. It provides system users with a detailed alarms processing and reporting features

and can accommodate diagrams and maps including sophisticated to-scale AutoCAD®

drawings. It provides feedback to the operator in real-time on the online/offline status of

devices.

Alarm Configuration

The Alarm Configuration application is used to add, delete, and modify custom alarm events

on the system. It is also used to add, edit and delete Alarm and Event Display events and the

duress PIN feature.

Alarm Filtering

The Alarm Filtering application enables different alarm information to go to different monitoring

workstations on a network. For example, there are two AED workstations. One should display

only alarms from building one. The other that should display only alarms from building two.

There are two ways by which alarms can be filtered.

Shunted: Alarms configured to be shunted will be disregarded by AC2000. They will not be

referred to in any log files or reports.

Filtered: Alarms are filtered for individual workstations. The alarms that you configure to be

filtered for a workstation are hidden from that workstation. All alarms configured for a particular

workstation will be logged in log files and reports.

Alarm Panel Config

The Alarm Panel Configuration application is used to add and configure Galaxy and DSC

alarm panels as well as DSC PowerSeries equipment.

Alarm Panel Control

The Alarm Panel Control application is used to monitor the status and send commands to

alarm panels such as Galaxy and DSC, as well as DSC PowerSeries equipment.

Anti-Passback Zones

The Anti-Passback Zones application is used to prevent ID cardholders from misusing their

cards. A cardholder presenting their card at a reader to gain access through an entry or exit

point and then handing their card to another person who uses it to gain unauthorised access

through that same point is a pass back. To stop this from occurring Anti-Passback Zones can

be created to prevent a card from being used twice consecutively.

BACNet

The AC2000 BACnet interface is configured for use through the BACnet application. This

application is used to set up mappings of AC2000 devices and inputs to BACnet objects; and

to define how alarms on these devices affect various properties of these objects. It is also used

21


CHAPTER 2

to define how changes to the properties of objects on external systems are represented as

alarms on the AC2000 system.

Breach of Conditions (BOC)

Users can add breaches of conditions orders against cardholders who abuse or ignore the

terms and conditions of their issued card. Letters can be written from within the Breach of

Conditions application and sent to companies highlighting such breaches.

Broadcast

The Broadcast Zones application is used to control one or more CEM devices (typically doorcontrolling

card readers) remotely from a workstation. This bypasses the normal route of

requiring a valid card presentation in order to activate one of these devices.

A Broadcast Zone can be activated or deactivated manually, using the application directly or

when mapped to a Time zone.

Card Setup

The Card Setup application is used to define different types of cards to be used on the system.

For each card type a number of card formats can be defined. Each cardholder on the system

will be allocated one card format, which contains details of that person's card design, the

default and maximum duration of the pass on the system and the access restrictions that apply

to that card format (that is, the access level and time zones can be used with that format).

Company

The Company application is used to maintain company information on the system. Each

cardholder is assigned to a particular company.

Configured

The Configured application is used to configure specific settings, if required, as instructed by

CEM personnel.

Configure Reader Messages

The Configure Reader Messages application is used to maintain a list of words and responses

that will be displayed on a card reader. The user is able to define words and responses that are

shown on the reader display.

Contact ID Config

The Contact ID application provides a method of converting AC2000 alarm messages into

Contact ID messages. This enables remote alarm panels to transmit information to a Central

Monitoring Station.

Data Import Tool

The Data Import Tool application allows administrators to import cardholder details in a csv or

other type of file format into AC2000.

Devices

The Devices application is used to add and configure devices. Each device must be added to

the AC2000 controller database and correctly configured so that the AC2000 controller is

aware of the device and all its settings.

22

A2SE8-QG-0321-1


Quick Start Guide

DSC Virtual Keypad

The DSC Virtual Keypad application enables a user to select a DSC Panel to connect to

remotely and provides full access to all the functionality of the actual keypad.

DVR Import

The DVR Import application allows the operator to import DVRs and their associated cameras

into AC2000, where they can be viewed via the DVR Viewer application.

DVR Viewer

The DVR Viewer allows the operator to view a live video feed from a chosen camera.

Extended Reports

The Extended Reports program is the main reporting application for the various transactions,

alarms and other recorded activity. It provides a comprehensive suite of native reporting tools.

External Systems

AC2000 is designed to integrate with other systems and applications. The External Systems

application allows the user to specify the format of alarm strings that are to be sent to a system

connected to the AC2000 Controller.

For example, there is a requirement to send door violation alarms, monitored by card readers

or Input/Output Controllers (IOCs), to a CCTV system that is controlling a number of cameras

at alarmed doors.

Getting Started

The Getting Started Wizard is used by engineers to quickly setup a working system.

Guard Tours

The Guard Tours application offers the option to define a list of either card readers or reader

inputs at which guards must visit and swipe their card or activate the input at an assigned

device within a specified time. Each of these pre-set patterns is known as a guard tour.

If the guard does not swipe at a reader or activate a reader input, that is, a push button,

correctly, a message is sent to the Alarm + Event Display workstation.

By using this application, the conduct of the guard patrols can be controlled. Possible

violations are as follows:

• Failure to start tour on time

• Failure to start a tour at all

• Missing out a door reader/input

• Swiping at a control point too late

• Swiping at control points out of sequence.

Keypad Commands

Staff can generate their own keypad commands for a specific device. For example, you could

configure a command so that by pressing 1234 on the device's keypad, a broadcast would be

triggered to open several doors.

23


CHAPTER 2

Lift Control

The Lift Control application is used to configure the use of CEM Lift Controllers on a site. Lift

Control is configured using multiple applications. The Lift Control manual contains all of the

information relevant to adding and configuring lift controllers.

Lift Mimic

The Lift Mimic displays all of the lift floors active in real time. It will give a graphical

representation of all floors that are connected to the lift controller system.

Lockdown

Use Lockdown to create multiple zones. You can then prevent access to all readers within

selected zones.

Muster Zones

The Muster Zones application is designed to create mustering areas for use in emergency

evacuation situations. Muster zones offer safe muster points for all members of staff to

assemble, swiping their cards at dedicated muster card readers in order to register their safe

exit from the building. It also provides the ability to produce muster reports of personnel that

have successfully swiped at their allocated muster points.

Notifications

The Notifications application offers a useful method of advising system users of alarm

situations remotely. In the event of any alarm situation an alert message can be emailed to any

recipient.

Note: You must configure the email server used and sender email address in the Network or

Mail Config page in AC2000 WEB. See the Network or Mail Config chapter in the AC2000

WEB manual for more information.

Occupancy Zones

The Occupancy Zones application allows users to control the maximum and minimum people

allowed into a zone. Devices are configured as In/Out readers so that cardholder movement

can be tracked.

OneShot

The Oneshot application is used to trigger a remote open command to an AC2000 device,

such as a reader at a door.

Overview Mimic

When using a Global CDC, all Mimics, that is, Alarm and Event Displays, on all connected

CDCs can be viewed from the Overview Mimic application.

Pass Design

The Pass Design application is the card, or ID pass, creation software available in AC2000. It

offers the operator tools and options create card designs for use in AC2000.

Personnel

The Personnel application is the ID card issuing application for AC2000. It is the entry point for

the main cardholder database on the system and is where the various components of an ID

card are combined together to produce a professional card for use on the AC2000 system.

24

A2SE8-QG-0321-1


Quick Start Guide

Rolling Transaction Display

The Rolling Transaction Display application is designed to offer security staff a real-time

personnel monitoring tool. You can see cardholder swipes as they go through the door.

The application also allows users to monitor any alarms triggered at configured readers. There

is also the ability to report on all alarms and transactions which have occurred on a device.

Security Hub

Use Security Hub to monitor and process alarms, as well as other events that occur on the

system. You can use it to view devices by location or device topology.

Set Threat Level

When the threat level functionality is being used on the system the Set Threat Level

application is used to set the current system threat level.

Smart Card Utility

The Smart Card Utility allows users to securely define, manage, and encode card readers and

blank DESfire EV1 smartcards with user defined encryption keysets. Keysets are then

downloaded via a secure Ethernet network to all CEM readers. This allows the user to take full

ownership of their smartcard personalisation process within AC2000, independently of third

party card manufacturers.

Standard Link

Standard Link is used to create a multi CDC environment where correctly configured multiple

CDCs can share common personnel data yet issue their own access levels and time zones to

imported cardholders.

Temporary Extra Access

The TEA application is used to setup the swipe invoked Temporary Extra Access feature which

is available in the Personnel application.

Swipe-invoked TEA means that the card of a person must first be presented at a designated

readers before his card can be used within the temporary access level - this reader must be

online. This reader should be a dedicated control post or validation reader, monitored by a

member of security or similar.

Threat Level Def

When threat level functionality is being used on the system the Threat Level Def application is

used to configure threat level settings.

Time and Attendance

Generates a transaction report on the time and attendance of any cardholder.

Timezones + Holidays

The Timezones and Holidays application is used to create time zones that are used to manage

the times that cardholders are permitted to use their cards to gain entry to controlled areas.

Holiday periods can be configured to further control access during allocated holiday times.

Translation Tool

Translation Tool is used to add translated versions of fields used in the AC2000 applications.

25


CHAPTER 2

User Fields

The User Fields application is used to customise the main screen in the Personnel, Company,

Visitor and Vehicles application. This allows administrators to create their own database tabs

and fields that can be used to capture site specific data.

User Options

The User Options application is used to create and manage user accounts on the AC2000

system. Users have restricted access to particular applications or specific functionality within

applications.

Utilities

The Utilities application is used to create or define values which appear in the drop down lists

in the various AC2000 applications.

Vehicles

The Vehicles application is used to store details of vehicles on the system and provides the

ability to associate cardholders who are authorised to drive the vehicle with it. ID Cards can be

produced for each vehicle.

Video Configuration

A one-time setup normally configured by system installer. However multiple video servers can

be configured within the Video Config application to accommodate different camera types.

Used for adding digital video servers and DVR cameras to the access control system.

Video Popup

An application which displays live video on screen, video pops up to the fore of the screen,

when an alarm or incident occurs at a device.

Visitors

The Visitors application is used to permit the addition of temporary cardholders into the

system. These visitors can be allocated time limited permissions on site, traced and have

cards personalised.

X-Partition Access

The X-Partition Access application is used to configure permissions which are only granted in

a partitioned system. This allows users to search using a hotstamp number or a card swipe for

cardholders that do not belong to their partition.

Zone Monitor

The Zone Monitor application is designed to display a real time view of cardholder movements

on site. The application provides information on who is present on site for safety and security

reasons. It also provides a counter displaying how many people are on site at any one time.

2.5 Settings

The Settings option in the Floatbar provides the user with information on the current session

details, and is also used to configure Floatbar settings.

26

A2SE8-QG-0321-1


Quick Start Guide

The Settings option can be accessed in two ways.

Figure 11 The location of the settings option on a minimised Floatbar

Figure 12 The location of the Settings option on a maximised Floatbar

2.5.1 The About tab

The About tab provides the user with the version number of the application, the name of the

application and any copyright information.

Figure 13 The Floatbar About tab

2.5.2 The Set Password tab

The Set Password tab enables the user to change their password. The existing user name and

password must be known to complete this action. The user is asked to type a new password

and then re-type it in Confirm Password.

2.5.3 The Set Favourite tab

The Favourites category on the Floatbar contains a maximum of 10 user selected applications.

When setting favourite applications, the user can also choose applications to Auto Start.

27


CHAPTER 2

When the user has logged successfully into Floatbar any application with Auto Start selected

automatically opens.

Figure 14 The Floatbar Set Favourite tab

Adding an application to the favourites list

To add an application to the favourites list, complete the following steps:

1. Select the application from the Application List. If you want the application to start

automatically, select Auto start.

2. Click Add.

Removing an application from the favourites list

To remove an application from the favourites list, complete the following steps:

1. Select the application to be removed from the list of Current Favourites.

2. Click Remove.

2.5.4 The Configure Floatbar tab

Use the Dock Toolbar to configure where the AC2000 Floatbar displays when it is not in use.

Toolbar docking options

Figure 15 Configure Floatbar tab

When you launch the Floatbar, it automatically docks into the default position at the top of the

screen. To change the docking location, select one of three options from the Dock Toolbar

drop-down menu:

• Top: displays basic Floatbar with minimal information across the top of the desktop

28

A2SE8-QG-0321-1


Quick Start Guide

• Top with options: AC2000 applications or categories are added to the basic Floatbar

• Floating: displays basic Floatbar with minimal information in toolbar that can be moved

anywhere on the desktop.

2.6 My External Apps

My External Apps allows the user to drag and drop shortcut links from third-party systems into

the Floatbar, where they can be launched by clicking on the link. The configuration for this

application is unique to each user and workstation. Up to a maximum of 16 links can be

created in this way and these can be deleted and/or replaced.

Note: It is not possible to drag and drop CEM created applications.

29


CHAPTER 2

30

A2SE8-QG-0321-1


Quick Start Guide

3.1 Introduction to Devices

Chapter 3 Devices

Use the Devices application to set up and configure all access control devices used in the

AC2000 system. You can also use it to set up and configure device inputs for the purpose of

triggering alarms on the real time monitoring applications, such as Alarm + Event Display and

Rolling Transaction Display.

Note: If you are using a partitioned system, see the Partitioning manual.

AC2000

Controller

AC2000 Server (CDC)

Ethernet

Controller

(RTC)

Device

Group

Up to 16 device groups,

either ethernet or serial,

can be assigned to

a single ethernet controller

Up to 16 devices may be

added to each device group

Up to 256 RTCs and s9032

controllers in total can

be attached to a single

AC2000 Server

ECM

Device

Group

ECM brings serial devices

online to the RTC

s9032

Lift Controller

A lift controller can control

two lift readers and two

LCIs

Device

Group

Figure 16 Illustration of the AC2000 devices hierarchy

3.2 Controllers

You can add serial lift controllers and ethernet controllers to the AC2000 system. Controllers

control messages between the Central Database Computer (CDC) and the individual readers.

31


CHAPTER 3

Ethernet controllers (RTCs)

Use ethernet controllers (RTCs) to manage up to 256 ethernet or serial devices grouped

together into 16 groups of 16. The controllers relay device-specific data between the AC2000

database and the devices, including configuration, alarms, and events.

Lift controllers (s9032)

A lift controller is an s9032 controller that is set in lift mode. In this mode, the s9032 can

support up to 2 lift devices. When adding an s9032 as a lift controller in the Devices

application, the location must start with the letters “LCM”. For more information, see the Lift

Controller manual.

Ethernet Control Module (ECM)

The ECM provides a means of including serial devices on an ethernet network. The ECM

communicates with the CDC, RTC or Lite Controller through ethernet and can control up to 16

serial devices. For more information, see the ECM Quick Guide.

3.3 Adding an RTC

Note: The most common setup of AC2000 is as a CDC/RTC. You only need to add an RTC to

AC2000 if a site has a standalone CDC or needs to add an extra RTC.

To add an RTC, complete the following steps:

1. In Devices, from the left pane, click AC2000.

2. Click Add, and click Add Controller.

3. Enter the relevant information for the controller and click Add.

Important: The controller must be initialised using AC2000 WEB. See the AC2000 WEB

manual for details.

3.4 Adding a lift controller

Important: Controllers can only be added to AC2000 Standard and Airport Edition.

For more information on lift controllers, see the Lift Controller manual.

