ProAccess SPACE User Manual v6
ProAccess SPACE User Manual v6
1. Introduction .............................................................................................................. 17
1. 1. About this Manual ..................................................................................................... 17
1. 2. Intended Audience ................................................................................................... 17
1. 3. Manual Roadmap ..................................................................................................... 17
2. System Overview ..................................................................................................... 19
2. 1. About ProAccess ...................................................................................................... 19
SALTO Virtual Network .................................................................................. 19
SALTO Data-on-Card .................................................................................... 19
Transferring and Updating Access Information .............................................. 19
2. 2. SALTO Network Components .................................................................................. 20
2. 3. ProAccess System Components .............................................................................. 21
ProAccess SPACE......................................................................................... 22
SQL Server and Database ............................................................................. 23
SALTO Service .............................................................................................. 23
Local IO Bridge .............................................................................................. 24
3. Installation ................................................................................................................ 25
3. 1. About Installing ......................................................................................................... 25
3. 2. Installation Process .................................................................................................. 25
3. 3. Installation Prerequisites .......................................................................................... 26
3. 4. Registering and Licensing SALTO Software ............................................................. 26
3. 5. Downloading SALTO Software ................................................................................. 27
3. 6. Installing SALTO Software Components................................................................... 27
3. 6. 1. Installing ProAccess SPACE .......................................................................... 27
3. 6. 1. 1. Using an Existing SQL Server Engine........................................................ 31
3. 6. 1. 2. Migrating Data from a Microsoft Access Database..................................... 35
3. 6. 2. Installing the Local IO Bridge ......................................................................... 37
3. 6. 2. 1. Installing from the Settings Screen ............................................................ 37
3. 6. 2. 2. Installing from the About Dialog Box .......................................................... 40
3. 7. Updating SALTO Software Licenses ........................................................................ 40
3. 7. 1. 1. Updating the License from the About Dialog Box ....................................... 42
3. 7. 1. 2. Updating the License from the Features Dialog Box .................................. 42
2
3. 8. Checking ProAccess SPACE Configuration ............................................................. 42
4. Getting Started ......................................................................................................... 46
4. 1. About Getting Started ............................................................................................... 46
4. 2. Logging In to ProAccess SPACE .............................................................................. 46
4. 2. 1. Admin Interface.............................................................................................. 48
4. 2. 2. Hotel Interface ............................................................................................... 49
4. 3. Configuring Operator Settings .................................................................................. 49
4. 3. 1. Default Operators .......................................................................................... 49
4. 3. 2. Default Operator Groups ................................................................................ 49
4. 3. 3. Managing Passwords..................................................................................... 49
4. 3. 4. Changing the Default Language .................................................................... 50
4. 3. 4. 1. Changing the Default Language in ProAccess SPACE .............................. 50
4. 3. 5. Managing Local Settings ................................................................................ 51
4. 3. 5. 1. Encoder Settings ....................................................................................... 51
4. 3. 5. 2. PPD Settings ............................................................................................. 52
4. 3. 5. 3. Date and Time ........................................................................................... 52
4. 4. Using ProAccess SPACE ......................................................................................... 52
4. 4. 1. Interface Components.................................................................................... 52
4. 4. 1. 1. Operator Area ............................................................................................ 53
4. 4. 1. 2. Main Menu Bar .......................................................................................... 53
4. 4. 1. 3. Quick-Access Tiles .................................................................................... 54
4. 4. 2. Common Screen Tasks ................................................................................. 54
4. 4. 2. 1. Using the Sidebar to Associate Entries ...................................................... 54
4. 4. 2. 2. Adding and Deleting from Selection Lists ................................................... 55
4. 4. 2. 3. Copying Information Using Same As… ...................................................... 56
4. 4. 2. 4. Filtering Data by Search Term ................................................................... 56
4. 4. 2. 5. Multi selection of rows ............................................................................... 57
4. 4. 2. 6. Columns in entity-list screens can be swapped and their position memorized
59
4. 4. 2. 7. Sorting Data Chronologically or Alphabetically ........................................... 60
4. 4. 2. 8. Printing and Exporting Data in ProAccess SPACE..................................... 60
4. 4. 2. 9. Users Multi edition ..................................................................................... 62
4. 4. 2. 10. Copy entities access configuration ........................................................... 63
4. 5. Logging Out of ProAccess SPACE ........................................................................... 65
4. 6. Setup Checklist ........................................................................................................ 65
5. Access Points ........................................................................................................... 68
3
5. 1. Access Points Process ............................................................................................. 68
5. 2. About Access Points................................................................................................. 69
5. 3. Doors ....................................................................................................................... 70
5. 3. 1. Creating Doors............................................................................................... 70
5. 3. 2. Configuring Doors .......................................................................................... 72
5. 3. 2. 1. Connection Types ...................................................................................... 72
5. 3. 2. 2. Opening Modes and Timed Periods ........................................................... 74
5. 3. 2. 3. Opening Times .......................................................................................... 76
5. 3. 2. 4. Calendars and Time Zones ........................................................................ 76
5. 3. 2. 5. Door Options ............................................................................................. 77
5. 3. 2. 6. Enabling Anti-passback ............................................................................. 78
5. 3. 2. 7. Adding or Changing Door Opening Modes................................................. 79
5. 3. 2. 8. CU4200 Standalone .................................................................................. 80
5. 3. 3. Associating Doors .......................................................................................... 81
5. 3. 3. 1. Users ......................................................................................................... 81
5. 3. 3. 2. Access Levels ............................................................................................ 82
5. 3. 3. 3. Zones ........................................................................................................ 83
5. 3. 3. 4. Automatic Outputs ..................................................................................... 83
5. 3. 3. 5. Lockdaow Areas ........................................................................................ 84
5. 3. 3. 6. Locations/Functions ................................................................................... 86
5. 3. 4. Door Icons ..................................................................................................... 87
5. 3. 5. Print ............................................................................................................... 88
5. 4. Energy Saving Devices ............................................................................................ 89
5. 4. 1. Creating ESDs ............................................................................................... 89
5. 4. 2. Associating ESDs with Users ......................................................................... 90
5. 4. 3. Associating ESDs with Access Levels ........................................................... 90
5. 4. 4. Associating Users with the ESD_#1 and ESD_#2 Outputs............................. 90
5. 4. 5. Associating User Access Levels with the ESD_#1 and ESD_#2 Outputs ....... 90
5. 5. Lockers..................................................................................................................... 90
5. 5. 1. Creating Lockers............................................................................................ 90
5. 5. 2. Configuring Lockers ....................................................................................... 93
5. 5. 2. 1. Connection type ......................................................................................... 93
5. 5. 2. 2. Opening Modes and Timed Periods ........................................................... 93
5. 5. 2. 3. Opening Times and Time Zones ................................................................ 93
5. 5. 2. 4. Locker Options .......................................................................................... 94
5. 5. 3. Associating Lockers ....................................................................................... 95
4
5. 5. 3. 1. Users ......................................................................................................... 95
5. 5. 3. 2. Access Levels ............................................................................................ 96
5. 5. 3. 3. Zones ........................................................................................................ 96
5. 5. 4. Locker Icons .................................................................................................. 96
5. 5. 5. Lockers and Visitors....................................................................................... 96
5. 6. Zones ....................................................................................................................... 97
5. 6. 1. Creating Zones .............................................................................................. 97
5. 6. 2. Configuring Zones ......................................................................................... 99
5. 6. 3. Associating Zones ......................................................................................... 99
5. 6. 3. 1. Access Points ............................................................................................ 99
5. 6. 3. 2. Users ....................................................................................................... 100
5. 6. 3. 3. Access Levels .......................................................................................... 100
5. 6. 4. Creating Free Assignment Zones................................................................. 101
5. 7. Locations ................................................................................................................ 101
5. 7. 1. Creating Locations ....................................................................................... 102
5. 7. 2. Associating Locations .................................................................................. 103
5. 7. 2. 1. Users ....................................................................................................... 103
5. 7. 2. 2. Access Points .......................................................................................... 104
5. 8. Functions................................................................................................................ 104
5. 8. 1. Creating Functions ....................................................................................... 104
5. 8. 2. Associating Functions .................................................................................. 106
5. 8. 2. 1. Users ....................................................................................................... 106
5. 8. 2. 2. Access Points .......................................................................................... 106
5. 9. Outputs................................................................................................................... 106
5. 9. 1. Creating Outputs.......................................................................................... 107
5. 9. 2. Associating Outputs ..................................................................................... 108
5. 9. 2. 1. Users ....................................................................................................... 108
5. 9. 2. 2. Access Levels .......................................................................................... 108
5. 9. 2. 3. Access Points .......................................................................................... 108
5. 9. 3. Automatic Outputs ....................................................................................... 109
5. 10. Lockdown Areas ..................................................................................................... 109
5. 10. 1. Creating Lockdown Areas ............................................................................ 110
5. 10. 2. Associating Lockdown Areas ....................................................................... 111
5. 10. 2. 1. Access Points ........................................................................................ 111
5. 11. Limited Occupancy Areas ....................................................................................... 111
5. 11. 1. Creating Limited Occupancy Areas .............................................................. 111
5
5. 11. 2. Associating Limited Occupancy Areas ......................................................... 113
5. 11. 2. 1. Access Points ........................................................................................ 113
5. 11. 2. 2. Limited Occupancy Groups .................................................................... 113
5. 12. Roll-Call Areas ....................................................................................................... 113
5. 12. 1. Creating Roll-Call Areas .............................................................................. 114
5. 12. 1. 1. Creating Roll-Call Exterior Areas ........................................................... 115
5. 12. 2. Associating Roll-Call Areas .......................................................................... 116
5. 12. 2. 1. Readers ................................................................................................. 116
5. 13. Access Point Timed Periods ................................................................................... 116
5. 13. 1. Creating Access Point Timed Periods .......................................................... 117
5. 14. Access Point Automatic Changes ........................................................................... 118
5. 14. 1. Creating Access Point Automatic Changes .................................................. 118
5. 14. 2. Managing Access Point Automatic Changes ................................................ 121
5. 14. 2. 1. Copying Automatic Changes – Day to Day ............................................ 121
5. 14. 2. 2. Copying Automatic Changes – Entry to Entry ........................................ 123
6. Cardholders ............................................................................................................ 126
6. 1. About Cardholders ................................................................................................. 126
6. 1. 1. About Cardholder Configuration ................................................................... 126
6. 2. Cardholders Process .............................................................................................. 126
6. 3. Users ...................................................................................................................... 127
6. 3. 1. Creating Users ............................................................................................. 127
6. 3. 1. 1. Adding Additional Information .................................................................. 130
6. 3. 1. 2. Assigning Keys ........................................................................................ 130
6. 3. 1. 3. Banning Users ......................................................................................... 131
6. 3. 1. 4. Adding User Images ................................................................................ 133
6. 3. 1. 5. Printing User Profiles ............................................................................... 134
6. 3. 1. 6. Deleting Users ......................................................................................... 134
6. 3. 1. 7. Reports on Calculation on Working Hours ............................................... 135
6. 3. 2. Configuring Users ........................................................................................ 135
6. 3. 2. 1. Identification ............................................................................................ 135
6. 3. 2. 2. Mobile Phone Data .................................................................................. 136
6. 3. 2. 3. Key Options ............................................................................................. 136
6. 3. 2. 4. PIN Codes ............................................................................................... 137
6. 3. 2. 5. User and Key Expiration .......................................................................... 137
6. 3. 2. 6. Dormitory Doors....................................................................................... 138
6. 3. 2. 7. Limited Occupancy Groups ...................................................................... 138
6
6. 3. 2. 8. Card Printing Templates .......................................................................... 138
6. 3. 3. Associating Users ........................................................................................ 139
6. 3. 3. 1. Access Points .......................................................................................... 139
6. 3. 3. 2. User Access Levels ................................................................................. 141
6. 3. 3. 3. Zones ...................................................................................................... 141
6. 3. 3. 4. Outputs .................................................................................................... 142
6. 3. 3. 5. Locations/Functions ................................................................................. 142
6. 4. User Access Levels ................................................................................................ 144
6. 4. 1. Creating User Access Levels ....................................................................... 144
6. 4. 2. Associating User Access Levels .................................................................. 145
6. 4. 2. 1. Access Points .......................................................................................... 145
6. 4. 2. 2. Zones ...................................................................................................... 146
6. 4. 2. 3. Users ....................................................................................................... 146
6. 4. 2. 4. Outputs .................................................................................................... 146
6. 5. Limited Occupancy Groups .................................................................................... 147
6. 5. 1. Creating Limited Occupancy Groups ........................................................... 147
6. 5. 2. Associating Limited Occupancy Groups ....................................................... 148
6. 5. 2. 1. Users ....................................................................................................... 148
6. 5. 2. 2. Limited Occupancy Areas ........................................................................ 149
6. 6. Cardholder Timetables ........................................................................................... 150
6. 6. 1. Creating Cardholder Timetables .................................................................. 150
6. 6. 2. Copying Cardholder Timetables ................................................................... 152
7. Visitors ................................................................................................................... 154
7. 1. About Visitors ......................................................................................................... 154
7. 1. 1. About Visitor Configuration .......................................................................... 154
7. 2. Visitors Process...................................................................................................... 154
7. 3. Visitor Access Levels.............................................................................................. 155
7. 3. 1. Creating Visitor Access Levels ..................................................................... 155
7. 3. 2. Associating Visitor Access Levels ................................................................ 156
7. 3. 2. 1. Access Points .......................................................................................... 156
7. 3. 2. 2. Zones ...................................................................................................... 157
7. 3. 2. 3. Outputs .................................................................................................... 158
7. 4. Visitor Check-Ins .................................................................................................... 158
7. 4. 1. Visitor Check-In Information ......................................................................... 160
7. 5. Visitor Check-Outs ................................................................................................. 160
7. 6. Managing Visitor Lists ............................................................................................ 161
7
7. 6. 1. Viewing Visitors ........................................................................................... 161
7. 6. 2. Printing Visitor the List ................................................................................. 161
7. 6. 3. Deleting Expired Visitors .............................................................................. 162
8. Hotels ..................................................................................................................... 163
8. 1. About Hotels ........................................................................................................... 163
8. 1. 1. About Hotel Configuration ............................................................................ 164
8. 2. Hotels Processes ................................................................................................... 164
8. 3. About Hotel Access Points ..................................................................................... 165
8. 4. Rooms .................................................................................................................... 165
8. 4. 1. Creating Rooms ........................................................................................... 165
8. 4. 2. Configuring Rooms ...................................................................................... 167
8. 4. 2. 1. Opening Modes ....................................................................................... 167
8. 4. 2. 2. Connection Types .................................................................................... 167
8. 4. 2. 3. Associated Device Lists ........................................................................... 168
8. 4. 2. 4. Room Options.......................................................................................... 169
8. 4. 2. 5. Opening Times ........................................................................................ 170
8. 4. 2. 6. Suites ...................................................................................................... 170
8. 4. 2. 7. Time Zones.............................................................................................. 170
8. 4. 3. Associating Rooms ...................................................................................... 170
8. 4. 3. 1. Automatic Outputs ................................................................................... 170
8. 4. 3. 2. Zones ...................................................................................................... 171
8. 4. 3. 3. Users ....................................................................................................... 172
8. 4. 3. 4. Access Levels .................................................................................... 172
8. 5. Suites ..................................................................................................................... 173
8. 5. 1. Creating Suites ............................................................................................ 173
8. 5. 2. Configuring Suites ....................................................................................... 174
8. 5. 2. 1. Opening Modes ....................................................................................... 174
8. 5. 2. 2. Connection Types .................................................................................... 175
8. 5. 2. 3. Associated Device Lists ........................................................................... 175
8. 5. 2. 4. Suite Options ........................................................................................... 175
8. 5. 2. 5. Opening Times ........................................................................................ 175
8. 5. 2. 6. Time Zones.............................................................................................. 175
8. 5. 3. Associating Suites ....................................................................................... 175
8. 5. 3. 1. Automatic Outputs ................................................................................... 175
8. 5. 3. 2. Rooms ..................................................................................................... 176
8. 5. 3. 3. Zones ...................................................................................................... 176
8
8. 6. Room and Suite Icons ............................................................................................ 176
8. 7. Creating Multiple Rooms and Suites....................................................................... 177
8. 7. 1. Creating Multiple Rooms .............................................................................. 177
8. 7. 2. Creating Multiple Suites ............................................................................... 179
8. 8. Checking Room and Suite Status ........................................................................... 179
8. 8. 1. Checking ESD Status .................................................................................. 180
8. 9. Configuring Hotel Keys ........................................................................................... 180
8. 9. 1. Copying Guest Keys .................................................................................... 181
8. 9. 2. Cancelling Guest Lost Keys ......................................................................... 182
8. 9. 3. Creating One Shot Keys .............................................................................. 182
8. 9. 4. Creating Programming/Spare Keys .............................................................. 183
8. 9. 4. 1. Creating Programming Keys .................................................................... 183
8. 9. 4. 2. Copying Programming Keys .................................................................... 184
8. 9. 4. 3. Editing Spare Keys .................................................................................. 186
8. 9. 4. 4. Editing Spare Key Copies ........................................................................ 186
8. 9. 5. Editing Guest Cancelling Keys ..................................................................... 188
8. 9. 6. Editing Room Cleaner Keys ......................................................................... 188
8. 10. Hotel Guests .......................................................................................................... 188
8. 11. Guest Access Levels .............................................................................................. 189
8. 11. 1. Creating Guest Access Levels ..................................................................... 189
8. 11. 2. Associating Guest Access Levels ................................................................ 190
8. 11. 2. 1. Zones .................................................................................................... 190
8. 11. 2. 2. Outputs .................................................................................................. 192
8. 11. 2. 3. Guests ................................................................................................... 192
8. 12. Guest Check-In ...................................................................................................... 192
8. 12. 1. Selecting Rooms.......................................................................................... 193
8. 12. 1. 1. JustIN Mobile check-in ........................................................................... 195
8. 12. 2. Adding Check-In Information........................................................................ 199
8. 12. 3. Changing Stay Duration ............................................................................... 200
8. 13. Guest Check-Out .................................................................................................... 201
8. 14. Group Check-In ...................................................................................................... 202
8. 14. 1. Entering Group Check-In Information ........................................................... 202
8. 14. 1. 1. Check-In Group Icons ............................................................................ 206
8. 14. 2. Pre-Editing Guest Keys ................................................................................ 206
8. 14. 3. Performing a Group Check-In ...................................................................... 208
8. 15. Group Check-Out ................................................................................................... 209
9
8. 16. Managing Guest Lists ............................................................................................. 210
8. 16. 1. Viewing Guest Lists ..................................................................................... 210
8. 16. 2. Configuring Guests ...................................................................................... 211
8. 16. 2. 1. Adding Additional Information ................................................................ 211
8. 16. 2. 2. Enabling Extended Door Opening Times ............................................... 211
8. 16. 3. Associating Guests ...................................................................................... 212
8. 16. 3. 1. Guest Access Levels ............................................................................. 212
8. 17. Re-Rooming ........................................................................................................... 213
8. 17. 1. Re-Rooming Guests .................................................................................... 213
9. Keys ....................................................................................................................... 215
