Access_Control_QuickGuide
Access Control QuickGuide for AC2000
Access Control QuickGuide for AC2000
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
AC2000 QUICK START
GUIDE
AC2000 8.0
A2SE8-QG-0321-1
Notice
The information in this manual was correct at the time of publication. Tyco Security Products reserves the right to
modify this product. All specifications are subject to change without notice.
© Copyright 2017
Under copyright laws, the contents of this manual may not be copied, photocopied, reproduced, translated or reduced
to any electronic medium or machine-readable form, in whole or in part, without prior written consent of Tyco Security
Products. All Rights Reserved.
Trademarks
The trademarks, logos, and service marks displayed on this document are registered in the United States (or other
countries). Any misuse of the trademarks is strictly prohibited and Tyco Security Products will aggressively enforce its
intellectual property rights to the fullest extent of the law, including pursuit of criminal prosecution wherever necessary.
All trademarks not owned by Tyco Security Products are the property of their respective owners, and are used with
permission or allowed under applicable laws.
Product offerings and specifications are subject to change without notice. Actual products may vary from photos. Not
all products include all features. Availability varies by region. Contact your sales representative for more information.
Licence information
Your use of this product is governed by certain terms and conditions.
Support
If you require technical assistance using CEM products, please contact the CEM Support team using the following
telephone number:
Telephone:+44(0)2890 456656
Email: cem.support@tycoint.com
• Please provide our support engineers with as much information as possible. This may include:
• Site name
• Product name and model
• CEM software version
• Description of the problem
Publication Date
April 2017
Quick Start Guide
Contents
Using the guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
The AC2000 system . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Key AC2000 terminology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Guide structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Initial Setup Process Flow. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Floatbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Introduction to Floatbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Accessing Floatbar . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Logging in . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
The Floatbar applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
My External Apps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Introduction to Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Controllers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Adding an RTC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Adding a lift controller . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Configuring devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Device inputs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34
Mapping alarms to device inputs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
Validation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Introduction to Validation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
Access Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Introduction to Access Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Access groups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Access levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39
Adding an access group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Adding an access level . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
Timezones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
3
Introduction to Timezones. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Timezones. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Pass Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Introduction to Pass Design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Using a default pass design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Creating a pass design . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Card Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Introduction to Card Setup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
Adding a card type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Adding a card format. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Company . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Introduction to Company. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Opening the Company application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51
Searching for a company record. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
Adding a company record . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54
Assigning a default company . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Authorisers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Spare Fields tab . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57
Adding an image to a company record . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Adding a document to a company record . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Company notes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Generating Company Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60
Printing a report. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Printing a screenshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Configuring the tabs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Terminating a company. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Deleting a company . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Personnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Introduction to Personnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Key features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Setting system permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Opening Personnel . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Searching for a cardholder record. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68
Adding a cardholder record. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70
Capturing a portrait . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Editing a cardholder record. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
A2SE8-QG-0321-1
Quick Start Guide
Printing the card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Validating a card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78
Checking access level readers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Performing an access level query . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80
Viewing the transaction history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Deleting a cardholder record. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Batch Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Batch Update Temporary Extra Access (TEA) Expiry Date . . . . . . . . . . . . . . . . . . . 82
Batch Field Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Batch Add Extra Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Batch Remove Extra Access. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Assigning extra access to one cardholder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Batch Printing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Resetting Anti-Passback. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Exporting card details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Imported Records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Returning a card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Card parking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Permits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
Configuring spare fields . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Configuring limited usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
Breach of Conditions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Referring a cardholder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
Tracing a cardholder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
User Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Introduction to User Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Opening User Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
User accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Adding a user account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Editing a user account. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Deleting a user account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Configuring user account settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
System Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Copying an existing user. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Adding a user template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Printing a user report. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Exporting a user report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
5
Introduction to testing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Test Card . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Backing Up AC2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Introduction to Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Upload Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
Restore Backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115
A2SE8-QG-0321-1
Quick Start Guide
1.1 Introduction
Chapter 1 Using the guide
This book can be used as an introductory step-by-step guide to setting up a basic AC2000
system, with the aim of validating a card and using it to achieve a valid swipe at an attached
reader for the first time. The guide covers only the most basic functions of each of the
applications used in this process. For information on additional application functionality, see
the AC2000 Setup Guide.
1.2 Prerequisites
Following a successful installation, AC2000 is ready for configuration. The following hardware
is required:
• Devices, including a connection to the validation reader if you want to set up a VIPPS
(Visual Imaging and Pass Production System) workstation
• Readable card
The following hardware can be included as part of the system setup, but its use is not covered
by this book:
• Printer: To print a card design on to a card
• Camera: To record a personnel portrait on the system
Other information necessary is:
• Connection details for the validation reader
• Device address information
– It is important to carefully plan the setup for the devices, including physical location,
description, and IP address if ethernet readers are being used
• A company logo image file in JPEG, BMP, TGA, or TIFF format
– This logo file is included on the company record
7
CHAPTER 1
1.3 The AC2000 system
The AC2000 system can consist of multiple servers and devices that communicate with each
other using ethernet or serial communications.
s9032/64 Serial
Lift Controller
Figure 1 Illustration of an AC2000 network
8
A2SE8-QG-0321-1
Quick Start Guide
1.4 Key AC2000 terminology
This guide uses CEM specific terminology throughout, this list contains a brief description of
the most commonly used terms.
CDC
RTC
The Central Database Computer is the database that stores
all AC2000 data. It is central to the system. All device,
controller, user, cardholder, and alarm information is stored
on the server.
The Real Time Computer communicates with the ethernet
devices on the system. Configuration updates are made on
the CDC and passed through the RTC to relevant devices on
the AC2000 network. Alarms and real time events at the
devices are passed through the RTC to the CDC.
Lift Controller The s9032/64 lift controller can control 2 lift readers and 2
LCIs.
ECM
CDC / RTC
Workstations
AED Workstation
VIPPS Workstation
Validation Reader
1.5 Guide structure
The Ethernet Control Module provides a means of including
serial devices on an ethernet network. The ECM
communicates with the CDC/RTC or Lite Controller through
ethernet and can control up to 16 serial devices.
The majority of systems use a single server to host both the
CDC and RTC software. The CDC and RTC still operate as
separate entities, but with the benefits of only having one
server to purchase and maintain.
A workstation is a desktop PC that runs the AC2000 software
to set up, configure and administrate the system. These
workstations can be as generic or specialised as required,
with functionality limited per user. This means that a single
workstation may be an AED Workstation, a VIPPS
Workstation or any other possible connotation as controlled
by the applications that any given user can access.
The Alarm & Event Display Workstation is a reference to a
workstation that is specifically used for monitoring and
responding to alarms and events on the system.
The Visual Imaging and Pass Production System Workstation
is a reference to a workstation that is specifically used for
capturing images, creating cardholder records and printing
cards on the system.
A Validation Reader is a specialist reader that is used with a
VIPPS Workstation to validate a card. Validation is the name
given to the process of assigning a card to a specific
cardholder record.
The guide is structured to lead users through the steps required to set up a basic AC2000
system in the most efficient order.
Important: When using the Getting Started wizard, ensure that each step is completed before
moving on to the next. Initial setup involves many interconnected applications, many of which
are dependent on prerequisite steps being completed before they can be used.
9
CHAPTER 1
1.5.1 The Getting Started Wizard
Use Getting Started Wizard to set up AC2000.
To open Getting Started Wizard, complete the following steps:
1. Log in to the AC2000 application as user cem.
Note: If you do not know the password, contact CEM Support.
2. From the AC2000 Floatbar, click Administration, and click Getting Started.
Use the wizard to perform the following tasks:
• Configure the validation reader attached to the system.
• Perform the initial setup applications in the correct order.
Figure 2 The Getting Started Wizard interface
Important: The wizard is not used to configure the applications, but can be used to launch
them. For the purposes of this manual, the wizard is only used to configure the validation
reader.
1.5.2 Navigating through the wizard
Each step in the wizard must be navigated in order. The left pane highlights the name of
application that is currently open and the right pane contains information about the application.
Each application also has a button to launch the application and a button to open the help file.
To use the wizard, complete the following steps:
1. When the current step is complete, click Next to move on to the next step.
Figure 3 Example screen capture of an application screen in the wizard
2. To open the application, click the button with the application name. In the example show, in
Figure 3, Devices is the application.
10
A2SE8-QG-0321-1
Quick Start Guide
Note: The wizard launches the application with full functionality.
3. To open the help file for the selected application, click Help.
4. When all steps are complete, click Finish to close the Getting Started Wizard.
Important: This guide has been written to be used independently from the wizard. However, it
is recommended that the wizard be used for the validation step as this simplifies the process.
11
CHAPTER 1
1.6 Initial Setup Process Flow
The following flowchart describes the flow of the steps required to perform the basic
configuration of an AC2000 system.
Figure 4 The Getting Started process flow
12
A2SE8-QG-0321-1
Quick Start Guide
2.1 Introduction to Floatbar
Chapter 2 Floatbar
The AC2000 Floatbar provides access to applications that are assigned to your account.
Note: If you are using a partitioned system, see the Partitioning manual.
2.2 Accessing Floatbar
You can open AC2000 Floatbar in the following ways:
• Double-click the desktop icon.
• Click Start, All Programs, select CEM Systems, AC2000, and click AC2000 Floatbar.
• Add the application to the Startup in Windows.
2.3 Logging in
Log on to the AC2000 Floatbar after installation using the default admin login. If you do not
have the default login, contact CEM Support for the username and password.
Figure 5 AC2000 Login Screen
2.3.1 User login options
There are three login procedures that can be initialised on the AC2000 system.
If a user enters an invalid user name or invalid password, they are notified that an error has
occurred on entry, but the incorrect field will not be identified.
In addition to logging valid attempts, AC2000 records all unsuccessful attempts to log on to
AC2000.
Important: It is recommended that a site-specific administrative user is created as soon as
possible after installation. To avoid security issues, access to the CEM username and
password should be restricted and the password changed from the default.
13
CHAPTER 2
Standard login
This is the default setting that requires only a valid username and password. Upon successful
entry, the Floatbar displays.
Agreement login
This login method requires that the users read and confirm that they agree to the terms and
conditions displayed by selecting the agreement check box before logging in.
To configure the AC2000 login to operate in this way, consult the Workstation Config Tool
Manual, and turn on Floatbar Warning Message.
Single sign on
Where LDAP single sign on has been configured on the AC2000 server, two login icons
appear on the desktop. The main AC2000 Floatbar icon will log the user in automatically using
Windows login credentials. A second icon with an attached shield logs in using the standard
procedure as described above.
Desktop icon using
Single Sign On
Figure 6 AC2000 desktop icons
Desktop icon where user is
required to enter user name
and password
2.3.2 Limiting log on attempts
If you have activated log on attempt tracking using the Workstation Config Tool, you have the
option to view the workstation history report in the User Options application.
If you exceed the limit on log on attempts, your account is locked out and an alarm is
generated on the Alarm + Event Display application. If you enter your password and click OK
for the final time allowed by the limit on log on attempts, a warning message is displayed. Click
Yes to continue or No to cancel. If you continue with the incorrect password, you will be locked
out of the system.
Activating login attempts
To activate login attempts, complete the following steps:
1. From the workstation, click Start, click All Programs, click CEM Systems, click AC2000,
and click Workstation Configuration Tool.
2. Select Floatbar from the menu bar.
3. Check Login attempts and set the number of login attempts that will be allowed before
locking the account out.
Figure 7 Activating login attempts
14
A2SE8-QG-0321-1
Quick Start Guide
Enabling the account locked alarm
To view a locked account alarm in Alarm + Event Display or Security Hub, you must activate
the alarm in the Configured application.
To enable the account locked alarm, complete the following steps:
1. From the AC2000 Floatbar, click Advanced Configuration, and click Configured.
2. Select the enable_lockout_alarm setting.
3. In the Value field, type Y to enable the alarm.
4. Click Save.
Figure 8 Enabling the account lockout alarm
Any time an account is locked out, an alarm in Alarm + Event Display or Security Hub. This
must be acknowledged and cancelled manually.
Unlocking a locked account
To unlock a locked account, complete the following steps:
1. From the Floatbar, click Administration, then User Options.
2. From the Users menu, select the account to be unlocked.
3. Clear the Locked check box beside the Account Status label.
4. Click Save.
Figure 9 Unlocking a locked account
15
CHAPTER 2
2.4 The Floatbar applications
If a valid user name and password combination is entered, the AC2000 Floatbar appears. This
is a rectangular window showing the various AC2000 applications assigned to the user.
For security, when the Floatbar or any other AC2000 application is running, they time-out and
close down if they are unused for a default period of 10 minutes. Users are required to log in to
the Floatbar and select the required applications again. To change the default time-out period,
consult the Workstation Config Tool manual.
Figure 10 AC2000 Floatbar screen
2.4.1 Recent
The Recent panel displays the five most recently used applications by a user, with the most
recent being displayed on the left of the panel. This is only available when the user has been
assigned more than eight applications.
2.4.2 Floatbar categories
AC2000 Floatbar is divided up into nine main application categories:
• Enrolment
• Alarm + Event Monitoring
• Administration
• Device Configuration
• Advanced Configuration
• CCTV/DVR (If installed)
• Favourites
• Settings
• My External Apps
Each category has been defined by CEM Systems. Favourites and My External Apps can be
tailored by users. Categories and associated applications are discussed in the next section.
Note: Categories and Recent are not displayed when a user is assigned less than eight
applications.
16
A2SE8-QG-0321-1
Quick Start Guide
2.4.3 Floatbar categories (continued)
The applications and the category each is associated with are displayed in the following table.
Enrolment
Company
Alarm + Event
Monitoring
AED Configuration
Data Import Tool
Ack/Can Alarms
Personnel
Alarm Configuration
Vehicles
Alarm Filtering
Visitors
Alarm Panel Control
Alarm+Event Display
Broadcast
Contact ID Config
DSC Virtual Keypad
Guard Tours
Oneshot
Overview Mimic
Rolling Trans Disp
Zone Monitor
Security Hub
Table 1: Application key for Enrolment and Alarm + Event Monitoring categories
17
CHAPTER 2
2.4.4 Categories (continued)
Administration
Device Configuration
Access Permissions
Alarm Panel Config
Anti-Passback Zones
BACnet Configuration
Card Setup
Configure Reader Messages
Extended Reports
Devices
Getting Started
External Systems
Pass Design
Lockdown
Temp Extra Access
Muster Zones
Time + Attendance
Timezones + Holidays
User Fields
User Options
Table 2: Application key for Administration and Device Configuration categories
18
A2SE8-QG-0321-1
Quick Start Guide
2.4.5 Categories (continued)
Advanced Configuration
BOC
CCTV / DVR
DVR Import
Configured
DVR Viewer
Keypad Commands
Video Configuration
Lift Control
Video Popup
Lift Mimic
Notifications
Occupancy Zones
Set Threat Level
Smart Card Utility
Standard Link
Threat Level Def
Translation Tool
Utilities
X-Partition Access
Table 3: Application key for Advanced Configuration and CCTV / DVR categories
19
CHAPTER 2
Note: All of the applications in Table 1:, Table 2:, and Table 3: are available to a system
administrator. However, there are restrictions for partition users. Partition users can only
access the following applications:
Enrolment group
• Company
• Data Import Tool
• Personnel
• Vehicles
• Visitors
Alarm+Event Monitoring group
• Ack/Can Alarms
• Alarm+Events Display
• Oneshot
• RTD
• Security Hub
Administration group
• Access Permissions
• Card Setup
• Extended Reports
• Pass Design
Device Configuration group
• Devices
Advanced Configuration group
• X-Partition Access
2.4.6 Description of applications
The following section identifies each available application providing a brief description of its
purpose.
Note: In a partitioned system, the functionality or availability of these applications is affected.
For more information on the impact of partitioning, see the Partitioning manual.
Access Permissions
The Access Permissions application is used to create and configure access groups and
access levels. Access groups are meaningful groups of devices which are added to staff
access levels.
Ack/Can Alarms
Acknowledge and/or cancel Alarms. The Ack/Can Alarms application is used to acknowledge
and cancel a group of alarms in one operation instead of individually selecting the alarms as
per the Alarm and Event Display application.
20
A2SE8-QG-0321-1
Quick Start Guide
For example, if a door is forced open the alarm must be acknowledged and cancelled before
the alarm is cleared. However, in some cases, (for example, during installation) it can be
necessary to acknowledge and cancel a large number of alarms in bulk. This is handled by the
Ack/Can Alarms application.
AED Config
This application is used to setup the Alarm and Event Display application with maps and
sounds to enhance alarm notification and make it more meaningful.
Alarm and Event Display (AED)
The Alarm and Event Display or AED application is a real-time graphical alarms processing
application. It provides system users with a detailed alarms processing and reporting features
and can accommodate diagrams and maps including sophisticated to-scale AutoCAD®
drawings. It provides feedback to the operator in real-time on the online/offline status of
devices.
Alarm Configuration
The Alarm Configuration application is used to add, delete, and modify custom alarm events
on the system. It is also used to add, edit and delete Alarm and Event Display events and the
duress PIN feature.
Alarm Filtering
The Alarm Filtering application enables different alarm information to go to different monitoring
workstations on a network. For example, there are two AED workstations. One should display
only alarms from building one. The other that should display only alarms from building two.
There are two ways by which alarms can be filtered.