3.5 Configuring devices

All readers connected to AC2000 are added to an ethernet or lift controller. It is essential that

all exit and auxiliary devices are also added.

Ethernet devices have extended properties that need to be completed.

3.5.1 Adding a device

To add a device, complete the following steps:

1. In Devices, select the controller and device group to add the device to from the overview

pane.

2. Click Add and select Add device. Alternatively, right-click the device group and select

Add Device.

3. Configure the parameters of the Settings pane and the Extended pane. For more

information, see Settings on page 33 and Extended properties on page 34.

32

A2SE8-QG-0321-1


Quick Start Guide

Settings

The following settings must be completed for both serial and ethernet devices. To do this,

select a device and edit the Settings pane on the right of the window:

Device Number:

Select a device number for the device. This forms part of the device address. Only numbers

that have not been used are available.

Device Location:

Enter a unique description of the location of this device.

Slave Location:

Where a slave device has been included in the Device Type, Slave Location appears. Enter a

unique description of the Location of the Slave device.

2nd Location:

This option only appears for the EDCM 300/350 MAST/MAST and SDCM 300/350

MAST/MAST device types. Enter a unique description for the second location of the device.

Device Family:

Select the device family from the drop-down list for the access control terminal.

Device Type:

Select the specific type of device from the drop-down box, which has been filtered by the

choice of Device Family in the drop-down above it.

Note: If an exit or auxiliary device is to be added to the master reader, select the correct

Device type. For example, a 600E device with an Exit Reader would have a Device type of

600E+Slave. This configures the Master device with an attached slave device.

Any Exit reader added to a Master appears as a child node in the Overview Pane of the Master

reader to which it is associated.

Configuration Mode: Select the Configuration Mode from the drop-down list.

Note: Configuration Mode contains default settings, however these can be user defined.

Priority of Alarms:

In a range of 0 to 8999, the alarms of a device can be given a greater priority than the

defaulted 0. This escalates the alarms from the device in AED or Security Hub.

Maintenance Mode:

Select the box if alarms generated from this device are to be ignored until maintenance or

installation is completed. If selected, all alarms generated are ignored in AED and Security

Hub. unless selected in those applications.

Restricted Reader:

This field is used to indicate that the reader is restricted. This is not available in AC2000 Lite

Edition.

Soft Anti-Passback:

Enabling this field sets the reader into soft anti-passback mode. This means that the same

card can be used twice in a row to gain access but an alarm is sent to the Alarm + Event

Display application.

Look at Camera (emerald terminals only)

Enabling this field means that a cardholder must look at a camera after a valid card swipe. A

guard monitoring the camera sends a One Shot command to the terminal to open the door.

33


CHAPTER 3

Time and Attendance:

This field is used to indicate that it is being used for Time and Attendance monitoring. This is

not available in Lite or Standard Edition.

Extended properties

This section is only for ethernet devices.

MAC Address:

Enter the unique MAC address of the device.

IP Address:

Enter the unique IP address of the device.

Offline Database:

Select the appropriate offline database for the device. Card Number offers an offline database

of card numbers only. Card Number, Timezone, Status, PIN provides the named detail in the

offline database. This is the default selection.

Threat Level Properties

If threat levels has been enabled on the system the option to assign a reader to a threat level

group will become available. The group to which the reader is to be assigned should be

selected from the menu.

Note: Threat level groups are created and configured in the Threat Level Def application.

3.6 Device inputs

AC2000 handles two different types of alarms on the system:

– Internal input alarms that are generated by the system when specific criteria have been

met.

– External input alarms that are generated by input state changes on the readers.

Internal input alarms

Internal input alarms are alarms that are generated by the system. Each of the alarms have

been pre-configured by CEM Systems to be activated on particular events, for example, a

Door Held alarm. This alarm is generated by the system when a door which has been opened

fails to close in the pre-defined Close Time period.

External input alarms

External input alarms are associated to input sensors outside of the system, such as Door

Position Sensors, Break Glass, and Request to Exits. Each external alarm that is to be

monitored must be configured in Devices Inputs and associated to the correct change of state,

either Open or Closed, and Tamper if 4-state is being used.

34

A2SE8-QG-0321-1


Quick Start Guide

The following is an example of how a typical door is configured. Each of the numbered items

represents different external and input devices which, when wired to the input of a reader,

represent external input alarms. Exceptions 1 and 2 are the DIU and reader.

Reserved inputs

Figure 17 Illustration of door input positioning

External Inputs can be further classified under CEM Reserved Inputs or Normal (General

Purpose). The following 4 Inputs are CEM Reserved, however each can be reconfigured to be

a General Purpose input:

Input Number Input Name Input State Alarm Type

0 Door position sensor Open

Closed

1 Lock sensor (disabled

by default)

Open

Closed

2 REX Open

Closed

3 Interlock / General

purpose

Open

Closed

Table 4: CEM reserved inputs

Door forced

Door closed

Lock not engaged

Lock engaged

No alarms are required to be configured for Input 2 and 3. However it is possible to assign

alarms to them.

Note: Input 3 is set to interlock when normal is unchecked.

3.7 Mapping alarms to device inputs

This section details how to map alarms to inputs. To create an alarm, consult the Alarm

Configuration chapter in the Operator Guide.

To map alarms to inputs, complete the following steps:

1. In Devices, select the device to which an alarm for an input is to be applied from the

devices tree on the left.

35


CHAPTER 3

2. Select the Inputs tab.

Figure 18 Input configuration pane

3. Select an input. The details of that input expands.

4. In the Location field, type a location.

5. Click the Enable button on each state that you want to enable for that input.

6. Select the relevant Alarm for each state using the drop-down lists.

7. Click Save to apply the configured Device Inputs.

36

A2SE8-QG-0321-1


Quick Start Guide

4.1 Introduction to Validation

Chapter 4 Validation

Before a card can be used to access readers, it must be validated against a cardholder. Cards

can be validated manually using a validation reader that is attached to the workstation. The

card validation readers must be set up first using the Getting Started Wizard.

To get to this part of the wizard, complete the following steps:

1. From the Getting Started Wizard, navigate to Validation.

2. Click Configure.

3. Select the type of validation reader.

Figure 19 Validation pane

– If the reader is a serial device, complete the following steps:

a. Select the AC2000 Serial radio button.

b. Enter the port number being used by the validation reader. It can not be longer

than two characters. For more information, see the validation reader quick guide.

c. Click Update.

d. Click Close.

– If the reader is an biometric device, complete the following steps:

a. Select the AC2000 Fingerprint radio button.

b. Enter the IP Address of the validation reader.

c. Click Update.

d. Click Close.

– If the reader is an online reader, do the following:

a. Select AC2000 Online Reader.

b. Enter the 5-digit AC2000 device address of the reader.

37


CHAPTER 4

c. Click Update.

d. Click Close.

– If the reader is another type of validation device, do the following:

a. Select the Other radio button.

b. Refer to the manufacturer’s guide for configuring the validation reader.

c. Click Close.

4. If you are using the wizard to open the applications, click Next to move to the next step. If

you are finished with the wizard, click the Next button until the Finish pane is displayed.

Click Finish.

38

A2SE8-QG-0321-1


Quick Start Guide

5.1 Introduction to Access Permissions

Chapter 5 Access Permissions

Use the Access Permissions application to organise access control devices into meaningful

access groups that can be assigned to cardholders using access levels. You can also use the

application to manage floor allocation for CEM Systems Lift Controllers.

Note: If you are using a partitioned system, see the Partitioning manual.

5.2 Access groups

Access groups are collections of readers arranged into logical categories. It is recommended

that these groups are organised and described as geographical locations. For example, a

group of readers controlling access to a reception area might be named Reception. In Figure

20, two access groups have been created containing devices related in their geographic

location and access function.

Figure 20 Illustrative example of Access Group creation

5.3 Access levels

Access levels are the primary means of controlling cardholder access on a site. It is

recommended that access levels are representative of human resource or personnel hierarchy

on a site. For example, access levels might be created for management, IT staff, general staff,

contractors, and more. In the example shown in Figure 21, the access level General Staff has

been allocated both the Reception and Canteen access groups, whereas Contractors has only

been allocated the Reception access group.

Figure 21 Illustrative example of Access Level creation

39


CHAPTER 5

5.4 Adding an access group

To add an access group, complete the following steps:

1. Click the Access Groups tab.

2. Click Add.

3. Enter a descriptive name for the access group. It is recommended that this description is

representative of a geographic location, for example, Server room, Lobby, and so on.

4. Select the readers to add.

5. If lift floors are to be added to the device group, complete the following steps:

1. Click the Floors tab.

2. Select the floors to add.

6. Click Save.

5.5 Adding an access level

To add an access level, complete the following steps:

1. Click the Access Levels tab.

2. Click Add.

3. Enter a descriptive name for the access level. It is recommended that this description is

representative of an HR or personnel function.

4. Click the access groups to be added to the level by selecting the corresponding check

boxes of the device groups. If the required access group does not exist, you can create it

by clicking the New Access Group option on the access level dialog box.

5. Click Save.

The access levels are listed in the left information pane. A white arrow denotes list entries that

are expandable. Click the arrow to expand the list. A dark grey arrow denotes an expanded list.

Figure 22 Diagram showing Access Levels with assigned and unassigned access groups

40

A2SE8-QG-0321-1


Quick Start Guide

6.1 Introduction to Timezones

Chapter 6 Timezones

The Timezones + Holidays application is used to create timezones and holiday periods to

control cardholder access to controlled areas within specific dates and times.

Note: If you are using a partitioned system, see the Partitioning manual.

6.2 Timezones

It is probable that multiple timezones are required to control access on a site. Timezones grant

access to assigned cardholders within the days and times laid out in the timezone. For

example, the following site requires three timezones.

• Timezone 1: Day Staff and grant access from Monday to Friday between the times of

8am and 6pm.

Figure 23 Example Mon - Fri, 8am - 6pm timezone

• Timezone 2: Evening Staff and grant access from Monday to Friday between the times of

5pm and 11pm.

Figure 24 Example Mon - Fri, 5pm - 11pm timezone

41


CHAPTER 6

• Timezone 3: ALL THE TIME and grants access every day all day. This timezone is set up

by default on a newly installed system.

Figure 25 Example All The Time timezone

6.2.1 Creating a timezone

To create a timezone, complete the following steps:

1. From the toolbar, click Add.

2. Type the name of the new timezone in the Timezone name field at the bottom of the pane.

3. Click in the day sector to be configured for the timezone in the approximate region of the

required start time.

Figure 26 Screen capture of a newly inserted timezone section

4. Using the handles on the left and right of the inserted segment, drag the segment to the

desired start and end times.

5. Configure the times as required by using the up and down arrows next to the Start Time

and End Time fields at the bottom right of the screen.

Figure 27 Screen capture of the Start Time and End Time fields

Note: The Start Time seconds always displays 00 and the End Time seconds always displays

59.

6. Repeat the steps for each individual day and time sector required. If the same time sector

is to be used on multiple days, it can simply be copied from one day to the other.

i. Select the time sector to be copied.

ii.

iii.

Drag the time sector to the day where it is required.

Repeat for each similar day.

42

A2SE8-QG-0321-1


Quick Start Guide

7. Multiple time sectors can be accommodated in any day. To do this, complete steps 4 - 7

but using a different insertion point within the day.

Figure 28 Example of a multiple time sectors in one day

Note: A maximum of 10 unique time sectors can be created in the application. If time sectors

are repeated, it is important to use the copy technique rather than create a new sector

manually because an error of even one minute creates a unique time sector that contributes to

the application total.

8. When the timezone sectors have been completed, click Save.

43


CHAPTER 7

7.1 Introduction to Pass Design

Chapter 7 Pass Design

Use the Pass Design application to create unique card designs that can be printed on to

access control cards. You can create multiple designs assigned to them different card formats,

which in turn can be assigned to different cardholders.

Note: If you are using a partitioned system, consult the Partitioning manual.

7.2 Using a default pass design

AC2000 provides default pass designs. Use a default pass design for a quick setup or if you

are not going to print the passes.

To use a default pass design, complete the following steps:

1. In Pass Design, click File, and select Load Badge.

2. Select a pass file. The following pass files are available:

– visitors

– portrait

– landscape

– permits

– vehicles

3. Click Open.

7.3 Creating a pass design

The following section explains how to create a new card design with the most commonly used

features of the application.

To create a new pass design, complete the following steps:

1. Click File, and click New.

2. Enter a file name for the design, a maximum length of 20 characters.

3. Click Create. The Badge Layout dialog box opens.

7.3.1 Configuring the badge layout

To configure the badge layout, complete the following steps:

1. Configure the Badge size parameters.

Figure 29 Badge size parameters

44

A2SE8-QG-0321-1


Quick Start Guide

2. Select whether you want to use a simple mono-colour background or a background image

by leaving the Use shared image file check box blank or populated respectively.

Note: Where a manufacturer has printed the background image or colour unto the card, it is

possible to prevent these from being printed, by clearing the Print background check box.

3. Select whether to include a plain border around the outside of the pass design.

4. The SQL button is used to bring data into the pass design from tables other than the

default Personnel table.

Important: It is recommended that you contact CEM support team if this functionality is

required.

5. Select the Magnetic encoding options. These options are used to encode up to three

segments of data on the magnetic strip of a compatible card. This information takes the

format of dynamic fields from the Personnel application, for example, card format or

expiry date.

6. When all Badge Layout properties have been configured, click OK.

7.3.2 Adding text fields to a design

Text controls can be either static or dynamic. If the control you place is dynamic, there are

some additional options available.

Adding a static text field to a design

Static fields are always printed, regardless of the cardholder. For example, a static control can

be placed adjacent to a dynamic control to indicate what the dynamic control is displaying. For

example, a static control can display the “Date of Birth” of a cardholder beside a dynamic

control that displays a date value for that same cardholder.

To add text fields to a design, complete the following steps:

1. Click and drag the text object to the design canvas from the toolbar. The Text Properties

dialog box is displayed.

Note: Text object properties are displayed when the object is first added to the canvas. It can

also be displayed by double-clicking on an object already placed, or by selecting the object

and clicking Edit and Control Properties.

2. With the Static text radio button checked, type the information you want displayed into the

Static text field.

3. Set the text background properties.

4. Set the text foreground properties.

5. A more precise positioning of text can be accomplished by using the Position tab.

Resizing placed objects

When an object such as a text field has been placed, it can be resized using the yellow

handles attached to the object. To resize or move an object, complete the following steps:

Figure 30 Object resizing handles

1. Click and hold its perimeter points, a 2 headed arrow appears; move the mouse in the

desired direction and, when you are satisfied with the size of the object, release the mouse

button. This resizes the object.

45


CHAPTER 7

2. Click and hold anywhere within the perimeter of the object, and drag it to required location.

Alternatively, position the object using the Position tab parameters. This moves the object.

Adding a dynamic text field to a design

Dynamic text is used to add database fields to a pass design. This can be done by adding a

single field or using the expression builder.

To add a dynamic text field to a design, complete the following steps:

1. Dynamic text is created as a single field.

i. Select Dynamic text. This changes the property window.

ii.

iii.

Figure 31 Dynamic text selection check box screen

Select the field from the database to be inserted from the drop-down list. The list of

available fields is dependent on the SQL that is generated for the card design.

Enter Sample text. This can be used to preview what text can look like during a print.