9. 1. About Keys ............................................................................................................. 215
9. 1. 1. About Key Configuration .............................................................................. 215
9. 1. 2. Types of Keys .............................................................................................. 216
9. 1. 3. Key Status Icons .......................................................................................... 216
9. 2. Reading Keys ......................................................................................................... 217
9. 3. Assigning User Keys .............................................................................................. 218
9. 3. 1. Assigning a user key .................................................................................... 218
9. 3. 2. Assigning a user key for JustIN mSVN application ....................................... 219
9. 3. 3. Assigning a user JustIN Mobile key ............................................................. 221
9. 3. 4. Cancelling Keys ........................................................................................... 222
9. 4. Deleting Keys ......................................................................................................... 223
9. 5. Reset Locker data .................................................................................................. 224
9. 6. Updating Keys ........................................................................................................ 224
9. 7. Assigning Keys Automatically ................................................................................. 225
9. 8. About Blacklists ...................................................................................................... 226
9. 8. 1. Managing Blacklists ..................................................................................... 226
9. 8. 1. 1. Sending User Keys to the Blacklist .......................................................... 226
9. 8. 1. 2. Sending Visitor Keys to the Blacklist ........................................................ 227
9. 8. 1. 3. Sending Guest Keys to the Blacklist ........................................................ 227
10. Monitoring .............................................................................................................. 228
10. 1. About Monitoring .................................................................................................... 228
10. 2. Audit Trails ............................................................................................................. 228
10. 2. 1. Restricting Audit Trail Data .......................................................................... 229
10. 2. 2. Printing and Exporting Audit Trail Lists......................................................... 229
10. 2. 3. Filtering Audit Trail Data .............................................................................. 229
10. 2. 3. 1. Audit Trail Filters .................................................................................... 230
10
10. 2. 4. Advanced Filtering ....................................................................................... 230
10. 2. 4. 1. Step One: Adding Filter Details .............................................................. 230
10. 2. 4. 2. Step Two: Selecting Filter Parameters ................................................... 231
10. 2. 4. 3. Step Three: Specifying Filter Date Periods ............................................ 232
10. 2. 5. Purging Audit Trail Data ............................................................................... 233
10. 3. Online Monitoring ................................................................................................... 233
10. 3. 1. Access points............................................................................................... 234
10. 3. 2. Events.......................................................................................................... 235
10. 4. Lockdown Monitoring.............................................................................................. 237
10. 5. Limited Occupancy Monitoring ............................................................................... 238
10. 6. Roll-Call Monitoring ................................................................................................ 240
10. 6. 1. Searching for Users ..................................................................................... 241
10. 6. 2. Adding Users ............................................................................................... 241
10. 6. 3. Removing Users .......................................................................................... 242
10. 6. 4. Printing User Names .................................................................................... 243
10. 7. Attendance Monitoring............................................................................................ 243
10. 8. Locker Kiosk ........................................................................................................... 244
10. 8. 1. View Locker data ......................................................................................... 245
10. 8. 2. Reset Locker data ........................................................................................ 247
10. 9. Relay outputs ......................................................................................................... 249
11. ProAccess Space Tools ......................................................................................... 252
11. 1. About ProAccess SPACE Tools ............................................................................. 252
11. 2. Entity Exportation ................................................................................................... 252
11. 2. 1. Step One: Job Configuration ........................................................................ 252
11. 2. 2. Step Two: Field Configuration ...................................................................... 254
11. 2. 3. Step Three: Confirmation ............................................................................. 257
11. 3. Scheduling Jobs ..................................................................................................... 258
11. 3. 1. Automatic Audit Trail Purging ....................................................................... 259
11. 3. 1. 1. Step One: Job Configuration .................................................................. 259
11. 3. 1. 2. Step Two: Schedule ............................................................................... 260
11. 3. 1. 3. Step Three: Confirmation ....................................................................... 260
11. 3. 2. Automatic System Auditor Purging ............................................................... 261
11. 3. 2. 1. Step One: Job Configuration .................................................................. 261
11. 3. 2. 2. Step Two: Schedule ............................................................................... 262
11. 3. 2. 3. Step Three: Confirmation ....................................................................... 262
11. 3. 3. Automatic Database Backups ...................................................................... 263
11
11. 3. 3. 1. Step One: Job Configuration .................................................................. 263
11. 3. 3. 2. Step Two: Schedule ............................................................................... 264
11. 3. 3. 3. Step Three: Confirmation ....................................................................... 264
11. 4. Creating Scheduled Jobs ....................................................................................... 264
11. 4. 1. Automatic CSV File Synchronization ............................................................ 264
11. 4. 1. 1. Step One: Job Configuration .................................................................. 264
11. 4. 1. 2. Step Two: Mapping Configuration .......................................................... 266
11. 4. 1. 3. Step Three: Schedule ............................................................................ 267
11. 4. 1. 4. Step Four: Confirmation ......................................................................... 267
11. 4. 2. Automatic Database Table Synchronization ................................................. 267
11. 4. 2. 1. Step One: Job Configuration .................................................................. 267
11. 4. 2. 2. Step Two: Mapping Configuration .......................................................... 269
11. 4. 2. 3. Step Three: Schedule ............................................................................ 270
11. 4. 2. 4. Step Four: Confirmation ......................................................................... 270
11. 4. 3. Automatic Audit Trail Exports ....................................................................... 270
11. 4. 3. 1. Step One: Job Configuration .................................................................. 270
11. 4. 3. 2. Step Two: Field Configuration ................................................................ 272
11. 4. 3. 3. Step Three: Filter Configuration ............................................................. 274
11. 4. 3. 4. Step Four: Schedule .............................................................................. 276
11. 4. 3. 5. Step Five: Confirmation ......................................................................... 276
11. 4. 4. Automatic Users Exports ............................................................................. 276
11. 4. 4. 1. Step One: Job Configuration .................................................................. 276
11. 4. 4. 2. Step Two: Field Configuration ................................................................ 278
11. 4. 4. 3. Step Three: Schedule ............................................................................ 281
11. 4. 4. 4. Step Four: Confirmation ......................................................................... 281
11. 5. Manual Synchronization ......................................................................................... 281
11. 6. Making Database Backups ..................................................................................... 281
11. 6. 1. Restoring Database Backups....................................................................... 282
11. 7. Events Streams ...................................................................................................... 282
11. 7. 1. Step 1: Configuring the General Settings ..................................................... 282
11. 7. 2. Step 2: Selecting the Data Fields ................................................................. 284
11. 7. 3. Step 3: Specifying the Parameters ............................................................... 286
11. 7. 4. Confirming the Configuration Settings .......................................................... 288
11. 8. Card printing ........................................................................................................... 290
11. 8. 1. Text ............................................................................................................. 292
11. 8. 2. Image .......................................................................................................... 293
12
11. 8. 3. Shape .......................................................................................................... 293
11. 8. 4. Line.............................................................................................................. 294
11. 8. 5. Design Icons ................................................................................................ 294
11. 8. 6. Back Design ................................................................................................ 294
11. 9. Using Card Printing Templates ............................................................................... 296
11. 10. Alarm Events ................................................................................................... 297
11. 10. 1. Trigger...................................................................................................... 297
11. 10. 2. Actions: .................................................................................................... 301
11. 11. Reports ........................................................................................................... 306
11. 11. 1. Access points inactivity report .................................................................. 307
11. 11. 2. Locks clock drift report ............................................................................. 308
12. ProAccess SPACE System Configuration .............................................................. 310
12. 1. About ProAccess SPACE System .......................................................................... 310
12. 2. ProAccess SPACE System Process....................................................................... 310
12. 3. System Auditor ....................................................................................................... 311
12. 3. 1. Printing and Exporting System Auditor Lists ................................................ 312
12. 3. 2. Filtering System Auditor Data ...................................................................... 312
12. 3. 2. 1. System Auditor Filters ............................................................................ 313
12. 3. 3. Purging System Auditor Data ....................................................................... 313
12. 4. Operators ............................................................................................................... 314
12. 4. 1. Adding Operators......................................................................................... 314
12. 5. Operator Groups .................................................................................................... 316
12. 5. 1. Creating Operator Groups............................................................................ 316
12. 5. 1. 1. Operator Group Settings ........................................................................ 318
12. 5. 1. 2. Operator Group Global Permissions ...................................................... 318
12. 5. 2. Associating Operator Groups ....................................................................... 324
12. 6. Partitions ................................................................................................................ 324
12. 6. 1. Creating Partitions ....................................................................................... 324
12. 6. 1. 1. Partition Family Types ........................................................................... 327
12. 6. 2. Associating Partitions................................................................................... 327
12. 7. PPD........................................................................................................................ 328
12. 7. 1. Peripheral Types .......................................................................................... 328
12. 7. 2. PPD Menu Options ...................................................................................... 329
12. 7. 3. Viewing PPD Status ..................................................................................... 329
12. 7. 4. Changing the PPD Language ...................................................................... 330
12. 7. 5. Using the PPD Information Screen .............................................................. 331
13
12. 7. 6. Updating PPD Firmware .............................................................................. 331
12. 7. 7. Downloading Firmware Files ........................................................................ 332
12. 7. 8. Initializing Locks........................................................................................... 334
12. 7. 9. Initializing Rooms and ESDs ........................................................................ 335
12. 7. 10. Updating Locks ........................................................................................ 336
12. 7. 11. Performing Emergency Door Openings .................................................... 337
12. 7. 12. Collecting Audit Trail Data from Offline Doors .......................................... 339
12. 8. SALTO Network ..................................................................................................... 339
12. 8. 1. Adding Network Devices .............................................................................. 341
12. 8. 1. 1. Adding Ethernet Encoders ..................................................................... 341
12. 8. 1. 2. Adding RFnet/BLUEnet Gateways ......................................................... 342
12. 8. 1. 3. Adding RFnet/BLUEnet Nodes .............................................................. 344
12. 8. 1. 4. Adding CU42E0 Gateways .................................................................... 346
12. 8. 1. 5. Adding CU4200 Nodes .......................................................................... 349
12. 8. 1. 6. Adding CUEB8 Node ............................................................................. 352
12. 8. 1. 7. Using CU4200 Inputs ............................................................................. 354
12. 8. 1. 8. Managing CU4200 Relays ..................................................................... 360
12. 8. 1. 9. CU42X0 devices initialization and update .............................................. 362
12. 8. 2. Filtering SALTO Network Data ..................................................................... 362
12. 8. 3. Configuring Online Connection Types .......................................................... 363
12. 8. 3. 1. Online IP (CU5000) ............................................................................... 363
12. 8. 3. 2. Online IP (CU4200) ............................................................................... 364
12. 8. 3. 3. Online RF (SALTO) ............................................................................... 365
12. 8. 4. Peripherals Addressing and Maintenance .................................................... 366
12. 8. 4. 1. Updating Firmware ................................................................................ 368
12. 8. 4. 1. 1. Peripherals ......................................................................................... 368
12. 8. 4. 1. 2. Firmware update through BlueNet ...................................................... 369
12. 9. Calendars ............................................................................................................... 371
12. 9. 1. Creating Calendars ...................................................................................... 371
12. 10. Time Zones ..................................................................................................... 373
12. 10. 1. Adding Time Zones .................................................................................. 373
12. 10. 2. Daylight Saving Time ............................................................................... 376
12. 10. 2. 1. Configuring DST .................................................................................. 376
12. 10. 2. 2. DST Options ........................................................................................ 378
12. 11. General options ............................................................................................... 378
12. 12. SAM and Issuing Data ..................................................................................... 378
14
12. 12. 1. Configuring Mifare Classic Settings .......................................................... 380
12. 12. 1. 1. Step One: Entering the SAM Card Data ............................................... 381
12. 12. 1. 2. Step Two: Entering the Data for Issuing Keys ...................................... 382
12. 12. 2. Configuring DESFire Keys Settings .......................................................... 384
12. 12. 3. Configuring Legic Settings........................................................................ 386
12. 12. 4. Configuring HID iCLASS Settings............................................................. 389
12. 12. 5. Configuring HID SEOS Settings ................................................ 389
12. 13. Third Party Readers ........................................................................................ 391
12. 14. Attendance Configuration ................................................................................ 398
12. 15. PMS Authorizations ......................................................................................... 400
12. 16. System Resources .......................................................................................... 402
13. ProAccess SPACE General Options ...................................................................... 404
13. 1. About ProAccess SPACE General options ............................................................. 404
13. 1. 1. Applying Configuration Changes .................................................................. 404
13. 2. General Tab ........................................................................................................... 404
13. 2. 1. Activating Multiple Time Zones .................................................................... 406
13. 3. Devices Tab ........................................................................................................... 407
13. 4. Hotel Tab................................................................................................................ 409
13. 4. 1. Configuring Associated Devices................................................................... 412
13. 4. 2. Configuring Tracks ....................................................................................... 414
13. 5. Security .................................................................................................................. 415
13. 5. 1. LDAP for Operators ..................................................................................... 417
13.5.2. LDAP for Users ............................................................................................ 418
13. 6. Access points Tab .................................................................................................. 419
13. 7. User Tab ................................................................................................................ 423
13. 7. 1. Configuring User IDs.................................................................................... 426
13. 6. 2. Configuring Wiegand Codes .................................................................... 427
13. 6. 3. Step One: Defining the Parts of the Wiegand Code .............................. 427
13. 6. 4. Step Two: Defining the Format of the Wiegand Code .......................... 431
13. 7. 5. Configuring Tracks ....................................................................................... 436
13. 7. 6. Automatic Key Assignment .......................................................................... 437
13. 7. 7. Configuring the Card Data Option ................................................................ 437
13. 8. SHIP Tab................................................................................................................ 442
13. 9. 13. 9. BAS Tab .................................................................................................. 444
13. 10. Locations/Functions Tab ................................................................................. 445
13. 10. 1. Adding Location Groupings ...................................................................... 446
15
13. 10. 2. Adding Function Groupings ...................................................................... 447
13. 11. Visitors Tab ..................................................................................................... 447
13. 12. PMS Tab ......................................................................................................... 448
13. 12. 1. Configuring Communication Settings........................................................ 450
13. 12. 2. Micros-Fidelio Protocol ............................................................................. 450
13. 12. 3. Industry Standard Protocol ....................................................................... 452
13. 13. Operators Tab ................................................................................................. 453
13. 14. Advanced Tab ................................................................................................. 454
13. 14. 1. Advanced Parameter Options .................................................................. 456
13. 15. Elevators Tab .................................................................................................. 459
13. 15. 1. The Schindler interface ............................................................................ 459
13. 15. 2. The Thyssenkrupp interface ..................................................................... 461
14. Peripherals ............................................................................................................. 464
14. 1. About Peripherals ................................................................................................... 464
14. 1. 1. Peripheral Types .......................................................................................... 464
14. 2. Encoders ................................................................................................................ 465
14. 2. 1. Updating Encoder Firmware ........................................................................ 465
14. 3. ESDs ...................................................................................................................... 466
16
1. INTRODUCTION
This chapter contains the following sections:
About this Manual
Intended Audience
Manual Roadmap
1. 2. Intended Audience
This manual is aimed at organizational staff responsible for site access control, who use
ProAccess SPACE on a regular basis. Organizations are defined as hotel or non-hotel sites
such as universities.
Routine access tasks such as assigning and deleting of keys, and check-in and check-out
are usually performed by a standard (non-admin) operator. The admin operator is generally
responsible for higher administrative functionality such as installation and configuration
tasks.
1. 3. Manual Roadmap
This manual is divided into the following chapters:
Chapter 1 – Introduction
Chapter 2 – System Overview
Chapter 3 – Installation
Chapter 4 – Getting Started
Chapter 5 – Access Points
Chapter 6 – Cardholders
Chapter 7 – Visitors
Chapter 8 – Hotels
Chapter 9 – Keys
Chapter 10 - Monitoring
Chapter 11 – ProAccess SPACE Tools
Chapter 12 – ProAccess SPACE System Configuration
Chapter 13 – ProAccess SPACE General options
Chapter 14 – Peripherals
Glossary
To check which chapters in the manual are relevant to your role, you can refer to the
following table.
18
2. SYSTEM OVERVIEW
This chapter contains the following sections:
About ProAccess
SALTO Network Components
ProAccess System Components
2. 1. About ProAccess
SALTO ProAccess is an access control management system that is used to manage online
and offline access points. An operator with administration rights configures entries such as
access points and users to control access to a site. Other operators can then manage
access permission changes within the system.
SALTO Data-on-Card
SALTO data-on-card means access data is stored on each RFID card (referred to in the
applications and in this manual as a ‘key’) rather than on the lock as in other access
systems. The advantage of this is that the keys can be used to collect and circulate access
data throughout a site as a user moves around. This functionality allows you to add or
remove a user’s access permissions to SALTO access points that are offline without having
to visit the door. When a user presents their key to an SVN wall reader, changes in their
access permissions are retrieved from the SALTO database and written to the key.
19
2. 2. SALTO Network Components
The SALTO network typically consists of the following components: the SALTO server, client
PCs, SALTO peripherals, and access point devices. The following diagram shows the
relationship between these components.
20
Icon Description
Allows or denies access, based on the permissions of the
presented key. These access point devices are offline and
battery-powered. However, they can be equipped with RF
Standalone electronic technology to allow online capability.
escutcheon and cylinder
Communicates information to the lock such as door
identification and configuration details. This device, which can
Portable be physically connected to a lock, is used to initialize and
Programming update offline doors. See PPD for more information.
Device (PPD)
Provides real-time access control. Managed by the SALTO
server, the CU works as both an online IP door and as a card
Online control unit updater.
(CU)
NOTE: All of the components in this figure represent SALTO components except for the
Property Management System (PMS) and the Software Integration. Badging is
embedded in ProAccess SPACE, but it is only added to the software if this license
option is selected.
These components are described in the following sections.
21
ProAccess SPACE
ProAccess SPACE is an online access control management application. It contains the
menus that allow admin operators and other operators to set up user profiles, add and delete
access points, customize company calendars, obtain audit trails etc.
These menus and functionality are only available where all the appropriate licensing options
are selected. See Registering and Licensing SALTO Software for more information. To
activate particular functionality in ProAccess SPACE, you may also have to enable a specific
parameter in ProAccess SPACE General Options. See General Options for more information
about enabling parameters.
The main menu options are described in the following table.
22
Menu Item Option
Hotel Room status
Check-in
Check-in groups
Check-out
Copy guest key
Cancellation of guest lost keys
One shot key
Programming & spare keys
Edit guest cancelling key
Edit room cleaner key
Tools Scheduled jobs
Synchronization
Make DB Backup
Event streams
Card printing
System System auditor
Operators
Operator groups
Partitions
PPD
SALTO network
Calendars
Time zones
General options
SAM & Issuing options
PMS Authorizations
System resources
SALTO Service
The SALTO Service is a Windows service that manages communication between the
peripherals, ProAccess SPACE, the database, and any software integrations. It is controlled
using the ProAccess SPACE Configurator.
The ProAccess SPACE Configurator is a desktop application used to set up communication
between the various components of the SALTO system. It is also used to start and stop the
SALTO Service.
NOTE: The SALTO Service remains running in the background. It should not be stopped
except for maintenance purposes as ProAccess SPACE will not work without it.
Peripherals can continue to operate as stand-alone or offline devices but will not
be able to communicate with the database unless the SALTO Service is restarted.
23
Local IO Bridge
The Local IO Bridge is a Windows service. It allows USB devices to be used with ProAccess
SPACE by creating a link between the USB device and the browser. The Local IO Bridge
must be installed on any client PCs you intend to use with a USB encoder or PPD. See
Encoders and PPD for more information.
24
3. INSTALLATION
This chapter contains the following sections:
About Installing
Installation Process
Installation Prerequisites
Registering and Licensing SALTO Software
Downloading SALTO Software
Installing SALTO Software Components
Updating SALTO Software Licenses
Checking ProAccess SPACE configuration
3. 1. About Installing
This chapter describes how to install and configure the software components required to
access and use the SALTO system. You need to perform two separate installation
processes:
ProAccess SPACE (which includes the installation of the SALTO Service and the
ProAccess SPACE Configurator)
Local IO Bridge (which you can download from within ProAccess SPACE)
3. 2. Installation Process
The installation process should be performed in the following order by an operator with
admin rights, referred to here as the admin operator:
1. Installation prerequisites are checked
The admin operator checks that the correct hardware and software requirements are met
before beginning the installation process.
SALTO installation files are obtained
a) The admin operator (or other appropriate manager) selects the appropriate licensing
options as part of purchasing the SALTO software.
b) The admin operator registers the SALTO software serial number on the SALTO
website.
c) The admin operator downloads the SALTO software.
SALTO software components are installed
d) The admin operator installs ProAccess SPACE.
e) The admin operator installs the Local IO Bridge.
25
3. 3. Installation Prerequisites
The following tables outline the minimum hardware and system requirements for the SALTO
server and client applications. The client applications are: ProAccess SPACE and the Local
IO Bridge.
Table 4: Minimum hardware and system requirements for the SALTO server
Component Requirement
RAM 4 GB, at least 8GB for large installations
Processor 1 GHz, at least 2GHz for large installations
Display 1024 x 768 high-colour 32-bit display
Hard Disk Space A minimum of 5 GB is recommended
10 GBis the recommended required space to operate a database
in a large organization
Operating System Windows 7 SP1, Windows 8, Windows 8.1, Windows 10, Windows
Server 2008 R2 SP1, Windows Server 2012R2, Windows Server
2016 (32-bit and 64-bit)
MS SQL Server Versions 2005, 2008R2, 2012, 2014, 2016, or LocalDB (all
editions, including MS-SQL Express). Note that if the SALTO
database was originally created with MS SQL Server 2000 and
later migrated to a higher version, you must ensure that the
database is in compatibility level 90 (version 2005) or higher.