Shunted: Alarms configured to be shunted will be disregarded by AC2000. They will not be
referred to in any log files or reports.
Filtered: Alarms are filtered for individual workstations. The alarms that you configure to be
filtered for a workstation are hidden from that workstation. All alarms configured for a particular
workstation will be logged in log files and reports.
Alarm Panel Config
The Alarm Panel Configuration application is used to add and configure Galaxy and DSC
alarm panels as well as DSC PowerSeries equipment.
Alarm Panel Control
The Alarm Panel Control application is used to monitor the status and send commands to
alarm panels such as Galaxy and DSC, as well as DSC PowerSeries equipment.
Anti-Passback Zones
The Anti-Passback Zones application is used to prevent ID cardholders from misusing their
cards. A cardholder presenting their card at a reader to gain access through an entry or exit
point and then handing their card to another person who uses it to gain unauthorised access
through that same point is a pass back. To stop this from occurring Anti-Passback Zones can
be created to prevent a card from being used twice consecutively.
BACNet
The AC2000 BACnet interface is configured for use through the BACnet application. This
application is used to set up mappings of AC2000 devices and inputs to BACnet objects; and
to define how alarms on these devices affect various properties of these objects. It is also used
21
CHAPTER 2
to define how changes to the properties of objects on external systems are represented as
alarms on the AC2000 system.
Breach of Conditions (BOC)
Users can add breaches of conditions orders against cardholders who abuse or ignore the
terms and conditions of their issued card. Letters can be written from within the Breach of
Conditions application and sent to companies highlighting such breaches.
Broadcast
The Broadcast Zones application is used to control one or more CEM devices (typically doorcontrolling
card readers) remotely from a workstation. This bypasses the normal route of
requiring a valid card presentation in order to activate one of these devices.
A Broadcast Zone can be activated or deactivated manually, using the application directly or
when mapped to a Time zone.
Card Setup
The Card Setup application is used to define different types of cards to be used on the system.
For each card type a number of card formats can be defined. Each cardholder on the system
will be allocated one card format, which contains details of that person's card design, the
default and maximum duration of the pass on the system and the access restrictions that apply
to that card format (that is, the access level and time zones can be used with that format).
Company
The Company application is used to maintain company information on the system. Each
cardholder is assigned to a particular company.
Configured
The Configured application is used to configure specific settings, if required, as instructed by
CEM personnel.
Configure Reader Messages
The Configure Reader Messages application is used to maintain a list of words and responses
that will be displayed on a card reader. The user is able to define words and responses that are
shown on the reader display.
Contact ID Config
The Contact ID application provides a method of converting AC2000 alarm messages into
Contact ID messages. This enables remote alarm panels to transmit information to a Central
Monitoring Station.
Data Import Tool
The Data Import Tool application allows administrators to import cardholder details in a csv or
other type of file format into AC2000.
Devices
The Devices application is used to add and configure devices. Each device must be added to
the AC2000 controller database and correctly configured so that the AC2000 controller is
aware of the device and all its settings.
22
A2SE8-QG-0321-1
Quick Start Guide
DSC Virtual Keypad
The DSC Virtual Keypad application enables a user to select a DSC Panel to connect to
remotely and provides full access to all the functionality of the actual keypad.
DVR Import
The DVR Import application allows the operator to import DVRs and their associated cameras
into AC2000, where they can be viewed via the DVR Viewer application.
DVR Viewer
The DVR Viewer allows the operator to view a live video feed from a chosen camera.
Extended Reports
The Extended Reports program is the main reporting application for the various transactions,
alarms and other recorded activity. It provides a comprehensive suite of native reporting tools.
External Systems
AC2000 is designed to integrate with other systems and applications. The External Systems
application allows the user to specify the format of alarm strings that are to be sent to a system
connected to the AC2000 Controller.
For example, there is a requirement to send door violation alarms, monitored by card readers
or Input/Output Controllers (IOCs), to a CCTV system that is controlling a number of cameras
at alarmed doors.
Getting Started
The Getting Started Wizard is used by engineers to quickly setup a working system.
Guard Tours
The Guard Tours application offers the option to define a list of either card readers or reader
inputs at which guards must visit and swipe their card or activate the input at an assigned
device within a specified time. Each of these pre-set patterns is known as a guard tour.
If the guard does not swipe at a reader or activate a reader input, that is, a push button,
correctly, a message is sent to the Alarm + Event Display workstation.
By using this application, the conduct of the guard patrols can be controlled. Possible
violations are as follows:
• Failure to start tour on time
• Failure to start a tour at all
• Missing out a door reader/input
• Swiping at a control point too late
• Swiping at control points out of sequence.
Keypad Commands
Staff can generate their own keypad commands for a specific device. For example, you could
configure a command so that by pressing 1234 on the device's keypad, a broadcast would be
triggered to open several doors.
23
CHAPTER 2
Lift Control
The Lift Control application is used to configure the use of CEM Lift Controllers on a site. Lift
Control is configured using multiple applications. The Lift Control manual contains all of the
information relevant to adding and configuring lift controllers.
Lift Mimic
The Lift Mimic displays all of the lift floors active in real time. It will give a graphical
representation of all floors that are connected to the lift controller system.
Lockdown
Use Lockdown to create multiple zones. You can then prevent access to all readers within
selected zones.
Muster Zones
The Muster Zones application is designed to create mustering areas for use in emergency
evacuation situations. Muster zones offer safe muster points for all members of staff to
assemble, swiping their cards at dedicated muster card readers in order to register their safe
exit from the building. It also provides the ability to produce muster reports of personnel that
have successfully swiped at their allocated muster points.
Notifications
The Notifications application offers a useful method of advising system users of alarm
situations remotely. In the event of any alarm situation an alert message can be emailed to any
recipient.
Note: You must configure the email server used and sender email address in the Network or
Mail Config page in AC2000 WEB. See the Network or Mail Config chapter in the AC2000
WEB manual for more information.
Occupancy Zones
The Occupancy Zones application allows users to control the maximum and minimum people
allowed into a zone. Devices are configured as In/Out readers so that cardholder movement
can be tracked.
OneShot
The Oneshot application is used to trigger a remote open command to an AC2000 device,
such as a reader at a door.
Overview Mimic
When using a Global CDC, all Mimics, that is, Alarm and Event Displays, on all connected
CDCs can be viewed from the Overview Mimic application.
Pass Design
The Pass Design application is the card, or ID pass, creation software available in AC2000. It
offers the operator tools and options create card designs for use in AC2000.
Personnel
The Personnel application is the ID card issuing application for AC2000. It is the entry point for
the main cardholder database on the system and is where the various components of an ID
card are combined together to produce a professional card for use on the AC2000 system.
24
A2SE8-QG-0321-1
Quick Start Guide
Rolling Transaction Display
The Rolling Transaction Display application is designed to offer security staff a real-time
personnel monitoring tool. You can see cardholder swipes as they go through the door.
The application also allows users to monitor any alarms triggered at configured readers. There
is also the ability to report on all alarms and transactions which have occurred on a device.
Security Hub
Use Security Hub to monitor and process alarms, as well as other events that occur on the
system. You can use it to view devices by location or device topology.
Set Threat Level
When the threat level functionality is being used on the system the Set Threat Level
application is used to set the current system threat level.
Smart Card Utility
The Smart Card Utility allows users to securely define, manage, and encode card readers and
blank DESfire EV1 smartcards with user defined encryption keysets. Keysets are then
downloaded via a secure Ethernet network to all CEM readers. This allows the user to take full
ownership of their smartcard personalisation process within AC2000, independently of third
party card manufacturers.
Standard Link
Standard Link is used to create a multi CDC environment where correctly configured multiple
CDCs can share common personnel data yet issue their own access levels and time zones to
imported cardholders.
Temporary Extra Access
The TEA application is used to setup the swipe invoked Temporary Extra Access feature which
is available in the Personnel application.
Swipe-invoked TEA means that the card of a person must first be presented at a designated
readers before his card can be used within the temporary access level - this reader must be
online. This reader should be a dedicated control post or validation reader, monitored by a
member of security or similar.
Threat Level Def
When threat level functionality is being used on the system the Threat Level Def application is
used to configure threat level settings.
Time and Attendance
Generates a transaction report on the time and attendance of any cardholder.
Timezones + Holidays
The Timezones and Holidays application is used to create time zones that are used to manage
the times that cardholders are permitted to use their cards to gain entry to controlled areas.
Holiday periods can be configured to further control access during allocated holiday times.
Translation Tool
Translation Tool is used to add translated versions of fields used in the AC2000 applications.
25
CHAPTER 2
User Fields
The User Fields application is used to customise the main screen in the Personnel, Company,
Visitor and Vehicles application. This allows administrators to create their own database tabs
and fields that can be used to capture site specific data.
User Options
The User Options application is used to create and manage user accounts on the AC2000
system. Users have restricted access to particular applications or specific functionality within
applications.
Utilities
The Utilities application is used to create or define values which appear in the drop down lists
in the various AC2000 applications.
Vehicles
The Vehicles application is used to store details of vehicles on the system and provides the
ability to associate cardholders who are authorised to drive the vehicle with it. ID Cards can be
produced for each vehicle.
Video Configuration
A one-time setup normally configured by system installer. However multiple video servers can
be configured within the Video Config application to accommodate different camera types.
Used for adding digital video servers and DVR cameras to the access control system.
Video Popup
An application which displays live video on screen, video pops up to the fore of the screen,
when an alarm or incident occurs at a device.
Visitors
The Visitors application is used to permit the addition of temporary cardholders into the
system. These visitors can be allocated time limited permissions on site, traced and have
cards personalised.
X-Partition Access
The X-Partition Access application is used to configure permissions which are only granted in
a partitioned system. This allows users to search using a hotstamp number or a card swipe for
cardholders that do not belong to their partition.
Zone Monitor
The Zone Monitor application is designed to display a real time view of cardholder movements
on site. The application provides information on who is present on site for safety and security
reasons. It also provides a counter displaying how many people are on site at any one time.
2.5 Settings
The Settings option in the Floatbar provides the user with information on the current session
details, and is also used to configure Floatbar settings.
26
A2SE8-QG-0321-1
Quick Start Guide
The Settings option can be accessed in two ways.
Figure 11 The location of the settings option on a minimised Floatbar
Figure 12 The location of the Settings option on a maximised Floatbar
2.5.1 The About tab
The About tab provides the user with the version number of the application, the name of the
application and any copyright information.
Figure 13 The Floatbar About tab
2.5.2 The Set Password tab
The Set Password tab enables the user to change their password. The existing user name and
password must be known to complete this action. The user is asked to type a new password
and then re-type it in Confirm Password.
2.5.3 The Set Favourite tab
The Favourites category on the Floatbar contains a maximum of 10 user selected applications.
When setting favourite applications, the user can also choose applications to Auto Start.
27
CHAPTER 2
When the user has logged successfully into Floatbar any application with Auto Start selected
automatically opens.
Figure 14 The Floatbar Set Favourite tab
Adding an application to the favourites list
To add an application to the favourites list, complete the following steps:
1. Select the application from the Application List. If you want the application to start
automatically, select Auto start.
2. Click Add.
Removing an application from the favourites list
To remove an application from the favourites list, complete the following steps:
1. Select the application to be removed from the list of Current Favourites.
2. Click Remove.
2.5.4 The Configure Floatbar tab
Use the Dock Toolbar to configure where the AC2000 Floatbar displays when it is not in use.
Toolbar docking options
Figure 15 Configure Floatbar tab
When you launch the Floatbar, it automatically docks into the default position at the top of the
screen. To change the docking location, select one of three options from the Dock Toolbar
drop-down menu:
• Top: displays basic Floatbar with minimal information across the top of the desktop
28
A2SE8-QG-0321-1
Quick Start Guide
• Top with options: AC2000 applications or categories are added to the basic Floatbar
• Floating: displays basic Floatbar with minimal information in toolbar that can be moved
anywhere on the desktop.
2.6 My External Apps
My External Apps allows the user to drag and drop shortcut links from third-party systems into
the Floatbar, where they can be launched by clicking on the link. The configuration for this
application is unique to each user and workstation. Up to a maximum of 16 links can be
created in this way and these can be deleted and/or replaced.
Note: It is not possible to drag and drop CEM created applications.
29
CHAPTER 2
30
A2SE8-QG-0321-1
Quick Start Guide
3.1 Introduction to Devices
Chapter 3 Devices
Use the Devices application to set up and configure all access control devices used in the
AC2000 system. You can also use it to set up and configure device inputs for the purpose of
triggering alarms on the real time monitoring applications, such as Alarm + Event Display and
Rolling Transaction Display.
Note: If you are using a partitioned system, see the Partitioning manual.
AC2000
Controller
AC2000 Server (CDC)
Ethernet
Controller
(RTC)
Device
Group
Up to 16 device groups,
either ethernet or serial,
can be assigned to
a single ethernet controller
Up to 16 devices may be
added to each device group
Up to 256 RTCs and s9032
controllers in total can
be attached to a single
AC2000 Server
ECM
Device
Group
ECM brings serial devices
online to the RTC
s9032
Lift Controller
A lift controller can control
two lift readers and two
LCIs
Device
Group
Figure 16 Illustration of the AC2000 devices hierarchy
3.2 Controllers
You can add serial lift controllers and ethernet controllers to the AC2000 system. Controllers
control messages between the Central Database Computer (CDC) and the individual readers.
31
CHAPTER 3
Ethernet controllers (RTCs)
Use ethernet controllers (RTCs) to manage up to 256 ethernet or serial devices grouped
together into 16 groups of 16. The controllers relay device-specific data between the AC2000
database and the devices, including configuration, alarms, and events.
Lift controllers (s9032)
A lift controller is an s9032 controller that is set in lift mode. In this mode, the s9032 can
support up to 2 lift devices. When adding an s9032 as a lift controller in the Devices
application, the location must start with the letters “LCM”. For more information, see the Lift
Controller manual.
Ethernet Control Module (ECM)
The ECM provides a means of including serial devices on an ethernet network. The ECM
communicates with the CDC, RTC or Lite Controller through ethernet and can control up to 16
serial devices. For more information, see the ECM Quick Guide.
3.3 Adding an RTC
Note: The most common setup of AC2000 is as a CDC/RTC. You only need to add an RTC to
AC2000 if a site has a standalone CDC or needs to add an extra RTC.
To add an RTC, complete the following steps:
1. In Devices, from the left pane, click AC2000.
2. Click Add, and click Add Controller.
3. Enter the relevant information for the controller and click Add.
Important: The controller must be initialised using AC2000 WEB. See the AC2000 WEB
manual for details.
3.4 Adding a lift controller
Important: Controllers can only be added to AC2000 Standard and Airport Edition.
For more information on lift controllers, see the Lift Controller manual.
3.5 Configuring devices
All readers connected to AC2000 are added to an ethernet or lift controller. It is essential that
all exit and auxiliary devices are also added.
Ethernet devices have extended properties that need to be completed.
3.5.1 Adding a device
To add a device, complete the following steps:
1. In Devices, select the controller and device group to add the device to from the overview
pane.
2. Click Add and select Add device. Alternatively, right-click the device group and select
Add Device.
3. Configure the parameters of the Settings pane and the Extended pane. For more
information, see Settings on page 33 and Extended properties on page 34.
32
A2SE8-QG-0321-1
Quick Start Guide
Settings
The following settings must be completed for both serial and ethernet devices. To do this,
select a device and edit the Settings pane on the right of the window:
Device Number:
Select a device number for the device. This forms part of the device address. Only numbers
that have not been used are available.
Device Location:
Enter a unique description of the location of this device.
Slave Location:
Where a slave device has been included in the Device Type, Slave Location appears. Enter a
unique description of the Location of the Slave device.
2nd Location:
This option only appears for the EDCM 300/350 MAST/MAST and SDCM 300/350
MAST/MAST device types. Enter a unique description for the second location of the device.
Device Family:
Select the device family from the drop-down list for the access control terminal.
Device Type:
Select the specific type of device from the drop-down box, which has been filtered by the
choice of Device Family in the drop-down above it.
Note: If an exit or auxiliary device is to be added to the master reader, select the correct
Device type. For example, a 600E device with an Exit Reader would have a Device type of
600E+Slave. This configures the Master device with an attached slave device.
Any Exit reader added to a Master appears as a child node in the Overview Pane of the Master
reader to which it is associated.
Configuration Mode: Select the Configuration Mode from the drop-down list.
Note: Configuration Mode contains default settings, however these can be user defined.
Priority of Alarms:
In a range of 0 to 8999, the alarms of a device can be given a greater priority than the
defaulted 0. This escalates the alarms from the device in AED or Security Hub.
Maintenance Mode:
Select the box if alarms generated from this device are to be ignored until maintenance or
installation is completed. If selected, all alarms generated are ignored in AED and Security
Hub. unless selected in those applications.
Restricted Reader:
This field is used to indicate that the reader is restricted. This is not available in AC2000 Lite
Edition.
Soft Anti-Passback:
Enabling this field sets the reader into soft anti-passback mode. This means that the same
card can be used twice in a row to gain access but an alarm is sent to the Alarm + Event
Display application.
Look at Camera (emerald terminals only)
Enabling this field means that a cardholder must look at a camera after a valid card swipe. A
guard monitoring the camera sends a One Shot command to the terminal to open the door.
33
CHAPTER 3
Time and Attendance:
This field is used to indicate that it is being used for Time and Attendance monitoring. This is
not available in Lite or Standard Edition.