46

A2SE8-QG-0321-1


Quick Start Guide

8.1 Introduction to Card Setup

Chapter 8 Card Setup

Use the Card Setup application to view, edit, and add card types and card formats.

Note: If you are using a partitioned system, see the Partitioning manual.

8.1.1 Card definitions

Card definitions define how the card must be read when presented to a reader. Card

definitions are added to the system using the Card Setup application.

8.1.2 Card types

A card type is used to assign the global properties of a card, such as its hotstamp number,

reading configuration, and validation type. A system can have multiple card types, these are

named according to site specific criteria.

For example, a site might two card types. The first card type is a readable permanent card type

for staff to gain access to controlled areas. The second card type is a non-readable vehicles

card type. It is not used to grant access at readers directly. It is printed and displayed on a

vehicle in order to provide security personnel at barrier controls with visual confirmation that

the vehicle is registered on the system and has access rights.

8.1.3 Card formats

Each card type created on an AC2000 system can have multiple card formats attached. Card

formats are assigned to cardholders and control factors such as which access levels the

cardholder can be assigned and the length of time for which the card is valid.

Card Definitions on CDC

CEM 37

Mifare 32

Card Types

Proximity Cards

Readable

iClass Cards

Readable

ID Card

Non-readable

Staff

Prox

Security

Prox

Staff

Mag

Vehicle

Permit

P

C

Contractors

Prox

Card Formats

C

Contractors

Mag

Figure 32 Illustration of the Card Setup hierarchy

47


CHAPTER 8

8.2 Adding a card type

To add a card type, complete the following steps:

1. From the Card Setup toolbar, click Add Card Type.

2. In the Description field, type a description for the new card type.

3. Select the Readable check box if the card is readable.

Note: Readable cards can be read by access control devices. If you want the card type to

control access using readers, it must be readable.

4. From the Validation Options drop-down menu, select the validation option for the card.

For more information, see Validation options on page 49.

Note: If the card type is not readable, validation options are not available.

5. If you want the card type to be exportable from one AC2000 system to another, select the

Exportable check box.

6. If you want the hotstamp to auto-generate, select the Auto-Generate Hotstamp check

box.

Note: It is important to establish whether hotstamp numbers are printed on the cards being

used. If the hotstamp number is printed on the card, that number must be used and the autogenerate

field left blank. If the card is blank, auto-generate should be used and the Pass

Design configured to print the generated number on to the card.

7. In the Minimum hotstamp field, type the first hotstamp number in the range for the card

type.

Note: Card types that auto-generate hotstamp numbers must have a unique hotstamp number

range. Card types that do not auto-generate hotstamp numbers can have overlapping

hotstamp ranges.

8. In the Maximum hotstamp field, type the last hotstamp number in the range for the card

type.

9. Select Save.

Note: When a card format, belonging to the selected card type, is assigned to a cardholder,

the following fields can no longer be edited:

• Exportable

• Auto-Generate Hotstamp

• Readable

• Validation Options

48

A2SE8-QG-0321-1


Quick Start Guide

8.2.1 Validation options

Validation is the process of associating a card with a cardholder record. This is typically

accomplished by swiping a card on a validation reader next to the card issuing workstation.

This table describes card validation options.

Validation option

CUSTOM DESFIRE

GEN CNUM & BIO

GENERATE CARD

NUM

HK JOCKEY CLUB

ONLINE READER

READ AES UID

READ CARD NUM

READ CNUM & BIO

SALTO SHIP

Description

This is a customer-specific validation option. The Desfire option is

not used for validation of Desfire cards. It is used specifically for

personalising Desfire information. If this option is required, please

contact CEM support.

If the cards do not have internal card numbers, this option generates

a number at the validation stage. The fingerprint of the cardholder is

captured as part of the validation process.

If the cards do not have internal card numbers, this option generates

a number at the validation stage. This is most often used when

printing barcode cards.

This is a customer-specific validation option.

Enables a card to be validated by swiping it on any online reader

connected to the AC2000 network. The online reader must possess

the same read head technology as the card being validated.

Enables an AES card to be validated by an Omnikey reader.

Validates the card by reading the internal card number.

Validates the card by reading the internal card number. The

fingerprint information of the cardholder is captured as part of the

process.

Enables a card to be validated by swiping it on any online Salto SHIP

validation reader connected to the AC2000 network.

Table 5: Validation options

8.3 Adding a card format

To add a card format, complete the following steps:

1. In Card Setup, from the list of card types in the left pane, select the existing Card Type to

which you want to associate the card format. When you add the card format, the card type

selected in the left pane expands to display all card formats associated with it.

2. From the Card Setup toolbar, click Add Card Format.

3. In the Description field, type a description for the card format.

4. From the Application drop-down list, select the application in which the format is to be

used. The options are as follows: Personnel, Permits, Vehicles, or Visitors.

5. Select the pass design that will be printed on the card. You can add designs in the Pass

Design application or select a default pass design.

6. If the card format is the default format for the selected application, select the Default

format for application check box.

7. Select whether or not the cards are reusable. A reusable card may be returned to the

system using the Personnel, Visitors, or Vehicles applications when the card is no longer

required by the cardholder. This means the card can then be associated with another

cardholder record. This is not an option normally used on a system that is printing

cardholder information on cards.

8. Select the default number of valid days.

49


CHAPTER 8

Note: This is the number of days for which the card is valid. When a card exceeds this number

of days from validation, it must be revalidated. This can be extended up to the maximum

number of valid days. For example, when you select the card format in Personnel, the

application sets the expiry date to the start date plus the default number of valid days. The

expiry date can be changed to any date up to the start date plus the maximum number of valid

days.

9. Select the maximum number of valid days that can be attributed to a card using this card

format in Personnel.

10. Set the number of about to expire days before expiry. This field denotes how many days

before expiry the cardholder will see an “About to Expire” message on readers.

11. Set the number of days after expiry when purged. This is the number of days after the card

expires when the card will be purged from the database. When a card is purged the

cardholder record is not removed from the system, but the details of the card are removed.

12. From the Access levels not used by format pane, select which access levels can be

used with the card format by selecting the relevant check boxes.

Note: If the card type is readable, you must select at least one access level to proceed. If

the card is non-readable, this pane is not available.

13. Optional: Select which access level should be used as Default Access Level for the card

format.

14. Optional: Select the time zone should be used as Default Timezone for the card format.

15. Click Save. The new card format is displayed in the list panel.

Note: All card formats have the Parked access level assigned to them automatically on

creation.

50

A2SE8-QG-0321-1


9.1 Introduction to Company

Chapter 9 Company

Use the Company application to create and manage company records and authorisers.

Note: If you are using a partitioned system, see the Partitioning manual.

9.2 Opening the Company application

To open the application, complete the following step:

• From AC2000 Floatbar, click Enrolment, and click Company.

51


CHAPTER 9

9.2.1 Company interface

Table 6 describes the Company interface.

A

B

C

D

Figure 33 Company interface

Identifier

A

B

C

D

Description

Navigation control

Company logo

Company information

Additional company information

Table 6: Screen layout

9.3 Searching for a company record

There are two ways to search for a company:

• Advanced search

• Quick search

9.3.1 Advanced search

Enter valid search criteria in to any of the available fields. If no search criteria is used in the

search, all company records are returned in the results. Depending on the number of

companies, this can take longer than specifying search criteria.

To perform an advanced search, complete the following steps:

1. Click Search.

2. Enter one or more search criterion in the fields of the Company interface.

52

A2SE8-QG-0321-1


Quick Start Guide

3. Click Apply. If you did not enter search criteria, click Yes to acknowledge the warning

message. The first result of the result set is displayed. Use the navigation control to view

all of the search results. For more information, see Navigation control on page 53.

9.3.2 Quick search

You can perform two types of quick search:

• Search on Identifier

• Search on Description

Perform a quick search to search the database using either the company identifier or company

description. An example of the search criteria for identifier is CEM. An example of the search

criteria for description is CEM SYSTEMS.

To perform a quick search, complete the following steps:

1. From the drop-down list in the quick search field, select Identifier or Description.

Quick

Search

2. Type valid search criteria into the Quick Search field, for example, CEM as the Identifier

or CEM Systems as the Description.

3. Press the Return key. The first result in the result set is displayed. Use the navigation

control to search through the results. For more information, see Navigation control on

page 53.

9.3.3 Navigation control

Use the navigation arrows, as shown in Figure 34, to search the results. Use the previous and

next arrows to skip between each individual record in the order that they are saved. Use the

first and last arrows to jump quickly to the first record or the last record. Click the List view

icon to generate a report containing a list of the results.

Previous/Next record

First

record

Last

record

List view

icon

Figure 34 Navigation arrows

53


CHAPTER 9

9.4 Adding a company record

To add a company record to the system, complete the following steps:

1. Click Add.

2. Configure the parameters of the Company Information pane. For more information, see

Parameters of the Company Information pane on page 54.

3. If required, complete the fields of the Contact Details tab to add the primary contact for

the company.

4. Click Save.

9.4.1 Parameters of the Company Information pane

This table describes the parameters of the Company Information pane.

Partition

Company

Parameter

Previous Company Name

Address

Postcode

Telephone

Ext

Fax

Description

Defines the partition of the company in a partitioned system.

This field is not editable.

The left Company field defines the ID of the company. The

right Company field defines the name of the company.

Defines the previous name of the company. This field is not

editable when adding a new company record.

Defines the address of the company.

Defines the postcode of the company.

Defines the telephone number of the company.

Defines a contact extension number for the company.

Defines the fax number of the company.

Table 7: Descriptions of the Company Information pane parameters

9.4.2 Importing a company logo

When you add a company record, you can import a company logo image that can then be

incorporated into the card design. It is recommended that you import a logo after you have

saved the new company information. Alternatively search for and display the company record,

and then add the logo.

Note: To add a company logo, you must enable the function in the Workstation Configuration

Tool. For more information, see the Workstation Configuration Tool manual.

To import a company logo, complete the following steps:

1. Perform a search for the company to which you want to add a company logo. For more

information, see Searching for a company record on page 52.

2. When the correct record is displayed, in the Company Logo pane, click Capture Logo.

The Capture an image application is launched.

3. In the Capture an image window, click Import.

4. Navigate to the logo, select the logo, and click Open.

5. If required, use the image editing tools on the right of the window.

6. Click Save and click Close. The logo is displayed in Company Logo pane. The date the

logo was added is displayed below.

54

A2SE8-QG-0321-1


Quick Start Guide

9.5 Assigning a default company

When you select a company to be the default company, the company is the default selected

company when adding a cardholder record in the Personnel application.

To assign a default company, complete the following steps:

1. Perform a search for the company that you want to set as the default company. For more

information, see Searching for a company record on page 52.

2. When the correct record is displayed, click Configuration and select Company Default.

9.6 Authorisers

An authoriser is anyone within the company who has authorisation to grant permission for a

new cardholder to be added to AC2000. This person can not be a user of AC2000. As a means

of increasing security, authorisers have been added so that each cardholder can be audited to

see who permitted them access.

Use the Authoriser tab to view the authorisers for the company. Select a name from the list to

view an image of the authoriser’s signature, if it was uploaded.

9.6.1 Searching for an authoriser

There are two ways to search for an authoriser:

• Advanced search

• Quick search

Advanced search

Enter valid search criteria in to any of the available fields. If no search criteria is used in the

search, all authorisers are returned in the results. Depending on the number of authorisers in

the system, this can take longer than specifying search criteria.

To perform an advanced search, complete the following steps:

1. From the toolbar, click Authoriser.

2. In the Authoriser window, click Search.

3. Enter the search criteria in the fields of the Authoriser window.

4. Click Apply. If you did not enter any search criterion, click Yes to acknowledge the warning

message. The first result of the result set is displayed. Use the navigation control to view

all of the search results. For more information, see Navigation control on page 53.

Quick search

To perform a quick search for an authoriser, complete the following tasks:

1. From the drop-down list in the Search on surname field, select Surname or Forename.

2. Type the search criterion in to the search field.

3. Press the Return key.

9.6.2 Enabling authorisers

By default, when you add a cardholder to the system, no authoriser is required.

To ensure that an authoriser is selected when a cardholder is added to the system in the

Personnel application, complete the following steps:

55


CHAPTER 9

1. From the AC2000 Floatbar, click Advanced Configuration, and click Configured.

2. Search for USING_AUTHORISERS.

3. Ensure the Value field is set to Y.

4. Click Save.

9.6.3 Configuring authorisers

When you add a company, the company initially has no authorisers. It is therefore necessary to

add these for each company when authorisers have been enabled. To configure authorisers,

open the authoriser window and complete the following steps:

1. Perform a search for the company to which you want to an authoriser. For more

information, see Searching for a company record on page 52.

2. When the correct record is displayed, click Authoriser.

3. To add an authoriser, see Adding an authoriser on page 56.

4. To edit an authoriser, see Editing an authoriser’s details on page 57.

5. To delete an authoriser, see Deleting an authoriser on page 57.

Figure 35 The Authoriser window

9.6.4 Adding an authoriser

To add an authoriser, complete the following steps:

1. In the Authoriser window, click Add.

2. Configure the parameters of the Authoriser window.

Note: Mandatory fields are indicated in red if they left blank.

3. If the authoriser is the point of contact for the company, from the Point of Contact dropdown

list, select Yes.

4. Click Save.

56

A2SE8-QG-0321-1


Quick Start Guide

9.6.5 Editing an authoriser’s details

To edit an authoriser, complete the following steps:

1. In the Authoriser window, perform a search for the authoriser you want to edit. For more

information, see Searching for an authoriser on page 55.

2. When the correct record is displayed, make the required edits.

3. Click Save.

9.6.6 Authoriser status

The status of authoriser can be one of the following:

• Active: Set the status to Active to enable cardholders to be authorised by this person using

the Personnel application. Authorisers are added to AC2000 in this state. If an authoriser

has been terminated, this authoriser can no longer grant permission for new cardholders.

• Terminated: Set the status to Terminated to prevent the authoriser’s account being used to

authorise cardholders. The authoriser’s name is no longer displayed in the Personnel

application as an authoriser.

When the status of an authoriser is changed to Terminated and the record is saved, click Yes

to terminate the authoriser, No to leave as active.

When resetting a terminated authoriser to Active, click Yes to activate the authoriser again,

No to leave as terminated.

9.6.7 Adding an authoriser signature

For signature validation, it is recommended that all authorisers have their signature added to

the system in electronic format.

To add an authoriser signature, complete the following steps:

1. In the Authoriser window, perform a search for the authoriser to which you want to add a

signature. For more information, see Searching for an authoriser on page 55.

2. When the correct record is displayed, click Capture. The Capture an image window

opens.

3. Click Signature Pad.

4. Sign the signature pad and click Transfer Image.

5. Click Save and Close.

Note: For audit purposes, the date the image was captured is also displayed.

9.6.8 Deleting an authoriser

To delete an authoriser, complete the following steps:

1. In the Authoriser window, perform a search for the authoriser you want to delete. For

more information, see Searching for an authoriser on page 55.

2. When the correct record is displayed, click Delete.

3. Click Yes to confirm deletion.

9.7 Spare Fields tab

In Company, the Spare Fields tab contains spare fields that you can configure to capture data

that is not included in the standard Company Information pane.

57


CHAPTER 9

If you require additional text, date, and number fields to record more company specific data,

there are six spare fields in the Spare Fields tab, each of which can be renamed to more

meaningful names. Careful attention should be given to the data format.