Machine Name Resolver Domain Name System (DNS)
Domain Environment A shared network is required and the domain or work group must
be set up by the organization’s IT administrator. This is strongly
recommended as it simplifies security and permission issues.
.NET Framework Version 4.6.2 (included within the ProAccess SPACE installer)
26
If you need to change your licensing options after registration, you can contact your SALTO
representative to do this. You can then update your installation from within ProAccess
SPACE to match the new licensing options. See Updating SALTO Software Licenses for
more information.
NOTE: Installation instructions are also available within the ProAccess SPACE
installation folder (SALTO\ProAccess Space\docs).
27
To install ProAccess SPACE, perform the following steps:
1. Unzip the ProAccess SPACE installation file.
2. Right-click the Setup_ProAccessSpace.exe file.
28
6. Select I agree to the terms and conditions and click next. The destination folder
dialog box is displayed.
29
9. Select Install SQL LocalDB.
In these steps, it is assumed that you are installing ProAccess SPACE for the first time
and that you are selecting the default option of using the SQL LocalDB. However, if you
are intending to select an alternative database (or create a new one) from an existing
SQL Server engine as part of the installation process, see Using an Existing SQL Server
Engine for more information.
If you are intending to migrate data from a Microsoft (MS) Access database as part of the
installation process, see Migrating Data from a Microsoft Access Database for more
information.
10. Click next. The activate software dialog box is displayed.
11. Type the email address and password you used to register.
Note that you can register using the manual tab if you have already received the license
data (.dat) file.
12. Select your license type from the drop-down list.
13. Type your serial number.
14. Click activate. The Well done! screen, confirming that ProAccess SPACE is installed, is
displayed.
30
Figure 8: Installation confirmation
You can click the quick-access tile to start using ProAccess SPACE.
31
Figure 9: Use existing SQL Server engine
2. Click next.
32
Figure 11: Select the SQL database
4. Select the applicable SQL database and enter the appropriate details.
5. Click next.
6. Follow Step 10 in Installing ProAccess SPACE to continue with the installation.
Creating a New Database
To install ProAccess SPACE using a new database, perform the following steps:
1. Select Use existing SQL Server engine.
33
Figure 12: Use existing SQL Server engine
2. Click next.
34
Figure 14: Existing SQL database details
4. Type the name of the new SQL database and enter the appropriate details.
5. Click next.
6. Follow Step 10 in Installing ProAccess SPACE to continue with the installation process.
35
Figure 15: Migrate from Microsoft Access
2. Click next.
3. Select the location of the rw.mdb file by clicking the folder icon.
4. Click next.
36
5. Follow Step 10 in Installing ProAccess SPACE to continue with the installation process.
Figure 17: Accessing the Operator Settings screen and the About dialog box
37
5. Select Run as administrator.
6. Click Yes when prompted with the following message:
Do you want to allow the following program from an unknown publisher to make changes
to this computer?
The initial installation dialog box is displayed.
7. Click next. The license agreement dialog box is displayed.
38
Figure 20: Destination folder dialog box
10. Choose a different location or accept the suggested installation destination folder.
11. Click next. The succeeded dialog box, confirming that the Local IO Bridge is installed, is
displayed.
39
3. 6. 2. 2. Installing from the About Dialog Box
To install the Local IO Bridge from the About dialog box, perform the following steps:
1. Click the About icon on the top right-hand side of the home screen. The About dialog
box is displayed.
2. Click Download.
Note that the text of the Download button varies slightly to reflect the latest available
version of the Local IO Bridge.
3. Click Save when prompted with the following message:
Do you want to run or save Setup_SaltoLocalIOBridge.exe?
4. Save the file to your computer and follow the steps in Installing from the Settings Screen.
40
Figure 23: About dialog box
Click View Features. The Features dialog box, listing all features, is displayed.
Enabled features are denoted by a green circle in the Status column. Disabled features are
denoted by a grey circle.
The Features dialog box also lists the license limitations for the following:
Maximum number of cardholders
Maximum number of access points
Maximum number of access points for mobile guest keys
Maximum number of access points for mobile SVN users who can update their keys with
Near Field Communication (NFC) technology
To enable additional license-dependent features, contact your SALTO representative. When
these changes are implemented for your registered account, you can update your installation
in two ways:
41
From the About dialog box
From the Features dialog box
42
Figure 26: Database tab
3. Ensure the server name in the Server name field is correct. You can verify the data in
Microsoft SQL Management Studio if installed.
4. Ensure the database name in the Database field is correct. You can verify the data in
Microsoft SQL Management Studio if installed.
5. Ensure the Windows authentication option is selected if you are working in a Windows
domain.
If you are not working in a Windows domain, select the SQL Server authentication
option. You must enter the appropriate SQL Server username and password.
6. Click Save.
Note that the SALTO Service must be stopped to save any change on the Service
properties tab and then restarted.
7. Click the Service properties tab.
43
Figure 27: Service properties tab
44
Figure 28: Service ports tab
12. Select the Enable TCP/IP ports for web application checkbox.
The default ports can be changed in accordance with your requirements. In some cases,
ports can be limited to one rather than a range.
If you want to use the secure version of HTTP, such as HTTPS, you will first need to
specify a valid certificate (use the “ProAccess SPACE Configurator” to select one among
the registered certificates within the server machine).
Note that the selected certificate must also be valid in the client machines in order to: 1)
avoid the “untrusted connection” warning message shown by the browser; 2) browsers to
receive real-time notifications (such as door openings) from the server.
Space supports the protocol TLS 1.1/1.2 from NetFrame versión 4.5 for https. Note: this
protocol can be defined at PC server level and not in the Space.
13. Click Save. The ProAccess SPACE link on this tab should now become active.
See Logging In to ProAccess SPACE for information about how to log in to ProAccess
SPACE and set up bookmarks in your browser for easy access.
NOTE: The Advanced tab manages the tracing level, which can be set to Low, Medium,
or High. The default tracing level is Low. Leave the tracing level at Low unless
your SALTO technical support contact recommends that you change it. If the
tracing level is set to High, this creates a more detailed report but the log file
rapidly increases in size. Tracing should only be set to High during
troubleshooting, for example, and reset to Low afterwards.
45
4. GETTING STARTED
This chapter contains the following sections:
About Getting Started
Logging In to ProAccess SPACE
Configuring Operator Settings
Using ProAccess SPACE
Logging Out of ProAccess SPACE
Setup Checklist
46
Figure 29: ProAccess SPACE link
Click the ProAccess SPACE link. The ProAccess SPACE login screen is displayed in
your browser.
NOTE: You can copy the ProAccess SPACE link and create a browser shortcut. This
means that you do not have to open the ProAccess SPACE Configurator each
time to access the link.
47
Note that the ProAccess SPACE link is only active when the SALTO Service is running.
If it is not active, check the Service Properties tab and restart the SALTO Service if
required.
Type admin in the User field.
The first time that you log in to ProAccess SPACE, you must use the admin login.
Type your password in the Password field.
NOTE: You can leave the Password field empty the first time you log in. However, it is
recommended that you create a password as soon as possible afterwards. See
Managing Passwords for more information about creating a password.
Click Enter. The ProAccess SPACE home screen is displayed.
4. 2. 1. Admin Interface
The Admin interface contains the necessary menu options to perform a wide range of tasks,
for example, configuring access points and cardholders. It can be accessed by using the
default login: admin.
Admin operators can create other logins with access only to a specified subset of ProAccess
SPACE functionality. The menu options and associated features visible to other operators
within the ProAccess SPACE interfaces depend on the permissions granted to them by the
admin operators. See Operator Group Global Permissions for more information.
48
4. 2. 2. Hotel Interface
The Hotel interface contains a subset of the Admin interface, and is intended for use by hotel
site operators. Its menu options are related to guest activities such as checking in and out,
and cancellation of guest keys, as well as other hotel management options. See Hotels for
more information. It also displays the quick-access tiles that are specific to hotel sites.
Operators can be given access to the Hotel interface by the admin operators. See Operators
and Operator Groups for more information.
4. 3. 1. Default Operators
One default system operator is created on the system during installation: (Admin). See
Operators for more information.
4. 3. 3. Managing Passwords
To create or change a password, perform the following steps:
Click admin (or other appropriate operator login) on the top right-hand side of the home
screen. The Settings screen is displayed.
49
Figure 34: Settings screen
50
Figure 36: Settings screen
4. 3. 5. 1. Encoder Settings
Encoders can be connected in two ways:
Local: This is used for encoders that are physically connected to the local computer.
Using this setting specifies that the encoders can transfer data through a USB
connection or a serial connection through a COM port. Ensure that you select the
appropriate encoder type from the drop-down list.
Online: This is used for encoders that are connected using an Internet Protocol (IP)
address. Using this setting specifies that the encoders transfer data through an Ethernet
connection. Ensure that you select the appropriate Ethernet connection from the drop-
down list.
When you select either Local or Online, the following buttons are enabled:
Supported Keys
Show Firmware
These are described in the following table.
51
Table 6: Encoder setting buttons
Button Description
Supported Keys If Local is selected, this button shows a list of available
technologies the encoder can read from, for example, Mifare and
Desfire. If Online is selected, this button still shows a list of
available technologies the encoder can read from, but the encoder
uses an Ethernet connection to communicate with the local
computer.
Show Firmware This button shows the encoder’s firmware version and allows you
to update the firmware. See Updating Encoder Firmware for more
information.
NOTE: You can use the Supported Keys button on the Settings screen in ProAccess
SPACE to SAM local encoders. See SAM & Issuing Data and General Options
sections.
4. 3. 5. 2. PPD Settings
PPDs can connect to the system using either a USB connection or a serial connection
through a COM port. Simply select the appropriate option here.
4. 4. 1. Interface Components
The interface is divided into three sections:
Operator area
Main menu bar
Quick-access tiles
52
Figure 37: ProAccess SPACE home screen
4. 4. 1. 1. Operator Area
The operator area is on the top right-hand side of the home screen. The screen icons are
described in the following table.
Logout
53
Menu Description
Hotel Enables guest check-in, check-out, and key control, for example,
cancelling keys, for hotels
System Provides system audit functionality, tracking event and object
modifications. This menu also contains specific administration
functionality such as managing peripherals and scheduled jobs,
and adding and deleting operators, operator groups, and
partitions. There is also a calendar option that can be used to
control access in different geographical areas, and configure
holiday and special day periods.
4. 4. 1. 3. Quick-Access Tiles
The home screen contains shortcuts for quick access to the most commonly used options.
The quick-access tiles that are displayed vary according to whether you are accessing the
Admin interface or the Hotel interface.
The Admin interface quick-access tiles are listed in the following table.
The Hotel interface quick-access tiles are listed in the following table.
54
Figure 38: Sidebar links
Select the required item in the left-hand panel and click the chevron. The selected item is
displayed in the right-hand panel. Double-clicking on an item also moves it between the
panels. Holding down the Shift key allows you to select several consecutive items to move at
a time. Alternatively, you can hold down the Ctrl key while clicking the items to make multiple
selections.
55
Figure 40: Selection lists
Click the arrows in the middle of the screen to move all items from the left panel to the right
panel and vice versa.
56
You can use the Funnel icon to search for specific data. The filtering options vary according
to the screen that is displayed. Common filters include user name, operator name, event,
and locations.
To search for specific data, click on the Funnel icon and enter your search term. The
following figure shows an example of a Users screen with the search dialog box displayed.
Clicking on the top left corner arrow of the entity list will select all the entities within the list,
or select only the entities from the current page, as can be seen on the picture below:
57
Figure 43: Sekect multiple users
Select multiple separate entities from a list by marking the checkboxes on the left side
column. Selection can be made on different pages, and the summary of the quantity of
selected entities or items, as well as the quantity of the total entities, will appear on the
bottom of the list. The window will also show the navigation information regarding the
available pages, and also navigating from the current position to the first or last page:
58
Figure 44: Select multiple users
Columns on the different entity lists can be swapped and positioned on a different order, just
by pressing and dragging over the column, and position it in the desired order:
The new positions are persisted and memorized in the Database so that the same layout is
kept the next time the entity list is opened:
59
Figure 46: Entity fields
NOTE: Data marked as non-erasable cannot be deleted from the system. Such entries
are highlighted in blue on the list screens.
60
TIFF file
Web archive
XPS document
The following example shows how to print a hard copy of the user list, or export it to a
specific file format:
1. Select Cardholders > Users. The Users screen is displayed.
2. Click Print. The Users dialog box, showing the user list, is displayed.
61
Figure 49: Users dialog box
The print preview view is displayed by default. You can click the Switch to interactive
view icon to use the interactive view option. If you select a user before you click Print,
the Print dialog box is displayed. This gives you the option to print either the complete
user list or the user profile for the selected user.
Click the Print report icon. A pop-up is displayed confirming that the document is ready
for printing.
Alternatively, click the Export icon to select a file format and then click Save to download
the file and save it to the appropriate file location.
Click Print. The Print dialog box is displayed.
Select your preferred printing options and click Print to print the user list.
62
Figure 50: Users dialog box
63
Figure 51: Copy From button
Following the above example, the accesses from another user could be copied on each of
the access tabs. Depending on the existing acceses, the software could request to copy the
entire configuration of another user (if the accesses are currently empty), or ask the operator
to chose how the access should be copied, as can be seen on the picture below:
64
4. 5. Logging Out of ProAccess SPACE
It is recommended that you manually log out of ProAccess SPACE at the end of your
session to prevent other operators from making unauthorized changes. The system can also
be configured to automatically log out operators after a specified period of inactivity.
NOTE: The system automatically logs you out of ProAccess SPACE after 120 seconds of
inactivity. To change the automatic logout time, you must enable the
AUTO_LOGOFF_TIMEOUT parameter in ProAccess SPACE General Options
and set the value in numbers of seconds. For example,
AUTO_LOGOFF_TIMEOUT=240 means that a session in ProAccess SPACE
expires after four minutes of inactivity and operators will need to log back in. See
Advanced Tab for more information.
To manually log out of ProAccess SPACE, perform the following steps:
1. Click the Logout icon on the top right-hand side of the home screen. The Confirmation
dialog box is displayed asking you to confirm that you want to log out.
Click Yes.
4. 6. Setup Checklist
This section provides a list of items that the admin operator (or an operator with admin
rights) should create and configure in ProAccess SPACE so that the system can be used
effectively.
65
Task Mandatory Mandatory Comments Y/N
for Non- for Hotel
Hotel Sites?
Sites?
devices.
7. Create and configure all Yes Yes
required system jobs, for
example, automatic database
backups.
Access Points
1. Create and configure all Yes Yes
required doors.
2. Create and configure all Yes Yes
required Energy Saving
Devices (ESDs).
3. Create and configure all Yes Yes
required outputs.
4. Create and configure all Yes/No Yes/No Depends on whether the
required lockers. site uses a locker system
5. Create and configure all Yes Yes
required zones.
6. Create and configure all Yes Yes
required locations.
7. Create and configure all Yes Yes
required functions.
8. Create and configure all Yes/No Yes/No Depends on whether the
required roll-call areas. site uses roll-call areas
9. Create and configure all Yes/No Yes/No Depends on whether the
required lockdown areas. site uses lockdown areas
10. Create and configure all Yes/No Yes/No Depends on whether the
required limited occupancy site uses this
areas. functionality (for
example, for a parking
area)
11. Create and configure all Yes Yes
required access point timed
periods.
12. Create and configure all Yes Yes
required access point automatic
changes.
Peripherals
Configure all required peripherals. Yes Yes
Cardholders
1. Create and configure all Yes Yes
required user profiles.
2. Create and configure all Yes Yes
required user access levels.
3. Create and configure all Yes/No Yes/No Depends on whether the
required limited occupancy site uses limited
groups. occupancy area
functionality
66
Task Mandatory Mandatory Comments Y/N
for Non- for Hotel
Hotel Sites?
Sites?
4. Create and configure all Yes Yes
required cardholder timetables.
5. Assign all required user keys. Yes Yes
Visitors
Create and configure all required Yes Yes
visitor access levels.
Hotels
1. Create and configure all No Yes
required rooms.
2. Create and configure all
required suites.
3. Create and configure all
required keys for use by hotel
staff and guests.
4. Create and configure all
required guest access levels.
67
5. ACCESS POINTS
This chapter contains the following sections:
¡Error! La autoreferencia al marcador no es válida.
About Access Points
Doors
Energy Saving Devices
Lockers¡Error! No se encuentra el origen de la referencia.
Zones
Locations
Functions
Outputs
Lockdown Areas
Limited Occupancy Areas
Roll-Call Areas
Access Point Times Periods
Access Point Automatic Changes
68
Zones associated
The admin operator associates access points, users, and/or access levels with the
specified zones.
Locations created and configured
The admin operator creates locations and configures the location options.
Locations associated
The admin operator associates users and/or access points with the specified locations.
Functions created and configured
The admin operator creates functions and configures the function options.
Functions associated
The admin operator associates users and/or access points with the specified functions.
Outputs created and configured
The admin operator creates outputs and configures the output options.
Outputs associated
The admin operator associates users, access levels, and/or access points with the
specified outputs.
Roll-call areas created and configured
The admin operator creates roll-call areas and configures the roll-call options.
Roll-call areas associated
The admin operator associates readers with the specified roll-call areas.
Lockdown areas created and configured
The admin operator creates lockdown areas and configures the lockdown area options.
Lockdown areas associated
The admin operator associates access points with the specified lockdown areas.
Limited occupancy areas created and configured
The admin operator creates limited occupancy areas and configures the limited
occupancy area options.
Limited occupancy areas associated
The admin operator associates access points and/or limited occupancy groups with the
specified limited occupancy areas.
Access point timed periods created
The admin operator creates an access point timed period.
Access point automatic changes created and configured
The admin operator creates an access point automatic change and configures the
access point automatic change options.
69
and control each of these. It also describes how to create roll-call areas, lockdown areas,
limited occupancy areas, timed access periods to control access, and ESDs.
The information contained in this chapter applies to non-hotel sites only. See About Hotel
Access Points for information about hotel access points.
5. 3. Doors
A door is an access point to an area, for example, a door to an office, a meeting room, or a
leisure area. Each door is fitted with an electronic device that controls the lock. The lock can
be mechanical, electrical, or magnetic. When a door is added to the system, data can then
be transferred to the electronic device using a PPD. See PPD for more information.
The following sections describe how to create and configure a door within ProAccess
SPACE.
5. 3. 1. Creating Doors
To create a door, perform the following steps:
1. Select Access points > Doors. The Doors screen is displayed.
70
Figure 54: Door information screen
NOTE: A Valid Until information field is displayed on the information screens for access
points if data relating to battery status and calendars, for example, is due to
expire.
Type a name for the door in the Name field.
Type a description for the door in the Description field.
Select the relevant partition from the Partition drop-down list, if required.
Partitions make it easier for different operators to manage the various sections of a site.
For example, a partition could be the Humanities building in a university. Operators who
have access to this partition can manage the items belonging to it (such as particular
access points, users, access levels, etc.) depending on the partition permissions set by
the admin operator. Operators who do not have access to a partition cannot manage the
items belonging to it. See Partitions for more information. Note that the partitions
functionality is license-dependent. See Registering and Licensing SALTO Software for
more information.
Select the appropriate configuration and management options.
The configuration and management fields are described in Configuring Doors.
71
Click Save.
If required, you can activate additional fields on the Door information screen by using
ProAccess SPACE General options. To activate the Ext ID field, the SHOW_EXT_ID
parameter must be enabled. See Advanced Tab for more information. The Ext ID field
displays a unique identifier for the door, automatically generated by the system. You can
amend this identifier if required.
You can also add and name a maximum of two general purpose fields using ProAccess
SPACE General options. To activate a general purpose field, you must select the Enable
field checkbox in System > General options > Access points tab in ProAccess SPACE.
You can then name the field in accordance with the information that you want to capture.
NOTE: You can create multiple doors at once by using the Multiple Add option. In
addition, you can edit multiple doors at once by using the Multiple Edit option.
The Multiple Edit button is enabled when you select more than one entry on the
Doors screen. This allows you to enter the appropriate identification and
configuration details on the Multiple edit screen including access rights. The
details are then applied to all of the selected entries. See Configuring Doors for
more information about the configuration settings for doors.
5. 3. 2. Configuring Doors
The following sections describe the various fields used to configure doors.