Extended properties
This section is only for ethernet devices.
MAC Address:
Enter the unique MAC address of the device.
IP Address:
Enter the unique IP address of the device.
Offline Database:
Select the appropriate offline database for the device. Card Number offers an offline database
of card numbers only. Card Number, Timezone, Status, PIN provides the named detail in the
offline database. This is the default selection.
Threat Level Properties
If threat levels has been enabled on the system the option to assign a reader to a threat level
group will become available. The group to which the reader is to be assigned should be
selected from the menu.
Note: Threat level groups are created and configured in the Threat Level Def application.
3.6 Device inputs
AC2000 handles two different types of alarms on the system:
– Internal input alarms that are generated by the system when specific criteria have been
met.
– External input alarms that are generated by input state changes on the readers.
Internal input alarms
Internal input alarms are alarms that are generated by the system. Each of the alarms have
been pre-configured by CEM Systems to be activated on particular events, for example, a
Door Held alarm. This alarm is generated by the system when a door which has been opened
fails to close in the pre-defined Close Time period.
External input alarms
External input alarms are associated to input sensors outside of the system, such as Door
Position Sensors, Break Glass, and Request to Exits. Each external alarm that is to be
monitored must be configured in Devices Inputs and associated to the correct change of state,
either Open or Closed, and Tamper if 4-state is being used.
34
A2SE8-QG-0321-1
Quick Start Guide
The following is an example of how a typical door is configured. Each of the numbered items
represents different external and input devices which, when wired to the input of a reader,
represent external input alarms. Exceptions 1 and 2 are the DIU and reader.
Reserved inputs
Figure 17 Illustration of door input positioning
External Inputs can be further classified under CEM Reserved Inputs or Normal (General
Purpose). The following 4 Inputs are CEM Reserved, however each can be reconfigured to be
a General Purpose input:
Input Number Input Name Input State Alarm Type
0 Door position sensor Open
Closed
1 Lock sensor (disabled
by default)
Open
Closed
2 REX Open
Closed
3 Interlock / General
purpose
Open
Closed
Table 4: CEM reserved inputs
Door forced
Door closed
Lock not engaged
Lock engaged
No alarms are required to be configured for Input 2 and 3. However it is possible to assign
alarms to them.
Note: Input 3 is set to interlock when normal is unchecked.
3.7 Mapping alarms to device inputs
This section details how to map alarms to inputs. To create an alarm, consult the Alarm
Configuration chapter in the Operator Guide.
To map alarms to inputs, complete the following steps:
1. In Devices, select the device to which an alarm for an input is to be applied from the
devices tree on the left.
35
CHAPTER 3
2. Select the Inputs tab.
Figure 18 Input configuration pane
3. Select an input. The details of that input expands.
4. In the Location field, type a location.
5. Click the Enable button on each state that you want to enable for that input.
6. Select the relevant Alarm for each state using the drop-down lists.
7. Click Save to apply the configured Device Inputs.
36
A2SE8-QG-0321-1
Quick Start Guide
4.1 Introduction to Validation
Chapter 4 Validation
Before a card can be used to access readers, it must be validated against a cardholder. Cards
can be validated manually using a validation reader that is attached to the workstation. The
card validation readers must be set up first using the Getting Started Wizard.
To get to this part of the wizard, complete the following steps:
1. From the Getting Started Wizard, navigate to Validation.
2. Click Configure.
3. Select the type of validation reader.
Figure 19 Validation pane
– If the reader is a serial device, complete the following steps:
a. Select the AC2000 Serial radio button.
b. Enter the port number being used by the validation reader. It can not be longer
than two characters. For more information, see the validation reader quick guide.
c. Click Update.
d. Click Close.
– If the reader is an biometric device, complete the following steps:
a. Select the AC2000 Fingerprint radio button.
b. Enter the IP Address of the validation reader.
c. Click Update.
d. Click Close.
– If the reader is an online reader, do the following:
a. Select AC2000 Online Reader.
b. Enter the 5-digit AC2000 device address of the reader.
37
CHAPTER 4
c. Click Update.
d. Click Close.
– If the reader is another type of validation device, do the following:
a. Select the Other radio button.
b. Refer to the manufacturer’s guide for configuring the validation reader.
c. Click Close.
4. If you are using the wizard to open the applications, click Next to move to the next step. If
you are finished with the wizard, click the Next button until the Finish pane is displayed.
Click Finish.
38
A2SE8-QG-0321-1
Quick Start Guide
5.1 Introduction to Access Permissions
Chapter 5 Access Permissions
Use the Access Permissions application to organise access control devices into meaningful
access groups that can be assigned to cardholders using access levels. You can also use the
application to manage floor allocation for CEM Systems Lift Controllers.
Note: If you are using a partitioned system, see the Partitioning manual.
5.2 Access groups
Access groups are collections of readers arranged into logical categories. It is recommended
that these groups are organised and described as geographical locations. For example, a
group of readers controlling access to a reception area might be named Reception. In Figure
20, two access groups have been created containing devices related in their geographic
location and access function.
Figure 20 Illustrative example of Access Group creation
5.3 Access levels
Access levels are the primary means of controlling cardholder access on a site. It is
recommended that access levels are representative of human resource or personnel hierarchy
on a site. For example, access levels might be created for management, IT staff, general staff,
contractors, and more. In the example shown in Figure 21, the access level General Staff has
been allocated both the Reception and Canteen access groups, whereas Contractors has only
been allocated the Reception access group.
Figure 21 Illustrative example of Access Level creation
39
CHAPTER 5
5.4 Adding an access group
To add an access group, complete the following steps:
1. Click the Access Groups tab.
2. Click Add.
3. Enter a descriptive name for the access group. It is recommended that this description is
representative of a geographic location, for example, Server room, Lobby, and so on.
4. Select the readers to add.
5. If lift floors are to be added to the device group, complete the following steps:
1. Click the Floors tab.
2. Select the floors to add.
6. Click Save.
5.5 Adding an access level
To add an access level, complete the following steps:
1. Click the Access Levels tab.
2. Click Add.
3. Enter a descriptive name for the access level. It is recommended that this description is
representative of an HR or personnel function.
4. Click the access groups to be added to the level by selecting the corresponding check
boxes of the device groups. If the required access group does not exist, you can create it
by clicking the New Access Group option on the access level dialog box.
5. Click Save.
The access levels are listed in the left information pane. A white arrow denotes list entries that
are expandable. Click the arrow to expand the list. A dark grey arrow denotes an expanded list.
Figure 22 Diagram showing Access Levels with assigned and unassigned access groups
40
A2SE8-QG-0321-1
Quick Start Guide
6.1 Introduction to Timezones
Chapter 6 Timezones
The Timezones + Holidays application is used to create timezones and holiday periods to
control cardholder access to controlled areas within specific dates and times.
Note: If you are using a partitioned system, see the Partitioning manual.
6.2 Timezones
It is probable that multiple timezones are required to control access on a site. Timezones grant
access to assigned cardholders within the days and times laid out in the timezone. For
example, the following site requires three timezones.
• Timezone 1: Day Staff and grant access from Monday to Friday between the times of
8am and 6pm.
Figure 23 Example Mon - Fri, 8am - 6pm timezone
• Timezone 2: Evening Staff and grant access from Monday to Friday between the times of
5pm and 11pm.
Figure 24 Example Mon - Fri, 5pm - 11pm timezone
41
CHAPTER 6
• Timezone 3: ALL THE TIME and grants access every day all day. This timezone is set up
by default on a newly installed system.
Figure 25 Example All The Time timezone
6.2.1 Creating a timezone
To create a timezone, complete the following steps:
1. From the toolbar, click Add.
2. Type the name of the new timezone in the Timezone name field at the bottom of the pane.
3. Click in the day sector to be configured for the timezone in the approximate region of the
required start time.
Figure 26 Screen capture of a newly inserted timezone section
4. Using the handles on the left and right of the inserted segment, drag the segment to the
desired start and end times.
5. Configure the times as required by using the up and down arrows next to the Start Time
and End Time fields at the bottom right of the screen.
Figure 27 Screen capture of the Start Time and End Time fields
Note: The Start Time seconds always displays 00 and the End Time seconds always displays
59.
6. Repeat the steps for each individual day and time sector required. If the same time sector
is to be used on multiple days, it can simply be copied from one day to the other.
i. Select the time sector to be copied.
ii.
iii.
Drag the time sector to the day where it is required.
Repeat for each similar day.
42
A2SE8-QG-0321-1
Quick Start Guide
7. Multiple time sectors can be accommodated in any day. To do this, complete steps 4 - 7
but using a different insertion point within the day.
Figure 28 Example of a multiple time sectors in one day
Note: A maximum of 10 unique time sectors can be created in the application. If time sectors
are repeated, it is important to use the copy technique rather than create a new sector
manually because an error of even one minute creates a unique time sector that contributes to
the application total.
8. When the timezone sectors have been completed, click Save.
43
CHAPTER 7
7.1 Introduction to Pass Design
Chapter 7 Pass Design
Use the Pass Design application to create unique card designs that can be printed on to
access control cards. You can create multiple designs assigned to them different card formats,
which in turn can be assigned to different cardholders.
Note: If you are using a partitioned system, consult the Partitioning manual.
7.2 Using a default pass design
AC2000 provides default pass designs. Use a default pass design for a quick setup or if you
are not going to print the passes.
To use a default pass design, complete the following steps:
1. In Pass Design, click File, and select Load Badge.
2. Select a pass file. The following pass files are available:
– visitors
– portrait
– landscape
– permits
– vehicles
3. Click Open.
7.3 Creating a pass design
The following section explains how to create a new card design with the most commonly used
features of the application.
To create a new pass design, complete the following steps:
1. Click File, and click New.
2. Enter a file name for the design, a maximum length of 20 characters.
3. Click Create. The Badge Layout dialog box opens.
7.3.1 Configuring the badge layout
To configure the badge layout, complete the following steps:
1. Configure the Badge size parameters.
Figure 29 Badge size parameters
44
A2SE8-QG-0321-1
Quick Start Guide
2. Select whether you want to use a simple mono-colour background or a background image
by leaving the Use shared image file check box blank or populated respectively.
Note: Where a manufacturer has printed the background image or colour unto the card, it is
possible to prevent these from being printed, by clearing the Print background check box.
3. Select whether to include a plain border around the outside of the pass design.
4. The SQL button is used to bring data into the pass design from tables other than the
default Personnel table.
Important: It is recommended that you contact CEM support team if this functionality is
required.
5. Select the Magnetic encoding options. These options are used to encode up to three
segments of data on the magnetic strip of a compatible card. This information takes the
format of dynamic fields from the Personnel application, for example, card format or
expiry date.
6. When all Badge Layout properties have been configured, click OK.
7.3.2 Adding text fields to a design
Text controls can be either static or dynamic. If the control you place is dynamic, there are
some additional options available.
Adding a static text field to a design
Static fields are always printed, regardless of the cardholder. For example, a static control can
be placed adjacent to a dynamic control to indicate what the dynamic control is displaying. For
example, a static control can display the “Date of Birth” of a cardholder beside a dynamic
control that displays a date value for that same cardholder.
To add text fields to a design, complete the following steps:
1. Click and drag the text object to the design canvas from the toolbar. The Text Properties
dialog box is displayed.
Note: Text object properties are displayed when the object is first added to the canvas. It can
also be displayed by double-clicking on an object already placed, or by selecting the object
and clicking Edit and Control Properties.
2. With the Static text radio button checked, type the information you want displayed into the
Static text field.
3. Set the text background properties.
4. Set the text foreground properties.
5. A more precise positioning of text can be accomplished by using the Position tab.
Resizing placed objects
When an object such as a text field has been placed, it can be resized using the yellow
handles attached to the object. To resize or move an object, complete the following steps:
Figure 30 Object resizing handles
1. Click and hold its perimeter points, a 2 headed arrow appears; move the mouse in the
desired direction and, when you are satisfied with the size of the object, release the mouse
button. This resizes the object.
45
CHAPTER 7
2. Click and hold anywhere within the perimeter of the object, and drag it to required location.
Alternatively, position the object using the Position tab parameters. This moves the object.
Adding a dynamic text field to a design
Dynamic text is used to add database fields to a pass design. This can be done by adding a
single field or using the expression builder.
To add a dynamic text field to a design, complete the following steps:
1. Dynamic text is created as a single field.
i. Select Dynamic text. This changes the property window.
ii.
iii.
Figure 31 Dynamic text selection check box screen
Select the field from the database to be inserted from the drop-down list. The list of
available fields is dependent on the SQL that is generated for the card design.
Enter Sample text. This can be used to preview what text can look like during a print.
46
A2SE8-QG-0321-1
Quick Start Guide
8.1 Introduction to Card Setup
Chapter 8 Card Setup
Use the Card Setup application to view, edit, and add card types and card formats.
Note: If you are using a partitioned system, see the Partitioning manual.
8.1.1 Card definitions
Card definitions define how the card must be read when presented to a reader. Card
definitions are added to the system using the Card Setup application.
8.1.2 Card types
A card type is used to assign the global properties of a card, such as its hotstamp number,
reading configuration, and validation type. A system can have multiple card types, these are
named according to site specific criteria.
For example, a site might two card types. The first card type is a readable permanent card type
for staff to gain access to controlled areas. The second card type is a non-readable vehicles
card type. It is not used to grant access at readers directly. It is printed and displayed on a
vehicle in order to provide security personnel at barrier controls with visual confirmation that
the vehicle is registered on the system and has access rights.
8.1.3 Card formats
Each card type created on an AC2000 system can have multiple card formats attached. Card
formats are assigned to cardholders and control factors such as which access levels the
cardholder can be assigned and the length of time for which the card is valid.
Card Definitions on CDC
CEM 37
Mifare 32
Card Types
Proximity Cards
Readable
iClass Cards
Readable
ID Card
Non-readable
Staff
Prox
Security
Prox
Staff
Mag
Vehicle
Permit
P
C
Contractors
Prox
Card Formats
C
Contractors
Mag
Figure 32 Illustration of the Card Setup hierarchy
47
CHAPTER 8
8.2 Adding a card type
To add a card type, complete the following steps:
1. From the Card Setup toolbar, click Add Card Type.
2. In the Description field, type a description for the new card type.
3. Select the Readable check box if the card is readable.
Note: Readable cards can be read by access control devices. If you want the card type to
control access using readers, it must be readable.
4. From the Validation Options drop-down menu, select the validation option for the card.
For more information, see Validation options on page 49.
Note: If the card type is not readable, validation options are not available.
5. If you want the card type to be exportable from one AC2000 system to another, select the
Exportable check box.
6. If you want the hotstamp to auto-generate, select the Auto-Generate Hotstamp check
box.
Note: It is important to establish whether hotstamp numbers are printed on the cards being
used. If the hotstamp number is printed on the card, that number must be used and the autogenerate
field left blank. If the card is blank, auto-generate should be used and the Pass
Design configured to print the generated number on to the card.
7. In the Minimum hotstamp field, type the first hotstamp number in the range for the card
type.
Note: Card types that auto-generate hotstamp numbers must have a unique hotstamp number
range. Card types that do not auto-generate hotstamp numbers can have overlapping
hotstamp ranges.
8. In the Maximum hotstamp field, type the last hotstamp number in the range for the card
type.
9. Select Save.
Note: When a card format, belonging to the selected card type, is assigned to a cardholder,
the following fields can no longer be edited:
• Exportable
• Auto-Generate Hotstamp
• Readable
• Validation Options
48
A2SE8-QG-0321-1
Quick Start Guide
8.2.1 Validation options
Validation is the process of associating a card with a cardholder record. This is typically
accomplished by swiping a card on a validation reader next to the card issuing workstation.
This table describes card validation options.
Validation option
CUSTOM DESFIRE
GEN CNUM & BIO
GENERATE CARD
NUM
HK JOCKEY CLUB
ONLINE READER
READ AES UID
READ CARD NUM
READ CNUM & BIO
SALTO SHIP
Description
This is a customer-specific validation option. The Desfire option is
not used for validation of Desfire cards. It is used specifically for
personalising Desfire information. If this option is required, please
contact CEM support.
If the cards do not have internal card numbers, this option generates
a number at the validation stage. The fingerprint of the cardholder is
captured as part of the validation process.
If the cards do not have internal card numbers, this option generates
a number at the validation stage. This is most often used when
printing barcode cards.
This is a customer-specific validation option.
Enables a card to be validated by swiping it on any online reader
connected to the AC2000 network. The online reader must possess
the same read head technology as the card being validated.
Enables an AES card to be validated by an Omnikey reader.
Validates the card by reading the internal card number.
Validates the card by reading the internal card number. The
fingerprint information of the cardholder is captured as part of the
process.
Enables a card to be validated by swiping it on any online Salto SHIP
validation reader connected to the AC2000 network.
Table 5: Validation options
8.3 Adding a card format
To add a card format, complete the following steps:
1. In Card Setup, from the list of card types in the left pane, select the existing Card Type to
which you want to associate the card format. When you add the card format, the card type
selected in the left pane expands to display all card formats associated with it.
2. From the Card Setup toolbar, click Add Card Format.
3. In the Description field, type a description for the card format.
4. From the Application drop-down list, select the application in which the format is to be
used. The options are as follows: Personnel, Permits, Vehicles, or Visitors.
5. Select the pass design that will be printed on the card. You can add designs in the Pass
Design application or select a default pass design.
6. If the card format is the default format for the selected application, select the Default
format for application check box.