• Spare Text1 & Spare Text2: User definable text fields.

• Spare Num1 & Spare Num2: User definable number fields.

• Spare Date1 & Spare Date2: User definable date fields.

To rename the spare fields, see Configuring spare fields on page 58.

9.7.1 Configuring spare fields

You can configure the spare fields in the Spare Fields tab. You can change the name of the

spare field, hide the spare field, edit the minimum and maximum characters of the field, make

the field mandatory, and make the field unique.

Note: Users without the correct authorisation can not configure Spare Fields for the

Company application.

1. From the toolbar, click Configuration, and select Spare Fields.

2. Select the spare field relevant to the type of data you want to display, for example, Spare

Date1 for Company Start Date, or Spare Text1 for Company Type.

3. In the Caption field, enter the new field name exactly as it should appear in the

application, for example, Company Start Date or Company Type.

4. Change the maximum number of characters that can be typed into the spare field by

editing the Maximum field.

Note: You can change the minimum and maximum values allowed in a numeric spare

field. For example, a minimum of 2 and a maximum of 10 means only numbers including

and between 2 and 10 are accepted values in this spare field.

5. To make the completion of a spare field mandatory, select the Mandatory check box.

6. To ensure the value of the spare field is unique, select the Unique check box.

7. To hide the field, clear the check box next to the spare field in the list.

8. Click Save.

9.8 Adding an image to a company record

To add an image to a company record, complete the following steps:

1. Perform a search for the company. For more information, see Searching for a company

record on page 52.

2. When the correct record is displayed, click the Images tab, and click Edit. This launches

the Image Upload window. Alternatively, from the toolbar, click View, select Documents,

and Image Upload.

3. Click Add. This launches the Capture an image window.

4. Click Import.

Note: All documents must be in the following formats: JPG, JPEG, PNG, and BMP.

5. Navigate to the file and click Open.

6. Click Save and click Close. The image is added to the Image Upload window. In the

Image Name field, enter a unique name for the image.

7. Click Save and Close.

58

A2SE8-QG-0321-1


Quick Start Guide

9.9 Adding a document to a company record

To add a document to a company record, complete the following steps:

1. Perform a search for the company. For more information, see Searching for a company

record on page 52.

2. When the correct record is displayed, click the Document tab, and click Edit. This

launches the File Upload window. Alternatively, from the toolbar, click View, select

Documents, and File Upload.

3. In the File Upload window, click Add.

4. Navigate to the file you want to upload and double-click the file.

Note: You can use the upload the following file formats: TXT, XLS, XLXS, DOC, DOCX, PDF,

XPS, PPT, and PPTX files types to a company record.

5. Into the Document Name field, type a unique document name.

6. Click Save and click Close. The file is added to the company record.

9.10 Company notes

You can enter extra data about a company using the Notes tab. This can be used for

information purposes or a quick referral tool for the operator.

9.10.1 Adding a note

To add a note to a company record, complete the following steps:

1. Perform a search for the company to which you want to add a note. For more information,

see Searching for a company record on page 52.

2. When the correct record is displayed, click the Notes tab, and click Edit.

3. Type the company note into the text box and click Save.

Note: If a note exists for that company, the Notes icon appears to the right of the company

name fields. Click the Notes icon to display all notes associated with that company.

9.10.2 Editing a note

To edit a company note, complete the following steps:

1. Perform a search for the company whose note you want to edit. For more information, see

Searching for a company record on page 52.

2. When the correct record is displayed, click the Notes icon next to the Company fields to

open the note.

3. Make the required edits.

4. Click Save.

9.10.3 Deleting a note

To add a note to a company record, complete the following steps:

1. Perform a search for the company whose note you want to delete. For more information,

see Searching for a company record on page 52.

2. When the correct record is displayed, click the Notes icon next to the Company fields to

open the note.

59


CHAPTER 9

3. Click Clear to remove the contents of the note.

4. Click Save. The Notes icon is no longer displayed.

9.11 Generating Company Reports

You can run the following reports using the Company application:

• Company Usage

• Last Swipe

• Empty Authorisers

9.11.1 Generating the Company Usage report

The Company Usage report generates a report based on how many cardholders are

associated with each company. You run the report using either of the following criteria:

• Card Status

• Card Format

Generating the Company Usage report by Card Status

1. Perform a search to find the required Company.

2. From the toolbar, click Reports

3. Click Company Usage.

4. Click Card Status is selected.

Saving the Company Usage report for Card Status

To generate the Company Usage report, complete the following steps:

1. Click Card Status to ensure it is selected.

2. Click Save.

Figure 36 Saving the Company Usage Report

3. To save the Company Usage report for Card Status to a .csv or .pdf file, select a File

Type, either Delimited or PDF. The list of elements exports to the default directory -

60

A2SE8-QG-0321-1


Quick Start Guide

C:\Program Files\CEM Systems\AC2000\Reports\ -

with a filename which reflects the application name, date and time of export. The following

format is used: <applicationName>_YYYYMMDD_HHMM.

4. To change the directory where the list is to be stored click Change and navigate to the

desired location.

5. If you are exporting as a .csv file, by default the list is exported using a Tab as the

delimiter. To change the delimiter select the preferred delimiter from those available: Tab,

Pipe, Semicolon, or a Comma; alternatively, you can select Other and enter the delimiter

that you want to use. If you are exporting as a .pdf file, the options for delimiters are not

be displayed.

6. Select the check box for which of the delimiters to save with the data.

7. Click Save.

Printing the Company Usage Report for Card Status

1. Generate the Company Usage report.

2. Ensure the Card Status option button is selected.

3. Click Print.

4. Select the correct printer settings.

5. Click Print.

Generating the Company Usage Report by Card Format

The Company Usage Card Format report generates a report that displays all cards according

to Card Format and how many cardholders are associated with that Card Format.

1. Perform a search to find the required Company.

2. From the toolbar, click Reports.

3. Click Company Usage.

4. Click Card Format to ensure it is selected.

Saving the Company Usage report by Card Format

1. Generate the Company Usage report.

2. Click the Card Format option button.

3. Click Save.

4. To save the full list of reports to a CSV or PDF file, select a File Type, either Delimited or

PDF. The list of elements exports to the default directory -

C:\Program Files\CEM Systems\AC2000\Reports\ -

with a filename which reflects the application name, date and time of export. The following

format is used: <applicationName>_YYYYMMDD_HHMM.

5. To change the directory where the list is to be stored, click Change and navigate to the

desired location.

6. If you are exporting as a .csv file, by default the list is exported using a Tab as the

delimiter. To change the delimiter select the preferred delimiter from those available: Tab,

Pipe, Semicolon, or a Comma; alternatively, you can select Other and enter the delimiter

that you want to use. If you are exporting as a .pdf file, the options for delimiters are not

be displayed.

7. Select the check box for which of the delimiters to save with the data and click Save.

61


CHAPTER 9

Printing the Company Usage Report by Card Format

1. Generate the Company Usage report.

2. Click the Card Format option button.

3. Click Print.

9.11.2 Generating the Last Swipe report

The Last Swipe report generates a list of companies where the swipes from personnel, visitor,

or vehicle cards are older than six, nine or twelve months.

Note: Generating a Last Swipe report can take a long time to run if there is a high volume of

swipes in the system.

1. From the toolbar, click Reports.

2. Click Last Swipe.

3. Click Yes in the warning message window.

Figure 37 Generating the Last Swipe report

4. From the drop-down list, click the Swipes older than date.

Saving the Last Swipe report

1. Generate the Last Swipe report.

2. Click Save.

3. To save the full list of card swipes to a .csv or .pdf file, select a File Type, either

Delimited or PDF. The list of elements exports to the default directory -

C:\Program Files\CEM Systems\AC2000\Reports\ -

with a filename which reflects the application name, date and time of export. The following

format is used: <applicationName>_YYYYMMDD_HHMM.

4. To change the directory where the list is to be stored, click Change and navigate to the

desired location.

5. If you are exporting as a .csv file, by default the list is exported using a Tab as the

delimiter. To change the delimiter select the preferred delimiter from those available: Tab,

Pipe, Semicolon, or a Comma; alternatively, you can select Other and enter the delimiter

62

A2SE8-QG-0321-1


Quick Start Guide

that you want to use. If you are exporting as a .pdf file, the options for delimiters are not

be displayed.

6. Select the check box for which of the delimiters to save with the data.

7. Click Save.

9.11.3 Generating the Empty Authorisers report

The Empty Authorisers report is used to generate a list of authorisers who are not assigned

to any personnel or vehicle records.

Note: The Authoriser function must be enabled in the Configured application. Set the

using_authorisers field to Y.

1. From the toolbar, click Reports.

2. Select Empty Authorisers.

Saving the Empty Authorisers report

1. Generate the Empty Authorisers report.

2. Click Save.

3. To save the full list of reports to a CSV or PDF file, select a File Type, either Delimited or

PDF. The list of elements exports to the default directory -

C:\Program Files\CEM Systems\AC2000\Reports\ -

with a filename which reflects the application name, date and time of export. The following

format is used: <applicationName>_YYYYMMDD_HHMM.

4. To change the directory where the list is to be stored, click Change and navigate to the

desired location.

5. If you are exporting as a .csv file, by default the list is exported using a Tab as the

delimiter. To change the delimiter select the preferred delimiter from those available: Tab,

Pipe, Semicolon, or a Comma; alternatively, you can select Other and enter the delimiter

that you want to use. If you are exporting as a .pdf file, the options for delimiters are not

be displayed.

6. Select the check box for which of the delimiters to save with the data.

7. Click Save.

9.12 Printing a report

You can print a comprehensive report of search results. For example, it is possible to produce

a report detailing all or specific companies or all or specific authorisers. The report is built

through querying the database so any number of reports can be created using different search

criteria. The same report layout is used, only the search criteria changes.

1. Perform a search. If searching for a company record, for more information, see Searching

for a company record on page 52. If searching for an authoriser record, see Searching for

an authoriser on page 55.

2. Click the List View icon, to display a report of the results.

3. Click Print to print the results.

9.13 Printing a screenshot

In the Company application, you can take a screenshot of a company’s details, and either print

or save the image.

63


CHAPTER 9

To take a screenshot of a company’s details, complete the following steps:

1. Click View and select Image Processing.

2. To view the screenshot, select Screen from the Image Type list.

3. To print the screenshot, click Print.

4. To save the screenshot, click Save.

9.14 Configuring the tabs

You can select which tabs are visible to users in the Company application.

To configure tab visibility, complete the following steps:

1. In the Company application, click Configuration and select Tab Configuration.

2. By default, all tabs are selected. Clear the check box of a tab to hide it from the company

application interface and click Save.

9.15 Terminating a company

When you add a company to the system, the default status is set to Active. Setting the status

to Active allows cardholders to be added to the company using the Personnel application. If a

company has been terminated, it is possible to change the state back to Active. This activates

the company and all cardholders that are associated with it.

When the status of a company changes, it changes the status of the ID cards associated with

the company. The status of these ID cards is set to expired, and the expiry date is set to today.

If the company is set to active again, all personnel and vehicle cards associated with it are set

to active again. The previous status, and expiry date, of these cards are restored. However,

not all expired cards are restored. Only cards associated with the company being terminated

are restored when the company is unterminated. Cards associated with an unterminated

company, but whose original expiry dates have passed, do not become active, even though

they have been unterminated.

Changing the status to Terminated renders the company and any cardholder associated with

the company invalid.

To terminate a company, complete the following steps:

1. Perform a search for the company to terminate. For more information, see Searching for a

company record on page 52.

2. When the correct record is displayed, from the Status drop-down list, select Terminated.

3. Click Save and Yes to confirm the status change.

4. If one or more cardholders are associated with the company, a second message is

displayed, indicating the number of cardholders this change affects. Click Yes to confirm.

The terminated company and associated cardholders have a terminated status.

9.16 Deleting a company

If a company will no longer use AC2000, it is recommended that you change the company

status to Terminated. For more information, see Terminating a company on page 64. It is

possible to delete a company if no cardholders are associated to it.

9.16.1 Deleting a company with no cardholders

A company with no associated cardholders can be deleted.

64

A2SE8-QG-0321-1


Quick Start Guide

To delete a company, complete the following steps:

1. Perform a search for the company to delete. For more information, see Searching for a

company record on page 52.

2. When the correct record is displayed, click Delete.

3. Click Yes to confirm deletion.

9.16.2 Deleting a company with cardholders

You can not delete a company that has associated cardholders.

65


CHAPTER 9

66

A2SE8-QG-0321-1


10.1 Introduction to Personnel

Chapter 10 Personnel

Use the Personnel application to view, edit, and add the personal, employment, and card data

for all personnel. You can issue more than one card to the record of a cardholder. You can

assign more than one company to the record of a cardholder.

Note: If you are using a partitioned system, see the Partitioning manual.

10.2 Key features

The Personnel application contains key features that perform important administrative tasks:

• Issuing one or more cards to a cardholder

• Assigning more than one company to a cardholder

• Assigning a cardholder extra access

• Limiting usage for a cardholder

• Applying traces and referrals to cardholders

10.3 Setting system permissions

You can control functionality in Personnel by setting system permissions in the User Options

application. You can control the following functions:

• Viewing access: Cardholder data can be shown or hidden by changing the Display

Authorization value for the appropriate field.

• Editing access: Editing options can be enabled or disabled by changing the Write

Authorization value for the appropriate field.

For information about how to set appropriate system permissions for Personnel, see System

Permissions on page 104.

67


CHAPTER 10

10.4 Prerequisites

Before adding personnel records to the system using Personnel, ensure the following

prerequisites are met:

• System permissions for Personnel have been set in the User Options application

• At least one company record has been added to the system in the Company application

• Times zones have been added to the system in the Timezones + Holidays application

• Access levels have been added to the system in the Access Permissions application

• Card types and card formats have been added to the system using the Card Setup

application

10.5 Opening Personnel

To open Personnel, complete the following step:

• From the AC2000 Floatbar, click Enrolment, then Personnel.

Figure 38 Personnel interface

10.6 Searching for a cardholder record

When you search for a cardholder record, the first matching record is displayed. Use the

navigation arrows, as shown in Figure 39, to search the results. Use the previous and next

arrows to skip between each individual record in the order that they are saved. Use the first

and last arrows to jump quickly to the first record or the last record. Click the List view icon to

generate a report containing a list of the results.

List view icon

Figure 39 Navigation arrows

68

A2SE8-QG-0321-1


Quick Start Guide

Enter valid search criteria in to any of the available fields. If you do not enter search criteria, all

cardholder records are returned in the results. Depending on the number of cardholders, this

can take longer than specifying search criteria. It is recommended that you enter one or more

search criterion to filter the results and reduce the time taken to return them.

To search for a cardholder record, complete the following steps:

1. In Personnel, click Search.

2. Enter one or more search criterion and click Apply.

3. If no search criteria is entered, click Yes to acknowledge the warning message.

4. If more than one record is found in the search, use the navigation arrows to locate the

correct cardholder record.