5. 3. 2. 1. Connection Types
The Connection Type panel defines the connection type for the door. The default option is
Offline. When you select any of the other (online) connection types from the Connection
Type drop-down list, a Configure button is displayed on the Door information screen. See
Configuring Online Connection Types for more information about configuring connection
types.
Additional panels are also displayed on the Door information screen, depending on the
connection type that you select.
The connection type options are described in the following table.
72
Option Description
Online IP (CU4200) Used for doors that are hardwired to the SALTO network and
managed using Ethernet TCP/IP protocols. See SALTO Network
for more information. Data and power are transmitted using a
Power over Ethernet (PoE) connection. When you select this
option, a Limited Occupancy Area panel and a Lockdown
Area panel are displayed on the Door information screen. An
Extended expiration (offline) checkbox is also displayed. See
above for more information about these options. The CU4200
functionality is license-dependent. See Registering and Licensing
SALTO Software for more information.
Online RFnet Used for doors that are connected to the SALTO network using RF
technology. When you select this option, a Lockdown Area
panel is displayed on the Door information screen. This means
you can add the door to a lockdown area if required. See
Lockdown Areas for more information. The RF functionality is
license-dependent. See Registering and Licensing SALTO
Software for more information.
Online BLUEnet Used for doors that are connected to the SALTO network using
BLUEnet technology. When you select this option, a “+
CONFIGURE” button is displayed on the Connection Type
information screen. In this “+ CONFIGURE” screen you can
choose the GW/nodes you can connect the lock. That BLUEnet
functionality is license-dependent. See Registering and Licensing
SALTO Software for more information.
You can also choose the “Enable key update” option to work with
SVN-flex (allows you to be capable of updating cards with
BLUEnet locks, just as it can be done with CUs). In order to have
this function available, update the FW to the latest version.
Online BAS Used for doors that are connected to a building automation system
(BAS) that is integrated with the SALTO network. Before selecting
this option, check that your BAS integration has been fully
configured in ProAccess SPACE General options. See BAS Tab in
General Options for more information. When you select this option,
a Lockdown Area panel is displayed on the Door information
screen. See Lockdown Areas for more information. The RF
functionality is license-dependent. See Registering and Licensing
SALTO Software for more information.
Table 13: Connection type options
Option Description
Offline Used for doors that are not connected to the SALTO network and
need to be updated using a PPD. See PPD for more information
about PPDs.
Online IP (CU5000) Used for doors that are hardwired to the SALTO network and
managed using Ethernet TCP/IP protocols. See SALTO Network
for more information. When you select this option, a Lockdown
Area panel and a Limited Occupancy Area panel are
displayed on the Door information screen. For an online CU, you
can add the door to a lockdown area and/or a limited occupancy
area if required. See Lockdown Areas and Limited Occupancy
Areas for more information. An Extended expiration (offline)
checkbox is also displayed. If you select this, any keys that are
presented are revalidated for a specific period, even if the CU is
offline. See User and Key Expiration for more information.
73
Option Description
Online IP (CU4200) Used for doors that are hardwired to the SALTO network and
managed using Ethernet TCP/IP protocols. See SALTO Network
for more information. Data and power are transmitted using a
Power over Ethernet (PoE) connection. When you select this
option, a Limited Occupancy Area panel and a Lockdown
Area panel are displayed on the Door information screen. An
Extended expiration (offline) checkbox is also displayed. See
above for more information about these options. The CU4200
functionality is license-dependent. See Registering and Licensing
SALTO Software for more information.
Online RFnet Used for doors that are connected to the SALTO network using RF
technology. When you select this option, a Lockdown Area
panel is displayed on the Door information screen. This means
you can add the door to a lockdown area if required. See
Lockdown Areas for more information. The RF functionality is
license-dependent. See Registering and Licensing SALTO
Software for more information.
Online BLUEnet Used for doors that are connected to the SALTO network using
BLUEnet technology. When you select this option, a “+
CONFIGURE” button is displayed on the Connection Type
information screen. In this “+ CONFIGURE” screen you can
choose the GW/nodes you can connect the lock. That BLUEnet
functionality is license-dependent. See Registering and Licensing
SALTO Software for more information.
You can also choose the “Enable key update” option to work with
SVN-flex (allows you to be capable of updating cards with
BLUEnet locks, just as it can be done with CUs). In order to have
this function available, update the FW to the latest version.
Online BAS Used for doors that are connected to a building automation system
(BAS) that is integrated with the SALTO network. Before selecting
this option, check that your BAS integration has been fully
configured in ProAccess SPACE General options. See BAS Tab in
General Options for more information. When you select this option,
a Lockdown Area panel is displayed on the Door information
screen. See Lockdown Areas for more information. The RF
functionality is license-dependent. See Registering and Licensing
SALTO Software for more information.
NOTE: If you select certain opening modes, additional information fields and drop-down
list options are displayed.
The options are described in the following table.
74
Option Description
Office The lock can be left open by any user who has the Office option
selected in their user profile and has access to the door. See Key
Options for more information. To activate Office mode, present the
key to the lock, while keeping the inner handle pressed down. To
disable the Office mode, repeat the procedure.
Timed office This is the same as the Office mode detailed above except that the
Office mode is only allowed during defined time periods (for
example from 08:00 to 15:00). The time periods must be
previously defined. See Access Point Timed Period for more
information. The lock automatically reverts to Standard mode at
the end of each period.
Automatic opening The lock opens automatically at specific times and remains open
during a defined time period (for example from 08:00 to 18:00). At
the end of each time period, the lock closes and reverts to
Standard mode. It is essential to set an access point timed period
for this mode.
Toggle The lock can be left open by any authorized user that presents a
valid key. You do not need to hold down the inner handle. The next
authorized key presented then closes the door. This continues
switching (toggling) on presentation of each valid key.
Timed toggle This mode operates in the same way as the Toggle mode
described above. However, you can only toggle the Office mode
on and off within set access point timed periods.
Keypad only The lock can be opened at any time by typing a valid code on a
keypad. The keypad code must contain between one and eight
digits and is the same for every user. When you select the Keypad
only option from the Open mode drop-down list, a keypad code
field is displayed in which you can define the code. The lock can
also be opened with a valid key.
Timed keypad This mode is the same as the Keypad only mode described above
except that the Keypad only mode is only allowed during a defined
timed period. The lock can be opened with a key at any time.
Key + PIN The lock can only be opened using both a valid key and by typing
a valid PIN on the keypad. This acts as a dual security control. If
the PIN code is incorrect, access will not be granted. The PIN must
be defined in the user profile. See PIN Codes for more information.
Timed key + PIN This is the same as the Key + PIN mode above except that the
Key + PIN mode is only allowed during specific time periods.
Outside of these time periods, the lock operates in Standard mode.
Automatic opening + Office The lock is in Office mode. If the door is closed, it opens
automatically at specific times and remains open during a defined
time period (for example from 08:00 to 18:00). At the end of each
time period, if the door is opened, the lock closes and stays in
office mode. It is essential to set an access point timed period for
this mode.
Automatic opening + toggle The lock is in Toggle mode. If the door is closed it opens
automatically at specific times and remains open during a defined
time period (for example from 08:00 to 18:00). At the end of each
time period, if the door is opened, the lock closes and stays in
Toggle mode. It is essential to set an access point timed period for
this mode.
75
Option Description
Automatic changes This ‘mode’ acts as an indication that the lock will work with a
mixture of modes during certain time periods throughout the day.
The combination of modes is defined in an automatic changes
entry, for example, Automatic change#001. You can select an
automatic changes entry using the drop-down list in the Automatic
changes field. See Access Point Automatic Changes for more
information.
Exit leaves open The lock remains open when the inner handle is used until a valid
key is presented. To activate this opening mode option, you must
enable the EXIT_LEAVES_OPEN parameter in ProAccess SPACE
General options. See Advanced Tab for more information. This
also activates the Toggle + Exit leaves open and the Keypad +
Exit leaves open mode options in the Open-mode drop-down list.
Toggle + Exit leaves open This mode is a combination of the Toggle mode and the Exit
leaves open mode. The lock opens when an authorized key is
presented and closes when the next authorized key is presented.
The lock continues to switch back and forth on presentation of
each valid key. However, when the inner handle is lowered, the
lock remains open. To activate this opening mode option, you must
enable the EXIT_LEAVES_OPEN parameter in ProAccess SPACE
General options. See Advanced Tab for more information.
Keypad + Exit Leaves open This mode is a combination of Keypad mode and Exit leaves open
mode. The lock opens when an authorized key is presented or
when the defined keypad code of the door is typed. This code
must contain between one and eight digits and is the same for
every user.
In this opening mode the lock remains open when the inner handle
is used until a valid key is presented or until that the keypad code
is typed on the escutcheon.
To activate this opening mode option, you must enable the
EXIT_LEAVES_OPEN parameter in ProAccess SPACE General
options. See Advanced Tab for more information.
5. 3. 2. 3. Opening Times
The Opening Time panel defines how long a door stays open after it has been unlocked.
The options are described in the following table.
76
The Time zone panel defines which one of the system time zones is used for the door. You
must enable the multiple time zones functionality in ProAccess SPACE System to display
this panel in ProAccess SPACE. See Activating Multiple Time Zones and Time Zones for
more information.
5. 3. 2. 5. Door Options
The Door Options panel defines how the door activity is audited.
The options are described in the following table.
77
of site” mode checkbox in System > General options > Access
points in ProAccess SPACE. When you select this checkbox, you
can also enable Strict out of site mode in ProAccess SPACE
General options. In this case, access permissions are also
removed from keys when they are presented at SVN exit wall
readers. See Devices Tab for more information.
5. 3. 2. 6. Enabling Anti-passback
Selecting the Enable anti-passback checkbox in the Anti-passback panel ensures that a
user cannot enter through the same door multiple times until they have first exited the door
(or until a specified time period has passed). This is to prevent a key being used by a
number of different users. The antipassback functionality is license-dependent. See
Registering and Licensing SALTO Software for more information.
If the door is a stand-alone unit, you must select the direction of the anti-passback control
from the two options provided:
Outside to inside
Inside to outside
NOTE: Using a CU50xx, you do not need to select the direction of the anti-passback
control for a CU as they have two readers: reader 1 and reader 2. Reader 1 is
always inside to outside and reader 2 is always outside to inside. Stand-alone
doors only have one reader.
To fully enable the anti-passback functionality, you must select this option when creating and
configuring a user in the User information screen. See Creating Users for more information.
You can also enable a ‘strict’ anti-passback functionality, if required. Use this where you
want the system to prevent a user from exiting where there is no record of them previously
entering. To enable this functionality, you must select the Enable strict anti-passback
checkbox in Systems > General options > Access points in ProAccess SPACE. See
Devices Tab for more information.
For this functionality to work with online doors, there must be an entrance wall reader and an
exit wall reader. For offline doors, you must select the direction of the anti-passback control
from the two options provided:
Outside to inside
Inside to outside
For online doors, only Online IP (CU4200), there is also the possibility to activate the anti-
passback in third party readers. This logic can be applied only to doors related to Access
Points connected to the use of third party readers integrated with the CU42x0 online (see
Using CU4200 Input for more information).
This logic isn’t related to our standard SVN system, but it’s managed by the DB. The doors
need to be online in order to manage this access permission feature.
To enable this functionality you must select you must select the Enable anti-passback in
third party reader checkbox in Systems > General options > Access points in ProAccess
SPACE. See Devices Tab for more information.
78
5. 3. 2. 7. Adding or Changing Door Opening Modes
To add or change a door opening mode, perform the following steps:
1. Select Access points > Doors. The Doors screen is displayed.
Double-click the required door. The Door information screen is displayed.
Select the required mode from the Open mode drop-down list.
Click Save.
NOTE: In the above example, the Update Required warning box is red because the
offline door needs to be updated using a PPD. Online doors update automatically.
See PPD for more information. The Factory Data button is displayed after you
create and save a door entry. Factory data refers to manufacturing-specific
information such as the manufacturing date and the firmware version. This button
is only enabled when you connect a PPD to your PC after the PPD has been
connected to a lock and information has been transferred.
79
5. 3. 2. 8. CU4200 Standalone
To allow the possibility of configuring a CU4200 as standalone and thus be able to program
the outputs and inputs of the control unit. Therefore, for that, follow these steps:
1. Configure the door “Connection Type” as “Offline”
80
3. We will be able to configure the Inputs and Outputs of the CU.
4. We should initialize the CU with the PPD in System -> PPD (see 12.7 PPD for more
information about the PPD initialization).
5. 3. 3. Associating Doors
After you have created and configured a door, you must associate users, access levels,
zones, automatic outputs, and/or locations/functions with that door. The following sections
describe how to associate doors with the various entries.
NOTE: You must select a timetable and an access point timed period for each door. See
Cardholder Timetables and Access Point Timed Periods for more information.
5. 3. 3. 1. Users
To allow access to a door, you must associate the door with a user. See Users for a
definition and information about how to create and configure a user.
To associate a user with a door, perform the following steps:
1. Select Access points > Doors. The Doors screen is displayed.
Double-click the door that you want to associate with a user. This means that you are
assigning the user access permissions for that door. The Door information screen is
displayed.
Click Users in the sidebar. The Users dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated a user with
this particular door.
Click Add/Delete. The Add/Delete dialog box, showing a list of users, is displayed.
Select the required user in the left-hand panel and click the chevron. The selected user
is displayed in the right-hand panel.
Click Accept. The selected user now has access permissions for that door.
Select the user in the Users dialog box if you want to select a cardholder timetable to be
used. See Cardholder Timetables for more information.
81
Figure 58: Users dialog box
Select the appropriate timetable using the drop-down list. Alternatively, you can also
select the Always or Never drop-down list option.
The Always option is selected by default. This means that users always have access to
the door, as you have not specified a timetable. Note that the system calendars do not
apply if the Always option is selected. If you select Never, they do not have access to
the door at any time.
Click OK.
5. 3. 3. 2. Access Levels
See User Access Levels, Visitor Access Levels, and Guest Access Levels for information
about how to create and configure access levels.
To associate a door with an access level, perform the following steps:
1. Select Access points > Doors. The Doors screen is displayed.
Double-click the door that you want to associate with an access level. The Door
information screen is displayed.
Click Access Levels in the sidebar. The Access levels dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated an access
level with this particular door.
Click Add/Delete. The Add/Delete dialog box, showing a list of access levels, is
displayed.
82
Select the required access level in the left-hand panel and click the chevron. The
selected access level is displayed in the right-hand panel.
Click Accept. The door is now associated with the access level.
Note that you can also select which cardholder timetable is used. See Users for more
information and a description of the steps you should follow.
5. 3. 3. 3. Zones
See Zones for a definition and information about how to create and configure a zone.
To associate a door with a zone, perform the following steps:
1. Select Access points > Doors. The Doors screen is displayed.
Double-click the door that you want to associate with a zone. The Door information
screen is displayed.
Click Zones in the sidebar. The Zones dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated a zone with
this particular door.
Click Add/Delete. The Add/Delete dialog box, showing a list of zones, is displayed.
Select the required zone in the left-hand panel and click the chevron. The selected zone
is displayed in the right-hand panel.
Click Accept. The door is now associated with the zone.
5. 3. 3. 4. Automatic Outputs
See Automatic Outputs for a definition and information about how to create and configure an
automatic output.
To associate a door with an automatic output, perform the following steps:
1. Select Access points > Doors. The Doors screen is displayed.
Double-click the door that you want to associate with an automatic output. The Door
information screen is displayed.
Click Automatic Outputs in the sidebar. The Automatic Outputs dialog box is
displayed.
Note that the dialog box will be blank because you have not yet associated an output
with this particular door.
Click Add/Delete. The Add/Delete dialog box, showing a list of automatic outputs, is
displayed.
Select the required automatic outputs in the left-hand panel and click the chevron. The
selected automatic output is displayed in the right-hand panel.
Click Accept. The selected door is now associated with the automatic output.
Select the output in the Automatic Outputs dialog box if you want to change the access
point timed period. See Access Point Timed Periods for more information.
83
Figure 60: Automatic outputs dialog box
Click Edit. The Edit dialog box is displayed. Time period 001 is selected by default.
Select the appropriate access point timed period using the drop-down list.
Click OK.
5. 3. 3. 5. Lockdaow Areas
See Lockdown areas for a definition and information about how to create and associate a
Lockdown area.
The lockdown area functionality is license-dependent. See Registering and Licensing
SALTO Software for more information.
To associate a door with a lockdown area, perform the following steps:
1. Select Access points > Doors. The Doors screen is display.
Double-click the door that you want to associate with a lockdown area. The Door
information screen is displayed.
84
Figure 62: Lockdown areas
2. Click Lockdown area in the sidebar. The Lockdown area dialog box is displayed.
NOTE: The dialog box will be blank if you have not yet created a lockdown area.
See Lockdown area for information about how to create and associate a
lockdown area.
3. Select the required location in the Lockdown area panel of the dialog box. The door is
now associated with the lockdown area (a door could belong to more than one
lockdown area)
4. For systems with many lockdown areas, it is possible to filter by lockdown area and
by status “Selected” or “not selected”.
85
Figure 64: lockdaown areas
5. 3. 3. 6. Locations/Functions
See Locations and Functions for a definition and information about how to create and
associate a location and a function.
The locations and functions functionality is license-dependent. See Registering and
Licensing SALTO Software for more information.
To associate a door with a location/function, perform the following steps:
1. Select Access points > Doors. The Doors screen is displayed.
Double-click the door that you want to associate with a location/function. The Door
information screen is displayed.
Click Locations/Functions in the sidebar. The Locations/Functions dialog box is
displayed.
86
Note that the dialog box will be blank if you have not yet created a location or a function.
See Locations and Functions for information about how to create and associate a
location and a function. See Locations/Functions Tab for information about adding
groupings for locations and functions.
Select the required location in the Locations panel of the dialog box. The door is now
associated with the location.
Select the required function in the Functions panel of the dialog box. The door is now
associated with the function.
2. For systems with a lot of functions and/or locations it’s possible to filter by Location or
Function name and also by status “Selected” or “not Selected”.
5. 3. 4. Door Icons
When you create doors, different icons are displayed on the Doors screen. These icons
vary, depending on the battery status of doors and whether they need to be updated.
The icons are described in the following table.
87
Table 17: Door icons
Icon Description
Indicates that a door needs to be updated. This
icon is displayed in the Update required
Update required column.
Indicates that the battery status of a door is
unknown. This icon is displayed in the Battery
Unknown column.
Indicates the battery status of a door. This can
be normal, low, or run-out.
Battery status
5. 3. 5. Print
You can print the door information by clicking the Print button. Once the document is
created you can print a hard copy or save it in different formats such as PDF, Excel and
more. There are 3 different report types, Print Selected Grouped, Print Selected Detailed
and Print All.
Print Selected Grouped and Print Selected Detailed displays the door information such as
its Identification, Door options, Connection type, Lock state and Opening mode and timed
periods.
Print Selected Grouped, shows a list of Zones the door is included in, a list of Users that
have direct access to the door and a list of Access Levels the doors is member of. The
User and Access Level tables display the Timetables, Days Period and Partition.
Print Selected Detailed shows a list of Zones the door is included in and a list of
Cardholders that have direct access to the door. The User table displays a list of users and
guests that have access to the door through the Access Levels and Zones shown in the
table. Under Timetable, see the cardholder timetable and under Days period, the days the
access to the door is permited for the cardholder.
Print All displays a list of all doors in the door list.
88
5. 4. Energy Saving Devices
Energy Saving Devices (ESDs) are used to control the activation of electrical equipment in a
specific area. They are more commonly used in hotel sites (especially in hotel rooms). For
hotel sites, they are created automatically when you enable ESDs by using the Hotel tab in
ProAccess SPACE General options. For non-hotel sites, you can manually create ESDs
within the system. This is done by creating them as door entries.
See ESDs for more general information about ESDs. See also Associated Device Lists for
more information about using ESDs in hotel sites.
The following example shows a simple way of completing the ESD setup process:
1. ESDs created and configured
The admin operator creates ESDs as door profiles in ProAccess SPACE and configures
the options.
ESDs associated
a) The admin operator associates users and/or access levels with the specified ESDs.
b) The admin operator associates users and/or access levels with the ESD_#1 and the
ESD_#2 outputs.