7. Select whether or not the cards are reusable. A reusable card may be returned to the
system using the Personnel, Visitors, or Vehicles applications when the card is no longer
required by the cardholder. This means the card can then be associated with another
cardholder record. This is not an option normally used on a system that is printing
cardholder information on cards.
8. Select the default number of valid days.
49
CHAPTER 8
Note: This is the number of days for which the card is valid. When a card exceeds this number
of days from validation, it must be revalidated. This can be extended up to the maximum
number of valid days. For example, when you select the card format in Personnel, the
application sets the expiry date to the start date plus the default number of valid days. The
expiry date can be changed to any date up to the start date plus the maximum number of valid
days.
9. Select the maximum number of valid days that can be attributed to a card using this card
format in Personnel.
10. Set the number of about to expire days before expiry. This field denotes how many days
before expiry the cardholder will see an “About to Expire” message on readers.
11. Set the number of days after expiry when purged. This is the number of days after the card
expires when the card will be purged from the database. When a card is purged the
cardholder record is not removed from the system, but the details of the card are removed.
12. From the Access levels not used by format pane, select which access levels can be
used with the card format by selecting the relevant check boxes.
Note: If the card type is readable, you must select at least one access level to proceed. If
the card is non-readable, this pane is not available.
13. Optional: Select which access level should be used as Default Access Level for the card
format.
14. Optional: Select the time zone should be used as Default Timezone for the card format.
15. Click Save. The new card format is displayed in the list panel.
Note: All card formats have the Parked access level assigned to them automatically on
creation.
50
A2SE8-QG-0321-1
9.1 Introduction to Company
Chapter 9 Company
Use the Company application to create and manage company records and authorisers.
Note: If you are using a partitioned system, see the Partitioning manual.
9.2 Opening the Company application
To open the application, complete the following step:
• From AC2000 Floatbar, click Enrolment, and click Company.
51
CHAPTER 9
9.2.1 Company interface
Table 6 describes the Company interface.
A
B
C
D
Figure 33 Company interface
Identifier
A
B
C
D
Description
Navigation control
Company logo
Company information
Additional company information
Table 6: Screen layout
9.3 Searching for a company record
There are two ways to search for a company:
• Advanced search
• Quick search
9.3.1 Advanced search
Enter valid search criteria in to any of the available fields. If no search criteria is used in the
search, all company records are returned in the results. Depending on the number of
companies, this can take longer than specifying search criteria.
To perform an advanced search, complete the following steps:
1. Click Search.
2. Enter one or more search criterion in the fields of the Company interface.
52
A2SE8-QG-0321-1
Quick Start Guide
3. Click Apply. If you did not enter search criteria, click Yes to acknowledge the warning
message. The first result of the result set is displayed. Use the navigation control to view
all of the search results. For more information, see Navigation control on page 53.
9.3.2 Quick search
You can perform two types of quick search:
• Search on Identifier
• Search on Description
Perform a quick search to search the database using either the company identifier or company
description. An example of the search criteria for identifier is CEM. An example of the search
criteria for description is CEM SYSTEMS.
To perform a quick search, complete the following steps:
1. From the drop-down list in the quick search field, select Identifier or Description.
Quick
Search
2. Type valid search criteria into the Quick Search field, for example, CEM as the Identifier
or CEM Systems as the Description.
3. Press the Return key. The first result in the result set is displayed. Use the navigation
control to search through the results. For more information, see Navigation control on
page 53.
9.3.3 Navigation control
Use the navigation arrows, as shown in Figure 34, to search the results. Use the previous and
next arrows to skip between each individual record in the order that they are saved. Use the
first and last arrows to jump quickly to the first record or the last record. Click the List view
icon to generate a report containing a list of the results.
Previous/Next record
First
record
Last
record
List view
icon
Figure 34 Navigation arrows
53
CHAPTER 9
9.4 Adding a company record
To add a company record to the system, complete the following steps:
1. Click Add.
2. Configure the parameters of the Company Information pane. For more information, see
Parameters of the Company Information pane on page 54.
3. If required, complete the fields of the Contact Details tab to add the primary contact for
the company.
4. Click Save.
9.4.1 Parameters of the Company Information pane
This table describes the parameters of the Company Information pane.
Partition
Company
Parameter
Previous Company Name
Address
Postcode
Telephone
Ext
Fax
Description
Defines the partition of the company in a partitioned system.
This field is not editable.
The left Company field defines the ID of the company. The
right Company field defines the name of the company.
Defines the previous name of the company. This field is not
editable when adding a new company record.
Defines the address of the company.
Defines the postcode of the company.
Defines the telephone number of the company.
Defines a contact extension number for the company.
Defines the fax number of the company.
Table 7: Descriptions of the Company Information pane parameters
9.4.2 Importing a company logo
When you add a company record, you can import a company logo image that can then be
incorporated into the card design. It is recommended that you import a logo after you have
saved the new company information. Alternatively search for and display the company record,
and then add the logo.
Note: To add a company logo, you must enable the function in the Workstation Configuration
Tool. For more information, see the Workstation Configuration Tool manual.
To import a company logo, complete the following steps:
1. Perform a search for the company to which you want to add a company logo. For more
information, see Searching for a company record on page 52.
2. When the correct record is displayed, in the Company Logo pane, click Capture Logo.
The Capture an image application is launched.
3. In the Capture an image window, click Import.
4. Navigate to the logo, select the logo, and click Open.
5. If required, use the image editing tools on the right of the window.
6. Click Save and click Close. The logo is displayed in Company Logo pane. The date the
logo was added is displayed below.
54
A2SE8-QG-0321-1
Quick Start Guide
9.5 Assigning a default company
When you select a company to be the default company, the company is the default selected
company when adding a cardholder record in the Personnel application.
To assign a default company, complete the following steps:
1. Perform a search for the company that you want to set as the default company. For more
information, see Searching for a company record on page 52.
2. When the correct record is displayed, click Configuration and select Company Default.
9.6 Authorisers
An authoriser is anyone within the company who has authorisation to grant permission for a
new cardholder to be added to AC2000. This person can not be a user of AC2000. As a means
of increasing security, authorisers have been added so that each cardholder can be audited to
see who permitted them access.
Use the Authoriser tab to view the authorisers for the company. Select a name from the list to
view an image of the authoriser’s signature, if it was uploaded.
9.6.1 Searching for an authoriser
There are two ways to search for an authoriser:
• Advanced search
• Quick search
Advanced search
Enter valid search criteria in to any of the available fields. If no search criteria is used in the
search, all authorisers are returned in the results. Depending on the number of authorisers in
the system, this can take longer than specifying search criteria.
To perform an advanced search, complete the following steps:
1. From the toolbar, click Authoriser.
2. In the Authoriser window, click Search.
3. Enter the search criteria in the fields of the Authoriser window.
4. Click Apply. If you did not enter any search criterion, click Yes to acknowledge the warning
message. The first result of the result set is displayed. Use the navigation control to view
all of the search results. For more information, see Navigation control on page 53.
Quick search
To perform a quick search for an authoriser, complete the following tasks:
1. From the drop-down list in the Search on surname field, select Surname or Forename.
2. Type the search criterion in to the search field.
3. Press the Return key.
9.6.2 Enabling authorisers
By default, when you add a cardholder to the system, no authoriser is required.
To ensure that an authoriser is selected when a cardholder is added to the system in the
Personnel application, complete the following steps:
55
CHAPTER 9
1. From the AC2000 Floatbar, click Advanced Configuration, and click Configured.
2. Search for USING_AUTHORISERS.
3. Ensure the Value field is set to Y.
4. Click Save.
9.6.3 Configuring authorisers
When you add a company, the company initially has no authorisers. It is therefore necessary to
add these for each company when authorisers have been enabled. To configure authorisers,
open the authoriser window and complete the following steps:
1. Perform a search for the company to which you want to an authoriser. For more
information, see Searching for a company record on page 52.
2. When the correct record is displayed, click Authoriser.
3. To add an authoriser, see Adding an authoriser on page 56.
4. To edit an authoriser, see Editing an authoriser’s details on page 57.
5. To delete an authoriser, see Deleting an authoriser on page 57.
Figure 35 The Authoriser window
9.6.4 Adding an authoriser
To add an authoriser, complete the following steps:
1. In the Authoriser window, click Add.
2. Configure the parameters of the Authoriser window.
Note: Mandatory fields are indicated in red if they left blank.
3. If the authoriser is the point of contact for the company, from the Point of Contact dropdown
list, select Yes.
4. Click Save.
56
A2SE8-QG-0321-1
Quick Start Guide
9.6.5 Editing an authoriser’s details
To edit an authoriser, complete the following steps:
1. In the Authoriser window, perform a search for the authoriser you want to edit. For more
information, see Searching for an authoriser on page 55.
2. When the correct record is displayed, make the required edits.
3. Click Save.
9.6.6 Authoriser status
The status of authoriser can be one of the following:
• Active: Set the status to Active to enable cardholders to be authorised by this person using
the Personnel application. Authorisers are added to AC2000 in this state. If an authoriser
has been terminated, this authoriser can no longer grant permission for new cardholders.
• Terminated: Set the status to Terminated to prevent the authoriser’s account being used to
authorise cardholders. The authoriser’s name is no longer displayed in the Personnel
application as an authoriser.
When the status of an authoriser is changed to Terminated and the record is saved, click Yes
to terminate the authoriser, No to leave as active.
When resetting a terminated authoriser to Active, click Yes to activate the authoriser again,
No to leave as terminated.
9.6.7 Adding an authoriser signature
For signature validation, it is recommended that all authorisers have their signature added to
the system in electronic format.
To add an authoriser signature, complete the following steps:
1. In the Authoriser window, perform a search for the authoriser to which you want to add a
signature. For more information, see Searching for an authoriser on page 55.
2. When the correct record is displayed, click Capture. The Capture an image window
opens.
3. Click Signature Pad.
4. Sign the signature pad and click Transfer Image.
5. Click Save and Close.
Note: For audit purposes, the date the image was captured is also displayed.
9.6.8 Deleting an authoriser
To delete an authoriser, complete the following steps:
1. In the Authoriser window, perform a search for the authoriser you want to delete. For
more information, see Searching for an authoriser on page 55.
2. When the correct record is displayed, click Delete.
3. Click Yes to confirm deletion.
9.7 Spare Fields tab
In Company, the Spare Fields tab contains spare fields that you can configure to capture data
that is not included in the standard Company Information pane.
57
CHAPTER 9
If you require additional text, date, and number fields to record more company specific data,
there are six spare fields in the Spare Fields tab, each of which can be renamed to more
meaningful names. Careful attention should be given to the data format.
• Spare Text1 & Spare Text2: User definable text fields.
• Spare Num1 & Spare Num2: User definable number fields.
• Spare Date1 & Spare Date2: User definable date fields.
To rename the spare fields, see Configuring spare fields on page 58.
9.7.1 Configuring spare fields
You can configure the spare fields in the Spare Fields tab. You can change the name of the
spare field, hide the spare field, edit the minimum and maximum characters of the field, make
the field mandatory, and make the field unique.
Note: Users without the correct authorisation can not configure Spare Fields for the
Company application.
1. From the toolbar, click Configuration, and select Spare Fields.
2. Select the spare field relevant to the type of data you want to display, for example, Spare
Date1 for Company Start Date, or Spare Text1 for Company Type.
3. In the Caption field, enter the new field name exactly as it should appear in the
application, for example, Company Start Date or Company Type.
4. Change the maximum number of characters that can be typed into the spare field by
editing the Maximum field.
Note: You can change the minimum and maximum values allowed in a numeric spare
field. For example, a minimum of 2 and a maximum of 10 means only numbers including
and between 2 and 10 are accepted values in this spare field.
5. To make the completion of a spare field mandatory, select the Mandatory check box.
6. To ensure the value of the spare field is unique, select the Unique check box.
7. To hide the field, clear the check box next to the spare field in the list.
8. Click Save.
9.8 Adding an image to a company record
To add an image to a company record, complete the following steps:
1. Perform a search for the company. For more information, see Searching for a company
record on page 52.
2. When the correct record is displayed, click the Images tab, and click Edit. This launches
the Image Upload window. Alternatively, from the toolbar, click View, select Documents,
and Image Upload.
3. Click Add. This launches the Capture an image window.
4. Click Import.
Note: All documents must be in the following formats: JPG, JPEG, PNG, and BMP.
5. Navigate to the file and click Open.
6. Click Save and click Close. The image is added to the Image Upload window. In the
Image Name field, enter a unique name for the image.
7. Click Save and Close.
58
A2SE8-QG-0321-1
Quick Start Guide
9.9 Adding a document to a company record
To add a document to a company record, complete the following steps:
1. Perform a search for the company. For more information, see Searching for a company
record on page 52.
2. When the correct record is displayed, click the Document tab, and click Edit. This
launches the File Upload window. Alternatively, from the toolbar, click View, select
Documents, and File Upload.
3. In the File Upload window, click Add.
4. Navigate to the file you want to upload and double-click the file.
Note: You can use the upload the following file formats: TXT, XLS, XLXS, DOC, DOCX, PDF,
XPS, PPT, and PPTX files types to a company record.
5. Into the Document Name field, type a unique document name.
6. Click Save and click Close. The file is added to the company record.
9.10 Company notes
You can enter extra data about a company using the Notes tab. This can be used for
information purposes or a quick referral tool for the operator.
9.10.1 Adding a note
To add a note to a company record, complete the following steps:
1. Perform a search for the company to which you want to add a note. For more information,
see Searching for a company record on page 52.
2. When the correct record is displayed, click the Notes tab, and click Edit.
3. Type the company note into the text box and click Save.
Note: If a note exists for that company, the Notes icon appears to the right of the company
name fields. Click the Notes icon to display all notes associated with that company.
9.10.2 Editing a note
To edit a company note, complete the following steps:
1. Perform a search for the company whose note you want to edit. For more information, see
Searching for a company record on page 52.
2. When the correct record is displayed, click the Notes icon next to the Company fields to
open the note.
3. Make the required edits.
4. Click Save.
9.10.3 Deleting a note
To add a note to a company record, complete the following steps:
1. Perform a search for the company whose note you want to delete. For more information,
see Searching for a company record on page 52.
2. When the correct record is displayed, click the Notes icon next to the Company fields to
open the note.
59
CHAPTER 9
3. Click Clear to remove the contents of the note.
4. Click Save. The Notes icon is no longer displayed.
9.11 Generating Company Reports
You can run the following reports using the Company application:
• Company Usage
• Last Swipe
• Empty Authorisers
9.11.1 Generating the Company Usage report
The Company Usage report generates a report based on how many cardholders are
associated with each company. You run the report using either of the following criteria:
• Card Status
• Card Format
Generating the Company Usage report by Card Status
1. Perform a search to find the required Company.
2. From the toolbar, click Reports
3. Click Company Usage.
4. Click Card Status is selected.
Saving the Company Usage report for Card Status
To generate the Company Usage report, complete the following steps:
1. Click Card Status to ensure it is selected.
2. Click Save.
Figure 36 Saving the Company Usage Report
3. To save the Company Usage report for Card Status to a .csv or .pdf file, select a File
Type, either Delimited or PDF. The list of elements exports to the default directory -
60
A2SE8-QG-0321-1
Quick Start Guide
C:\Program Files\CEM Systems\AC2000\Reports\ -
with a filename which reflects the application name, date and time of export. The following
format is used: <applicationName>_YYYYMMDD_HHMM.
4. To change the directory where the list is to be stored click Change and navigate to the
desired location.
5. If you are exporting as a .csv file, by default the list is exported using a Tab as the
delimiter. To change the delimiter select the preferred delimiter from those available: Tab,
Pipe, Semicolon, or a Comma; alternatively, you can select Other and enter the delimiter
that you want to use. If you are exporting as a .pdf file, the options for delimiters are not
be displayed.
6. Select the check box for which of the delimiters to save with the data.
7. Click Save.
Printing the Company Usage Report for Card Status
1. Generate the Company Usage report.
2. Ensure the Card Status option button is selected.
3. Click Print.
4. Select the correct printer settings.
5. Click Print.
Generating the Company Usage Report by Card Format
The Company Usage Card Format report generates a report that displays all cards according
to Card Format and how many cardholders are associated with that Card Format.
1. Perform a search to find the required Company.
2. From the toolbar, click Reports.
3. Click Company Usage.
4. Click Card Format to ensure it is selected.
Saving the Company Usage report by Card Format
1. Generate the Company Usage report.
2. Click the Card Format option button.
3. Click Save.
4. To save the full list of reports to a CSV or PDF file, select a File Type, either Delimited or
PDF. The list of elements exports to the default directory -
C:\Program Files\CEM Systems\AC2000\Reports\ -
with a filename which reflects the application name, date and time of export. The following
format is used: <applicationName>_YYYYMMDD_HHMM.
5. To change the directory where the list is to be stored, click Change and navigate to the
desired location.
6. If you are exporting as a .csv file, by default the list is exported using a Tab as the
delimiter. To change the delimiter select the preferred delimiter from those available: Tab,
Pipe, Semicolon, or a Comma; alternatively, you can select Other and enter the delimiter
that you want to use. If you are exporting as a .pdf file, the options for delimiters are not
be displayed.