View the results in a

separate window

List of all records found

The fourth record in

the search results

Figure 40 Viewing the search results

5. To see a list view of the result records, click the icon next to the left and right arrows.

6. Click the pop-out icon to view the results in a separate window.

Save list

Print list

Figure 41 Viewing the search results in a separate window

7. To save the results, click the Save list icon.

8. To print the results, click the Print list icon.

69


CHAPTER 10

10.7 Adding a cardholder record

To add a cardholder record, complete the following steps:

1. From the Personnel toolbar, click Add.

2. Configure the personal details of the cardholder in the Personnel Details pane. For more

information, see Parameters of the Personal Details pane on page 71.

Figure 42 Personal Details pane

3. Configure the parameters of the Employment Details pane. For more information, see

Parameters of the Employment Details pane on page 71.

Figure 43 Employment Details pane

4. Configure the parameters of the Card Details pane. For more information, see Parameters

of the Card Details pane on page 72.

Figure 44 Card Details pane

70

A2SE8-QG-0321-1


Quick Start Guide

5. Click Save.

6. You can add multiple cards to one cardholder record. To add another card, click the small

green add icon at the top right of the Card Details pane and repeat steps 4 and 5.

10.7.1 Parameters of the Personal Details pane

This table describes the parameters of the Personal Details pane.

Parameter

Surname

Forename

Address

Postcode

Date of Birth

Gender

Email

Description

Defines the surname of the cardholder

Defines the forename of the cardholder

Defines the address of the cardholder

Defines the postcode of the cardholder

Defines the date of birth of the cardholder

Defines the gender of the cardholder

Defines the email address of the cardholder

Table 8: Personnel Details pane

10.7.2 Parameters of the Employment Details pane

This table describes the parameters of the Employment Details pane.

Parameter

Company

Department

Job Title

Payroll Number

Contact Num

PIN

Special Usage

Last Device

Last Time

Description

Defines the company or companies assigned to the cardholder. From

the Company drop-down list, select one or more companies. If you

select more than one company, the Company Information window

opens. If the employee has a different job title or works for a different

department in each company, select each company and configure the

Job Title and Department fields. Click Apply.

Note: If more than one company is assigned to a cardholder, the

number of companies is displayed in a new label next to the Company

field.

Defines the department of the cardholder for the company selected in

the Company parameter.

Defines the job title of the cardholder for the company selected in the

Company parameter.

Defines the payroll number of the cardholder.

Defines a contact number for the cardholder.

Defines the PIN for the cardholder to be used on PIN access readers.

Defines that the cardholder is given extra time to pass through a door

after a reader has been swiped.

Defines the AC2000 address of the last device the cardholder

accessed.

Defines the last time the cardholder presented a card at an access

control reader.

Table 9: Employment Details pane

71


CHAPTER 10

10.7.3 Parameters of the Card Details pane

This table describes the parameters of the Card Details pane.

Parameter

Card Format

Access Level

Timezone

Start Date

Expiry Date

Card Status

Reason

Total Cards

Card Serial

Hotstamp

Added By

Creation Date

Pass Print Date

Authoriser

Company

Last Update

Time

Last Updated

By

Description

Defines the card format the cardholder’s new card is assigned.

Defines the access level assigned to the cardholder’s card.

Defines the time the cardholder can gain access using this card.

Defines the start date of the cardholder’s card.

Defines the expiry date of the cardholder’s card.

Defines the status of the card. When adding a card, the default card

status is (none). After the card is validated, more options become

available to choose from in the Card Status drop-down menu. For more

information, see Card Status on page 73.

Defines the reason for issuing the card and the charge associated with

it, if any.

Note: If this field is required and is not displayed, ensure the

enable_charging value is set to Y in Configured.

The total number of cards in the cardholder record. This parameter is

not editable.

The serial number of the card.

Defines the hotstamp number of the card. If the hotstamp is autogenerated,

the field is blank and the label Generated is displayed next

to the field.

The name of the user that added the card. This parameter is not

editable.

The date the card was added. This parameter is not editable.

The date the card was printed. This parameter is not editable.

Defines the name of the authoriser for the company.

Note: If this field is not displayed, you need to enable authorisers.

Enable the Authoriser function in the Configured application. To do

this, set the using_authorisers value to Y. Add an authoriser to a

company record in the Company application.

Defines the company to which the card is assigned.

The date the card details were last updated. This parameter is not

editable.

The name of the user that last updated the card details. This parameter

is not editable.

Table 10: Descriptions of the Card Details parameters

72

A2SE8-QG-0321-1


Quick Start Guide

10.7.4 Card Status

This table describes the card status values.

Card Status

(none)

Current

Lost/Stolen

Not Yet

Operational

About to Expire

Expired

Purged

Description

Defines the default card status of a card.

Defines the status of a card after it has been validated.

Defines that the card has been lost or stolen. If the card is used at a

reader, it will not provide access.

Defines that the cardholder’s start date is a future date.

Defines that the card is set to expiry within a set period of time. This value

depends on the About to expire days value for the selected card format.

This value is set in Card Setup. For more information, see the Card Setup

chapter in this guide.

Defines that the Expiry Date of the card has passed.

Defines that the card has not been used for a set period of time or that a

reusable card has been returned.

Table 11: Card Status values

10.8 Capturing a portrait

To add a portrait image, you must enable the function in the Workstation Configuration Tool.

See the Workstation Configuration Tool manual for more information.

To add a portrait image to the cardholder record, complete the following steps:

1. Perform a search for the cardholder. For more information, see Searching for a cardholder

record on page 68.

2. When you hover the cursor over the empty grey box on the right-hand side of the pane, the

words Capture Portrait and an image of a camera are displayed in the box. Click the box

to open the Capture an image application.

3. In the Capture an image window, click Import.

4. Navigate to the image, select the image, and click Open.

5. If required, use the image editing tools on the right of the window.

6. Click Save and click Close. The image is displayed in the portrait box. The date the image

was added is displayed below the image.

10.9 Editing a cardholder record

To edit a cardholder record, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. When the correct record is displayed, make the edits to the cardholder record as required.

3. Click Save.

Note: If a card has been validated, the Card Format field can not be edited.

Note: If a cardholder’s record was imported from another site, the editable fields are limited.

For more information, see Imported Records on page 87.

73


CHAPTER 10

Note: If a cardholder’s record is associated with a terminated company, the card details can

not be edited.

10.9.1 Setting the threat level

If threat levels are enabled on the system, you must assign a threat level threshold to the

cardholder. This means that when threat levels are raised, a cardholder’s access is limited to

threat level readers equivalent to or below their threshold.

To assign a threat level threshold to a cardholder, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. When the correct record is displayed, click the Miscellaneous tab.

3. Select a threshold level from the Threat Level drop-down list.

4. Click Save.

Note: If the Threat Level drop-down list is not visible, open the Configured application and

change the threat_level_enabled value to y. Restart the Personnel application.

10.9.2 Changing the Remote App Group

If emerald readers are installed on a system, a cardholder can access specific applications

using the touchscreen reader. The applications that the cardholder can use are determined by

the Remote App Group that the cardholder is assigned to in the Personnel application. By

default, the cardholder is assigned to the Cardholder group.

To change the remote app group, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. When the correct record is displayed, click the Miscellaneous tab.

3. Select a group from the Remote App Group drop-down list and click Save.

Note: If the Remote Group App drop-down list is not visible, open the Configured application

and change the remote_app_group_enabled value to y. Restart the Personnel application.

10.9.3 Assigning Visitor Sponsor status

If you intend to use AC2000 WEB Visitors applications, you can assign a visitor sponsor to a

visitor. Sponsors are cardholders that can accompany a visitor. This function is only available

in Personnel if visitor_escort is enabled in the Configured application.

Note: If you can not assign a sponsor, open the Configured application, and change the

visitor_escort value to y. Restart the Personnel application.

To assign Visitor Sponsor status to a cardholder, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. When the correct record is displayed, click the Miscellaneous tab.

3. From the Status Options drop-down list, select the Visitor sponsor check box.

4. Click Save.

74

A2SE8-QG-0321-1


Quick Start Guide

10.9.4 Uploading an image

You can upload multiple images to a cardholder’s record.

To upload an image, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. From the toolbar, click View.

3. Select Documents and select Image Upload.

4. Click Add. The Capture an image window opens.

5. Select a method of capturing an image. The following options are available to choose

from:

• Import

• Video & Web Cameras

• Scanners

• Digital Cameras

6. Click Save, then Close.

Figure 45 Adding an image

Note: The image import function must first be configured using the Workstation Configuration

Tool. For more information, refer to the Workstation Configuration guide.

10.9.5 Uploading a document

You can upload multiple documents to a cardholder’s record.

To upload a document, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. From the toolbar, click View.

3. Select Documents and select File Upload.

4. Click Add.

75


CHAPTER 10

5. Select the type of file you want to upload from the drop-down menu located to the right of

the File name field. The options are as follows:

• Word

• Excel

• Powerpoint

• Text

• PDF

• XPS

6. Navigate to the file, select it, and click Open.

Note: Invalid files, for example, images, can not be uploaded through the File Upload.

Note: The maximum space assigned to each cardholder for uploaded files is 5000KB. If you

attempt to upload a file that pushes the total space used over the maximum allowed, the file

fails to upload. You can configure this maximum space value in the Configured application by

changing the parameter doc_allocated_space.

10.9.6 Opening a document

To open a document in a cardholder’s record, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. Click the Files tab.

3. Select the document you want to open and click the icon in the Actions column.

10.9.7 Deleting a document

To delete a document from a cardholder’s record, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. Click the Files tab and click Edit.

Note: Alternatively, click View, click Documents, and select File Upload.

3. Select the file to delete and click the x icon in the Delete column.

4. Click Yes to confirm deletion.

5. When finished deleting documents, click Close.

10.9.8 Capturing biometrics

You can capture cardholder biometric information using a biometric reader.

To capture biometric information, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. From the toolbar, click Biometric.

3. If prompted to enter an IP address, type the IP address, for example, 192.164.6.10, of the

biometric reader and click OK. If you are not prompted to enter the IP address of the

biometric reader, it has been set already using the Getting Started application.

76

A2SE8-QG-0321-1


Quick Start Guide

4. Select Capture and place one of your fingers on the biometric reader.

Figure 46 Capturing biometric information

5. When your first finger’s biometric information has been captured and the fingerprint image

displays, place another one of your fingers on the biometric reader.

6. Click Accept to proceed or Cancel to abort.

Note: To change the IP address of the biometric reader, refer to the Getting Started Guide.

10.9.9 Editing the badge name

The cardholder’s name appears on the card as displayed in the Badge Name field in the

Miscellaneous tab. The Badge Name is automatically created using the Forename and

Surname fields, but can be edited to display something different. This is useful for cardholders

who are more commonly known by their middle name, for example, or by a shortened version

of their first name.

To edit the Badge Name, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. Click the Miscellaneous tab.

3. Make the required edits to the Badge Name field and click Save.

10.9.10 Adding a note

To add notes to a cardholder’s record, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. Click the Notes tab.

3. Click Edit.

4. Type the note information into the Notes pane and click Save.

10.9.11 Viewing a note

To view a cardholder’s notes, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. From the toolbar, click View, and select Personnel Notes.

Note: You can also view notes by clicking on the Notes tab.

77


CHAPTER 10

10.9.12 Viewing company notes

Notes can be added to a company in the Company application. You can view these notes in

Personnel.

To view a company notes in Personnel, complete the following steps:

1. In Personnel, perform a search for the company. For more information, see Searching for

a cardholder record on page 68.

2. From the toolbar, click View, and select Company Notes.

10.10 Printing the card

To print the card, complete the following steps.

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. Ensure that the configured printer is connected and powered on.

3. Insert the card into the printer.

4. Click Print to open the Print Engine window.

5. Adjust the size of the Print window if necessary, using the drop-down Zoom button.

6. Select the Side drop-down menu to preview the front, back, or both sides of the pass

before printing.

7. Click Print.

10.11 Validating a card

Before a card can be used to access readers, it must be validated against a cardholder.

Cards can be validated in Personnel in one of two ways:

• Automatic validation, using preloaded card information from a Load Cards operation in the

Card Setup application. For more information, see Automatic card validation on page 78.

• Manual validation, using a validation reader that is attached to the workstation. For more

information, see Manual card validation using an online reader on page 79, Manual card

validation using a fingerprint reader on page 79, and Salto offline-lock validation on page

80.

10.11.1 Automatic card validation

Before a card can be validated, you must create the correct card format in the Card Setup

application. If there is preloaded card information on the system, you can validate cards

automatically.

Note: If the card type is set to GENERATE CARD NUM, you do not need to preload card

numbers on to the system.

To validate a card in Personnel automatically, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. If the cardholder has more than one card, scroll through the cards to find the card to

validate.

3. In the toolbar, click Validate.

78

A2SE8-QG-0321-1


Quick Start Guide

4. If prompted for a hotstamp number, type the hotstamp number into the Hotstamp field.

5. Click Validate and click Yes to accept automatic validation.

10.11.2 Manual card validation using an online reader

Before a card can be validated, you must create the correct card format in the card types

application. For example, if you want to use an online reader connected to the AC2000

network on which to perform card validation, the ONLINE READER validation option must be

selected in the Card Setup application.

To manually validate a card, complete the following steps:

1. In the Personnel toolbar, click Validate to display the Online Card Validation window.

2. If prompted to type a hotstamp number, type the hotstamp number into the Hotstamp field.

If the card type has Auto-Generate Hotstamp enabled, the hotstamp generates

automatically and you can not edit the value.

3. Type the five-digit hexadecimal AC2000 address of the online reader into the Device

Address field.

Note: If you have setup the device address in the Getting Started wizard application, you

will not be prompted to manually enter the device address.

4. Click Validate to display the swipe timeout prompt.

5. Swipe the card over the reader.

Note: Validation of a card must be performed on a reader that is compatible with that card

technology, for example, a MiFare card must be validated on a MiFare reader.

Note: Where cards do not have an encoded internal number, it is recommended that the card’s

validation method is set to GENERATE CARD NUM. It is also advisable that the hotstamp

number is included in the pass design.

10.11.3 Manual card validation using a fingerprint reader

Before a card can be validated, you must create the correct card format in the card types

application. For example, if you want to use an fingerprint reader connected to the AC2000

network on which to perform card validation, the READ CNUM & BIO validation option must

be selected in the Card Setup application.

To manually validate a card, complete the following steps:

1. In the Personnel, click Validate to display the Validation window.

2. If prompted to type a hotstamp number, type the hotstamp number into the Hotstamp field.

If the card type has Auto-Generate Hotstamp enabled, the hotstamp generates

automatically and you can not edit the value.

3. Click Validate.

4. In the IP Address fields, type the IP address of the validation reader.

5. Click Save to display the Capture Biometrics pane.

Note: If you are not prompted to enter the IP address of the biometric reader, it has been

set already using the Getting Started application.

6. Select Capture and place one of your fingers on the biometric reader.

7. When your first finger’s biometric information has been captured and the fingerprint image

displays, place another one of your fingers on the biometric reader.

8. Click Accept to proceed or Cancel to abort.

9. Swipe the card over the reader.

79


CHAPTER 10

10.11.4 Salto offline-lock validation

Salto offline-locks are validated manually as above, using a Salto Smart Card Encoder.

Before validating a Salto offline-lock card, ensure that the following tasks have been

completed:

• A card type has been created for Salto offline-locks in the Card Setup application with its

validation method set to SALTO SHIP.

• A card format has been created that uses the Salto offline-locks card type.

• A Salto Smart Card Encoder is attached to the Visual Imaging and Pass Production System

(VIPPS) workstation.