The ESD_#1 and the ESD_#2 outputs are automatically generated by the system. They
cannot be deleted. These outputs activate the relays for ESDs. If required, they can be set
up to control access to different electrical systems in your site. For example, the ESD_#1
output can be used to control access to electrical lights, and the ESD_#2 output can be used
to control access to air conditioning (AC). Users must be associated with the ESD_#1 and
the ESD_#2 outputs, as well as with the required ESD, in order to activate the ESD with their
key.
NOTE: When you activate an ESD, you must initialize it using a PPD. See Initializing
Rooms and ESDs for more information.
5. 4. 1. Creating ESDs
For non-hotel sites, the procedure for creating an ESD in the system is the same as for
creating a door. However, only certain options on the Door information screen are applicable
for ESDs. See Creating Doors for more information.
To create an ESD, perform the following steps:
1. Select Access points > Doors. The Doors screen is displayed.
2. Click Add Door. The Door information screen is displayed.
3. Type a name for the ESD in the Name field.
4. Type a description for the ESD in the Description field.
5. Select the relevant partition from the Partition drop-down list, if required.
See Partitions for more information.
6. Select the required values in the Open time and Increased open time fields in the
Opening Time panel.
See Opening Times for more information about these options.
Select the Audit on keys checkbox in the Door Options panel if required.
See Door Options for more information about this option.
89
Click Save.
NOTE: If ESDs are in a room or office, for example, it is recommended that you associate
them with the same zone as the room or office door. This makes them easier to
manage in the system. See Zones for more information about zones.
5. 5. Lockers
The term ‘locker’ within the SALTO system can refer to a locker, cupboard, display cabinet,
box, or case fitted with an electronic device that controls the lock. SALTO lockers are
commonly used in corporate organizations, universities, and gyms. The lockers functionality
is license-dependent. See Registering and Licensing SALTO Software for more information.
You must initialize a locker with a PPD before it can be used. The procedure for initializing
lockers is the same as for initializing locks. See Initializing Locks for more information and a
description of the steps you should follow.
The following sections describe how to create and configure a locker.
5. 5. 1. Creating Lockers
To create a locker, perform the following steps:
1. Select Access points > Lockers. The Lockers screen is displayed.
90
Figure 69: Lockers screen
NOTE: The Set Lockers States As Opened button gives you the option to reset the
status of available lockers on the system. This option applies to all lockers in the
system and changes the status of each locker to Open on its information screen.
However, it does not affect the physical lockers. It is generally only used in sites
such as gyms or spas where only free assignment lockers are in use. To activate
this button, you must select the Control of lockers left closed checkbox
in System > General options > Access points in ProAccess SPACE.
See Access Points Tab for more information.
Click Add Locker. The Locker information screen is displayed.
91
Figure 70: Locker information screen
92
the Lockers screen. This allows you to enter the appropriate identification and
configuration details on the Multiple edit screen including access rights. The
details are then applied to all of the selected entries. See Configuring Lockers for
more information about the configuration settings for lockers.
5. 5. 2. Configuring Lockers
The following sections describe the various fields used to configure lockers.
5. 5. 2. 1. Connection type
The Connection Type panel defines the connection type for the locker. The default option
is Offline. When you select any of the other (online) connection types from the Connection
Type drop-down list, a Configure button is displayed on the Door information screen.
See Configuring Online Connection Types for more information about configuring connection
types.
The connection type options are described in the following table.
93
Table 20: Locker opening times
Option Description
Open time Defines how long a locker thumbturn stays active after it is
unlocked The default time value is six seconds. The value can be
increased or decreased in the range 0 to 255 seconds.
Increased open time Defines a longer opening time. This option is designed for disabled
or ‘hands full’ users. The default time value is 20 seconds. The
value can be increased or decreased in the range 0 to 255
seconds. You must enable this option in the user’s profile. See Key
Options for more information.
The Time zone panel defines which one of the system time zones is used for the locker.
You must enable the multiple time zones functionality in ProAccess SPACE General options
to display this panel. See General Tab and Time Zones for more information.
5. 5. 2. 4. Locker Options
The Locker Options panel defines locker functionality, such as auditing locker activity,
allowing users to secure a locker without a key, and reducing battery consumption.
The options are described in the following table.
94
5. 5. 3. Associating Lockers
Once you have created a locker, you must associate users, access levels, and/or zones with
the specific locker. The following sections describe how to associate lockers with the various
entries.
5. 5. 3. 1. Users
To give access permissions for a locker, you must associate the locker with the user.
See Users for a definition and information about how to create and configure a user.
To associate a user with a locker, perform the following steps:
1. Select Access points > Lockers. The Lockers screen is displayed.
Double-click the locker that you want to associate with a user. The Locker information
screen is displayed.
NOTE: The Status Open information field is displayed on the Locker information screen
if you have reset the status of available lockers to Open on the system by using
the Set Lockers States as Opened button. This button is available on
the Lockers list screen. See Creating Lockers for more information. The status of
lockers is also updated when user keys are updated using an encoder.
Click Users in the sidebar. The Users dialog box is displayed.
95
Note that the dialog box will be blank because you have not yet associated a user with
this particular locker.
Click Add/Delete. The Add/Delete dialog box, showing a list of users, is displayed.
Select the required user in the left-hand panel and click the chevron. The selected user
is displayed in the right-hand panel.
Click Accept. The selected user now has access permissions for the locker.
Note that you can also select which cardholder timetable is used. See Users for more
information and a description of the steps you should follow.
5. 5. 3. 2. Access Levels
See User Access Levels, Visitor Access Levels, and Guest Access Levels for information
about how to create and configure access levels.
To associate a locker with an access level, perform the following steps:
1. Select Access points > Lockers. The Lockers screen is displayed.
Double-click the locker that you want to associate with an access level.
The Locker information screen is displayed.
Click Access Levels in the sidebar. The Access levels dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated an access
level with this particular locker.
Click Add/Delete. The Add/Delete dialog box, showing a list of access levels, is
displayed.
Select the required access level in the left-hand panel and click the chevron. The
selected access level is displayed in the right-hand panel.
Click Accept. The locker is now associated with the selected access level.
You can also select which cardholder timetable is used. See Users for more information
and a description of the steps you should follow.
5. 5. 3. 3. Zones
See Zones for a definition and information about how to create and configure a zone.
To associate a locker with a zone, perform the following steps:
1. Select Access points > Lockers. The Lockers screen is displayed.
Double-click the locker that you want to associate with a zone. The Locker information
screen is displayed.
Click Zones in the sidebar. The Zones dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated a zone with
this particular locker.
Click Add/Delete. The Add/Delete dialog box, showing a list of zones, is displayed.
Click the required zone in the right panel.
Click the chevron that points to the right panel. The selected zone is displayed in the
right panel.
Click Accept. The locker is now associated with the zone.
5. 5. 4. Locker Icons
When you create lockers, different icons are displayed on the Lockers screen. These icons
are the same as those displayed for doors. See Door Icons for more information.
96
You can opt to show if a visitor has left a locker opened or closed (preventing users
accessing the locker) when the visitor checks out. To activate this option, select the Control
of lockers left closed checkbox in System > General options > Access point in
ProAccess SPACE. See User Tab for more information.
5. 6. Zones
A zone is a specified group of access points that are grouped together to make them easier
to manage in the system. For example, a zone could be the doors on the first floor, all the
lockers in the gym area, or all the doors in the financial services area.
When an offline access point is added to a zone, the access point must then be updated with
the information using a PPD. See PPD for more information. A combination of 64K doors +
high zones and 96 low zones can be created in the system (regardless of whether the doors
are online or offline). For example, if the systems contains 50000 doors then we could create
until 14000 zones.
NOTE: Creating a zone saves memory space on a key because it does not have to store
large amounts of individual access point permission details. Instead, it just needs
to store the permission information relating to one or more zone entries.
5. 6. 1. Creating Zones
To create a zone, perform the following steps:
1. Select Access points > Zones. The Zones screen is displayed.
97
Figure 73: Zones screen
98
See Partitions for more information.
Select Low zone if appropriate.
See Configuring Zones for more information about this option.
Select Is free assignment zone if appropriate.
The Is free assignment zone option only applies to lockers. See Configuring Zones and
Creating Free Assignment Zones for more information about this option.
Click Save.
If required, you can activate the Ext ID field on the Zone information screen using
ProAccess SPACE General options. To activate the Ext ID field, the SHOW_ EXT_ID
parameter must be enabled. See Advanced Tab for more information.
5. 6. 2. Configuring Zones
The options for configuring zones are described in the following table.
5. 6. 3. Associating Zones
After you have created a zone, you must associate access points, users, and/or access
levels with the specified zone. The following sections describe how to associate zones with
the various entries.
5. 6. 3. 1. Access Points
See About Access Points for more information.
99
To associate a zone with an access point, perform the following steps:
1. Select Access points > Zones. The Zones screen is displayed.
Double-click the zone that you want to associate with an access point. The Zone
information screen is displayed.
Click Access points in the sidebar. The Access points dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated an access
point with this particular zone.
Click Add/Delete. The Add/Delete dialog box, showing a list of access points, is
displayed.
Select the required access point in the left-hand panel and click the chevron. The
selected access point is displayed in the right-hand panel.
Click Accept. The zone is now associated with the access point.
5. 6. 3. 2. Users
You must associate a user with a zone to allow that user to access the access points within
the zone.
To associate a user with a zone, perform the following steps:
1. Select Access points > Zones. The Zones screen is displayed.
Double-click the zone that you want to associate with a user. The Zone information
screen is displayed.
Click Users in the sidebar. The Users dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated a user with
this particular zone.
Click Add/Delete. The Add/Delete dialog box, showing a list of users, is displayed.
Select the required user in the left-hand panel and click the chevron. The selected user
is displayed in the right-hand panel.
Click Accept. The selected user now has access to that zone.
You can also select which cardholder timetable is used. See Users for more information
and a description of the steps you should follow.
5. 6. 3. 3. Access Levels
See User Access Levels, Visitor Access Levels, and Guest Access Levels for information
about how to create and configure access levels.
To associate a zone with an access level, perform the following steps:
1. Select Access points > Zones. The Zones screen is displayed.
Double-click the zone that you want to associate with an access level. The Zone
information screen is displayed.
Click Access Levels in the sidebar. The Access levels dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated an access
level with this particular zone.
Click Add/Delete. The Add/Delete dialog box, showing a list of access levels, is
displayed.
Select the required access level in the left-hand panel and click the chevron. The
selected access level is displayed in the right-hand panel.
100
Click Accept. The zone is now associated with the access level.
Note that you can also select which cardholder timetable is used. See Users for more
information and a description of the steps you should follow.
5. 7. Locations
In the SALTO system, a location is a large area of designated access points. For example, a
company could create a location entry for each of its offices across Australia in Sydney,
Melbourne, and Perth. You can assign access rights for each location.
The following example shows a simple way of completing this process:
1. Location groupings added
101
The admin operator adds the location grouping in ProAccess SPACE General options.
See Locations/Functions Tab for information about adding a location grouping.
Locations created and configured
The admin operator creates locations and configures the location options in ProAccess
SPACE.
Locations associated
The admin operator associates users and/or access points with the specified locations in
ProAccess SPACE.
5. 7. 1. Creating Locations
To create a location, perform the following steps:
1. Select Access points > Locations. The Locations screen is displayed.
NOTE: The number of locations you create in ProAccess SPACE occupies a fixed
amount of memory on keys. The text Minimum memory size (without
cardholder timetables): indicates the size of the fixed space allocated.
102
Figure 76: Location information screen
5. 7. 2. Associating Locations
Once you have created a location, you must associate users and access points with that
location. An example of a user would be a staff member who always works at that location.
For example, for a Sydney location, you could provide an IT manager with access to all IT
areas in that location. The following sections describe how to associate locations with the
various entries.
5. 7. 2. 1. Users
To associate a user with a location, perform the following steps:
1. Select Access points > Locations. The Locations screen is displayed.
Double-click the location that you want to associate with a user. The Location
information screen is displayed.
Click Users in the sidebar. The Users dialog box is displayed.
103
Note that the dialog box will be blank because you have not yet associated a user with
this particular location.
Click Add/Delete. The Add/Delete dialog box, showing a list of users, is displayed.
Select the required user in the left-hand panel and click the chevron. The selected user
is displayed in the right-hand panel.
Click Accept. The selected user now has access permissions for that location.
5. 7. 2. 2. Access Points
See About Access Points for more information.
To associate a location with an access point, perform the following steps:
1. Select Access points > Locations. The Locations screen is displayed.
Double-click the location that you want to associate with an access point. The Location
information screen is displayed.
Click Access Points in the sidebar. The Access points dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated an access
point with this particular location.
Click Add/Delete. The Add/Delete dialog box, showing a list of access points, is
displayed.
Select the required access point in the left-hand panel and click the chevron. The
selected access point is displayed in the right-hand panel.
Click Accept. The location is now associated with that access point.
5. 8. Functions
A function is a category of permissions within a SALTO location. For example, if a company
creates a location for each of its offices across the country, it can assign functions such as
entrances and maintenance, to each location. For the company location Melbourne, for
example, the company can assign the entrances function to all building entrances at that
location.
The following example shows a simple way of completing this process:
1. Function groupings added
The admin operator adds the function grouping in ProAccess SPACE General options.
See Locations/Functions Tab for information about adding a function grouping.
Functions created and configured
The admin operator creates functions and configures the function options in ProAccess
SPACE.
Functions associated
The admin operator associates users and/or access points with the specified functions in
ProAccess SPACE.
5. 8. 1. Creating Functions
To create a function, perform the following steps:
1. Select Access points > Functions. The Functions screen is displayed.
104
Figure 77: Functions screen
NOTE: The number of functions you create in ProAccess SPACE occupies a fixed
amount of memory on keys. The text Minimum memory size (without
cardholder timetables): indicates the size of the fixed space allocated.
105
5. 8. 2. Associating Functions
Once you have created a function, you must associate users and access points with that
function. For example, you could associate electrician users with a maintenance function.
The following sections describe how to associate functions with the various entries.
5. 8. 2. 1. Users
To associate a user with a function, perform the following steps:
1. Select Access points > Functions. The Functions screen is displayed.
Double-click the function that you want to associate with a user. The Function
information screen is displayed.
Click Users in the sidebar. The Users dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated a user with
this particular function.
Click Add/Delete. The Add/Delete dialog box, showing a list of users, is displayed.
Select the required user in the left-hand panel and click the chevron. The selected user
is displayed in the right-hand panel.
Click Accept. The selected user now has access permissions for that function.
5. 8. 2. 2. Access Points
See About Access Points for more information.
To associate a function with an access point, perform the following steps:
1. Select Access points > Functions. The Functions screen is displayed.
Double-click the function that you want to associate with an access point. The Function
information screen is displayed.
Click Access Points in the sidebar. The Access points dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated an access
point with this particular function.
Click Add/Delete. The Add/Delete dialog box, showing a list of access points, is
displayed.
Select the required access point in the left-hand panel and click the chevron. The
selected access point is displayed in the right-hand panel.
Click Accept. The function is now associated with the access point.
5. 9. Outputs
In the SALTO system, an output is a type of electrical permission or authorization used to
activate devices like ESDs or elevators.
For example, you can control elevator access to specific floors by creating outputs. If a CU is
connected to a relay extension board, you can use outputs to specify that only a designated
user can activate one or multiple relays in an elevator. If you enable Floor 1 and Floor 3 in
their access permissions, the user can only access those specific floors and not Floor 2.
Similarly, you can control the energy usage in a room or a floor by creating an output. For
example, if you enable an ESD for Room 101, only an authorized key will allow the electrical
devices in that room to be switched on.
106
The information for creating outputs in the following sections applies to non-hotel sites only.
See ESDs for more general information about ESDs. See Associated Device Lists for more
information about using ESDs in hotel sites.
5. 9. 1. Creating Outputs
To create an output, perform the following steps:
1. Select Access points > Outputs. The Outputs screen is displayed.
107
Type a name for the output in the Name field.
Type a description for the output in the Description field.
Select the relevant partition from the Partition drop-down list, if required.
See Partitions for more information.
Click Save.
NOTE: The ID field is automatically populated but numbers from 1 to 128 can be edited if
required. Each output ID number corresponds to one relay. For example, output 1
is relay 1.
5. 9. 2. Associating Outputs
Once you have created an output, you must associate users, access levels, and/or access
points with the specified output. The following sections describe how to associate outputs
with the various entries.
5. 9. 2. 1. Users
To assign an output to a user, perform the following steps:
1. Select Access points > Outputs. The Outputs screen is displayed.
Double-click the output that you want to assign to a user. The Output information screen
is displayed.
Click Users in the sidebar. The Users dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated a user with
this particular output.
Click Add/Delete. The Add/Delete dialog box, showing a list of users, is displayed.
Select the required user in the left-hand panel and click the chevron. The selected user
is displayed in the right-hand panel.
Click Accept. The output is now associated with the user.
5. 9. 2. 2. Access Levels
See User Access Levels, Visitor Access Levels, and Guest Access Levels for information
about how to create and configure access levels.
To associate an output with an access level, perform the following steps:
1. Select Access points > Outputs. The Outputs screen is displayed.
Double-click the output that you want to associate with an access level. The Output
information screen is displayed.
Click Access Levels in the sidebar. The Access levels dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated an access
level with this particular output.
Click Add/Delete. The Add/Delete dialog box, showing a list of access levels, is
displayed.
Select the required access level in the left-hand panel and click the chevron. The
selected access level is displayed in the right-hand panel.
Click Accept. The output is now associated with the access level.
5. 9. 2. 3. Access Points
See About Access Points for information about access points.
108
To associate an output with an access point, perform the following steps:
1. Select Access points > Outputs. The Outputs screen is displayed.
Double-click the output that you want to associate with an access point. The Output
information screen is displayed.
Click Access Points in the sidebar. The Access points dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated an access
point with this particular output.
Click Add/Delete. The Add/Delete dialog box, showing a list of access points, is
displayed.
Select the required access point in the left-hand panel and click the chevron. The
selected access point is displayed in the right-hand panel.
Click Accept. The output is now associated with the access point.
You can change which access point timed period is used. See Automatic Outputs for
more information and a description of the steps you should follow.
5. 9. 3. Automatic Outputs
Using a CU50xx, if you want outputs associated with a door to operate in Automatic opening
mode for a specific time period, you must assign an access point timed period to the output.
You can do this when associating an automatic output with a door. The maximum number of
automatic outputs that you can associate with a door is four. See Automatic Outputs for
more information about this. See also Access Point Timed Periods for more information.
This limitation does not apply CU42x0 as a Timed-Period can be associated with a relay
without being related with an access point.
NOTE: You cannot use Lockdown monitoring in ProAccess SPACE to open and close
offline doors in an emergency situation. However, if offline doors are fitted with
AMOK locks, which have two readers, you can give users permissions to perform
a manual lockdown. To do this, you must select the Set lockdown option on the
User information screen. This means that users can enable and disable lockdown
mode for the doors by presenting their key to the door’s inside reader. You can
also give users permissions to open both online and offline doors when they are
in lockdown by selecting the Override lockdown checkbox on the User
information screen in ProAccess SPACE. See Key Options for more information.
109
5. 10. 1. Creating Lockdown Areas
To create a lockdown area, perform the following steps:
1. Select Access points > Lockdown areas. The Lockdown areas screen is displayed.
Click Add Lockdown Area. The Lockdown area information screen is displayed.
110
5. 10. 2. Associating Lockdown Areas
Once you have created a lockdown area, you must associate access points with that
lockdown area. The following section describes how to associate lockdown areas with
access points.
111
Figure 83: Limited occupancy areas screen
Click Add Limited Occupancy Area. The Limited occupancy area information screen
is displayed.
Type a name for the limited occupancy area in the Name field.
Type a description for the limited occupancy area in the Description field.
Click Save.
112
5. 11. 2. Associating Limited Occupancy Areas
Once you have created a limited occupancy area, you must associate access points and
limited occupancy groups with that limited occupancy area. The following sections describe
how to associate limited occupancy areas with the various entries.
113
possible to check whether all the users in the area have been safely evacuated. The system
generates the roll call by monitoring specific access points. By tracking when cardholders
enter and exit using these access points, it is possible to see exactly who is inside or outside
the roll-call area.
The roll-call functionality is license-dependent. See Registering and Licensing SALTO
Software for more information.
See Roll-Call for information about generating a list of individual user names in a roll-call
area in ProAccess SPACE. You can also use ProAccess SPACE Roll-Call Monitoring to
perform other roll-call tasks, such as searching all roll-call areas for a user and the time and
date each user entered the roll-call area. See Roll-Call for more information.