7. Select the check box for which of the delimiters to save with the data and click Save.
61
CHAPTER 9
Printing the Company Usage Report by Card Format
1. Generate the Company Usage report.
2. Click the Card Format option button.
3. Click Print.
9.11.2 Generating the Last Swipe report
The Last Swipe report generates a list of companies where the swipes from personnel, visitor,
or vehicle cards are older than six, nine or twelve months.
Note: Generating a Last Swipe report can take a long time to run if there is a high volume of
swipes in the system.
1. From the toolbar, click Reports.
2. Click Last Swipe.
3. Click Yes in the warning message window.
Figure 37 Generating the Last Swipe report
4. From the drop-down list, click the Swipes older than date.
Saving the Last Swipe report
1. Generate the Last Swipe report.
2. Click Save.
3. To save the full list of card swipes to a .csv or .pdf file, select a File Type, either
Delimited or PDF. The list of elements exports to the default directory -
C:\Program Files\CEM Systems\AC2000\Reports\ -
with a filename which reflects the application name, date and time of export. The following
format is used: <applicationName>_YYYYMMDD_HHMM.
4. To change the directory where the list is to be stored, click Change and navigate to the
desired location.
5. If you are exporting as a .csv file, by default the list is exported using a Tab as the
delimiter. To change the delimiter select the preferred delimiter from those available: Tab,
Pipe, Semicolon, or a Comma; alternatively, you can select Other and enter the delimiter
62
A2SE8-QG-0321-1
Quick Start Guide
that you want to use. If you are exporting as a .pdf file, the options for delimiters are not
be displayed.
6. Select the check box for which of the delimiters to save with the data.
7. Click Save.
9.11.3 Generating the Empty Authorisers report
The Empty Authorisers report is used to generate a list of authorisers who are not assigned
to any personnel or vehicle records.
Note: The Authoriser function must be enabled in the Configured application. Set the
using_authorisers field to Y.
1. From the toolbar, click Reports.
2. Select Empty Authorisers.
Saving the Empty Authorisers report
1. Generate the Empty Authorisers report.
2. Click Save.
3. To save the full list of reports to a CSV or PDF file, select a File Type, either Delimited or
PDF. The list of elements exports to the default directory -
C:\Program Files\CEM Systems\AC2000\Reports\ -
with a filename which reflects the application name, date and time of export. The following
format is used: <applicationName>_YYYYMMDD_HHMM.
4. To change the directory where the list is to be stored, click Change and navigate to the
desired location.
5. If you are exporting as a .csv file, by default the list is exported using a Tab as the
delimiter. To change the delimiter select the preferred delimiter from those available: Tab,
Pipe, Semicolon, or a Comma; alternatively, you can select Other and enter the delimiter
that you want to use. If you are exporting as a .pdf file, the options for delimiters are not
be displayed.
6. Select the check box for which of the delimiters to save with the data.
7. Click Save.
9.12 Printing a report
You can print a comprehensive report of search results. For example, it is possible to produce
a report detailing all or specific companies or all or specific authorisers. The report is built
through querying the database so any number of reports can be created using different search
criteria. The same report layout is used, only the search criteria changes.
1. Perform a search. If searching for a company record, for more information, see Searching
for a company record on page 52. If searching for an authoriser record, see Searching for
an authoriser on page 55.
2. Click the List View icon, to display a report of the results.
3. Click Print to print the results.
9.13 Printing a screenshot
In the Company application, you can take a screenshot of a company’s details, and either print
or save the image.
63
CHAPTER 9
To take a screenshot of a company’s details, complete the following steps:
1. Click View and select Image Processing.
2. To view the screenshot, select Screen from the Image Type list.
3. To print the screenshot, click Print.
4. To save the screenshot, click Save.
9.14 Configuring the tabs
You can select which tabs are visible to users in the Company application.
To configure tab visibility, complete the following steps:
1. In the Company application, click Configuration and select Tab Configuration.
2. By default, all tabs are selected. Clear the check box of a tab to hide it from the company
application interface and click Save.
9.15 Terminating a company
When you add a company to the system, the default status is set to Active. Setting the status
to Active allows cardholders to be added to the company using the Personnel application. If a
company has been terminated, it is possible to change the state back to Active. This activates
the company and all cardholders that are associated with it.
When the status of a company changes, it changes the status of the ID cards associated with
the company. The status of these ID cards is set to expired, and the expiry date is set to today.
If the company is set to active again, all personnel and vehicle cards associated with it are set
to active again. The previous status, and expiry date, of these cards are restored. However,
not all expired cards are restored. Only cards associated with the company being terminated
are restored when the company is unterminated. Cards associated with an unterminated
company, but whose original expiry dates have passed, do not become active, even though
they have been unterminated.
Changing the status to Terminated renders the company and any cardholder associated with
the company invalid.
To terminate a company, complete the following steps:
1. Perform a search for the company to terminate. For more information, see Searching for a
company record on page 52.
2. When the correct record is displayed, from the Status drop-down list, select Terminated.
3. Click Save and Yes to confirm the status change.
4. If one or more cardholders are associated with the company, a second message is
displayed, indicating the number of cardholders this change affects. Click Yes to confirm.
The terminated company and associated cardholders have a terminated status.
9.16 Deleting a company
If a company will no longer use AC2000, it is recommended that you change the company
status to Terminated. For more information, see Terminating a company on page 64. It is
possible to delete a company if no cardholders are associated to it.
9.16.1 Deleting a company with no cardholders
A company with no associated cardholders can be deleted.
64
A2SE8-QG-0321-1
Quick Start Guide
To delete a company, complete the following steps:
1. Perform a search for the company to delete. For more information, see Searching for a
company record on page 52.
2. When the correct record is displayed, click Delete.
3. Click Yes to confirm deletion.
9.16.2 Deleting a company with cardholders
You can not delete a company that has associated cardholders.
65
CHAPTER 9
66
A2SE8-QG-0321-1
10.1 Introduction to Personnel
Chapter 10 Personnel
Use the Personnel application to view, edit, and add the personal, employment, and card data
for all personnel. You can issue more than one card to the record of a cardholder. You can
assign more than one company to the record of a cardholder.
Note: If you are using a partitioned system, see the Partitioning manual.
10.2 Key features
The Personnel application contains key features that perform important administrative tasks:
• Issuing one or more cards to a cardholder
• Assigning more than one company to a cardholder
• Assigning a cardholder extra access
• Limiting usage for a cardholder
• Applying traces and referrals to cardholders
10.3 Setting system permissions
You can control functionality in Personnel by setting system permissions in the User Options
application. You can control the following functions:
• Viewing access: Cardholder data can be shown or hidden by changing the Display
Authorization value for the appropriate field.
• Editing access: Editing options can be enabled or disabled by changing the Write
Authorization value for the appropriate field.
For information about how to set appropriate system permissions for Personnel, see System
Permissions on page 104.
67
CHAPTER 10
10.4 Prerequisites
Before adding personnel records to the system using Personnel, ensure the following
prerequisites are met:
• System permissions for Personnel have been set in the User Options application
• At least one company record has been added to the system in the Company application
• Times zones have been added to the system in the Timezones + Holidays application
• Access levels have been added to the system in the Access Permissions application
• Card types and card formats have been added to the system using the Card Setup
application
10.5 Opening Personnel
To open Personnel, complete the following step:
• From the AC2000 Floatbar, click Enrolment, then Personnel.
Figure 38 Personnel interface
10.6 Searching for a cardholder record
When you search for a cardholder record, the first matching record is displayed. Use the
navigation arrows, as shown in Figure 39, to search the results. Use the previous and next
arrows to skip between each individual record in the order that they are saved. Use the first
and last arrows to jump quickly to the first record or the last record. Click the List view icon to
generate a report containing a list of the results.
List view icon
Figure 39 Navigation arrows
68
A2SE8-QG-0321-1
Quick Start Guide
Enter valid search criteria in to any of the available fields. If you do not enter search criteria, all
cardholder records are returned in the results. Depending on the number of cardholders, this
can take longer than specifying search criteria. It is recommended that you enter one or more
search criterion to filter the results and reduce the time taken to return them.
To search for a cardholder record, complete the following steps:
1. In Personnel, click Search.
2. Enter one or more search criterion and click Apply.
3. If no search criteria is entered, click Yes to acknowledge the warning message.
4. If more than one record is found in the search, use the navigation arrows to locate the
correct cardholder record.
View the results in a
separate window
List of all records found
The fourth record in
the search results
Figure 40 Viewing the search results
5. To see a list view of the result records, click the icon next to the left and right arrows.
6. Click the pop-out icon to view the results in a separate window.
Save list
Print list
Figure 41 Viewing the search results in a separate window
7. To save the results, click the Save list icon.
8. To print the results, click the Print list icon.
69
CHAPTER 10
10.7 Adding a cardholder record
To add a cardholder record, complete the following steps:
1. From the Personnel toolbar, click Add.
2. Configure the personal details of the cardholder in the Personnel Details pane. For more
information, see Parameters of the Personal Details pane on page 71.
Figure 42 Personal Details pane
3. Configure the parameters of the Employment Details pane. For more information, see
Parameters of the Employment Details pane on page 71.
Figure 43 Employment Details pane
4. Configure the parameters of the Card Details pane. For more information, see Parameters
of the Card Details pane on page 72.
Figure 44 Card Details pane
70
A2SE8-QG-0321-1
Quick Start Guide
5. Click Save.
6. You can add multiple cards to one cardholder record. To add another card, click the small
green add icon at the top right of the Card Details pane and repeat steps 4 and 5.
10.7.1 Parameters of the Personal Details pane
This table describes the parameters of the Personal Details pane.
Parameter
Surname
Forename
Address
Postcode
Date of Birth
Gender
Description
Defines the surname of the cardholder
Defines the forename of the cardholder
Defines the address of the cardholder
Defines the postcode of the cardholder
Defines the date of birth of the cardholder
Defines the gender of the cardholder
Defines the email address of the cardholder
Table 8: Personnel Details pane
10.7.2 Parameters of the Employment Details pane
This table describes the parameters of the Employment Details pane.
Parameter
Company
Department
Job Title
Payroll Number
Contact Num
PIN
Special Usage
Last Device
Last Time
Description
Defines the company or companies assigned to the cardholder. From
the Company drop-down list, select one or more companies. If you
select more than one company, the Company Information window
opens. If the employee has a different job title or works for a different
department in each company, select each company and configure the
Job Title and Department fields. Click Apply.
Note: If more than one company is assigned to a cardholder, the
number of companies is displayed in a new label next to the Company
field.
Defines the department of the cardholder for the company selected in
the Company parameter.
Defines the job title of the cardholder for the company selected in the
Company parameter.
Defines the payroll number of the cardholder.
Defines a contact number for the cardholder.
Defines the PIN for the cardholder to be used on PIN access readers.
Defines that the cardholder is given extra time to pass through a door
after a reader has been swiped.
Defines the AC2000 address of the last device the cardholder
accessed.
Defines the last time the cardholder presented a card at an access
control reader.
Table 9: Employment Details pane
71
CHAPTER 10
10.7.3 Parameters of the Card Details pane
This table describes the parameters of the Card Details pane.
Parameter
Card Format
Access Level
Timezone
Start Date
Expiry Date
Card Status
Reason
Total Cards
Card Serial
Hotstamp
Added By
Creation Date
Pass Print Date
Authoriser
Company
Last Update
Time
Last Updated
By
Description
Defines the card format the cardholder’s new card is assigned.
Defines the access level assigned to the cardholder’s card.
Defines the time the cardholder can gain access using this card.
Defines the start date of the cardholder’s card.
Defines the expiry date of the cardholder’s card.
Defines the status of the card. When adding a card, the default card
status is (none). After the card is validated, more options become
available to choose from in the Card Status drop-down menu. For more
information, see Card Status on page 73.
Defines the reason for issuing the card and the charge associated with
it, if any.
Note: If this field is required and is not displayed, ensure the
enable_charging value is set to Y in Configured.
The total number of cards in the cardholder record. This parameter is
not editable.
The serial number of the card.
Defines the hotstamp number of the card. If the hotstamp is autogenerated,
the field is blank and the label Generated is displayed next
to the field.
The name of the user that added the card. This parameter is not
editable.
The date the card was added. This parameter is not editable.
The date the card was printed. This parameter is not editable.
Defines the name of the authoriser for the company.
Note: If this field is not displayed, you need to enable authorisers.
Enable the Authoriser function in the Configured application. To do
this, set the using_authorisers value to Y. Add an authoriser to a
company record in the Company application.
Defines the company to which the card is assigned.
The date the card details were last updated. This parameter is not
editable.
The name of the user that last updated the card details. This parameter
is not editable.
Table 10: Descriptions of the Card Details parameters
72
A2SE8-QG-0321-1
Quick Start Guide
10.7.4 Card Status
This table describes the card status values.
Card Status
(none)
Current
Lost/Stolen
Not Yet
Operational
About to Expire
Expired
Purged
Description
Defines the default card status of a card.
Defines the status of a card after it has been validated.
Defines that the card has been lost or stolen. If the card is used at a
reader, it will not provide access.
Defines that the cardholder’s start date is a future date.
Defines that the card is set to expiry within a set period of time. This value
depends on the About to expire days value for the selected card format.
This value is set in Card Setup. For more information, see the Card Setup
chapter in this guide.
Defines that the Expiry Date of the card has passed.
Defines that the card has not been used for a set period of time or that a
reusable card has been returned.
Table 11: Card Status values
10.8 Capturing a portrait
To add a portrait image, you must enable the function in the Workstation Configuration Tool.
See the Workstation Configuration Tool manual for more information.
To add a portrait image to the cardholder record, complete the following steps:
1. Perform a search for the cardholder. For more information, see Searching for a cardholder
record on page 68.
2. When you hover the cursor over the empty grey box on the right-hand side of the pane, the
words Capture Portrait and an image of a camera are displayed in the box. Click the box
to open the Capture an image application.
3. In the Capture an image window, click Import.
4. Navigate to the image, select the image, and click Open.
5. If required, use the image editing tools on the right of the window.
6. Click Save and click Close. The image is displayed in the portrait box. The date the image
was added is displayed below the image.
10.9 Editing a cardholder record
To edit a cardholder record, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. When the correct record is displayed, make the edits to the cardholder record as required.
3. Click Save.
Note: If a card has been validated, the Card Format field can not be edited.
Note: If a cardholder’s record was imported from another site, the editable fields are limited.
For more information, see Imported Records on page 87.
73
CHAPTER 10
Note: If a cardholder’s record is associated with a terminated company, the card details can
not be edited.
10.9.1 Setting the threat level
If threat levels are enabled on the system, you must assign a threat level threshold to the
cardholder. This means that when threat levels are raised, a cardholder’s access is limited to
threat level readers equivalent to or below their threshold.
To assign a threat level threshold to a cardholder, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. When the correct record is displayed, click the Miscellaneous tab.
3. Select a threshold level from the Threat Level drop-down list.
4. Click Save.
Note: If the Threat Level drop-down list is not visible, open the Configured application and
change the threat_level_enabled value to y. Restart the Personnel application.
10.9.2 Changing the Remote App Group
If emerald readers are installed on a system, a cardholder can access specific applications
using the touchscreen reader. The applications that the cardholder can use are determined by
the Remote App Group that the cardholder is assigned to in the Personnel application. By
default, the cardholder is assigned to the Cardholder group.
To change the remote app group, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. When the correct record is displayed, click the Miscellaneous tab.
3. Select a group from the Remote App Group drop-down list and click Save.
Note: If the Remote Group App drop-down list is not visible, open the Configured application
and change the remote_app_group_enabled value to y. Restart the Personnel application.
10.9.3 Assigning Visitor Sponsor status
If you intend to use AC2000 WEB Visitors applications, you can assign a visitor sponsor to a
visitor. Sponsors are cardholders that can accompany a visitor. This function is only available
in Personnel if visitor_escort is enabled in the Configured application.
Note: If you can not assign a sponsor, open the Configured application, and change the
visitor_escort value to y. Restart the Personnel application.
To assign Visitor Sponsor status to a cardholder, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. When the correct record is displayed, click the Miscellaneous tab.
3. From the Status Options drop-down list, select the Visitor sponsor check box.
4. Click Save.
74
A2SE8-QG-0321-1
Quick Start Guide
10.9.4 Uploading an image
You can upload multiple images to a cardholder’s record.
To upload an image, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. From the toolbar, click View.
3. Select Documents and select Image Upload.
4. Click Add. The Capture an image window opens.
5. Select a method of capturing an image. The following options are available to choose
from:
• Import
• Video & Web Cameras
• Scanners
• Digital Cameras
6. Click Save, then Close.
Figure 45 Adding an image
Note: The image import function must first be configured using the Workstation Configuration
Tool. For more information, refer to the Workstation Configuration guide.
10.9.5 Uploading a document
You can upload multiple documents to a cardholder’s record.
To upload a document, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. From the toolbar, click View.
3. Select Documents and select File Upload.
4. Click Add.
75
CHAPTER 10
5. Select the type of file you want to upload from the drop-down menu located to the right of
the File name field. The options are as follows:
• Word
• Excel
• Powerpoint
• Text
• XPS
6. Navigate to the file, select it, and click Open.
Note: Invalid files, for example, images, can not be uploaded through the File Upload.
Note: The maximum space assigned to each cardholder for uploaded files is 5000KB. If you
attempt to upload a file that pushes the total space used over the maximum allowed, the file
fails to upload. You can configure this maximum space value in the Configured application by
changing the parameter doc_allocated_space.
10.9.6 Opening a document
To open a document in a cardholder’s record, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. Click the Files tab.