10.12 Checking access level readers

You can check the access permissions of a cardholder by viewing the readers the cardholder

has access to. You can view the devices according to the access level.

To view the access permissions of a cardholder, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. Click the Card Details tab.

3. Click the icon located next to the Access Level drop-down list to display the list of

readers.

View the access

level readers

Figure 47 Checking access level readers

4. Click Save to save the report or click Print to print out the report.

10.13 Performing an access level query

The access level query option searches the primary access level that has been assigned to a

cardholder and displays the results.

To perform an access level query, complete the following steps:

1. From the Personnel toolbar, click Search.

2. In the Card Details pane, select an access level from the Access Level drop-down list.

Note: If you want to include extra access levels assigned to users in the search, select the

Include Extra Access check box at the top of the pane.

3. Click Apply. All cardholders with the access level used in the search are displayed in the

results.

80

A2SE8-QG-0321-1


Quick Start Guide

10.14 Viewing the transaction history

A transaction history of a cardholder can be viewed as a report showing their last 20 card

swipes. You can search for recent transactions in Personnel based on date, duration, and

hotstamp number.

To view a cardholder’s transaction history, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. From the toolbar, click Cards, and select Recent Transactions. If the cardholder has

been swiping the cards, the last 20 transactions automatically display.

3. Configure the search criteria. You can configure multiple criteria, all fields, or just one field.

For more information, see Fields of the Recent Transactions window on page 81.

4. Click Search and Export.

5. To save the report, select Save, and to print the report, click Print.

10.14.1 Fields of the Recent Transactions window

This table describes the fields of the Recent Transactions window.

Field

Start Date

Duration

Hotstamp

Action

Select the date using the calender.

Select duration from the drop-down menu or select a date using the

calender.

Select a hotstamp number from the drop-down menu. Select All if you

want to search all transactions for all cards.

Table 12: Configuring the search criteria

10.15 Deleting a cardholder record

You can only delete cardholder records with no validated cards. Cardholder records with

validated cards should be updated to an Expired card status. If a card has been validated and

has an expired status, the record still can not be deleted.

To delete a record, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. Click Delete and click Yes to confirm deletion.M

10.16 Batch Update

The Batch Update option updates a batch of cards with a new expiry date, access level, and

TEA expiry date.

To batch update both the expiry date and access level, complete the following steps:

1. From the Personnel toolbar, click Cards, select Batch, and Batch Update.

2. Configure the search criteria of the Query pane.

Note: If you want to update the access level, you must select an access level from the

Access Level drop-down list in the search query.

3. Click Query.

4. After you select the new expiry date and access level, click Update.

81


CHAPTER 10

Note: The maximum number of cards that can be batch updated depends on whether the user

is updating the expiry date or both the expiry date and access level. The values are

configurable in the Configured application. The default maximum number for updating the

expiry date is 500. To change this, configure the max_update_expiry_date parameter in the

Configured application. The default maximum number for updating access levels and expiry

dates is 100. To change this, change the max_update_access_levels parameter in

Configured.

10.16.1 Batch Update Error Status

Possible error status messages are as follows:

• Unassigned Access Level: When a cardholder record is being updated with an access

level that is not included in the card format.

• Invalid Card Format: When an attempt is made to update a record that has not yet been

assigned a card format or by implication an access level.

Invalid Date Range: When a record is being updated with an expiry date that exceeds the

maximum expiry date defined for the card format.

10.17 Batch Update Temporary Extra Access (TEA) Expiry

Date

To perform a batch update on TEA Expiry Date, complete the following steps:

1. From the toolbar, click Cards, select Batch, and Batch Update.

2. Configure the Access Level, Company and TEA Expiry Date parameters in the Query

pane.

3. Click Query.

4. Enter a new TEA expiry date in the New TEA Expiry Date field.

5. Click Update. A report is generated, displaying the cardholders records that were updated

and those that failed.

6. Click Print to print the report.

7. Click Save As to save the report.

8. Click Close.

10.18 Batch Field Update

To update one or more fields in multiple cardholder records, complete the following steps:

1. In Personnel, perform a search for the cardholders you want to include in the Batch Field

Update. For more information, see Searching for a cardholder record on page 68.

2. In the toolbar, click Cards, select Batch, and Batch Field Update. The results from the

search are displayed in the top pane.

Note: If the record set is greater than 500, an error message is displayed. Narrow the result set

by adding more search criteria when performing the search.

Note: Imported personnel records do not appear in the result set.

3. If necessary, clear the check boxes of cardholder records to exclude them from the

update.

4. From the Fields drop-down list, select the field you want to edit

82

A2SE8-QG-0321-1


Quick Start Guide

5. In the Value field, type the new value, and click Add.

6. To update another field name, perform steps 3 to 5.

7. To remove a field from the batch update, click the X icon in the Delete column.

8. To save the changes, click Update.

10.19 Batch Add Extra Access

You can create an extra access and assign it to multiple cardholder records.

A cardholder is assigned access levels and time zones to restrict a cardholder’s access

throughout the site in accordance with location and time. There are occasions when temporary

additional access must be granted.

To assign extra access to a cardholder, complete the following steps:

1. In Personnel, perform a search for the cardholders you want to include in the Batch Add

Extra Access. For more information, see Searching for a cardholder record on page 68.

Note: If there are no common card formats among the result set, the parameters of the Batch

Add Extra Access window are disabled and an error message is displayed. It is

recommended that you include the card format in the search criteria.

2. In the toolbar, click Cards, select Batch, and Batch Add Extra Access. The results from

the search are displayed in the top pane.

Note: If the record set is greater than 500, an error message is displayed. Narrow the result set

by adding more search criteria when performing the search.

Note: Imported personnel records and records with no active or readable cards do not appear

in the result set.

3. If necessary, clear the check boxes of cardholder records to exclude them from the

update.

4. Select an access type from the Extra Access Type drop-down list in the Properties pane.

There are three access types:

• Multiple Access: This extra access type allocates additional access levels and time

zones to a cardholder’s permissions. For more information, see Multiple Access on

page 83.

• Manual TEA: This extra access type allocates extra permissions to a cardholder for a

specific period of time. After that time, the extra access lapses. For more information,

see Manual TEA on page 84.

• Swipe Invoked TEA: This extra access type assigns a cardholder temporary access to

another area by invoking access using a trigger reader. A TEA area and trigger devices

must be configured in the Temporary Extra Access application before Swipe-Invoked

TEA can be applied. All trigger readers must be contained in the cardholder’s Primary

Access Level to invoke the TEA. For more information, see Swipe Invoked TEA on

page 84.

10.19.1 Multiple Access

To assign Multiple Access Extra Access, complete the following steps:

1. Select Multiple Access from the Extra Access Type drop-down list.

2. Select an access level from the Access Level drop-down list.

3. Select a time zone from the Timezone drop-down list.

4. Configure the Start Date/Time and End Date/Time parameters using the date picker.

83


CHAPTER 10

5. Click Save. A report is generated, displaying the cardholders records that received the

extra access and those that failed.

6. Click Print to print the report.

7. Click Save As to save the report.

8. Click Close.

10.19.2 Manual TEA

To assign Manual TEA Extra Access, complete the following steps:

1. Select Manual TEA from the Extra Access Type drop-down list.

2. Select an access level from the Access Level drop-down list.

3. Select a time zone from the Timezone drop-down list.

4. Configure the Start Date/Time and End Date/Time parameters using the date picker.

5. Click Save. A report generates, displaying the cardholders records that received the extra

access and those that failed.

6. Click Print to print the report.

7. Click Save As to save the report.

8. Click Close.

10.19.3 Swipe Invoked TEA

To assign Swipe Invoke Extra Access, complete the following steps:

1. Select Swipe Invoked TEA from the Extra Access Type drop-down list.

2. Select a TEA area from the Area drop-down list.

3. Click Save. A report is generated, displaying the cardholders records that received the

extra access and those that failed.

4. Click Print to print the report.

5. Click Save As to save the report.

6. Click Close.

10.20 Batch Remove Extra Access

To batch remove extra access, complete the following steps:

1. In Personnel, perform a search for the cardholders you want to include in the Batch

Remove Extra Access. For more information, see Searching for a cardholder record on

page 68.

Note: If the record set is greater than 500, an error message is displayed. Narrow the result set

by adding more search criteria when performing the search.

2. In the toolbar, click Cards, select Batch, and Batch Remove Extra Access. The results

from the search are displayed in the top pane.

3. If necessary, clear the check boxes of cardholder records to exclude them from the

update.

4. To view an individual cardholder’s extra access, click the cardholder record and if there is

extra access, it is displayed in the Extra Access Details pane.

84

A2SE8-QG-0321-1


Quick Start Guide

5. To batch remove extra access, click Remove, and click Yes to confirm deletion.

10.21 Assigning extra access to one cardholder

A cardholder is assigned access levels and time zones to restrict a cardholder’s access

throughout the site in accordance with location and time. There are occasions when temporary

additional access must be granted. To give one cardholder extra access, use the Extra Access

function.

To assign extra access to one cardholder, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. From the toolbar, click Extra Access, and click Add.

Figure 48 Extra Access dialog

3. Select an access type from the Extra Access Type drop-down list in the Properties pane.

There are three access types:

• Multiple Access: This extra access type allocates additional access levels and time

zones to a cardholder’s permissions. For more information, see Multiple Access on page

83.

• Manual TEA: This extra access type allocates extra permissions to a cardholder for a

specific period of time. After that time, the extra access lapses. For more information,

see Manual TEA on page 84.

• Swipe Invoked TEA: This extra access type assigns a cardholder temporary access to

another area by invoking access via a trigger reader. A TEA area and trigger devices

must be configured in the Temporary Extra Access application before Swipe-Invoked

TEA can be applied. All trigger readers must be contained in the cardholder’s Primary

Access Level to invoke the TEA. For more information, see Swipe Invoked TEA on

page 84.

10.21.1 Editing extra access

To edit a cardholder’s extra access, complete the following steps:

85


CHAPTER 10

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. Click Extra Access.

3. From the Assigned Extra Access pane, select the extra access level you want to edit.

4. Click Edit.

5. Edit the End Date/Time parameter and click Save.

10.21.2 Deleting extra access

To edit a cardholder’s extra access, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. Click Extra Access.

3. From the Assigned Extra Access pane, select the extra access level you want to delete.

4. Click Delete.

5. Click Yes to confirm deletion.

10.22 Batch Printing

The Batch Print option prints one card for every cardholder in the search query results. If a

cardholder has multiple cards, you can print only one of the cards in each Batch Print

operation.

To perform a batch print operation, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. If a cardholder has multiple cards, select the card you want to print by clicking on the dropdown

list in the Card Serial column and selecting the card.

3. Click Print.

10.23 Resetting Anti-Passback

Anti-passback is a way of configuring readers to prevent cards from being swiped twice at the

same reader to allow access for two people. If passback has been attempted, the access on

the cardholder’s card automatically locks and must be reset before the cardholder can

successfully swipe through a reader with that card again.

To reset anti-passback, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. From the toolbar, click Actions, and select Reset APB.

10.24 Exporting card details

The Export card option gives a cardholder access to multiple sites operating within a Standard

Link by creating a record in another site’s Personnel database. This is done by exporting the

cardholder’s details from their record on the home site workstation to the other site the

cardholder need access to. If a cardholder has multiple cards, all of their active cards are

exported.

86

A2SE8-QG-0321-1


Quick Start Guide

To export a card, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. From the toolbar, click Cards, and select Export Card.

3. Click Edit.

4. Select the site check box you want to export the card to.

5. Click Save.

10.25 Imported Records

If cards are imported from another site, there are restrictions placed on editable fields and

functionality.

Editable fields are restricted to:

• Access Level

• Timezone

• Remote app group

• Threat level group

• Status Options

• Static and dynamic user fields

It is not possible to return/validate, print, batch print, batch update, or export an imported card.

10.26 Returning a card

If a cardholder leaves the company, or requires their card to be re-issued because it is has

expired or is about to expire, their current card needs to deactivated. To deactivate cards for

any other reason, set card status to expired.

You can not return a card unless it has been set as Reusable in the Card Setup application

and the card has been validated.

To return a card, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. From the toolbar, click Return Card.

3. Click Yes to continue. The Card Status changes to Purged.

10.27 Card parking

Card parking deactivates a card so that it can no longer be used to access a readers on a site.

If a card has been inactive for a predefined time, it is automatically parked. If a card is parked,

the Parked radio button in the cardholder record is selected.

The Card Parking setting is configured in AC2000 WEB. For information about how to

configure the inactivity time period, refer to the AC2000 WEB manual.

87


CHAPTER 10

10.27.1 Exempting a card from card parking

Cards can be configured to be exempt from automatic card parking. This is performed using

the Parking Exemption option.

To exempt a cardholder’s cards, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. In the System Information pane, you can choose from two options to make a cardholder’s

cards exempt from parking.

• Select Indefinite from the Park Exemption drop-down list to make the cards exempt

indefinitely.

• Select Until Date to set an exemption period. This defines that the card will not be

parked up to a specific date. Enter the date in the Exempt Until field.

3. Click Save.

10.27.2 Unparking a card

To reactivate a parked card, you must manually unpark the card.

To unpark a card, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. Click Actions and select Unpark.

3. Click OK.

10.27.3 Viewing a cardholder’s park history

The Park History option displays the dates the cardholder’s cards were parked and the

access level the cardholder had before the cards were parked.

To view a cardholder’s park history, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. Click Actions and select Park History.

10.28 Permits

Typically, a permit is a non-readable pass that can not be used on swipe card readers. They

are most commonly used for vehicles and personnel who require a sponsor and only visit on

an incidental basis, such as repair staff.

Permits are issued using a permit pass design and are usually printed on paper. A permit pass

design must be configured before a permit can be issued.

Note: You can create a permit pass containing a barcode that is read using barcode readers.

10.28.1 Issuing a permit

To issue a permit, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

88

A2SE8-QG-0321-1


Quick Start Guide

2. From the toolbar, click Actions, and select Permits.

3. Click Add.

4. Alternatively, if a permit record already exists, you can edit the Permit Format field,

Permit Status field, Start Date field and Expiry fields. You can also edit the spare text

fields, the spare num fields and the spare date fields.

5. Enter the permit details. For more information, see Parameters of the Permit Details pane

on page 89.

6. Select Save.

7. To print the permit, select Print Pass, and click Print.

10.28.2 Parameters of the Permit Details pane

This table describes the parameters of the Permit Details pane.

Parameter

Permit Serial

Personnel Serial

Permit Format

Permit Status

Company

Forename

Surname

Start Date

Expiry Date

Spare Fields

Description

Defines the serial number of the permit. This is automatically generated

by AC2000.

Defines the cardholder’s personnel serial number.

Defines the permit format to be used. These formats are created in the

Card Setup application. For more information, see the Card Setup

chapter.

Defines the status of the permit. When a Permit Format is selected, the

default format is Current.

Defines the company to which the permit is assigned.

Defines the first name of the cardholder.

Defines the surname of the cardholder.

Defines the first date the permit can be used.

Defines the final date the permit can be used.

There are four spare text fields, two spare date fields, and two spare

numeric fields.

Table 13: Permit Details parameters

Note: The spare field names can be changed. For more information, see Configuring spare

fields on page 89.