NOTE: The View List of Access Points button shows a list of access points associated
with all roll-call areas.
Click Add Roll-Call area. The Roll-call area information screen is displayed.
114
Figure 86: Roll-call area information screen
In the above example, there are three standard roll-call areas: A1, A2, and A3. The exterior
area is A0, which lists all users who are not in A1, A2, or A3.
115
A user in A1, A2, or A3 must present their key to a wall reader to exit that roll-call area.
When a user presents their key, the system determines that the user has exited the area and
entered the exterior area A0. The exterior area allows the system to create accurate roll-call
lists, accounting for all the people who are present.
5. 12. 2. 1. Readers
To associate a reader with a roll-call area, perform the following steps:
1. Select Access points > Roll-call areas. The Roll-call areas screen is displayed.
Double-click the roll-call area that you want to associate with a reader. The Roll-call
area information screen is displayed.
Click Readers in the sidebar. The Readers dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated an access
point with this particular roll-call area.
Click Add/Delete. The Add/Delete dialog box, showing a list of access points, is
displayed.
This list only applies to online CUs where there are two physical wall readers.
Select the required access point in the left-hand panel and click the chevron. The
selected access point is displayed in the right-hand panel.
Click Accept. The roll-call area is now associated with the access point.
116
Special 1
Special 2
NOTE: You must configure the system calendar before you create access point timed
periods. See Calendars for more information.
117
Click Save.
NOTE: An access point automatic change differs from an access point timed period in
that the access point timed period allows for only one opening mode to be applied
to an access point. An access point automatic change allows multiple opening
modes to be applied to one access point. See Access Point Timed Periods for
more information.
118
Figure 89: Automatic changes screen
119
Figure 90: Edit automatic changes dialog box
Type a start time and end time for the automatic changes period in the Add panel.
Select an opening mode from the drop-down list in the Add panel.
The opening modes drop-down list includes an extra mode in addition to those available
for managing doors. This extra mode is called the Two-person rule. It can only be
enabled from this dialog box. Enabling this mode means that two users must each
present a valid key to open the door.
Click the Plus icon on the right-hand side of the Add panel. The automatic change is
added.
Click the Tick icon on the right-hand side of the last automatic change entry to add
another entry that starts when the last one ends.
Click Accept when you have finished adding all of the automatic changes for the
specified day.
The Automatic changes screen is displayed with the automatic changes added.
120
Figure 91: Automatic changes created
Click Save.
121
Figure 92: Automatic changes#003
122
Figure 94: Automatic changes#003 created
Click Save.
123
Figure 95: Automatic changes#004
124
Click Accept. The Automatic change#003 entry information is copied to the Automatic
change#004 entry.
Click Save.
125
6. CARDHOLDERS
This chapter contains the following sections:
About Cardholders
Cardholders Process
Users
User Access Levels
Limited Occupancy Groups
Cardholder Timetables
6. 1. About Cardholders
Card is a generic term in the SALTO system that refers to a key, bracelet, watch, or phone.
A cardholder is a person who accesses a SALTO site by using one of these access devices.
A cardholder can be a user (usually a member of staff), a visitor (someone who only requires
access once or just occasionally), or a guest (someone staying temporarily at a hotel who
requires access to an assigned room for a fixed period of time).
This chapter describes how to create users. It also describes the management options
associated with cardholders. See Visitors for information about visitors and Hotels for
information about hotel guests.
The information contained in this chapter applies to non-hotel sites only. See Hotels for
information about hotel guests who also use keys. Note that guests are treated differently
from other types of cardholders.
NOTE: Keycards are generally referred to as keys, both in this manual and in the system
itself.
6. 2. Cardholders Process
Cardholders are generally created and managed by an operator with admin rights.
References are made to the admin operator throughout this chapter. However, this can
mean any operator that has been granted admin rights.
126
The following example shows a simple way of completing this process:
1. Users created and configured
The admin operator creates user profiles and configures the user options.
Users associated
The admin operator associates access points, user access levels, zones, outputs, and
locations/functions with the specified users.
User access levels created and configured
The admin operator creates user access levels and configures the user access level
options.
User access levels associated
The admin operator associates access points, zones, users, and outputs with the
specified user access level.
Limited occupancy groups created and configured
The admin operator creates limited occupancy groups and configures the limited
occupancy groups options.
Limited occupancy groups associated
The admin operator associates users and limited occupancy areas with the specified
limited occupancy groups.
Cardholder timetables created and configured
The admin operator creates cardholder timetables and configures the timetable options.
6. 3. Users
A user is typically a member of staff who needs access to and within your site’s buildings.
They are differentiated from other cardholders by the fact that they need regular, rather than
occasional, access. Usually, they also have a greater level of access than other types of
cardholders such as visitors.
6. 3. 1. Creating Users
To create a user, perform the following steps:
1. Select Cardholders > Users. The Users screen is displayed.
127
Figure 98: Users screen
128
Type a title, first name, and last name for the user in the Identification panel.
NOTE: You can activate system restrictions for user names by enabling the
INHIBIT_USER_NAME_CHANGE parameter in System > General options >
Advanced. If you enable this parameter, you cannot edit the Title, First name,
and Last name fields on the User information screen if you have assigned a key
to the user at any point. An Error pop-up message is displayed when you try to
save any changes to these fields. This ensures that the audit trail data for users is
accurate. See Advanced Tab for more information.
Enter a Wiegand code if required. See Wiegand code format for more information.
Enter an Authorization code if required
NOTE: Only Wiegand interface is supported and requires a third-party ROM-code reader.
The user access is based on a white list of ROM codes at the Salto DB. CU42x0
are required. See Advanced Tab for more information.
Select the relevant partition from the Partition drop-down list, if required.
See Partitions for more information.
Select the appropriate management options.
The configuration and management fields are described in Reports on Calculation on
Working Hours
This report selection allows to have working hour report according to the selected users
We can get a report of working hour period according to the first and last event of the user in
any door per day
129
Figure 107: Report Working Hours
Configuring Users
Click Save.
NOTE: The Multiple Edit button is enabled when you select more than one entry on the
Users screen. This allows you to enter the appropriate options and configuration
details on the Multiple edit screen including access rights. The details are then
applied to all of the selected entries. See Configuring Users for more information
about the configuration settings for users.
6. 3. 1. 2. Assigning Keys
After you have created and configured a user, you can click Assign Key on the User
information screen to assign them a key. See Assigning User Keys for more information.
When you assign keys to users, different icons are displayed in the Key status column on
the Users screen, depending on the key status. See Key Status Icons for more information.
The key status is also displayed on the User information screen. The period for which keys
are valid is shown on the User information screen and also in the Key Expiration column on
the Users screen.
NOTE: The Assign Key button is only available on the User information screen after a
user profile has been created and saved.
130
Figure 100: User information screen
6. 3. 1. 3. Banning Users
After you have created and configured a user, you can, if necessary, ban a user from
accessing any part of a site by invalidating their key. For example, a user who is a member
of staff can be banned while they are on vacation. Unbanning the user when they return from
vacation restores their original access data to their key (after presenting the key to an SVN
wall reader).
NOTE: Banning users is different from cancelling keys. A user’s key can be cancelled, for
example, if a user loses their key. See Cancelling Keys for more information. The
blacklist is a record of cancelled keys. Banned users are not added to the
blacklist. See About Blacklists for more information.
To ban a user, perform the following steps:
1. Select Cardholders > Users. The Users screen is displayed.
131
Figure 101: List of users
Double-click the user that you want to ban. The User information screen is displayed.
Click Ban User. A pop-up is displayed asking you to confirm that you want to ban the
user.
132
Figure 103: Ban user confirmation pop-up
133
Figure 105: User information screen
6. 3. 1. 6. Deleting Users
You can delete any user by selecting the required user on the Users screen and clicking
Delete. This deletes their profile, and they are no longer displayed on the Users screen. If
the deleted user had an assigned key, his key will be cancelled through the same process.
134
6. 3. 1. 7. Reports on Calculation on Working Hours
This report selection allows to have working hour report according to the selected users
We can get a report of working hour period according to the first and last event of the user in
any door per day
6. 3. 2. Configuring Users
The following sections describe the various panel options used to configure users.
6. 3. 2. 1. Identification
The Identification panel defines the user’s details. Most of the fields in this panel are
described in Creating Users.
The ROM field is generally filled in by synchronization but it can also be filled in manually.
This code is used for automatic key assignment. Note that the automatic key assignment
functionality is license-dependent. If you do not have access to this in your licensing options,
135
the ROM field is not displayed. See Registering and Licensing SALTO Software for more
information.
You must enable the SHOW_ROM_CODE parameter in ProAccess SPACE General options
to control the display of ROM codes when you read keys or export audit trail data. See
Advanced Tab for more information.
NOTE: Generally, the system does not allow you to create two cardholders with the same
name. You can make user names unique by changing the default format for user
IDs in ProAccess SPACE General options. See Configuring User IDs for more
information.
6. 3. 2. 3. Key Options
The Key Options panel defines the user access details.
136
Option Description
Use antipassback Ensures that a user cannot enter through the same door multiple
times until they have first exited the door (or until a specified time
period has passed). This is to prevent a key being used by a
number of different users. See Enabling Anti-passback and Access
Points Tab for more information. The antipassback functionality is
license-dependent. See Registering and Licensing SALTO
Software for more information.
Audit openings in the key Allows an audit trail of the user’s access point activity to be written
to their key. If this option is disabled, the locks will not write any
audit information to the key. You must also enable this feature on
the required access points by selecting the Audit on keys option.
See Door Options and ¡Error! No se encuentra el origen de la
referencia. for more information.
New key can be cancelled Ensures that the user’s key is sent to the blacklist if it is cancelled.
through blacklist To activate this option, you must enable the
MORE_THAN_64K_USERS parameter in ProAccess SPACE
General options. This checkbox is selected by default for users. If
you clear the checkbox, the user’s key is not sent to the blacklist
when cancelled. See Advanced Tab for more information.
6. 3. 2. 4. PIN Codes
The PIN Code panel defines the user’s PIN code options. In addition to a key, a PIN code
may sometimes be required for users to gain access to certain parts of the site.
137
Option Description
Calendar Defines which calendar is applied to the user. See Calendars for
more information.
Enable revalidation of key Enables the user’s key to be revalidated at any time even when
expiration the key has not expired. For example, if the user’s update period is
seven days, the key is revalidated for another seven days every
time the user presents their key to an SVN wall reader even if has
been revalidated the day before.
Update period Defines the time period between user validations. If this is set to
zero, the user’s key expires at 00:00 on the same day that it is
updated. However, the key can still be updated each day. If 30
days is selected, the user’s key will be valid for 30 days and will
need to be revalidated once that time period has expired. You can
change the default update period by amending the value in the
Default expiration period field in System > General options >
Users in ProAccess SPACE. See User Tab for more information.
6. 3. 2. 6. Dormitory Doors
You can allow users in your organization to change a door’s keypad code. For example, in a
dormitory where there is a high turnover of students, users may need to frequently change a
door’s keypad code to prevent unauthorized access.
To activate this functionality, you must enable the DORM_KEYPAD parameter in ProAccess
SPACE General options. See Advanced Tab for more information. When you enable this
parameter, a Dormitory Door panel is added to the User information screen, and you can
select a door from the drop-down list.
You must change the keypad code for the door by using the Keypad Code field on the Door
information screen. See Opening Modes and Timed Periods for more information. The new
keypad code is transferred to the user’s key when they update their key at an SVN wall
reader. When the user presents their key to the door, the door is updated with the new
keypad code, and the previous keypad code is invalidated.
138
6. 3. 3. Associating Users
After you have created a user, you must associate access points, user access levels, zones,
outputs, and locations/functions with the specified user. The following sections describe how
to associate users with the various entries.
6. 3. 3. 1. Access Points
See ¡Error! No se encuentra el origen de la referencia. for definitions and information
about how to create and configure access points.
NOTE: You would generally only associate individual users with access points if they do
not belong to a user access level. User access levels allow you to group users
with the same access permissions for easier access management. See User
Access Levels for more information. However, there may be cases where you
need to give individual users access to doors or zones that are not associated
with their user access level.
To associate a user with an access point, perform the following steps:
1. Select Cardholders > Users. The Users screen is displayed.
Double-click the user name that you want to associate with an access point. The User
information screen is displayed.
Click Access Points in the sidebar. The Access points dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated a user with
this particular access point.
Click Add/Delete. The Add/Delete dialog box, showing a list of access points, is
displayed.
Select the required access point in the left-hand panel and click the chevron. The
selected access point is displayed in the right-hand panel.
Click Accept. The access point is associated with the user.
Select the access point in the Access points dialog box if you want to select a
cardholder timetable to be used. See Cardholder Timetables for more information.
139
Click Edit. The Edit dialog box is displayed.
Select the appropriate timetable using the drop-down list. Alternatively, you can also
select the Always or Never drop-down list option.
The Always option is selected by default. This means that the user always has access to
the access point, as you have not specified a timetable. Note that the system calendars
do not apply if the Always option is selected. If you select Never, they do not have
access to the access point at any time.
In Days period, Same as key is selected by default. It means the user will have access
to the door while the key is valid.
Select Use the following days period if you want the user to have access to that
specific door only during a period of time. Select a Start date and an End date.
NOTE: The key validity takes precedence over the door access. If the access to the door
is set for a future date than the key expiration, the access will be denied according
with the key expiration date.
140
6. 3. 3. 2. User Access Levels
See User Access Levels for a definition and information about how to create and configure a
user access level.
To associate a user with a user access level, perform the following steps:
1. Select Cardholders > Users. The Users screen is displayed.
Double-click the user name that you want to associate with a user access level. The
User information screen is displayed.
Click User Access Levels in the sidebar. The User access levels dialog box is
displayed.
Note that the dialog box will be blank because you have not yet associated a user
access level with this particular user.
Click Add/Delete. The Add/Delete dialog box, showing a list of user access levels, is
displayed.
Select the required user access level in the left-hand panel and click the chevron. The
selected user access level is displayed in the right-hand panel.
Highlight the Access Level and click Edit. In Days period, Same as key is selected by
default. It means the user will have access to the access level while the key is valid.
Select Use the following days period if you want the user to have access to that
specific access point only during a period of time. Select a Start date and an End date.
Click Accept. The user access level is now associated with the user.
NOTE: The key validity takes precedence over the Access Level access. If the access to
the access level is set for a future date than the key expiration, the access will be
denied according with the key expiration date.
6. 3. 3. 3. Zones
See Zones for a definition and information about how to create and configure a zone.
To associate a user with a zone, perform the following steps:
1. Select Cardholders > Users. The Users screen is displayed.
Double-click the user name that you want to associate with a zone. The User information
screen is displayed.
Click Zones in the sidebar. The Zones dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated a zone with
this particular user.
Click Add/Delete. The Add/Delete dialog box, showing a list of zones, is displayed.
Select the required zone in the left-hand panel and click the chevron. The selected zone
is displayed in the right-hand panel.
Highlight the Zone and click Edit. In Days period, Same as key is selected by default. It
means the user will have access to the zone while the key is valid.
Select Use the following days period if you want the user to have access to that
specific access point only during a period of time. Select a Start date and an End date.
Click Accept. The zone is now associated with the user.
Note that you can also select which cardholder timetable is used. See Access Points for
more information and a description of the steps you should follow.
141
NOTE: The key validity takes precedence over the Zone access. If the access to the
zone is set for a future date than the key expiration, the access will be denied
according with the key expiration date.
6. 3. 3. 4. Outputs
See Outputs for a definition and information about how to create and configure an output.
To associate a user with an output, perform the following steps:
1. Select Cardholders > Users. The Users screen is displayed.
Double-click the user name that you want to associate with an output. The User
information screen is displayed.
Click Outputs in the sidebar. The Outputs dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated an output
with this particular user.
Click Add/Delete. The Add/Delete dialog box, showing a list of outputs, is displayed.
Select the required output in the left-hand panel and click the chevron. The selected
output is displayed in the right-hand panel.
Click Accept. The output is now associated with the user.
6. 3. 3. 5. Locations/Functions
See Locations and Functions for definitions and information about how to create and
configure a location and function.
To associate a user with a location/function, perform the following steps:
1. Select Cardholders > Users. The Users screen is displayed.
Double-click the user name that you want to associate with a location/function. The User
information screen is displayed.
Click Locations/Functions in the sidebar. The Locations/Functions dialog box is
displayed.
Select the checkbox for the required location in the Locations panel.
Select the checkbox for the required function in the Functions panel.
142
Select a cardholder timetable to be used from the Timetable drop-down list.
Alternatively, you can select the Always or Never drop-down list option.
The option you select is applied to both the selected location and function. You cannot
select a different option for both. The Always option is selected by default. This means
that the user always has access to the location and function, as you have not specified a
timetable. If you select Never, they do not have access to the location or the function at
any time.
For systems with a lot of functions and/or locations it’s possible to filter by Location or
Function name and also by status “Selected” or “not Selected”.
143
6. 4. User Access Levels
User access levels are used to define a group of users with the same access permissions,
for example, all staff in a department or all managerial staff. This means that if you are
configuring a door entry on the Door information screen, you can allow access permissions
for that door to all users who belong to a specific user access level. Without user access
levels, you would have to associate each individual user with that particular door.
The following sections describe how to create and configure a user access level.
NOTE: User access levels allow you to group users for easier access management.
Unlike zones, user access levels do not save memory space on a key.
Click Add Access Level. The User access level information screen is displayed.
144
Figure 115: User access level information screen
6. 4. 2. 1. Access Points
See ¡Error! No se encuentra el origen de la referencia. for definitions and information
about how to create and configure the various types of access points.
To associate a user access level with an access point, perform the following steps:
1. Select Cardholders > User access levels. The User access levels screen is
displayed.
Double-click the user access level that you want to associate with an access point. The
User access level information screen is displayed.
Click Access Points in the sidebar. The Access points dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated an access
point with this particular user access level.
Click Add/Delete. The Add/Delete dialog box, showing a list of access points, is
displayed.
Select the required access point in the left-hand panel and click the chevron. The
selected access point is displayed in the right-hand panel.
Click Accept. The user access level is now associated with the access point.
Note that you can also select which cardholder timetable is used. See Access Points for
more information and a description of the steps you should follow.
145
6. 4. 2. 2. Zones
See Zones for a definition and information about how to create and configure a zone.
To associate a user access level with a zone, perform the following steps:
1. Select Cardholders > User access levels. The User access levels screen is
displayed.
Double-click the user access level that you want to associate with a zone. The User
access level information screen is displayed.
Click Zones in the sidebar. The Zones dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated a zone with
this particular user access level.
Click Add/Delete. The Add/Delete dialog box, showing a list of zones, is displayed.
Select the required zone in the left-hand panel and click the chevron. The selected zone
is displayed in the right-hand panel.
Click Accept. The user access level is now associated with the zone.
Note that you can also select which cardholder timetable is used. See Access Points for
more information and a description of the steps you should follow.
6. 4. 2. 3. Users
See Users for a definition and information about how to create and configure a user.
To associate a user access level with a user, perform the following steps:
1. Select Cardholders > User access levels. The User access levels screen is
displayed.
Double-click the user access level that you want to associate with a user. The User
access level information screen is displayed.
Click Users in the sidebar. The Users dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated a user with
this particular user access level.
Click Add/Delete. The Add/Delete dialog box, showing a list of users, is displayed.
Select the required user in the left-hand panel and click the chevron. The selected user
is displayed in the right-hand panel.
Click Accept. The user access level is now associated with the user.
6. 4. 2. 4. Outputs
See Outputs for a definition and information about how to create and configure an output.
To associate a user access level with an output, perform the following steps:
1. Select Cardholders > User access levels. The User access levels screen is
displayed.
Double-click the user access level that you want to associate with an output. The User
access level information screen is displayed.
Click Outputs in the sidebar. The Outputs dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated an output
with this particular user access level.
Click Add/Delete. The Add/Delete dialog box, showing a list of outputs, is displayed.
146
Select the required output in the left-hand panel and click the chevron. The selected
output is displayed in the right-hand panel.
Click Accept. The user access level is now associated with the output.
Click Add Limited Occupancy Group. The Limited occupancy group information
screen is displayed.
147
Figure 117: Limited occupancy group information screen
Type a name for the limited occupancy group in the Name field.