3. Select the document you want to open and click the icon in the Actions column.
10.9.7 Deleting a document
To delete a document from a cardholder’s record, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. Click the Files tab and click Edit.
Note: Alternatively, click View, click Documents, and select File Upload.
3. Select the file to delete and click the x icon in the Delete column.
4. Click Yes to confirm deletion.
5. When finished deleting documents, click Close.
10.9.8 Capturing biometrics
You can capture cardholder biometric information using a biometric reader.
To capture biometric information, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. From the toolbar, click Biometric.
3. If prompted to enter an IP address, type the IP address, for example, 192.164.6.10, of the
biometric reader and click OK. If you are not prompted to enter the IP address of the
biometric reader, it has been set already using the Getting Started application.
76
A2SE8-QG-0321-1
Quick Start Guide
4. Select Capture and place one of your fingers on the biometric reader.
Figure 46 Capturing biometric information
5. When your first finger’s biometric information has been captured and the fingerprint image
displays, place another one of your fingers on the biometric reader.
6. Click Accept to proceed or Cancel to abort.
Note: To change the IP address of the biometric reader, refer to the Getting Started Guide.
10.9.9 Editing the badge name
The cardholder’s name appears on the card as displayed in the Badge Name field in the
Miscellaneous tab. The Badge Name is automatically created using the Forename and
Surname fields, but can be edited to display something different. This is useful for cardholders
who are more commonly known by their middle name, for example, or by a shortened version
of their first name.
To edit the Badge Name, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. Click the Miscellaneous tab.
3. Make the required edits to the Badge Name field and click Save.
10.9.10 Adding a note
To add notes to a cardholder’s record, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. Click the Notes tab.
3. Click Edit.
4. Type the note information into the Notes pane and click Save.
10.9.11 Viewing a note
To view a cardholder’s notes, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. From the toolbar, click View, and select Personnel Notes.
Note: You can also view notes by clicking on the Notes tab.
77
CHAPTER 10
10.9.12 Viewing company notes
Notes can be added to a company in the Company application. You can view these notes in
Personnel.
To view a company notes in Personnel, complete the following steps:
1. In Personnel, perform a search for the company. For more information, see Searching for
a cardholder record on page 68.
2. From the toolbar, click View, and select Company Notes.
10.10 Printing the card
To print the card, complete the following steps.
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. Ensure that the configured printer is connected and powered on.
3. Insert the card into the printer.
4. Click Print to open the Print Engine window.
5. Adjust the size of the Print window if necessary, using the drop-down Zoom button.
6. Select the Side drop-down menu to preview the front, back, or both sides of the pass
before printing.
7. Click Print.
10.11 Validating a card
Before a card can be used to access readers, it must be validated against a cardholder.
Cards can be validated in Personnel in one of two ways:
• Automatic validation, using preloaded card information from a Load Cards operation in the
Card Setup application. For more information, see Automatic card validation on page 78.
• Manual validation, using a validation reader that is attached to the workstation. For more
information, see Manual card validation using an online reader on page 79, Manual card
validation using a fingerprint reader on page 79, and Salto offline-lock validation on page
80.
10.11.1 Automatic card validation
Before a card can be validated, you must create the correct card format in the Card Setup
application. If there is preloaded card information on the system, you can validate cards
automatically.
Note: If the card type is set to GENERATE CARD NUM, you do not need to preload card
numbers on to the system.
To validate a card in Personnel automatically, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. If the cardholder has more than one card, scroll through the cards to find the card to
validate.
3. In the toolbar, click Validate.
78
A2SE8-QG-0321-1
Quick Start Guide
4. If prompted for a hotstamp number, type the hotstamp number into the Hotstamp field.
5. Click Validate and click Yes to accept automatic validation.
10.11.2 Manual card validation using an online reader
Before a card can be validated, you must create the correct card format in the card types
application. For example, if you want to use an online reader connected to the AC2000
network on which to perform card validation, the ONLINE READER validation option must be
selected in the Card Setup application.
To manually validate a card, complete the following steps:
1. In the Personnel toolbar, click Validate to display the Online Card Validation window.
2. If prompted to type a hotstamp number, type the hotstamp number into the Hotstamp field.
If the card type has Auto-Generate Hotstamp enabled, the hotstamp generates
automatically and you can not edit the value.
3. Type the five-digit hexadecimal AC2000 address of the online reader into the Device
Address field.
Note: If you have setup the device address in the Getting Started wizard application, you
will not be prompted to manually enter the device address.
4. Click Validate to display the swipe timeout prompt.
5. Swipe the card over the reader.
Note: Validation of a card must be performed on a reader that is compatible with that card
technology, for example, a MiFare card must be validated on a MiFare reader.
Note: Where cards do not have an encoded internal number, it is recommended that the card’s
validation method is set to GENERATE CARD NUM. It is also advisable that the hotstamp
number is included in the pass design.
10.11.3 Manual card validation using a fingerprint reader
Before a card can be validated, you must create the correct card format in the card types
application. For example, if you want to use an fingerprint reader connected to the AC2000
network on which to perform card validation, the READ CNUM & BIO validation option must
be selected in the Card Setup application.
To manually validate a card, complete the following steps:
1. In the Personnel, click Validate to display the Validation window.
2. If prompted to type a hotstamp number, type the hotstamp number into the Hotstamp field.
If the card type has Auto-Generate Hotstamp enabled, the hotstamp generates
automatically and you can not edit the value.
3. Click Validate.
4. In the IP Address fields, type the IP address of the validation reader.
5. Click Save to display the Capture Biometrics pane.
Note: If you are not prompted to enter the IP address of the biometric reader, it has been
set already using the Getting Started application.
6. Select Capture and place one of your fingers on the biometric reader.
7. When your first finger’s biometric information has been captured and the fingerprint image
displays, place another one of your fingers on the biometric reader.
8. Click Accept to proceed or Cancel to abort.
9. Swipe the card over the reader.
79
CHAPTER 10
10.11.4 Salto offline-lock validation
Salto offline-locks are validated manually as above, using a Salto Smart Card Encoder.
Before validating a Salto offline-lock card, ensure that the following tasks have been
completed:
• A card type has been created for Salto offline-locks in the Card Setup application with its
validation method set to SALTO SHIP.
• A card format has been created that uses the Salto offline-locks card type.
• A Salto Smart Card Encoder is attached to the Visual Imaging and Pass Production System
(VIPPS) workstation.
10.12 Checking access level readers
You can check the access permissions of a cardholder by viewing the readers the cardholder
has access to. You can view the devices according to the access level.
To view the access permissions of a cardholder, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. Click the Card Details tab.
3. Click the icon located next to the Access Level drop-down list to display the list of
readers.
View the access
level readers
Figure 47 Checking access level readers
4. Click Save to save the report or click Print to print out the report.
10.13 Performing an access level query
The access level query option searches the primary access level that has been assigned to a
cardholder and displays the results.
To perform an access level query, complete the following steps:
1. From the Personnel toolbar, click Search.
2. In the Card Details pane, select an access level from the Access Level drop-down list.
Note: If you want to include extra access levels assigned to users in the search, select the
Include Extra Access check box at the top of the pane.
3. Click Apply. All cardholders with the access level used in the search are displayed in the
results.
80
A2SE8-QG-0321-1
Quick Start Guide
10.14 Viewing the transaction history
A transaction history of a cardholder can be viewed as a report showing their last 20 card
swipes. You can search for recent transactions in Personnel based on date, duration, and
hotstamp number.
To view a cardholder’s transaction history, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. From the toolbar, click Cards, and select Recent Transactions. If the cardholder has
been swiping the cards, the last 20 transactions automatically display.
3. Configure the search criteria. You can configure multiple criteria, all fields, or just one field.
For more information, see Fields of the Recent Transactions window on page 81.
4. Click Search and Export.
5. To save the report, select Save, and to print the report, click Print.
10.14.1 Fields of the Recent Transactions window
This table describes the fields of the Recent Transactions window.
Field
Start Date
Duration
Hotstamp
Action
Select the date using the calender.
Select duration from the drop-down menu or select a date using the
calender.
Select a hotstamp number from the drop-down menu. Select All if you
want to search all transactions for all cards.
Table 12: Configuring the search criteria
10.15 Deleting a cardholder record
You can only delete cardholder records with no validated cards. Cardholder records with
validated cards should be updated to an Expired card status. If a card has been validated and
has an expired status, the record still can not be deleted.
To delete a record, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. Click Delete and click Yes to confirm deletion.M
10.16 Batch Update
The Batch Update option updates a batch of cards with a new expiry date, access level, and
TEA expiry date.
To batch update both the expiry date and access level, complete the following steps:
1. From the Personnel toolbar, click Cards, select Batch, and Batch Update.
2. Configure the search criteria of the Query pane.
Note: If you want to update the access level, you must select an access level from the
Access Level drop-down list in the search query.
3. Click Query.
4. After you select the new expiry date and access level, click Update.
81
CHAPTER 10
Note: The maximum number of cards that can be batch updated depends on whether the user
is updating the expiry date or both the expiry date and access level. The values are
configurable in the Configured application. The default maximum number for updating the
expiry date is 500. To change this, configure the max_update_expiry_date parameter in the
Configured application. The default maximum number for updating access levels and expiry
dates is 100. To change this, change the max_update_access_levels parameter in
Configured.
10.16.1 Batch Update Error Status
Possible error status messages are as follows:
• Unassigned Access Level: When a cardholder record is being updated with an access
level that is not included in the card format.
• Invalid Card Format: When an attempt is made to update a record that has not yet been
assigned a card format or by implication an access level.
Invalid Date Range: When a record is being updated with an expiry date that exceeds the
maximum expiry date defined for the card format.
10.17 Batch Update Temporary Extra Access (TEA) Expiry
Date
To perform a batch update on TEA Expiry Date, complete the following steps:
1. From the toolbar, click Cards, select Batch, and Batch Update.
2. Configure the Access Level, Company and TEA Expiry Date parameters in the Query
pane.
3. Click Query.
4. Enter a new TEA expiry date in the New TEA Expiry Date field.
5. Click Update. A report is generated, displaying the cardholders records that were updated
and those that failed.
6. Click Print to print the report.
7. Click Save As to save the report.
8. Click Close.
10.18 Batch Field Update
To update one or more fields in multiple cardholder records, complete the following steps:
1. In Personnel, perform a search for the cardholders you want to include in the Batch Field
Update. For more information, see Searching for a cardholder record on page 68.
2. In the toolbar, click Cards, select Batch, and Batch Field Update. The results from the
search are displayed in the top pane.
Note: If the record set is greater than 500, an error message is displayed. Narrow the result set
by adding more search criteria when performing the search.
Note: Imported personnel records do not appear in the result set.
3. If necessary, clear the check boxes of cardholder records to exclude them from the
update.
4. From the Fields drop-down list, select the field you want to edit
82
A2SE8-QG-0321-1
Quick Start Guide
5. In the Value field, type the new value, and click Add.
6. To update another field name, perform steps 3 to 5.
7. To remove a field from the batch update, click the X icon in the Delete column.
8. To save the changes, click Update.
10.19 Batch Add Extra Access
You can create an extra access and assign it to multiple cardholder records.
A cardholder is assigned access levels and time zones to restrict a cardholder’s access
throughout the site in accordance with location and time. There are occasions when temporary
additional access must be granted.
To assign extra access to a cardholder, complete the following steps:
1. In Personnel, perform a search for the cardholders you want to include in the Batch Add
Extra Access. For more information, see Searching for a cardholder record on page 68.
Note: If there are no common card formats among the result set, the parameters of the Batch
Add Extra Access window are disabled and an error message is displayed. It is
recommended that you include the card format in the search criteria.
2. In the toolbar, click Cards, select Batch, and Batch Add Extra Access. The results from
the search are displayed in the top pane.
Note: If the record set is greater than 500, an error message is displayed. Narrow the result set
by adding more search criteria when performing the search.
Note: Imported personnel records and records with no active or readable cards do not appear
in the result set.
3. If necessary, clear the check boxes of cardholder records to exclude them from the
update.
4. Select an access type from the Extra Access Type drop-down list in the Properties pane.
There are three access types:
• Multiple Access: This extra access type allocates additional access levels and time
zones to a cardholder’s permissions. For more information, see Multiple Access on
page 83.
• Manual TEA: This extra access type allocates extra permissions to a cardholder for a
specific period of time. After that time, the extra access lapses. For more information,
see Manual TEA on page 84.
• Swipe Invoked TEA: This extra access type assigns a cardholder temporary access to
another area by invoking access using a trigger reader. A TEA area and trigger devices
must be configured in the Temporary Extra Access application before Swipe-Invoked
TEA can be applied. All trigger readers must be contained in the cardholder’s Primary
Access Level to invoke the TEA. For more information, see Swipe Invoked TEA on
page 84.
10.19.1 Multiple Access
To assign Multiple Access Extra Access, complete the following steps:
1. Select Multiple Access from the Extra Access Type drop-down list.
2. Select an access level from the Access Level drop-down list.
3. Select a time zone from the Timezone drop-down list.
4. Configure the Start Date/Time and End Date/Time parameters using the date picker.
83
CHAPTER 10
5. Click Save. A report is generated, displaying the cardholders records that received the
extra access and those that failed.
6. Click Print to print the report.
7. Click Save As to save the report.
8. Click Close.
10.19.2 Manual TEA
To assign Manual TEA Extra Access, complete the following steps:
1. Select Manual TEA from the Extra Access Type drop-down list.
2. Select an access level from the Access Level drop-down list.
3. Select a time zone from the Timezone drop-down list.
4. Configure the Start Date/Time and End Date/Time parameters using the date picker.
5. Click Save. A report generates, displaying the cardholders records that received the extra
access and those that failed.
6. Click Print to print the report.
7. Click Save As to save the report.
8. Click Close.
10.19.3 Swipe Invoked TEA
To assign Swipe Invoke Extra Access, complete the following steps:
1. Select Swipe Invoked TEA from the Extra Access Type drop-down list.
2. Select a TEA area from the Area drop-down list.
3. Click Save. A report is generated, displaying the cardholders records that received the
extra access and those that failed.
4. Click Print to print the report.
5. Click Save As to save the report.
6. Click Close.
10.20 Batch Remove Extra Access
To batch remove extra access, complete the following steps:
1. In Personnel, perform a search for the cardholders you want to include in the Batch
Remove Extra Access. For more information, see Searching for a cardholder record on
page 68.
Note: If the record set is greater than 500, an error message is displayed. Narrow the result set
by adding more search criteria when performing the search.
2. In the toolbar, click Cards, select Batch, and Batch Remove Extra Access. The results
from the search are displayed in the top pane.
3. If necessary, clear the check boxes of cardholder records to exclude them from the
update.
4. To view an individual cardholder’s extra access, click the cardholder record and if there is
extra access, it is displayed in the Extra Access Details pane.
84
A2SE8-QG-0321-1
Quick Start Guide
5. To batch remove extra access, click Remove, and click Yes to confirm deletion.
10.21 Assigning extra access to one cardholder
A cardholder is assigned access levels and time zones to restrict a cardholder’s access
throughout the site in accordance with location and time. There are occasions when temporary
additional access must be granted. To give one cardholder extra access, use the Extra Access
function.
To assign extra access to one cardholder, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. From the toolbar, click Extra Access, and click Add.
Figure 48 Extra Access dialog
3. Select an access type from the Extra Access Type drop-down list in the Properties pane.
There are three access types:
• Multiple Access: This extra access type allocates additional access levels and time
zones to a cardholder’s permissions. For more information, see Multiple Access on page
83.
• Manual TEA: This extra access type allocates extra permissions to a cardholder for a
specific period of time. After that time, the extra access lapses. For more information,
see Manual TEA on page 84.
• Swipe Invoked TEA: This extra access type assigns a cardholder temporary access to
another area by invoking access via a trigger reader. A TEA area and trigger devices
must be configured in the Temporary Extra Access application before Swipe-Invoked
TEA can be applied. All trigger readers must be contained in the cardholder’s Primary
Access Level to invoke the TEA. For more information, see Swipe Invoked TEA on
page 84.
10.21.1 Editing extra access
To edit a cardholder’s extra access, complete the following steps:
85
CHAPTER 10
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. Click Extra Access.
3. From the Assigned Extra Access pane, select the extra access level you want to edit.
4. Click Edit.
5. Edit the End Date/Time parameter and click Save.
10.21.2 Deleting extra access
To edit a cardholder’s extra access, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. Click Extra Access.
3. From the Assigned Extra Access pane, select the extra access level you want to delete.
4. Click Delete.
5. Click Yes to confirm deletion.
10.22 Batch Printing
The Batch Print option prints one card for every cardholder in the search query results. If a
cardholder has multiple cards, you can print only one of the cards in each Batch Print
operation.
To perform a batch print operation, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. If a cardholder has multiple cards, select the card you want to print by clicking on the dropdown
list in the Card Serial column and selecting the card.
3. Click Print.
10.23 Resetting Anti-Passback
Anti-passback is a way of configuring readers to prevent cards from being swiped twice at the
same reader to allow access for two people. If passback has been attempted, the access on
the cardholder’s card automatically locks and must be reset before the cardholder can
successfully swipe through a reader with that card again.
To reset anti-passback, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. From the toolbar, click Actions, and select Reset APB.