10.28.3 Deleting a permit

To delete a permit, complete the following steps:

1. From the toolbar, click Actions, and select Permits.

2. Select the permit and click Delete.

3. Click Yes to confirm deletion.

10.29 Configuring spare fields

In Personnel, the Spare Fields tab contains spare fields that you can configure to capture data

that is not included in the standard Personnel form, for example, car registration. Permit spare

fields can also be configured to capture data from permit holders.

To configure the spare fields, complete the following steps:

1. From the Personnel toolbar, click Configuration, and select Spare Fields.

89


CHAPTER 10

2. Select a spare field from the list. This must be appropriate for the data, such as a text field

for car registration or a date field for an employee start date.

3. In the Caption field, enter the new field name exactly as it should appear in the

application, for example, Car Registration.

4. Change the maximum number of characters that can be typed into the spare field by

editing the Maximum field.

Note: You can change the minimum and maximum values allowed in a numeric spare

field. For example, a minimum of 2 and a maximum of 10 means only numbers including

and between 5 and 10 are accepted values in this spare field.

5. To make the completion of a spare field mandatory, select the Mandatory check box.

6. To ensure the value of the spare field is unique, select the Unique check box.

7. To hide the field, clear the check box next to the spare field in the list.

8. Click Save.

10.29.1 Configuring permit spare fields

To configure the Permit Spare Fields, complete the following steps:

1. From the toolbar, click Configuration, and select Permits Spare Fields.

2. Select a spare field from the list. This must be appropriate for the data, such as a text field

for car registration.

3. In the Caption field, enter the new field name exactly as it should appear in the

application, for example, Car Registration.

4. Change the maximum number of characters to be typed into the spare field by editing the

Maximum field.

Note: You can change the minimum and maximum values allowed in a numeric spare

field. For example, a minimum of 2 and a maximum of 10 means only numbers including

and between 5 and 10 are accepted values in this spare field.

5. To make the completion of a spare field mandatory, select the Mandatory check box.

6. To ensure the value of the spare field is unique, select the Unique check box.

7. If you want to hide the field, clear the check box next to the spare field in the list.

8. Click Save.

10.30 Configuring limited usage

Cardholders are assigned to particular access levels depending on what reader access is

required. The Limited Usage option limits the cardholder to a designated number of card

swipes after which the primary access level changes to another access level.

10.30.1 Applying limited usage

To apply limited usage to a cardholder, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. From the toolbar, click Cards, and select Limited Usage.

3. Select a Usage Type. You can choose from two usage types.

• Daily: On a daily basis

• Total: For the full duration of the cardholder’s time with the company

90

A2SE8-QG-0321-1


Quick Start Guide

4. In the Assigned Usage field, enter the cardholder’s swipe allowance. This value must be

between 1 and 1000. The number of available swipes the cardholder has left displays in

the Remaining Usage field.

5. From the When usage expires set Access Level drop-down list, select the access level

the cardholder will be assigned to when the allowance is used up.

Figure 49 Applying limited usage to a cardholder

Note: It is recommended that you create a restricted access level in Access Permissions with

limited readers. This restricted access level must belong to all card formats that the user has

active. This can be done using the Card Setup application.

6. Select Save.

10.30.2 Reset Limit usage

Resetting the allowance updates the values to the cardholder’s settings before Limited Usage

was applied. This option can not be used if the value in the Remaining Allowance field is

greater than 0.

To reset Limited Usage, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. From the toolbar, click Cards, and select Limited Usage.

3. Select Reset and click Close.

10.30.3 Deleting limited usage

To delete a cardholder’s limited usage, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. From the toolbar, click Cards, and select Limited Usage.

3. Click Delete and click Yes to confirm deletion.

10.31 Breach of Conditions

If a cardholder has broken the terms of their employment, you can add a breach of conditions

the personnel file as a formal record of the disciplinary event. The cardholder is then typically

issued with a formal letter advising them of the breach.

To apply a breach of conditions to a cardholder, you must preconfigure the breach types and

letter in the Utilities and BOC applications.

For more information, see the Setup Guide and System Configuration manual.

91


CHAPTER 10

Note: If the Breach of Conditions tab is not available in Personnel, set the enable_boc

parameter to Y in the Configured application.

10.31.1 Adding a breach of conditions to a cardholder record

To add a breach of conditions to a cardholder record, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

Note: You can also search for a cardholder in the Breach of Conditions pane by clicking

Search.

2. Click the Breach of Conditions tab and BOC Admin.

Alternatively, click Actions and Breach of Conditions.

3. Click Add.

Parameter

Description

Breach Type The type of breach.

Incident Date The date of the incident.

Response

The date the cardholder is expected to reply.

Expected Date

Response

The date of a response to the breach of conditions.

Received Date

Breach Number This is an auto-generated number.

Incident Number The incident number of the breach.

Score

The score for the breach type. Each breach type can have a different

score. The score is set in the Utilities application. In the Configured

application, the value of max_boc_points is the maximum allowed

score for a cardholder record before their card is parked.

Breach Description A brief description of the breach that occurred.

Initial Action A brief description of the action taken against the individual

concerned for this breach of conditions.

Outcome

Details of the outcome if a response has been received and an

outcome to the breach has been reached.

Table 14: Parameters of the Breach of Conditions window

4. Click Save. The Response Received Date and Outcome fields are typically filled at a

later date.

10.31.2 Issuing a breach of conditions letter

To issue a breach of conditions letter, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

Note: You can also search for a cardholder in the Breach of Conditions window by

clicking Search.

2. Click the Breach of Conditions tab.

3. Click BOC Admin.

4. If the cardholder has more than one breach, select the breach for which you want to issue

a letter.

5. If necessary, format the letter by clicking Format BOC Letter. Make the required edits,

click Save, then Close.

92

A2SE8-QG-0321-1


Quick Start Guide

6. Click Preview. Review the letter and amend if necessary.

7. Click Print to print the letter or click Save to save the letter.

10.31.3 Viewing breach history of a cardholder

The Breach of Conditions window contains a list of all the breaches associated with a

cardholder, sorted in date order.

To view the breach history of the cardholder, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

Note: You can also search for a cardholder in the Breach of Conditions window by

clicking Search.

2. Click the Breach of Conditions tab.

3. Click BOC Admin. All breaches assigned to the cardholder are displayed in the Breach of

Conditions pane.

4. Select the relevant breach to view the details.

10.31.4 Editing a breach of conditions

To edit a breach, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

Note: You can also search for a cardholder in the Breach of Conditions window by

clicking Search.

2. Click the Breach of Conditions tab.

3. Click BOC Admin.

4. From the Breach of Conditions pane, select the breach you want to edit.

5. Make the required edits and click Save.

10.31.5 Deleting a breach of conditions

To delete a breach, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

Note: You can also search for a cardholder in the Breach of Conditions window by clicking

Search.

2. Click the Breach of Conditions tab.

3. Click BOC Admin.

4. From the Breach of Conditions pane, select the breach you want to delete.

5. Click Delete and click Yes to confirm deletion.

10.32 Referring a cardholder

You can add a referral to a cardholder record to flag the cardholder for a particular reason, for

example, if they cause suspicion or fail to complete the necessary paperwork. A referral does

not physically restrict a cardholder’s access or track their movements throughout the site.

93


CHAPTER 10

When a cardholder has been placed on the referred list, the Referred radio button is selected

in the System Information pane and the word Referred is displayed in red font at the top of the

Personnel window.

10.32.1 Adding a referral

To add a referral, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. From the toolbar, click Cards, and select Referral.

3. Click Add.

4. Type a reason for the referral into the Reason field and click Save.

5. Click Close.

10.32.2 Editing a referral

To edit a referral, complete the following steps:

1. In Personnel, click Cards, and select Referral.

2. Edit the text in the Reason field and click Save.

3. Click Close.

10.32.3 Deleting a referral

To delete a referral, complete the following steps:

1. In Personnel, click Cards, and select Referral.

2. Clear the check box for the referral you want to delete and click Save.

10.33 Tracing a cardholder

You can monitor the movements of a cardholder who has raised suspicion by applying a trace

their record in the Personnel application. When you add a trace to a cardholder, the

cardholder’s card is configured so that the swipes appear as a list of transactions at each

device the cardholder passes through. Each time the card is swiped, a pop-up window

displays the cardholder’s details in Alarm + Event Display (AED). If a cardholder has multiple

cards, the trace applies to each card.

10.33.1 Adding a Trace

You can add a trace to an active card.

To add a trace to a cardholder, complete the following steps:

1. In Personnel, perform a search for the cardholder. For more information, see Searching

for a cardholder record on page 68.

2. From the toolbar, click Cards, and select Trace.

3. Click Add.

4. Enter a reason for adding the trace to the cardholder in the Reason field and click Save.

94

A2SE8-QG-0321-1


Quick Start Guide

10.33.2 Deleting a Trace

To delete a trace, complete the following steps:

1. From the Personnel toolbar, click Cards, and select Trace.

2. From the list of traced cardholders, clear the check box corresponding to the cardholder

whose trace you want to delete.

3. Click Save.

10.33.3 Viewing all traces

To view a list of all traced cardholders, click Cards, and select Trace.

10.33.4 Exporting traces

By exporting traces, you can print off a list of traces or save a the list as a CSV or PDF file to

disk.

To export traces, complete the following steps:

1. From the toolbar, click Cards, and select Trace.

2. Click Export.

3. To save the details to an external file, click Save As.

4. To print a list of traces, click Print.

95


CHAPTER 10

96

A2SE8-QG-0321-1


11.1 Introduction to User Options

Chapter 11 User Options

Use the User Options application to create and manage user accounts on the AC2000 system.

You can also restrict the access of a user to particular applications or functionality within

applications.

Note: If you are using a partitioned system, see the Partitioning manual.

11.2 Opening User Options

To open User Options, complete the following step:

• Log on to the AC2000 Floatbar, click Administration, and click User Options.

User

pane

Figure 50 The User Options interface

97


CHAPTER 11

11.2.1 Navigating the user pane

The user pane uses a hierarchy tree to group list entries.

A white arrow denotes list entries that are expandable. Click the arrow to expand the list. A

dark grey arrow denotes an expanded list.

Expanded list entries

Expandable list entry

Figure 51 Expandable list entry

11.3 User accounts

Unique user accounts are used to access AC2000 applications and perform system functions.

They consist of the following elements:

• A unique username and password

• An authorisation level

• Application permissions

• Company restrictions

• Oneshot restrictions

• System permissions

• User template

11.4 Adding a user account

To add a user, complete the following steps:

1. From the list of users in the left pane, click Users.

2. From the toolbar, click Action, and click Add User.

3. Configure the parameters of the Add User pane. For more information, see Parameters of

the Add User pane on page 99.

4. Click Save.

Note: All new accounts are configured with the default system settings. Change these to

restrict the user permissions of the individual. For more information, see Configuring user

account settings on page 99.

98

A2SE8-QG-0321-1


Quick Start Guide

11.4.1 Parameters of the Add User pane

This table describes the parameters of the Add User pane.

Parameter

Username

Password

Confirm Password

Authorisation level

Copy User

Assign template

Description

The username for the user account

The password for the user account

The password for the user account

The authorisation level of the user account

The existing user account settings you want to apply to the new

user account. For more information on copying user settings,

see Copying an existing user on page 105.

The template you want to apply to the user account. For more

information on user templates, see Adding a user template on

page 106.

Table 15: Utilities and applications

11.5 Editing a user account

To edit a user account, complete the following steps:

1. From the list of users in the left pane, select the user you want to edit.

2. Make the edits.

3. Click Save.

11.6 Deleting a user account

To delete a user account, complete the following steps:

1. From the list of users in the left pane, click the account you want to delete.

2. From the toolbar, click Actions, and select Delete User.

3. Click Yes.

11.7 Configuring user account settings

When you add a user account, it is configured with the default settings of the system. Ensure

to configure the settings of each user account.

11.7.1 Changing authorisation level

There are five authorisation levels on the AC2000 system. The highest level of authorisation is

level 4, which is classed as administrator level and is functionally unrestricted. By default, on a

newly installed AC2000 system, levels zero to three all have the same authorisation level and

are classed as users. The system administrator must devise and implement an authorisation

hierarchy. Control authorisation level privileges by limiting access to applications, companies,

oneshot functionality, and system permissions. You can also change the authorisation level of

a user after the user has been created.

Note: You cannot edit users that were created during system installation; for example, cem

and gswizard.

To change the authorisation level, complete the following steps:

99


CHAPTER 11

1. From the list of users in the left pane, select the user.

2. From the Authorization level drop-down list, select the authorisation level for the user.

3. Click Save.

11.7.2 Configuring the account status

Use the Account Status tab to perform the following tasks:

• Assign a user template

• View the status of an account

• Lock and unlock a user account

• Assign a cardholder record to a user

Assigning a user template

To assign a user template, complete the following steps:

1. From the list of users in the left pane, select the account to which you want to assign a

user template.

2. In the Account Status tab, select a template from the Template drop-down menu.

3. Click Save.

For more information, see Adding a user template on page 106.

Viewing the status of an account

The Current Status field indicates the login status of the user.

• Online indicates that the user is logged in to AC2000.

• Offline indicates that the user is currently logged out.

Locking a user account

Accounts are locked either manually or automatically as the result of failed login attempts.

Note: You can configure login attempt restrictions in the Workstation Configuration Tool.

To lock a user account, complete the following steps:

1. From the list of users in the left pane, select the user account you want to lock.

2. Select the Account Status check box.

3. Click Save.

Unlocking user accounts

To unlock a user account, complete the following steps:

1. From the list of users in the left pane, select the user account you want to unlock.

2. Clear the Account Status check box.

3. Click Save.

100

A2SE8-QG-0321-1


Quick Start Guide

Assigning a cardholder record to a user

When a cardholder record is assigned to a user account, the user must swipe their card on a

validation reader at the workstation and enter their username and password to log in to

AC2000.

Note: Ensure the Swipe Login feature is enabled in the Workstation Configuration Tool.

To assign a cardholder record to a user account, complete the following steps:

1. From the list of users in the left pane, select the user.

2. Click Assign.

3. To search for a cardholder record, enter the Personnel serial number of the cardholder

and click Search. Alternatively, click Swipe and present the pass of the cardholder to the

validation reader. The result displays the surname, first name, and company of the

cardholder.

Search result

4. Click Save.

Figure 52 Assigning a cardholder to an account

Deleting a cardholder record

To delete a cardholder record, complete the following steps:

1. From the list of users in the left pane, select the user to delete.

2. Click Delete.

Changing a user account password

To change a user account password, complete the following steps:

1. From the list of users in the left pane, select the user.

2. In the Account Status tab, click Change password.

3. Type the new password.

4. Type the password again to confirm.

5. Click Save.

Allocating web dashboard widget groups

You can allocate a web dash widget group to a user account that has access to the Web

Dashboard application. These groups control which widgets are available when a user

assesses the AC2000 WEB Dashboard.

To allocate a widget group to an account, complete the following steps:

1. From the list of users in the left pane, select the user.

2. From the Web Dash Widget Group drop-down menu, select the widget group.

101


CHAPTER 11

3. Click Save.

Note: Web Dash Widget Groups are created using the Dashboard Widget application in the

AC2000 WEB Pages. For further information, see the AC2000 WEB manual.

Widget Group

List of widgets in the assigned group

Figure 53 Assigning Web Dashboard Widget Groups to a user

11.7.3 Using the Applications tab

Use the Applications tab to assign and remove access to users for specific applications.