Type a description for the limited occupancy group in the Description field.
Click Save.
6. 5. 2. 1. Users
To associate a user with a limited occupancy group, perform the following steps:
1. Select Cardholders > Limited occupancy groups. The Limited occupancy groups
screen is displayed.
Double-click the limited occupancy group that you want to associate with a user. The
Limited occupancy group information screen is displayed.
Click Users in the sidebar. The Users dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated a user with
this particular limited occupancy group.
Click Add/Delete. The Add/Delete dialog box, showing a list of users, is displayed.
Select the required user in the left-hand panel and click the chevron. The selected user
is displayed in the right-hand panel.
Click Accept. The limited occupancy group is now associated with the user.
NOTE: You can also add users to limited occupancy groups by selecting the required
limited occupancy group in the Limited Occupancy Group panel on the User
information screen.
148
6. 5. 2. 2. Limited Occupancy Areas
To associate a limited occupancy area with a limited occupancy group, perform the following
steps:
1. Select Cardholders > Limited occupancy groups. The Limited occupancy groups
screen is displayed.
Double-click the limited occupancy group that you want to associate with a limited
occupancy area. The Limited occupancy group information screen is displayed.
Click Limited Occupancy Areas in the sidebar. The Limited occupancy areas dialog
box is displayed.
Note that the dialog box will be blank because you have not yet associated a limited
occupancy area with this particular limited occupancy group.
Click Add/Delete. The Add/Delete dialog box, showing a list of limited occupancy areas,
is displayed.
Select the required limited occupancy area in the left-hand panel and click the chevron.
The selected limited occupancy area is displayed in the right-hand panel.
Click Accept. The limited occupancy group is now associated with the limited occupancy
area.
Select the limited occupancy area in the Limited occupancy areas dialog box if you
want to change the maximum number of users allowed in the area. The default number
of users is 1.
149
Select the maximum number of users allowed using the up and down arrows.
Alternatively, you can type the appropriate number in the Maximum allowed users field.
Click OK.
6. 6. Cardholder Timetables
Cardholder timetables control the time periods during which a user’s key can be used with a
site’s access points. For example, a user who works 12-hour shifts over a four-day period
could have a timetable that looks like the following example:
08.00 to 20.00 Monday
08.00 to 20.00 Tuesday
20.00 to 08.00 Wednesday
20.00 to 08.00 Thursday
A timetable can be set up so that outside of these periods the user’s key is not valid and they
cannot access the site.
When you create cardholder timetables, you can choose which are used with a site’s access
points for individual users and user access levels. This is done by selecting the required
cardholder timetable in the dialog boxes for access points in the sidebar on the User and
User access level information screens. See Access Points and Zones for more information
and a description of the steps you should follow. You can also choose cardholder timetables
to be used with a site’s access points for guest access levels and visitor access levels. See
Zones, Access Points, and Zones for more information and a description of the steps you
should follow.
NOTE: You must configure the system calendar before you create cardholder timetables.
The calendar determines the days or weeks that user access is granted, for
example, from Monday to Friday. See Calendar for more information. Cardholder
timetables control the time period during which user access is granted, for
example, from 08:00 to 20:00.
150
Figure 120: Cardholder timetables screen
151
timezone entries for each partition. If required, you can select timezone entries from the
list and move them to a different partition by selecting the appropriate partition in the
Partition field and clicking Save. See Partitions for more information.
Type a start time for the timezone entry in the From field.
Type an end time for the timezone entry in the To field.
Click the applicable days in the Days panel.
If you want to deselect a day, click the applicable day again. If you want to deselect all
entries, click the Minus icon.
In addition to the days of the week, you can also create timed periods for holidays (H1)
and special days (S1 and S2). See Calendars for more information about holidays and
special days.
Click Save.
152
Figure 123: Save Cardholder timetable 002
Click Save.
153
7. VISITORS
This chapter contains the following sections:
About Visitors
Visitors Process
Visitor Access Levels
Visitor Check-Ins
Visitor Check-Outs
Managing Visitor Lists
7. 1. About Visitors
Visitors is the term used to describe cardholders who require temporary access to a site. An
example of a visitor might be an engineer doing site maintenance work for a few hours. The
engineer can be given access to particular areas of the site for a specified time period. When
the time period expires, they can no longer access the site.
If someone regularly needs to visit the site, they can be more permanently included in the
system as a visitor and an operator can check them in and out as applicable. However, they
have access permissions only during the time period specified. If the appointment is a one-
off visit, the operator can delete the visitor from the database once the specified check-out
time has expired.
Note that the visitors functionality is license-dependent. See Registering and Licensing
SALTO Software for more information.
The information contained in this chapter applies to non-hotel sites only. Visitors should not
be confused with guests – guests are applicable to hotel sites only. See Guest Check-In for
information about guest check-in.
7. 2. Visitors Process
Visitors are generally created and managed by an operator with admin rights. Throughout
this chapter, references are made to the admin operator. However, this can refer to any
operator that has been granted admin rights.
The following example shows a simple way to complete this process:
1. Visitor access levels created and configured
The admin operator creates a visitor access level and configures the visitor access level
options.
Visitor access levels associated
154
The admin operator associates access points, zones, and outputs with the specified
visitor access level.
Visitor check-in created
The operator enters the check-in information.
Visitor check-out created
The operator enters the check-out information.
5. Visitors list managed
The operator views the list of visitors and deletes visitors whose visits have expired.
Click Add Access Level. The Visitor access level information screen is displayed.
155
Figure 125: Visitor access level information screen
7. 3. 2. 1. Access Points
See ¡Error! No se encuentra el origen de la referencia. for definitions and information
about how to create and configure the various types of access points.
NOTE: The maximum number of doors to which a visitor can be granted access is 96.
To associate a visitor access level with an access point, perform the following steps:
Select Cardholders > Visitor access levels. The Visitor access levels screen is
displayed.
Double-click the visitor access level that you want to associate with an access point. The
Visitor access level information screen is displayed.
Click Access Points in the sidebar. The Access points dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated an access
point with this particular visitor access level.
Click Add/Delete. The Add/Delete dialog box, showing a list of access points, is
displayed.
Select the required access point in the left-hand panel and click the chevron. The
selected access point is displayed in the right-hand panel.
Click Accept. The visitor access level is now associated with the access point.
156
Select the access point in the Access points dialog box if you want to select a
cardholder timetable to be used or specify whether access is optional.
Select the appropriate cardholder timetable using the drop-down list. Alternatively, you
can also select the Always or Never drop-down list option.
The Always option is selected by default. This means that the cardholder associated
with the specified visitor access level always has access to the access point, as you
have not specified a timetable. Note that the system calendars do not apply if the
Always option is selected. If you select Never, the access point cannot be used by the
visitor cardholder at any time.
Select Yes or No as appropriate.
If you select Yes, operators can decide whether or not to grant access when they check
in a visitor. If you select No, access is granted to visitors by default. Note that if you
specify an access point as optional, it is displayed as a checkbox option on the Visitor
check-in screen. See Visitor Check-Ins for more information.
Click OK.
7. 3. 2. 2. Zones
See Zones for a definition and information about how to create and configure a zone.
157
To associate a visitor access level with a zone, perform the following steps:
Select Cardholders > Visitor access levels. The Visitor access levels screen is
displayed.
Double-click the visitor access level that you want to associate with a zone. The Visitor
access level information screen is displayed.
Click Zones in the sidebar. The Zones dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated a zone with
this particular visitor access level.
Click Add/Delete. The Add/Delete dialog box, showing a list of zones, is displayed.
Select the required zone in the left-hand panel and click the chevron. The selected zone
is displayed in the right-hand panel.
Click Accept. The visitor access level is now associated with the zone.
Note that you can select a cardholder timetable to be used and specify whether access
is optional. See Access Points for more information and a description of the steps you
should follow.
7. 3. 2. 3. Outputs
See Outputs for a definition and information about how to create and configure an output.
To associate a visitor access level with an output, perform the following steps:
Select Cardholders > Visitor access levels. The Visitor access levels screen is
displayed.
Double-click the visitor access level that you want to associate with an output. The
Visitor access level information screen is displayed.
Click Outputs in the sidebar. The Outputs dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated an output
with this particular visitor access level.
Click Add/Delete. The Add/Delete dialog box, showing a list of outputs, is displayed.
Select the required output in the left-hand panel and click the chevron. The selected
output is displayed in the right-hand panel.
Click Accept. The visitor access level is now associated with the output.
Note that you can specify whether access is optional. For example, you can enable
elevator access so that a user can access Floor 1 and Floor 3 of a building, but not Floor
2. See Access Points for more information and a description of the steps you should
follow.
7. 4. Visitor Check-Ins
To check in a visitor, perform the following steps:
Select Keys > Visitor check-in. The Visitor check-in screen is displayed.
158
Figure 128: Visitor check-in screen
Click OK.
NOTE: If required, you can add an Additional data field to the Visitor check-in screen
using ProAccess SPACE General options. To enable the field, you must select
Track #1, Track #2, or Track #3 from the Save additional data on… drop-down
159
list in System > Configuration > General options > Visitors. See Visitors Tab
for more information.
NOTE: The default check-out time is 12:00. If required, you can change this in ProAccess
SPACE General options in the Default checkout time field in System > General
options > Visitors. See Visitors Tab for more information.
The default maximum number of days for which a visitor can be granted access is
30. If required, you can change this in ProAccess SPACE General options in the
Maximum number of days field in System > General options > Visitors. See
Visitors Tab for more information.
7. 5. Visitor Check-Outs
To check out a visitor, perform the following steps:
Select Keys > Visitor check-out. The Visitor check-out dialog box is displayed.
160
Figure 131: Visitor check-out pop-up
Click OK. The visitor key can no longer be used to access any area of the site.
7. 6. 1. Viewing Visitors
You can view a list of visitors by selecting Cardholders > Visitors.
By default, visitors remain on the database and are displayed in the visitors list for 120 days
after the visit expires.
NOTE: To change the default display time, you can adjust the value in the Keys expired
X days ago will be removed automatically field in System > General options
> Visitors in ProAccess SPACE. See Visitors Tab for more information.
161
To Export the list, click on the Save icon. The list can be exported to PDF, CSV, Excel, TIFF,
Web Archive or XPS Document format documents.
Select the format and click Save.
162
8. HOTELS
This chapter is relevant to hotel sites only. Operators working in non-hotel sites do not need
to refer to it.
This chapter contains the following sections:
About Hotels
Hotels Process
About Hotel Access Points
Rooms
Suites
Room and Suite Icons
Creating Multiple Rooms and Suites
Checking Room and Suite Status
Configuring Hotel Keys
Hotel Guests
Guest Access Levels
Guest Check-In
Guest Check-Out
Group Check-In
Group Check-Out
Managing Guest Lists
Re-Rooming
8. 1. About Hotels
Hotel sites have specific requirements that entail additional functionality not required in other
SALTO installation sites. To meet these requirements, ProAccess SPACE has a Hotel
interface and menu that is enabled specifically for such sites. The Hotel interface gives
operators access to a restricted subset of the functionality available to an admin user. See
Admin Interface and Hotel Interface for more information.
The Hotel menu options can be accessed by admin operators and any operators that have
been given the appropriate permissions. These menus contain functionality relating to the
access management of guests.
The admin operator (or operator with admin rights) sets up users (hotel staff) and guest
access points (rooms, suites, zones, and outputs), and checks in visitors (people who
require access for a fixed period, for example, to do site maintenance). They also set up
hotel operator groups and hotel operators. The hotel operator can then perform tasks such
as guest check-in and check-out. See Users for more information about users. See Visitors
for more information about visitors.
The hotel functionality is license-dependent. Certain additional options for hotels, for
example, the re-rooming and mobile guest keys functionality, are also controlled by
licensing. See Registering and Licensing SALTO Software for more information.
163
NOTE: A hotel operator is generally a front-desk operator or a member of the hotel’s
reservations staff who has been set up with the appropriate operator permissions.
They can be given access to the Hotel interface only or to additional menus and
functionality; this depends on the permissions set by the admin operator. See
Operator Groups and Operators for more information.
8. 2. Hotels Processes
Hotel access points and access levels are generally created and managed by an operator
with admin rights. References are made to the admin operator throughout this chapter.
However, this can mean any operator that has been granted admin rights. References are
also made to a hotel operator. This can refer to any operator who has been given
permissions particular to hotels, for example, a front-desk operator.
The following example shows a simple way of completing this process:
1. Rooms created and configured
The admin operator creates rooms and configures the room options.
Rooms associated
The admin operator associates automatic outputs and zones with the specified rooms.
Suites created and configured
The admin operator creates suites and configures the suite options.
Suites associated
The admin operator associates rooms, automatic outputs, and zones with the specified
suites.
Hotel keys configured
The admin operator configures keys for use by hotel staff and management, and the
hotel operator configures keys for guests.
Guest access levels created and configured
The admin operator creates and configures guest access levels.
Guest access levels associated
The admin operator associates zones, outputs, and guests with the specified guest
access levels.
164
Hotel guest entries created and configured
a) The hotel operator selects a room and enters the guest check-in information.
b) The hotel operator encodes the room key with the guest check-in information.
c) The hotel operator checks the guest out when the guest is leaving.
See Group Check-In for information about setting up group check-ins.
Guest lists managed
The hotel operator views the list of guests and configures guest profiles.
NOTE: You must initialize room and suite locks using a PPD. See Initializing Rooms and
ESDs for more information.
8. 4. Rooms
The following sections describe how to create and configure a room.
8. 4. 1. Creating Rooms
To create a room, perform the following steps:
1. Select Access points > Rooms. The Rooms screen is displayed.
165
Figure 134: Rooms screen
166
See Partitions for more information about partitions.
Select the appropriate configuration options.
The configuration fields are described in Configuring Rooms.
Click Save.
You can activate up to two general purpose fields on the Room information screen if
required. To activate a general purpose field, you must select an Enable field checkbox in
System > General options > Access points in ProAccess SPACE. You can then name the
field in accordance with the information that you want to capture. See Access points Tab for
more information.
8. 4. 2. Configuring Rooms
The following sections describe the various ProAccess SPACE fields used to configure
rooms.
8. 4. 2. 1. Opening Modes
The default opening mode for rooms and suites is Standard. However, you can change this
to Toggle mode in ProAccess SPACE General options if required. To do so, select the
Toggle option from the Open mode drop-down list in System > General options > Hotel.
The selected opening mode applies to all external room doors in the hotel. However, it does
not apply to doors in subsuites. See Hotel Tab and Opening Modes and Timed Periods for
more information.
8. 4. 2. 2. Connection Types
The Connection Type panel defines the connection type for the room. The default option is
Offline. When you select any of the other (online) connection types from the Connection
Type drop-down list, a Configure button is displayed on the Room information screen. This
button is activated when you click Save. See Configuring Online Connection Types for more
information about configuring connection types.
Additional panels are also displayed on the Room information screen depending on the
connection type that you select.
The connection type options are described in the following table.
167
Option Description
Online RF (SALTO) Used for doors that are connected to the SALTO network using RF
technology. When you select this option, a Lockdown Area panel
is displayed on the Room information screen. This means you can
add the room to a lockdown area if required. See Lockdown Areas
and Limited Occupancy Areas for more information.
Online RF (BAS integration) Used for doors that are connected to a building automation system
(BAS) that is integrated with the SALTO network. Before selecting
this option, check that your BAS integration has been fully
configured in ProAccess SPACE General options. See BAS Tab
for more information. When you select this option, a Lockdown
Area panel is displayed on the Room information screen. This
means you can add the room to a lockdown area if required. See
Lockdown Areas for more information.
NOTE: When you activate a room’s ESD, you must initialize it using a PPD. See
Initializing Rooms and ESDs for more information.
ESD_#1 and ESD_#2 outputs are automatically generated by the system. These outputs
activate the relays for ESDs. They cannot be deleted.
Granting Guests Access to ESDs
You must complete the following process to give guests access to ESDs:
1. Create a guest access level and associate the required guests with the guest access
level.
See Guest Access Levels for more information about creating guest access levels and
associating guests.
2. Associate the ESD_#1 and ESD_#2 outputs with the guest access level.
Note that, in general, the ESD_#1 output controls access to electrical lights, and the
ESD_#2 output controls access to AC systems. You must associate both of these
outputs with guest access levels. See Outputs for more information about associating
outputs with guest access levels.
3. Amend the optional access settings for the ESD_#1 and ESD_#2 outputs so access is
granted to all guests by default.
This means that when you check in a guest to a particular room, for example, room 101,
their key can automatically be used to access the ESD in the room, for example,
@ESD_101. Otherwise, you have to grant this access to individual guests during check-
in. See Outputs for more information.
Check in the guests to the required rooms.
168
Guest keys can only be used to access ESDs in rooms if a guest has been checked in to
the room.
Granting Users Access to ESDs
The process for granting hotel staff (users) access to ESDs in rooms is different than for
guests.
You must do the following:
1. Create a zone and associate the required ESDs with the zone.
2. Associate users (or user access levels) with the zone.
3. Associate users (or user access levels) with the ESD_#1 and ESD_#2 outputs.
If required, you can associate users with the ESD_#1 output only. This means that they
can activate electrical lights but not AC systems, which are controlled by the ESD_#2
output.
See Zones and Outputs for more information.
8. 4. 2. 4. Room Options
The Room Options panel controls how the door activity is audited and whether mobile
guest keys can be used to access rooms.
The options are described in the following table.
169
Option Description
Allow mobile guest’s keys Allows mobile guest keys to be used to access a room. Mobile
guest keys allow guests to access a room by using the JustIN key
app on their mobile phone (instead of a separate physical
credential). When you select this option, a Send key to guest’s
mobile checkbox and a Notification message field are displayed
on the Hotel check-in screen for the room. This option is currently
only compatible with smartphones using iOS or Android operating
systems.
8. 4. 2. 5. Opening Times
The Opening Time panel defines how long a door stays open after it has been unlocked.
The options are described in the following table.
8. 4. 2. 6. Suites
Selecting a suite from the drop-down list in the Suite panel adds the room to the suite.
8. 4. 2. 7. Time Zones
The Time Zone panel defines which one of the system time zones is used for the room. You
must enable the multiple time zones functionality in ProAccess SPACE General options to
display this panel in ProAccess SPACE. See Activating Multiple Time Zones and Time
Zones for more information.
8. 4. 3. Associating Rooms
After you have created and configured a room, you must associate automatic outputs and
zones with that room. The following sections describe how to associate rooms with those
entries.
8. 4. 3. 1. Automatic Outputs
See Automatic Outputs for a definition and information about how to create and configure an
automatic output.
To associate an automatic output with a room, perform the following steps:
1. Select Access points > Rooms. The Rooms screen is displayed.
2. Double-click the room that you want to associate with an automatic output. The Room
information screen is displayed.
Click Automatic Outputs in the sidebar. The Automatic Outputs dialog box is
displayed.
170
Note that the dialog box will be blank because you have not yet associated an automatic
output.
Click Add/Delete. The Add/Delete dialog box, showing a list of automatic outputs, is
displayed.
Select the required automatic output in the left-hand panel and click the chevron. The
selected automatic output is displayed in the right-hand panel.
Click Accept. The room is now associated with the automatic output.
Select the output in the Automatic Outputs dialog box if you want to change the access
point timed period. See Access Point Timed Periods for more information.
Click Edit. The Edit dialog box is displayed. Time period 001 is selected by default.
Select the appropriate access point timed period from the drop-down list.
Click OK.
8. 4. 3. 2. Zones
See Zones for a definition and information about how to create and configure a zone. You
can associate rooms with zones by using the Access Points dialog box in the sidebar of the
Zone information screen. See Access Points for a description of the steps that you should
follow.
You can view a list of zones that are associated with each room on the system.
171
To view the zones associated with a room, perform the following steps:
1. Select Access points > Rooms. The Rooms screen is displayed.
2. Double-click the room with the zone list you want to view. The Room information screen
is displayed.
Click Zones in the sidebar. The Zones dialog box, showing a list of zones, is displayed.
8. 4. 3. 3. Users
See Users for information about which users of the system have got access assigned to the
room directly. You can associate rooms with users on the Cardholders menu, Users option,
by modifying the user profile on the Access Points. See Cardholders for a description of the
steps that you should follow.
Access levels:
8. 4. 3. 4. Access Levels
See Access Levels for information about which Access Levels of the system have got
access assigned to the room. You can associate rooms with access levels on the
Cardholders menu, Access Levels option, by modifying the Access Level profile on the
Access Points. See Access Levels for a description of the steps that you should follow.