10.24 Exporting card details
The Export card option gives a cardholder access to multiple sites operating within a Standard
Link by creating a record in another site’s Personnel database. This is done by exporting the
cardholder’s details from their record on the home site workstation to the other site the
cardholder need access to. If a cardholder has multiple cards, all of their active cards are
exported.
86
A2SE8-QG-0321-1
Quick Start Guide
To export a card, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. From the toolbar, click Cards, and select Export Card.
3. Click Edit.
4. Select the site check box you want to export the card to.
5. Click Save.
10.25 Imported Records
If cards are imported from another site, there are restrictions placed on editable fields and
functionality.
Editable fields are restricted to:
• Access Level
• Timezone
• Remote app group
• Threat level group
• Status Options
• Static and dynamic user fields
It is not possible to return/validate, print, batch print, batch update, or export an imported card.
10.26 Returning a card
If a cardholder leaves the company, or requires their card to be re-issued because it is has
expired or is about to expire, their current card needs to deactivated. To deactivate cards for
any other reason, set card status to expired.
You can not return a card unless it has been set as Reusable in the Card Setup application
and the card has been validated.
To return a card, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. From the toolbar, click Return Card.
3. Click Yes to continue. The Card Status changes to Purged.
10.27 Card parking
Card parking deactivates a card so that it can no longer be used to access a readers on a site.
If a card has been inactive for a predefined time, it is automatically parked. If a card is parked,
the Parked radio button in the cardholder record is selected.
The Card Parking setting is configured in AC2000 WEB. For information about how to
configure the inactivity time period, refer to the AC2000 WEB manual.
87
CHAPTER 10
10.27.1 Exempting a card from card parking
Cards can be configured to be exempt from automatic card parking. This is performed using
the Parking Exemption option.
To exempt a cardholder’s cards, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. In the System Information pane, you can choose from two options to make a cardholder’s
cards exempt from parking.
• Select Indefinite from the Park Exemption drop-down list to make the cards exempt
indefinitely.
• Select Until Date to set an exemption period. This defines that the card will not be
parked up to a specific date. Enter the date in the Exempt Until field.
3. Click Save.
10.27.2 Unparking a card
To reactivate a parked card, you must manually unpark the card.
To unpark a card, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. Click Actions and select Unpark.
3. Click OK.
10.27.3 Viewing a cardholder’s park history
The Park History option displays the dates the cardholder’s cards were parked and the
access level the cardholder had before the cards were parked.
To view a cardholder’s park history, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. Click Actions and select Park History.
10.28 Permits
Typically, a permit is a non-readable pass that can not be used on swipe card readers. They
are most commonly used for vehicles and personnel who require a sponsor and only visit on
an incidental basis, such as repair staff.
Permits are issued using a permit pass design and are usually printed on paper. A permit pass
design must be configured before a permit can be issued.
Note: You can create a permit pass containing a barcode that is read using barcode readers.
10.28.1 Issuing a permit
To issue a permit, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
88
A2SE8-QG-0321-1
Quick Start Guide
2. From the toolbar, click Actions, and select Permits.
3. Click Add.
4. Alternatively, if a permit record already exists, you can edit the Permit Format field,
Permit Status field, Start Date field and Expiry fields. You can also edit the spare text
fields, the spare num fields and the spare date fields.
5. Enter the permit details. For more information, see Parameters of the Permit Details pane
on page 89.
6. Select Save.
7. To print the permit, select Print Pass, and click Print.
10.28.2 Parameters of the Permit Details pane
This table describes the parameters of the Permit Details pane.
Parameter
Permit Serial
Personnel Serial
Permit Format
Permit Status
Company
Forename
Surname
Start Date
Expiry Date
Spare Fields
Description
Defines the serial number of the permit. This is automatically generated
by AC2000.
Defines the cardholder’s personnel serial number.
Defines the permit format to be used. These formats are created in the
Card Setup application. For more information, see the Card Setup
chapter.
Defines the status of the permit. When a Permit Format is selected, the
default format is Current.
Defines the company to which the permit is assigned.
Defines the first name of the cardholder.
Defines the surname of the cardholder.
Defines the first date the permit can be used.
Defines the final date the permit can be used.
There are four spare text fields, two spare date fields, and two spare
numeric fields.
Table 13: Permit Details parameters
Note: The spare field names can be changed. For more information, see Configuring spare
fields on page 89.
10.28.3 Deleting a permit
To delete a permit, complete the following steps:
1. From the toolbar, click Actions, and select Permits.
2. Select the permit and click Delete.
3. Click Yes to confirm deletion.
10.29 Configuring spare fields
In Personnel, the Spare Fields tab contains spare fields that you can configure to capture data
that is not included in the standard Personnel form, for example, car registration. Permit spare
fields can also be configured to capture data from permit holders.
To configure the spare fields, complete the following steps:
1. From the Personnel toolbar, click Configuration, and select Spare Fields.
89
CHAPTER 10
2. Select a spare field from the list. This must be appropriate for the data, such as a text field
for car registration or a date field for an employee start date.
3. In the Caption field, enter the new field name exactly as it should appear in the
application, for example, Car Registration.
4. Change the maximum number of characters that can be typed into the spare field by
editing the Maximum field.
Note: You can change the minimum and maximum values allowed in a numeric spare
field. For example, a minimum of 2 and a maximum of 10 means only numbers including
and between 5 and 10 are accepted values in this spare field.
5. To make the completion of a spare field mandatory, select the Mandatory check box.
6. To ensure the value of the spare field is unique, select the Unique check box.
7. To hide the field, clear the check box next to the spare field in the list.
8. Click Save.
10.29.1 Configuring permit spare fields
To configure the Permit Spare Fields, complete the following steps:
1. From the toolbar, click Configuration, and select Permits Spare Fields.
2. Select a spare field from the list. This must be appropriate for the data, such as a text field
for car registration.
3. In the Caption field, enter the new field name exactly as it should appear in the
application, for example, Car Registration.
4. Change the maximum number of characters to be typed into the spare field by editing the
Maximum field.
Note: You can change the minimum and maximum values allowed in a numeric spare
field. For example, a minimum of 2 and a maximum of 10 means only numbers including
and between 5 and 10 are accepted values in this spare field.
5. To make the completion of a spare field mandatory, select the Mandatory check box.
6. To ensure the value of the spare field is unique, select the Unique check box.
7. If you want to hide the field, clear the check box next to the spare field in the list.
8. Click Save.
10.30 Configuring limited usage
Cardholders are assigned to particular access levels depending on what reader access is
required. The Limited Usage option limits the cardholder to a designated number of card
swipes after which the primary access level changes to another access level.
10.30.1 Applying limited usage
To apply limited usage to a cardholder, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. From the toolbar, click Cards, and select Limited Usage.
3. Select a Usage Type. You can choose from two usage types.
• Daily: On a daily basis
• Total: For the full duration of the cardholder’s time with the company
90
A2SE8-QG-0321-1
Quick Start Guide
4. In the Assigned Usage field, enter the cardholder’s swipe allowance. This value must be
between 1 and 1000. The number of available swipes the cardholder has left displays in
the Remaining Usage field.
5. From the When usage expires set Access Level drop-down list, select the access level
the cardholder will be assigned to when the allowance is used up.
Figure 49 Applying limited usage to a cardholder
Note: It is recommended that you create a restricted access level in Access Permissions with
limited readers. This restricted access level must belong to all card formats that the user has
active. This can be done using the Card Setup application.
6. Select Save.
10.30.2 Reset Limit usage
Resetting the allowance updates the values to the cardholder’s settings before Limited Usage
was applied. This option can not be used if the value in the Remaining Allowance field is
greater than 0.
To reset Limited Usage, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. From the toolbar, click Cards, and select Limited Usage.
3. Select Reset and click Close.
10.30.3 Deleting limited usage
To delete a cardholder’s limited usage, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. From the toolbar, click Cards, and select Limited Usage.
3. Click Delete and click Yes to confirm deletion.
10.31 Breach of Conditions
If a cardholder has broken the terms of their employment, you can add a breach of conditions
the personnel file as a formal record of the disciplinary event. The cardholder is then typically
issued with a formal letter advising them of the breach.
To apply a breach of conditions to a cardholder, you must preconfigure the breach types and
letter in the Utilities and BOC applications.
For more information, see the Setup Guide and System Configuration manual.
91
CHAPTER 10
Note: If the Breach of Conditions tab is not available in Personnel, set the enable_boc
parameter to Y in the Configured application.
10.31.1 Adding a breach of conditions to a cardholder record
To add a breach of conditions to a cardholder record, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
Note: You can also search for a cardholder in the Breach of Conditions pane by clicking
Search.
2. Click the Breach of Conditions tab and BOC Admin.
Alternatively, click Actions and Breach of Conditions.
3. Click Add.
Parameter
Description
Breach Type The type of breach.
Incident Date The date of the incident.
Response
The date the cardholder is expected to reply.
Expected Date
Response
The date of a response to the breach of conditions.
Received Date
Breach Number This is an auto-generated number.
Incident Number The incident number of the breach.
Score
The score for the breach type. Each breach type can have a different
score. The score is set in the Utilities application. In the Configured
application, the value of max_boc_points is the maximum allowed
score for a cardholder record before their card is parked.
Breach Description A brief description of the breach that occurred.
Initial Action A brief description of the action taken against the individual
concerned for this breach of conditions.
Outcome
Details of the outcome if a response has been received and an
outcome to the breach has been reached.
Table 14: Parameters of the Breach of Conditions window
4. Click Save. The Response Received Date and Outcome fields are typically filled at a
later date.
10.31.2 Issuing a breach of conditions letter
To issue a breach of conditions letter, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
Note: You can also search for a cardholder in the Breach of Conditions window by
clicking Search.
2. Click the Breach of Conditions tab.
3. Click BOC Admin.
4. If the cardholder has more than one breach, select the breach for which you want to issue
a letter.
5. If necessary, format the letter by clicking Format BOC Letter. Make the required edits,
click Save, then Close.
92
A2SE8-QG-0321-1
Quick Start Guide
6. Click Preview. Review the letter and amend if necessary.
7. Click Print to print the letter or click Save to save the letter.
10.31.3 Viewing breach history of a cardholder
The Breach of Conditions window contains a list of all the breaches associated with a
cardholder, sorted in date order.
To view the breach history of the cardholder, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
Note: You can also search for a cardholder in the Breach of Conditions window by
clicking Search.
2. Click the Breach of Conditions tab.
3. Click BOC Admin. All breaches assigned to the cardholder are displayed in the Breach of
Conditions pane.
4. Select the relevant breach to view the details.
10.31.4 Editing a breach of conditions
To edit a breach, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
Note: You can also search for a cardholder in the Breach of Conditions window by
clicking Search.
2. Click the Breach of Conditions tab.
3. Click BOC Admin.
4. From the Breach of Conditions pane, select the breach you want to edit.
5. Make the required edits and click Save.
10.31.5 Deleting a breach of conditions
To delete a breach, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
Note: You can also search for a cardholder in the Breach of Conditions window by clicking
Search.
2. Click the Breach of Conditions tab.
3. Click BOC Admin.
4. From the Breach of Conditions pane, select the breach you want to delete.
5. Click Delete and click Yes to confirm deletion.
10.32 Referring a cardholder
You can add a referral to a cardholder record to flag the cardholder for a particular reason, for
example, if they cause suspicion or fail to complete the necessary paperwork. A referral does
not physically restrict a cardholder’s access or track their movements throughout the site.
93
CHAPTER 10
When a cardholder has been placed on the referred list, the Referred radio button is selected
in the System Information pane and the word Referred is displayed in red font at the top of the
Personnel window.
10.32.1 Adding a referral
To add a referral, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. From the toolbar, click Cards, and select Referral.
3. Click Add.
4. Type a reason for the referral into the Reason field and click Save.
5. Click Close.
10.32.2 Editing a referral
To edit a referral, complete the following steps:
1. In Personnel, click Cards, and select Referral.
2. Edit the text in the Reason field and click Save.
3. Click Close.
10.32.3 Deleting a referral
To delete a referral, complete the following steps:
1. In Personnel, click Cards, and select Referral.
2. Clear the check box for the referral you want to delete and click Save.
10.33 Tracing a cardholder
You can monitor the movements of a cardholder who has raised suspicion by applying a trace
their record in the Personnel application. When you add a trace to a cardholder, the
cardholder’s card is configured so that the swipes appear as a list of transactions at each
device the cardholder passes through. Each time the card is swiped, a pop-up window
displays the cardholder’s details in Alarm + Event Display (AED). If a cardholder has multiple
cards, the trace applies to each card.
10.33.1 Adding a Trace
You can add a trace to an active card.
To add a trace to a cardholder, complete the following steps:
1. In Personnel, perform a search for the cardholder. For more information, see Searching
for a cardholder record on page 68.
2. From the toolbar, click Cards, and select Trace.
3. Click Add.
4. Enter a reason for adding the trace to the cardholder in the Reason field and click Save.
94
A2SE8-QG-0321-1
Quick Start Guide
10.33.2 Deleting a Trace
To delete a trace, complete the following steps:
1. From the Personnel toolbar, click Cards, and select Trace.
2. From the list of traced cardholders, clear the check box corresponding to the cardholder
whose trace you want to delete.
3. Click Save.
10.33.3 Viewing all traces
To view a list of all traced cardholders, click Cards, and select Trace.
10.33.4 Exporting traces
By exporting traces, you can print off a list of traces or save a the list as a CSV or PDF file to
disk.
To export traces, complete the following steps:
1. From the toolbar, click Cards, and select Trace.
2. Click Export.
3. To save the details to an external file, click Save As.
4. To print a list of traces, click Print.
95
CHAPTER 10
96
A2SE8-QG-0321-1
11.1 Introduction to User Options
Chapter 11 User Options
Use the User Options application to create and manage user accounts on the AC2000 system.
You can also restrict the access of a user to particular applications or functionality within
applications.
Note: If you are using a partitioned system, see the Partitioning manual.
11.2 Opening User Options
To open User Options, complete the following step:
• Log on to the AC2000 Floatbar, click Administration, and click User Options.
User
pane
Figure 50 The User Options interface
97
CHAPTER 11
11.2.1 Navigating the user pane
The user pane uses a hierarchy tree to group list entries.
A white arrow denotes list entries that are expandable. Click the arrow to expand the list. A
dark grey arrow denotes an expanded list.
Expanded list entries
Expandable list entry
Figure 51 Expandable list entry
11.3 User accounts
Unique user accounts are used to access AC2000 applications and perform system functions.
They consist of the following elements:
• A unique username and password
• An authorisation level
• Application permissions
• Company restrictions
• Oneshot restrictions
• System permissions
• User template
11.4 Adding a user account
To add a user, complete the following steps:
1. From the list of users in the left pane, click Users.
2. From the toolbar, click Action, and click Add User.
3. Configure the parameters of the Add User pane. For more information, see Parameters of
the Add User pane on page 99.
4. Click Save.
Note: All new accounts are configured with the default system settings. Change these to
restrict the user permissions of the individual. For more information, see Configuring user
account settings on page 99.
98
A2SE8-QG-0321-1
Quick Start Guide
11.4.1 Parameters of the Add User pane
This table describes the parameters of the Add User pane.
Parameter
Username
Password
Confirm Password
Authorisation level
Copy User
Assign template
Description
The username for the user account
The password for the user account
The password for the user account
The authorisation level of the user account
The existing user account settings you want to apply to the new
user account. For more information on copying user settings,
see Copying an existing user on page 105.
The template you want to apply to the user account. For more
information on user templates, see Adding a user template on
page 106.
Table 15: Utilities and applications
11.5 Editing a user account
To edit a user account, complete the following steps:
1. From the list of users in the left pane, select the user you want to edit.
2. Make the edits.
3. Click Save.
11.6 Deleting a user account
To delete a user account, complete the following steps:
1. From the list of users in the left pane, click the account you want to delete.
2. From the toolbar, click Actions, and select Delete User.
3. Click Yes.
11.7 Configuring user account settings
When you add a user account, it is configured with the default settings of the system. Ensure
to configure the settings of each user account.
11.7.1 Changing authorisation level
There are five authorisation levels on the AC2000 system. The highest level of authorisation is
level 4, which is classed as administrator level and is functionally unrestricted. By default, on a
newly installed AC2000 system, levels zero to three all have the same authorisation level and
are classed as users. The system administrator must devise and implement an authorisation
hierarchy. Control authorisation level privileges by limiting access to applications, companies,
oneshot functionality, and system permissions. You can also change the authorisation level of
a user after the user has been created.
Note: You cannot edit users that were created during system installation; for example, cem
and gswizard.
To change the authorisation level, complete the following steps:
99
CHAPTER 11
1. From the list of users in the left pane, select the user.
2. From the Authorization level drop-down list, select the authorisation level for the user.
3. Click Save.
11.7.2 Configuring the account status
Use the Account Status tab to perform the following tasks:
• Assign a user template
• View the status of an account
• Lock and unlock a user account
• Assign a cardholder record to a user
Assigning a user template
To assign a user template, complete the following steps:
1. From the list of users in the left pane, select the account to which you want to assign a
user template.
2. In the Account Status tab, select a template from the Template drop-down menu.
3. Click Save.
For more information, see Adding a user template on page 106.
Viewing the status of an account
The Current Status field indicates the login status of the user.
• Online indicates that the user is logged in to AC2000.
• Offline indicates that the user is currently logged out.
Locking a user account
Accounts are locked either manually or automatically as the result of failed login attempts.
Note: You can configure login attempt restrictions in the Workstation Configuration Tool.