There are three tabs in the Applications tab: Workstation, Web, and Security Hub.

Assigning applications

Figure 54 The Applications tab

To assign applications to a user, complete the following steps:

1. From the list of users in the left pane, select the user.

2. Click the Applications tab.

3. From the Not Selected pane, select the applications you want to make available to the

user by selecting the check box.

4. Click Save.

Note: Selected applications move to the Selected pane.

Removing applications

To remove applications from a user, complete the following steps:

102

A2SE8-QG-0321-1


Quick Start Guide

1. From the list of users in the left pane, select the user.

2. Click the Applications tab.

3. From the Selected Pane, clear the check boxes corresponding to the applications you

want to make unavailable to the user.

4. Click Save.

11.7.4 Using the Company Restriction tab

Several companies can use the same AC2000 system. Use the Company Restrictions tab to

set which company records are viewable by a user account.

Note: Restrictions apply only to Personnel, Company, Visitors and Vehicles applications.

Show companies to a user

To allow a user to view companies, complete the following steps:

1. From the list of users in the left pane, select the user.

2. Click the Company Restriction tab.

3. Select the Enable company restrictions check box.

4. From the list of companies in the Hidden pane, select the companies you want to make

visible to the user, and click Save.

Note: Selected companies move to the Visible pane.

Hiding companies from a user

To hide companies from a user, complete the following steps:

1. From the list of users in the left pane, select the user.

2. Click the Company Restriction tab.

3. From the Visible list, clear the check boxes for the companies you want to hide from the

user, and click Save.

11.7.5 Oneshot restriction

Limit the devices on which a user can perform a oneshot using the Oneshot Restriction tab.

To do this, restrict the access levels associated with the user account for the oneshot function.

Note: Users automatically have access to oneshot functionality for all devices by default.

Restricting access levels

To restrict access levels, complete the following steps:

1. From the list of users in the left pane, select the user.

2. Click the Oneshot Restriction tab.

3. From the Allowed pane, select the access levels you want to restrict from the user and

click Save.

Allowing access levels

To allow access levels, complete the following steps:

1. From the list of users in the left pane, select the user.

103


CHAPTER 11

2. Click the Oneshot Restriction tab.

3. From the Restricted pane, clear the access levels to which the user has access.

4. Click Save.

11.8 System Permissions

Application checkpoints limit the functions available on specific applications. Use this feature

to set the minimum authorization level of the user to complete certain tasks.

Field checkpoints restrict the display and write permissions of selected fields in the Company,

Personnel, Company, and Vehicles applications. Select the minimum authorisation levels that

have display and write permissions for each individual field. For example, level two users can

have display only access to all of the Personnel fields.

To enable system permissions, complete the following steps:

1. From the toolbar, click System Permissions.

2. Choose the checkpoint type.

• Application Checkpoints

• Field Checkpoints

Figure 55 The System permissions window

11.8.1 Configuring application checkpoints

To configure an application checkpoint, complete the following steps:

1. In User Options, click System Permissions.

2. Click Application Checkpoints.

3. From the Application Name drop-down list, select the application you want to configure.

104

A2SE8-QG-0321-1


Quick Start Guide

4. From the list of checkpoints, select the authorisation level required to perform the function

from the Authorization level drop-down list.

Note: Any user assigned to this level and above has access to this function.

5. Click Save.

11.8.2 Configuring field checkpoints

To configure field checkpoints, complete the following tasks:

1. Click Field Checkpoints.

2. Select the Application from the drop-down list.

3. From the available Checkpoints list, select the field to be configured.

4. Select the authorisation level for the Display Authorisation. Any user assigned this level

and above can view the field.

5. Select the authorisation level for the Write Authorisation. Any user assigned this level

and above can write or update the field.

6. Click Save.

11.9 Copying an existing user

When you add a user, you can copy the application settings of that user to any other user.

To copy the settings of a user, complete the following steps:

1. From the list of users in the left pane, select Users.

2. From the toolbar, click Action, and select Add User.

3. Configure the parameters of the Add User pane. For more information, see Parameters of

the Add User pane on page 99.

4. From the Copy User drop-down list, select the user account whose settings you want to

copy. The Details to copy parameter is displayed.

Figure 56 The Copy User details options

5. Select the check box for the settings you want to copy. The options are as follows:

• Applications

• Oneshot Restriction

• Company Restriction

6. Click Save.

105


CHAPTER 11

11.10 Adding a user template

Use templates to apply the same user options settings to multiple users. You can create a user

with specific settings or apply a template. If you apply a template to a user account, you can

not make changes to that individual user account. You must make the changes at template

level. Changes made to a template apply to all users associated with that template.

To create a user template, complete the following steps:

1. From the list of users in the left pane, select Default partition.

2. From the toolbar, click Action, and select Add template.

3. Enter a unique name for the template.

4. Select the authorisation level you want to apply.

5. Click Save.

The new template is displayed in the list of users on the left.

Available templates

Figure 57 User templates

6. Configure the template settings in the same way that you configure a user account. For

more information, see page 98 to page 105.

11.10.1 Editing a template

To edit a template, complete the following steps:

1. From the list of users in the left pane, select the template to edit.

2. Make the edits.

3. Click Save.

11.10.2 Deleting a template

To delete a template, complete the following steps:

1. From the list of users in the left pane, select the template to delete.

2. From the toolbar, click Actions, and select Delete Template.

3. Click Yes.

11.11 Printing a user report

You can print a report of all users on the system and view details of authorisation level,

application permissions, restrictions, and cardholder status.

To print a user report, complete the following steps:

1. From the toolbar, click Report.

2. Click Print.

3. Select the printer and click Print.

106

A2SE8-QG-0321-1


Quick Start Guide

11.12 Exporting a user report

You can export a user report to a CSV or PDF file. You can also export or print a report for a

single user by selecting that user from the user pane and then clicking Report.

To export a user report, complete the following steps:

1. From the toolbar, click Report.

2. Click Save As.

3. To export the report to a CSV or PDF file, select a File Type, either Delimited or PDF. The

list of elements exports to the default directory -

C:\Program Files\CEM Systems\AC2000\Reports\ -

with a filename which reflects the application name, date and time of export. The following

format is used: <applicationName>_YYYYMMDD_HHMM.

4. To change the directory where the list is to be stored, click Change and navigate to the

desired location.

5. If you are exporting as a .csv file, by default the list is exported using a Comma as the

delimiter. To change the delimiter select the preferred delimiter from those available: Tab,

Pipe, Semicolon, or a Comma; alternatively, you can select Other and enter the delimiter

that you want to use. If you are exporting as a PDF file, the options for delimiters are not

be displayed.

6. Click Save.

107


CHAPTER 11

108

A2SE8-QG-0321-1


Quick Start Guide

Chapter 12 Testing

12.1 Introduction to testing

When you complete the Getting Started Wizard, test the card and generate a transaction

report to check that everything is working as it should.

Important: CEM Systems recommends testing one card before validating more cards on the

system, to ensure the card and system have been setup correctly.

12.2 Test Card

To test a card, complete the following steps:

1. Swipe a validated card at a door reader. Do not use a validation reader.

2. Check the reader response.

Message

DOOR OPEN/CARD VALID

WRONG ZONE

CARD NOT IN SYSTEM

INVALID CARD

CARD EXPIRED

Description

The configuration has been set up correctly.

The card has been validated but is not set up to access the

reader. Check access levels and access groups.

The card number is not validated on the system. This may

be a validation issue with the setup of the validation reader.

An incorrect card format or site code has been selected.

Check the card type.

Check the card status in Personnel.

Table 16: Reader messages

12.2.1 Generate a transaction report

If the validation reader does not have an LCD display and therefore cannot display the reader

messages as described in Table 16 on page 109, generate a Transaction report to test the

configuration.

To generate a transaction report, complete the following steps:

1. From the AC2000 Floatbar, click Administration, and click Extended Reports.

2. Click Reports and select Transaction Report.

3. Click Generate.

Refer to Table 16 on page 109 for an explanation of any reader messages and their meaning.

109


CHAPTER 12

110

A2SE8-QG-0321-1


Quick Start Guide

13.1 Introduction to Backup

Chapter 13 Backing Up AC2000

Use the AC2000 web application Backup to back up data. The backup method you select dictates

whether a full server backup or a data-only backup is completed.

13.1.1 Opening Backup

To open Backup, complete the following steps:

1. Open a web browser. CEM recommends using Internet Explorer 10 (IE10) or above.

2. Enter the CDC IP address, for example, https://192.168.1.10.

3. Select the language from the drop-down list. English is the default language.

4. Enter the username and password.

Note: Your username and password support mixed case and hyphens or dashes. However, hyphens

or dashes can not be placed at the beginning of the username or password.

5. Select the authorisation check box if required.

6. Click Login.

7. In AC2000 WEB, click System, and click Backup.

13.1.2 Types of backup

Full server backup: All data and the server operating system is backed up: Tape and Drive options

only.

Data only backup: All data is backed up but not the operating system: Download File and FTP

options only.

Network backup: All data is backed up and stored onto a network drive specified by the user: The

Network option performs a full server backup.

13.1.3 The importance of backing up

Important: Failure to regularly backup the system can result in the total loss of all data on an AC2000

system, including all card records, reader configurations, transactions, and personnel records. If a

backup has not been configured these cannot be recovered and the system will have to be rebuilt.

There are many factors that can cause a system failure that results in a loss of data including:

• Server component failure

• Unforeseen risks such as fire, flood, theft, malicious damage

• Human error

13.1.4 Configuring backup

To configure the backup, complete the following steps:

1. Using an internet browser, log on to AC2000 WEB, and click Backup.

2. Select the appropriate backup option by clicking the radio button beside it.

3. Click SAVE SETTINGS and click OK.

111


CHAPTER 13

4. Click RUN BACKUP.

Backup Option AC2000 Lite AC2000 SE/AE Software Only Lite

Download File

FTP

Network

Tape/DVD

Drive/USB

Table 17: List of compatible backup options for specific AC2000 systems

Note: The AC2000 system automatically runs a backup process at 00:01 daily. This file is transferred

to the selected backup media.

Download file

The Download File option creates a backup of only the system data. This backup file is NOT

automatically transferred and must be manually downloaded to a secure location daily.

To download a file, complete the following steps:

1. Select the Download File radio button.

2. Click SAVE SETTINGS and click OK.

3. Click RUN BACKUP.

4. Check that the Last Backup was complete successfully.

5. Click Download and click Save.

Figure 58 Last backup date

6. Browse to the location of the network device. Save the backup file in this location.

Note: This workflow is also dependant on your web browser. On some browsers, clicking Save

saves the file to your Downloads folder. If you click Save As, you must select the location for the

file you are saving.

7. Click Save.

FTP

Use the FTP option to create a backup of only system data. The data is saved to a directory on an FTP

server automatically at 00:01 daily.

To create a backup of the system data, complete the following steps:

1. Select the FTP radio button.

2. Complete the IP Address, Username, Password, and Directory fields of the FTP server. This

sets where the backup file is saved.

3. Click SAVE SETTINGS and click OK.

Note: It is recommended that the FTP server is checked to ensure that the file has transferred.

112

A2SE8-QG-0321-1


Quick Start Guide

Network

Use the Network option to perform a full server backup on a network drive specified by the user.

To create a network backup, complete the following steps:

1. Select the Network radio button.

2. In the right pane, configure the parameters. For more information, see Parameters of the network

backup pane on page 113.

3. Click SAVE SETTINGS and click OK.

Parameters of the network backup pane

This table describes the parameters of the network backup pane.

Parameter

Type

IP Address

Share Name

Disk Space Limit

(MB)

Username

Password

Domain

Description

Defines the share protocol. The options are NFS and CIFS.

The IP address of the destination server where the backup is stored.

The name of the share.

The disk space limit for the backup in megabytes.

The authentication username required to access the network share.

This can be left empty if authentication is not required.

The authentication password required to access the network share.

This can be left empty if authentication is not required.

This can be left empty.

Table 18: Parameters of the network backup pane

Tape - SE and AE systems only

The Tape option creates a complete backup of both the data and the server operating system. The

backup will automatically save to the media at 00:01 daily.

To create a complete backup of the data and the server operating system, complete the following

steps:

1. Select the Tape radio button.

2. Click SAVE SETTINGS and click OK.

Note: It is recommended that the Tape is replaced daily and stored in a secure location offsite in line

with organisational IT backup policies.

Drive - USB HD, USB memory stick, Removable HD

Use the Drive option to create a backup of the database and system files. The data is saved to a

directory on an external drive. The backup automatically saves to the media at 00:01 daily.

To create a backup of the database and system files, complete the following steps:

1. Select the Drive radio button.

2. Attach the removable storage device to the server.

3. Click Initialise on the Media or Drive for Backup option.

4. This prepares the drive for the file by installing the media on the CDC and performing any

necessary formatting.

5. Click SAVE SETTINGS and click OK.

113


CHAPTER 13

Important: A failed backup will trigger an alarm in the AED application.

13.1.5 Creating a manual backup

A backup is automatically set up to run each night. However, you can create a manual backup using

Run Backup.

To create a manual backup, complete the following steps:

1. Click Run Backup.

2. There is no change on the page to let you know when the backup is created. Refresh the web page

and check the time of the Last Backup.

3. Click the History button. Check the last record with the expected start and finish times, green

display and that the outcome is successful.

Note: In order for the file download function to operate correctly, you must set your web browser to

allow pop-ups. Therefore, disable pop-up blockers on your web browser.

13.1.6 Backup recommendations

The following recommendations are suggested for Backup:

• It is important to implement a structured backup strategy in your organisation. Failure to properly

backup the system could result in a total and permanent loss of data.

• Backups must be performed daily so that, in the event of a system failure, no more than 24 hours

worth of data will be lost.

• Backups must be stored in a separate secure location away from the AC2000 server to protect

them from the same risks.

• If using the Download backup option, maintain a schedule to track that the downloads are

completed regularly.

• If you require assistance to configure and maintain backups, contact CEM support.

114

A2SE8-QG-0321-1


Quick Start Guide

13.2 Upload Backup

Although backup files can be saved in a number of different locations, they can only be restored from a

local machine. Therefore, they need to be uploaded to your CDC first.

13.2.1 Opening Upload Backup

To open Upload Backup, complete the following steps:

• In AC2000 WEB, click System, and click Upload Backup.

Figure 59 The upload backup page

Note: Ensure the appropriate backup option has been selected in Backup before uploading a backup

file.

To use the Upload Backup application, complete the following steps:

1. Using the Choose File button, navigate to the backup file you want to restore.

2. Click Open, and click Upload.

3. When the backup file has been uploaded to the CDC, it can then be restored. See the following

section, Restore Backup.

13.3 Restore Backup

Use the Restore Backup application to check the backup file. If the backup file is OK, perform a

system restore.

13.3.1 Opening Restore Backup

To open Restore Backup, complete the following steps:

• In AC2000 WEB, click System, and click Restore Backup.

Figure 60 Checking the Backup File

Note: When completing a restore on a new system the Operating System must be installed first.

1. To check the backup file, click Check.

115


CHAPTER 13

Figure 61 Restoring a backed up server

2. If the backup file is OK, read the warning and click Restore.

Important: Any information added to the server since the backup was saved will be lost after the

restore.

116

A2SE8-QG-0321-1

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!