To lock a user account, complete the following steps:
1. From the list of users in the left pane, select the user account you want to lock.
2. Select the Account Status check box.
3. Click Save.
Unlocking user accounts
To unlock a user account, complete the following steps:
1. From the list of users in the left pane, select the user account you want to unlock.
2. Clear the Account Status check box.
3. Click Save.
100
A2SE8-QG-0321-1
Quick Start Guide
Assigning a cardholder record to a user
When a cardholder record is assigned to a user account, the user must swipe their card on a
validation reader at the workstation and enter their username and password to log in to
AC2000.
Note: Ensure the Swipe Login feature is enabled in the Workstation Configuration Tool.
To assign a cardholder record to a user account, complete the following steps:
1. From the list of users in the left pane, select the user.
2. Click Assign.
3. To search for a cardholder record, enter the Personnel serial number of the cardholder
and click Search. Alternatively, click Swipe and present the pass of the cardholder to the
validation reader. The result displays the surname, first name, and company of the
cardholder.
Search result
4. Click Save.
Figure 52 Assigning a cardholder to an account
Deleting a cardholder record
To delete a cardholder record, complete the following steps:
1. From the list of users in the left pane, select the user to delete.
2. Click Delete.
Changing a user account password
To change a user account password, complete the following steps:
1. From the list of users in the left pane, select the user.
2. In the Account Status tab, click Change password.
3. Type the new password.
4. Type the password again to confirm.
5. Click Save.
Allocating web dashboard widget groups
You can allocate a web dash widget group to a user account that has access to the Web
Dashboard application. These groups control which widgets are available when a user
assesses the AC2000 WEB Dashboard.
To allocate a widget group to an account, complete the following steps:
1. From the list of users in the left pane, select the user.
2. From the Web Dash Widget Group drop-down menu, select the widget group.
101
CHAPTER 11
3. Click Save.
Note: Web Dash Widget Groups are created using the Dashboard Widget application in the
AC2000 WEB Pages. For further information, see the AC2000 WEB manual.
Widget Group
List of widgets in the assigned group
Figure 53 Assigning Web Dashboard Widget Groups to a user
11.7.3 Using the Applications tab
Use the Applications tab to assign and remove access to users for specific applications.
There are three tabs in the Applications tab: Workstation, Web, and Security Hub.
Assigning applications
Figure 54 The Applications tab
To assign applications to a user, complete the following steps:
1. From the list of users in the left pane, select the user.
2. Click the Applications tab.
3. From the Not Selected pane, select the applications you want to make available to the
user by selecting the check box.
4. Click Save.
Note: Selected applications move to the Selected pane.
Removing applications
To remove applications from a user, complete the following steps:
102
A2SE8-QG-0321-1
Quick Start Guide
1. From the list of users in the left pane, select the user.
2. Click the Applications tab.
3. From the Selected Pane, clear the check boxes corresponding to the applications you
want to make unavailable to the user.
4. Click Save.
11.7.4 Using the Company Restriction tab
Several companies can use the same AC2000 system. Use the Company Restrictions tab to
set which company records are viewable by a user account.
Note: Restrictions apply only to Personnel, Company, Visitors and Vehicles applications.
Show companies to a user
To allow a user to view companies, complete the following steps:
1. From the list of users in the left pane, select the user.
2. Click the Company Restriction tab.
3. Select the Enable company restrictions check box.
4. From the list of companies in the Hidden pane, select the companies you want to make
visible to the user, and click Save.
Note: Selected companies move to the Visible pane.
Hiding companies from a user
To hide companies from a user, complete the following steps:
1. From the list of users in the left pane, select the user.
2. Click the Company Restriction tab.
3. From the Visible list, clear the check boxes for the companies you want to hide from the
user, and click Save.
11.7.5 Oneshot restriction
Limit the devices on which a user can perform a oneshot using the Oneshot Restriction tab.
To do this, restrict the access levels associated with the user account for the oneshot function.
Note: Users automatically have access to oneshot functionality for all devices by default.
Restricting access levels
To restrict access levels, complete the following steps:
1. From the list of users in the left pane, select the user.
2. Click the Oneshot Restriction tab.
3. From the Allowed pane, select the access levels you want to restrict from the user and
click Save.
Allowing access levels
To allow access levels, complete the following steps:
1. From the list of users in the left pane, select the user.
103
CHAPTER 11
2. Click the Oneshot Restriction tab.
3. From the Restricted pane, clear the access levels to which the user has access.
4. Click Save.
11.8 System Permissions
Application checkpoints limit the functions available on specific applications. Use this feature
to set the minimum authorization level of the user to complete certain tasks.
Field checkpoints restrict the display and write permissions of selected fields in the Company,
Personnel, Company, and Vehicles applications. Select the minimum authorisation levels that
have display and write permissions for each individual field. For example, level two users can
have display only access to all of the Personnel fields.
To enable system permissions, complete the following steps:
1. From the toolbar, click System Permissions.
2. Choose the checkpoint type.
• Application Checkpoints
• Field Checkpoints
Figure 55 The System permissions window
11.8.1 Configuring application checkpoints
To configure an application checkpoint, complete the following steps:
1. In User Options, click System Permissions.
2. Click Application Checkpoints.
3. From the Application Name drop-down list, select the application you want to configure.
104
A2SE8-QG-0321-1
Quick Start Guide
4. From the list of checkpoints, select the authorisation level required to perform the function
from the Authorization level drop-down list.
Note: Any user assigned to this level and above has access to this function.
5. Click Save.
11.8.2 Configuring field checkpoints
To configure field checkpoints, complete the following tasks:
1. Click Field Checkpoints.
2. Select the Application from the drop-down list.
3. From the available Checkpoints list, select the field to be configured.
4. Select the authorisation level for the Display Authorisation. Any user assigned this level
and above can view the field.
5. Select the authorisation level for the Write Authorisation. Any user assigned this level
and above can write or update the field.
6. Click Save.
11.9 Copying an existing user
When you add a user, you can copy the application settings of that user to any other user.
To copy the settings of a user, complete the following steps:
1. From the list of users in the left pane, select Users.
2. From the toolbar, click Action, and select Add User.
3. Configure the parameters of the Add User pane. For more information, see Parameters of
the Add User pane on page 99.
4. From the Copy User drop-down list, select the user account whose settings you want to
copy. The Details to copy parameter is displayed.
Figure 56 The Copy User details options
5. Select the check box for the settings you want to copy. The options are as follows:
• Applications
• Oneshot Restriction
• Company Restriction
6. Click Save.
105
CHAPTER 11
11.10 Adding a user template
Use templates to apply the same user options settings to multiple users. You can create a user
with specific settings or apply a template. If you apply a template to a user account, you can
not make changes to that individual user account. You must make the changes at template
level. Changes made to a template apply to all users associated with that template.
To create a user template, complete the following steps:
1. From the list of users in the left pane, select Default partition.
2. From the toolbar, click Action, and select Add template.
3. Enter a unique name for the template.
4. Select the authorisation level you want to apply.
5. Click Save.
The new template is displayed in the list of users on the left.
Available templates
Figure 57 User templates
6. Configure the template settings in the same way that you configure a user account. For
more information, see page 98 to page 105.
11.10.1 Editing a template
To edit a template, complete the following steps:
1. From the list of users in the left pane, select the template to edit.
2. Make the edits.
3. Click Save.
11.10.2 Deleting a template
To delete a template, complete the following steps:
1. From the list of users in the left pane, select the template to delete.
2. From the toolbar, click Actions, and select Delete Template.
3. Click Yes.
11.11 Printing a user report
You can print a report of all users on the system and view details of authorisation level,
application permissions, restrictions, and cardholder status.
To print a user report, complete the following steps:
1. From the toolbar, click Report.
2. Click Print.
3. Select the printer and click Print.
106
A2SE8-QG-0321-1
Quick Start Guide
11.12 Exporting a user report
You can export a user report to a CSV or PDF file. You can also export or print a report for a
single user by selecting that user from the user pane and then clicking Report.
To export a user report, complete the following steps:
1. From the toolbar, click Report.
2. Click Save As.
3. To export the report to a CSV or PDF file, select a File Type, either Delimited or PDF. The
list of elements exports to the default directory -
C:\Program Files\CEM Systems\AC2000\Reports\ -
with a filename which reflects the application name, date and time of export. The following
format is used: <applicationName>_YYYYMMDD_HHMM.
4. To change the directory where the list is to be stored, click Change and navigate to the
desired location.
5. If you are exporting as a .csv file, by default the list is exported using a Comma as the
delimiter. To change the delimiter select the preferred delimiter from those available: Tab,
Pipe, Semicolon, or a Comma; alternatively, you can select Other and enter the delimiter
that you want to use. If you are exporting as a PDF file, the options for delimiters are not
be displayed.
6. Click Save.
107
CHAPTER 11
108
A2SE8-QG-0321-1
Quick Start Guide
Chapter 12 Testing
12.1 Introduction to testing
When you complete the Getting Started Wizard, test the card and generate a transaction
report to check that everything is working as it should.
Important: CEM Systems recommends testing one card before validating more cards on the
system, to ensure the card and system have been setup correctly.
12.2 Test Card
To test a card, complete the following steps:
1. Swipe a validated card at a door reader. Do not use a validation reader.
2. Check the reader response.
Message
DOOR OPEN/CARD VALID
WRONG ZONE
CARD NOT IN SYSTEM
INVALID CARD
CARD EXPIRED
Description
The configuration has been set up correctly.
The card has been validated but is not set up to access the
reader. Check access levels and access groups.
The card number is not validated on the system. This may
be a validation issue with the setup of the validation reader.
An incorrect card format or site code has been selected.
Check the card type.
Check the card status in Personnel.
Table 16: Reader messages
12.2.1 Generate a transaction report
If the validation reader does not have an LCD display and therefore cannot display the reader
messages as described in Table 16 on page 109, generate a Transaction report to test the
configuration.
To generate a transaction report, complete the following steps:
1. From the AC2000 Floatbar, click Administration, and click Extended Reports.
2. Click Reports and select Transaction Report.
3. Click Generate.
Refer to Table 16 on page 109 for an explanation of any reader messages and their meaning.
109
CHAPTER 12
110
A2SE8-QG-0321-1
Quick Start Guide
13.1 Introduction to Backup
Chapter 13 Backing Up AC2000
Use the AC2000 web application Backup to back up data. The backup method you select dictates
whether a full server backup or a data-only backup is completed.
13.1.1 Opening Backup
To open Backup, complete the following steps:
1. Open a web browser. CEM recommends using Internet Explorer 10 (IE10) or above.
2. Enter the CDC IP address, for example, https://192.168.1.10.
3. Select the language from the drop-down list. English is the default language.
4. Enter the username and password.
Note: Your username and password support mixed case and hyphens or dashes. However, hyphens
or dashes can not be placed at the beginning of the username or password.
5. Select the authorisation check box if required.
6. Click Login.
7. In AC2000 WEB, click System, and click Backup.
13.1.2 Types of backup
Full server backup: All data and the server operating system is backed up: Tape and Drive options
only.
Data only backup: All data is backed up but not the operating system: Download File and FTP
options only.
Network backup: All data is backed up and stored onto a network drive specified by the user: The
Network option performs a full server backup.
13.1.3 The importance of backing up
Important: Failure to regularly backup the system can result in the total loss of all data on an AC2000
system, including all card records, reader configurations, transactions, and personnel records. If a
backup has not been configured these cannot be recovered and the system will have to be rebuilt.
There are many factors that can cause a system failure that results in a loss of data including:
• Server component failure
• Unforeseen risks such as fire, flood, theft, malicious damage
• Human error
13.1.4 Configuring backup
To configure the backup, complete the following steps:
1. Using an internet browser, log on to AC2000 WEB, and click Backup.
2. Select the appropriate backup option by clicking the radio button beside it.
3. Click SAVE SETTINGS and click OK.
111
CHAPTER 13
4. Click RUN BACKUP.
Backup Option AC2000 Lite AC2000 SE/AE Software Only Lite
Download File
FTP
Network
Tape/DVD
Drive/USB
Table 17: List of compatible backup options for specific AC2000 systems
Note: The AC2000 system automatically runs a backup process at 00:01 daily. This file is transferred
to the selected backup media.
Download file
The Download File option creates a backup of only the system data. This backup file is NOT
automatically transferred and must be manually downloaded to a secure location daily.
To download a file, complete the following steps:
1. Select the Download File radio button.
2. Click SAVE SETTINGS and click OK.
3. Click RUN BACKUP.
4. Check that the Last Backup was complete successfully.
5. Click Download and click Save.
Figure 58 Last backup date
6. Browse to the location of the network device. Save the backup file in this location.
Note: This workflow is also dependant on your web browser. On some browsers, clicking Save
saves the file to your Downloads folder. If you click Save As, you must select the location for the
file you are saving.
7. Click Save.
FTP
Use the FTP option to create a backup of only system data. The data is saved to a directory on an FTP
server automatically at 00:01 daily.
To create a backup of the system data, complete the following steps:
1. Select the FTP radio button.
2. Complete the IP Address, Username, Password, and Directory fields of the FTP server. This
sets where the backup file is saved.
3. Click SAVE SETTINGS and click OK.
Note: It is recommended that the FTP server is checked to ensure that the file has transferred.
112
A2SE8-QG-0321-1
Quick Start Guide
Network
Use the Network option to perform a full server backup on a network drive specified by the user.
To create a network backup, complete the following steps:
1. Select the Network radio button.
2. In the right pane, configure the parameters. For more information, see Parameters of the network
backup pane on page 113.
3. Click SAVE SETTINGS and click OK.
Parameters of the network backup pane
This table describes the parameters of the network backup pane.
Parameter
Type
IP Address
Share Name
Disk Space Limit
(MB)
Username
Password
Domain
Description
Defines the share protocol. The options are NFS and CIFS.
The IP address of the destination server where the backup is stored.
The name of the share.
The disk space limit for the backup in megabytes.
The authentication username required to access the network share.
This can be left empty if authentication is not required.
The authentication password required to access the network share.
This can be left empty if authentication is not required.
This can be left empty.
Table 18: Parameters of the network backup pane
Tape - SE and AE systems only
The Tape option creates a complete backup of both the data and the server operating system. The
backup will automatically save to the media at 00:01 daily.
To create a complete backup of the data and the server operating system, complete the following
steps:
1. Select the Tape radio button.
2. Click SAVE SETTINGS and click OK.
Note: It is recommended that the Tape is replaced daily and stored in a secure location offsite in line
with organisational IT backup policies.
Drive - USB HD, USB memory stick, Removable HD
Use the Drive option to create a backup of the database and system files. The data is saved to a
directory on an external drive. The backup automatically saves to the media at 00:01 daily.
To create a backup of the database and system files, complete the following steps:
1. Select the Drive radio button.
2. Attach the removable storage device to the server.
3. Click Initialise on the Media or Drive for Backup option.
4. This prepares the drive for the file by installing the media on the CDC and performing any
necessary formatting.
5. Click SAVE SETTINGS and click OK.
113
CHAPTER 13
Important: A failed backup will trigger an alarm in the AED application.
13.1.5 Creating a manual backup
A backup is automatically set up to run each night. However, you can create a manual backup using
Run Backup.
To create a manual backup, complete the following steps:
1. Click Run Backup.
2. There is no change on the page to let you know when the backup is created. Refresh the web page
and check the time of the Last Backup.
3. Click the History button. Check the last record with the expected start and finish times, green
display and that the outcome is successful.
Note: In order for the file download function to operate correctly, you must set your web browser to
allow pop-ups. Therefore, disable pop-up blockers on your web browser.
13.1.6 Backup recommendations
The following recommendations are suggested for Backup:
• It is important to implement a structured backup strategy in your organisation. Failure to properly
backup the system could result in a total and permanent loss of data.
• Backups must be performed daily so that, in the event of a system failure, no more than 24 hours
worth of data will be lost.
• Backups must be stored in a separate secure location away from the AC2000 server to protect
them from the same risks.
• If using the Download backup option, maintain a schedule to track that the downloads are
completed regularly.
• If you require assistance to configure and maintain backups, contact CEM support.
114
A2SE8-QG-0321-1
Quick Start Guide
13.2 Upload Backup
Although backup files can be saved in a number of different locations, they can only be restored from a
local machine. Therefore, they need to be uploaded to your CDC first.
13.2.1 Opening Upload Backup
To open Upload Backup, complete the following steps:
• In AC2000 WEB, click System, and click Upload Backup.
Figure 59 The upload backup page
Note: Ensure the appropriate backup option has been selected in Backup before uploading a backup
file.
To use the Upload Backup application, complete the following steps:
1. Using the Choose File button, navigate to the backup file you want to restore.
2. Click Open, and click Upload.
3. When the backup file has been uploaded to the CDC, it can then be restored. See the following
section, Restore Backup.
13.3 Restore Backup
Use the Restore Backup application to check the backup file. If the backup file is OK, perform a
system restore.
13.3.1 Opening Restore Backup
To open Restore Backup, complete the following steps:
• In AC2000 WEB, click System, and click Restore Backup.
Figure 60 Checking the Backup File
Note: When completing a restore on a new system the Operating System must be installed first.
1. To check the backup file, click Check.
115
CHAPTER 13
Figure 61 Restoring a backed up server
2. If the backup file is OK, read the warning and click Restore.
Important: Any information added to the server since the backup was saved will be lost after the
restore.
116
A2SE8-QG-0321-1