172
Figure 139: Access levels accessing a room
8. 5. Suites
The following sections describe how to create and configure a suite.
8. 5. 1. Creating Suites
To create a suite, perform the following steps:
1. Select Access points > Rooms. The Rooms screen is displayed.
173
2. Click Add Suite. The Suite information screen is displayed.
8. 5. 2. Configuring Suites
The following sections describe the various ProAccess SPACE fields used to configure
suites.
8. 5. 2. 1. Opening Modes
The default opening mode for rooms and suites is Standard. However, you can change this
to Toggle mode in ProAccess SPACE General options if required. To enter Toggle mode,
select the Toggle option from the Open mode drop-down list in System > General options
> Hotel. The selected opening mode applies to all external suite doors in the hotel.
However, it does not apply to doors in subsuites. See Hotel Tab for more information.
174
You can enable Office mode for subsuite doors by activating the SUBSUITE_OFFICE and
SUBSUITE OFFICE_GUESTS parameters in System > General options > Advanced in
ProAccess SPACE. See Advanced Tab and Opening Modes and Timed Periods for more
information.
8. 5. 2. 2. Connection Types
The connection types are the same for suites and rooms. See Connection Types for more
information.
8. 5. 2. 4. Suite Options
The suite options are the same as the room options for rooms. See Room Options for more
information.
8. 5. 2. 5. Opening Times
The opening time options are the same for suites and rooms. See Opening Times for more
information.
8. 5. 2. 6. Time Zones
The time zone options are the same for suites and rooms. See Time Zones for more
information.
8. 5. 3. Associating Suites
When you have created and configured a suite, you must associate automatic outputs,
rooms, and zones with that suite. The following sections describe how to associate suites
with those entries.
8. 5. 3. 1. Automatic Outputs
See Automatic Outputs for a definition and information about how to create and configure an
automatic output.
To associate an automatic output with a suite, perform the following steps:
1. Select Access points > Rooms. The Rooms screen is displayed.
The Rooms screen shows a list of rooms and suites.
2. Double-click the suite that will be associated with an automatic output. The Suite
information screen is displayed.
Click Automatic Outputs in the sidebar. The Automatic Outputs dialog box is
displayed.
Note that the dialog box will be blank because you have not yet associated an automatic
output.
Click Add/Delete. The Add/Delete dialog box, showing a list of automatic outputs is
displayed.
Select the required automatic output in the left-hand panel and click the chevron. The
selected automatic output is displayed in the right-hand panel.
Click Accept. The suite is now associated with the automatic output.
175
You can specify which access point timed period is used. See Automatic Outputs for
more information and a description of the steps that you should follow.
8. 5. 3. 2. Rooms
See About Hotel Access Points and Rooms for a definition and information about how to
create and configure a room.
To associate a room with a suite, perform the following steps:
1. Select Access Points > Rooms. The Rooms screen is displayed.
The Rooms screen shows a list of rooms and suites.
Double-click the suite that you want to associate with a room. The Suite information
screen is displayed.
Click Rooms in the sidebar. The Rooms dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated a room.
Click Add/Delete. The Add/Delete dialog box, showing a list of rooms, is displayed.
Select the required room in the left-hand panel and click the chevron. The selected room
is displayed in the right-hand panel.
Click Accept. The suite is now associated with the room.
8. 5. 3. 3. Zones
See Zones for a definition and information about how to create and configure a zone. You
can associate suites with zones by using the Access Points dialog box in the sidebar of the
Zone information screen. See Access Points for a description of the steps that you should
follow.
You can view a list of zones that are associated with each suite in the system.
To view the zones associated with a suite, perform the following steps:
1. Select Access points > Rooms. The Rooms screen is displayed.
The Rooms screen shows a list of rooms and suites.
Double-click the suite with the zone list you want to view. The Suite information screen is
displayed.
Click Zones in the sidebar. The Zones dialog box, showing a list of zones, is displayed.
176
Icon Description
Indicates that the battery status of a door is unknown. This icon is
displayed in the Battery column.
Unknown
Indicates the battery status of a door. This can be normal, low, or
run-out.
Battery status
NOTE: Icons are displayed on the Room status information screen to indicate if rooms
or suites are occupied. See Checking Room and Suite Status for more
information.
177
Figure 143: Multiple add dialog box
3. Select the appropriate partition from the Partition drop-down list if required.
See Partitions for more information about partitions.
4. Type a prefix in the Prefix field if required.
This is included at the beginning of the new room names. For example, if you type 9 in
the Prefix field, and create two rooms, the rooms are named 91 and 92 respectively.
You can change individual room names by amending the text in the Name field on the
Room information screen if required.
5. Type a suffix in the Suffix field if required.
This is included at the end of the new room names. For example, if you type 9 in the
Suffix field, and create two rooms, the rooms are named 19 and 29 respectively.
6. Select the required numbers by using the up and down arrows in the From and To fields.
The numbers in these fields define the number of rooms that are created. For example, if
you select 1 in the From field and 3 in the To field, three rooms are created. The number
of each room is included in the room name by default. In this example, if you have not
entered a prefix or a suffix, the rooms are named 1, 2, and 3 respectively.
7. Select the appropriate number by using the up and down arrows in the Step field if
required.
This allows you to more accurately define what rooms are created within the number
range you have selected in the From and To fields. For example, if you select 2 in the
Step field, rooms are created for every second number within the specified range.
8. Select the appropriate room from the Same as drop-down list if required.
If you select a room from the drop-down list, the configuration settings of the new rooms
are the same as the room you select. However, if you select a suite, multiple suites with
the same configuration settings are created. You must associate rooms with each of the
new suites individually if required. See Rooms for more information and a description of
the steps you should follow. The default option is None. In this case, multiple rooms are
created, but you must define the configuration settings for each one.
Click OK.
178
8. 7. 2. Creating Multiple Suites
The process for creating multiple suites is the same as for creating multiple rooms. See
Creating Multiple Rooms for a description of the steps you should follow.
NOTE: You can edit multiple rooms or suites at once by using the Multiple Edit button.
This button is enabled when you select more than one entry on the Rooms
screen. This allows you to enter the appropriate identification and configuration
details on the Multiple edit screen. The details are then applied to all of the
selected entries. See Configuring Rooms and Configuring Suites for more
information about the configuration settings for rooms and suites.
The Room status information screen shows all of the rooms and suites in the hotel.
Different icons are displayed, depending on the status of each room and suite.
These are described in the following table.
179
Table 32: Room and suite status icons
Icon Description
Indicates that a room or suite is occupied by guests.
This icon is displayed on the left-hand side of the room
Occupied
or suite name. If a room or suite is occupied, the
expiration date is also shown in the Date of Expiry
column.
Indicates that some of the rooms in a suite are occupied
by guests. This icon is displayed on the left-hand side of
Some of the rooms within the
the suite name. In this case, you cannot perform a
suite
check-in for the suite.
are occupied
Indicates that a room or suite is reserved for a check-in
group. This icon is displayed in the Belongs to a
Belongs to a check-in group check-in group column.
180
The following sections describe these key configurations.
If the room is assigned to a guest who is using a mobile key, on the screen you will see
the option to make the copy of the key to another mobile number. Alternatively, you can
make a copy as a traditional credential. If you want to make another mobile key, click on
Send key to guest mobile and include the new mobile number which will receive a copy
of the key. Note that you can only add one mobile number at a time.
181
Click Copy Key. A pop-up is displayed asking you to place a key on the encoder.
Place the key on the encoder when the LED light begins to flash. The room information
is transferred to the key. A pop-up is displayed confirming the operation was successful.
Remove the key and click OK.
Repeat Steps 4, 5, and 6 to continue copying keys.
182
By default, the expiration data for a one shot key is one hour from the moment of
encoding. The default cannot be changed.
Click Edit Key. A pop-up is displayed asking you to place the key on the encoder.
Place the key on the encoder when the LED light begins to flash. A pop-up is displayed
confirming the operation was successful.
Remove the key and click OK.
NOTE: The default optional facilities granted to the room you want to create a one shot
key for will be added as well in the one shot key. For example, if room 101 has
access to the elevator, the one shot key will also have access to the elevator.
Optional facilities that are not granted by default, won’t be added to the key.
NOTE: Operators can only create programming keys, copy programming keys, and edit
spare keys for their own partitions. See Partitions for more information about
partitions. The partition options that are displayed when performing these tasks
depend on operator permissions.
NOTE: It is highly recommended that after you create your programming key, you make
multiple copies of it. Store these keys in a safe place for use by hotel staff in an
emergency situation. Copies of programming keys can be used with spare keys.
However, if a new programming key is created, this invalidates any existing spare
keys. You should always create copies of the programming key unless it is lost or
damaged. In this case, you need to create a new programming key.
To create a programming key, perform the following steps:
1. Select Hotel > Programming & spare keys. The Programming & spare keys screen
is displayed.
183
Figure 148: Programming & spare keys screen
The partitions functionality is license-dependent. If you do not have access to this in your
licensing options, the Partition dialog box is not displayed. See Partitions for more
information about partitions.
3. Select a partition from the drop-down list if required.
4. Click OK. A pop-up is displayed asking you to place the key on the encoder.
5. Place the key on the encoder when the LED light begins to flash. A pop-up is displayed
confirming the operation was successful.
6. Click OK.
After you create a programming key, the date and time it was programmed are displayed on
the Programming & spare keys screen.
NOTE: Copies of programming keys can be used with spare keys. See Copying
Programming Keys and Editing Spare Keys for more information. However, if a
new programming key is created, this invalidates any existing spare keys. If
guests do not return spare keys, or they are damaged, you can create new spare
keys for use with the existing programming key after normal operation resumes.
184
To copy a programming key, perform the following steps:
1. Select Hotel > Programming & spare keys. The Programming & spare keys screen
is displayed.
185
8. 9. 4. 3. Editing Spare Keys
Spare keys are used with programming keys to allow guests to access rooms in the case of
a power failure or an encoder failure. See Creating Programming Keys for more information
about programming keys.
When a spare key is used, it automatically cancels any other keys for the room, except those
of hotel staff (users). A spare key is automatically cancelled when a new guest key or a new
spare key is used to access the room.
It is recommended that you edit a higher number of spare keys than hotel rooms. For
example, if a hotel has 300 rooms, you should edit approximately 450 spare keys.
NOTE: Copies of programming keys can be used with the spare keys you create. See
Copying Programming Keys for more information. However, if a new
programming key is created, this invalidates any existing spare keys.
To edit a spare key, perform the following steps:
1. Select Hotel > Programming & spare keys. The Programming & spare keys screen
is displayed.
Click Edit Spare Keys. A pop-up is displayed asking you to place the key on the
encoder.
Place the key on the encoder when the LED light begins to flash. A pop-up is displayed
confirming that the operation was successful.
Remove the key and click Close.
You can click Edit Another Spare Key to continue editing keys.
186
keys checkbox in System > General options > Hotel. When you select this option, an Edit
Spare Keys Copies button is displayed on the Programming & spare keys screen. See
Hotel Tab and Editing Spare Keys for more information.
To edit spare key copies, perform the following steps:
1. Select Hotel > Programming & spare keys. The Programming & spare keys screen
is displayed.
Click Edit Spare Key Copies. The Copy spare key dialog box is displayed.
Select the number of keys you want to copy by using the up and down arrows in the
Number of keys field.
NOTE: You can only edit up to 10 spare key copies at a time. However, you can repeat
the operation as many times as you want.
Click OK. A pop-up is displayed asking you to place the key on the encoder.
Place the key on the encoder when the LED light begins to flash. A pop-up is displayed
confirming that the key has been edited and asking you to place the next key on the
encoder.
Place the next key on the encoder and click Accept.
Repeat the process for all the required keys. A pop-up is displayed confirming that the
operation was completed successfully.
187
Click OK.
Select the start date using the calendar and type the time in the Start date fields.
Select the date of expiry using the calendar and type the time in the Date of expiry
fields.
Click Edit Key. A pop-up is displayed asking you to place the key on the encoder.
Place the key on the encoder when the LED light begins to flash. A pop-up is displayed
confirming that the operation was successful.
Remove the key and click OK.
188
The following sections describe the two types of guests and the associated configuration
options:
Guest: An individual requiring one room or a suite
Group: A number of guests requiring multiple rooms
2. Click Add Guest Access Level. The Guest access level information screen is
displayed.
189
Figure 157: Guest access level information screen
3. Type a name for the guest access level in the Name field.
4. Type a description for the guest access level in the Description field.
5. Select the appropriate partition from the Partition drop-down list if required.
See Partitions for more information about partitions.
6. Click Save.
8. 11. 2. 1. Zones
To associate a zone with a guest access level, perform the following steps:
1. Select Cardholders > Guest access levels. The Guest access levels screen is
displayed.
2. Double-click the guest access level that you want to associate with a zone. The Guest
access level information screen is displayed.
3. Click Zones in the sidebar. The Zones dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated a zone.
Click Add/Delete. The Add/Delete dialog box, showing a list of zones, is displayed.
Select the required zone in the left-hand panel and click the chevron. The selected zone
is displayed in the right-hand panel.
Click Accept. The guest access level is now associated with the zone.
Select the zone in the Zones dialog box if you want to select a cardholder timetable to
be used or specify whether access is optional. See Cardholder Timetables for more
information.
190
Figure 158: Zones dialog box
Select the appropriate timetable using the drop-down list. Alternatively, you can select
the Always or Never drop-down list option.
The Always option is selected by default. This means that guests associated with the
specified guest access level always have access to the zone, as you have not specified
a timetable. Note that the system calendars do not apply if the Always option is
selected. If you select Never, they do not have access to the zone at any time.
Select Yes or No as appropriate.
If you select Yes, the hotel operator can decide whether or not to grant access when
they check in a guest. If you select No, access is granted to all guests in the guest
access level by default. Note that if you specify an access point as optional, it is
displayed as a checkbox option in the Optional Facilities panel on the Hotel check-in
screen. Optional access is useful for hotels offering various accommodation packages
and rates to guests, for example, accommodation with or without spa access.
Click OK.
191
NOTE: For security purposes, a guest access level cannot be associated with a zone that
contains a room. Guests can only be given access to their own rooms or specific
additional rooms at check-in.
8. 11. 2. 2. Outputs
To associate an output with a guest access level, perform the following steps:
1. Select Cardholders > Guest access levels. The Guest access levels screen is
displayed.
2. Double-click the guest access level that you want to associate with an output. The Guest
access level information screen is displayed.
Click Outputs in the sidebar. The Outputs dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated an output.
Click Add/Delete. The Add/Delete dialog box, showing a list of outputs, is displayed.
Select the required output in the left-hand panel and click the chevron. The selected
output is displayed in the right-hand panel.
Click Accept. The guest access level is now associated with the output.
You can specify whether access is optional. For example, you can give all guests in the
guest access level access to the penthouse floor by default or opt to grant guests access
to this floor during check-in. See Zones for more information and a description of the
steps that you should follow.
NOTE: It is recommended that you select No in the Optional column for the ESD_#1 and
ESD_#2 outputs that are generated by the system. This ensures that guests
automatically receive access to the ESD in their room when their key is encoded,
and hotel operators do not have to grant this access to individual guests during
check-in. See Associated Device Lists and Zones for more information.
8. 11. 2. 3. Guests
To associate a guest with a guest access level, perform the following steps:
1. Select Cardholders > Guest access levels. The Guest access levels screen is
displayed.
Double-click the guest access level that you want to associate with a guest. The Guest
access level information screen is displayed.
Click Guests in the sidebar. The Guests dialog box is displayed.
Note that the dialog box will be blank because you have not yet associated a guest.
Click Add/Delete. The Add/Delete dialog box, showing a list of guests, is displayed.
Select the required guest in the left-hand panel and click the chevron. The selected
guest is displayed in the right-hand panel.
Click Accept. The guest access level is now associated with the guest.
192
The hotel operator selects a room and enters the check-in information, for example, the
dates of the guest’s stay and any additional rooms required.
Key is edited
The hotel operator edits the key for the guest using an encoder. See Encoders for more
information about encoders.
Type the name of the room or, alternatively, press F2 to display the Select room dialog
box.
193
Figure 161: Select room dialog box
194
Select the applicable check-in information in the Check-In Info panel.
The check-in information fields are described in Adding Check-In Information.
You can also add a General purpose field in the check-in window. See Hotel Tab for
more information about guests general purpose fields. The content of the General
purpose field can be added to a track in the guest key. For example, the guest car tag is
added to the General purpose field, this data in turn is written in the key track so it can
be sent to a third party application when the key is read.
Select the appropriate optional facilities if required.
The optional facilities shown in the Optional Facilities panel match any access points
you have set up and defined as optional. See Zones for more information about defining
guest access points as optional. You can control whether guests can access optional
facilities before their specified room start time in ProAccess SPACE General options.
You can also define the time when guest access to optional facilities expires on their
check-out day. See Hotel Tab for more information.
Select the number of keys required in the Number of keys field.
NOTE: Up to 10 keys can be issued per room during a check-in. Only the original key and
the first three copies are named differently by the system. For example, for Room
101, the first four keys are named as follows: @101, @101#1, @101#2, and
@101#3.The remaining six keys are all named @101 #3. If more keys are
required, additional copies can also be made. See Copying Guest Keys for more
information.
Click Edit Key. A pop-up is displayed asking you to place the key on the encoder.
Place the key on the encoder when the LED light begins to flash. The check-in
information is transferred to the key. A pop-up is displayed confirming that the operation
was successful.
Remove the key and click OK.
NOTE: The JustIN Mobile key does not share the same characteristics as traditional
credentials such as cards, bracelets and fobs. For example, the smartphone-
based credential does not support data on tracks, Wiegand applications, free
assignment lockers, anti-passback, last rejection data or audit on key. Also Wall
Readers (update points) cannot write data on a smartphone-based credential.
Once the guest has downloaded the JustIN Mobile application, a guest need only follow the
instructions on the application to complete registration.
195
To select a room, perform the following steps:
1. Select Hotel > Check-in. The Hotel check-in screen is displayed.
Type the name of the room or, alternatively, press F2 to display the Select room dialog
box.
NOTE: To see the Send key to guest’s mobile in Key options during the Check-in, you
must enable Allow mobile guest’s keys in the room. See Room options for more
information. If Allow mobile guest’s keys is not checked in rooms, the Send key
to guest’s mobile will not be shown during the check-in process.
196
Figure 164: Select room dialog box
197
Select Send key to guest’s mobile in the Key option panel.
You can add a message in the Notification message box and this message will be shown
in the guest mobile. For example, “Welcome to Hotel Paradise”
198
Figure 167: Mobile opening screen
NOTE: Make sure Bluetooth is activated on the mobile phone. A message will appear if
Bluetooth has not beed activated.
199
Option Description
Number of nights Pre-set amount of check-in days for the guest stay. According to
the guest arrival day various options will be shown:
Weekend: from Friday to Sunday,
Week: from Monday to Sunday,
Midweek: from Monday to Friday.
By selecting one of these options you will automatically set the
departure date. To activate this option, you must select the
Enable predefined packages at check-in checkbox in
System > General options > Hotel. See Hotel Tab for more
information.
General Purpose Field You can have up to 5 General Purpose Fields for guests. In the
general purpose field you can add information related with the
guest such as his car tag, an ID number or a zip code for example.
See the Hotel Tab in General options for more information. This
information can also be added into key tracks if required. See
Tracks of guest keys in General options > Hotel Tab for more
information.
200
Select the room for which you want to change the stay duration.
Click Change Check-In. The Hotel check-in information screen is displayed.
Select the required number of nights by using the up and down arrows or, alternatively,
type the number in the Number of nights field.
The Date of expiry field updates automatically.
Click Save Check-In. The stay duration is changed.
NOTE: The new check-in data is sent automatically to RF doors so that the guest is
granted access until the new check-out date. The guest’s key is automatically
updated when they present it to an SVN wall reader. The new check-in data is not
sent to non-RF doors automatically. Instead, the key must be updated at an SVN
wall reader or at an encoder in reception.
To allow guest key updates, you must enable this functionality in ProAccess
SPACE General options. This is done by selecting the Enable guest keys
update checkbox in System > General options > Hotel. See Hotel Tab for more
information.
201
Figure 170: Hotel check-out dialog box
202
Figure 171: Check-in groups screen
Click Add Check-In Group. The Check-in group information screen is displayed.
203
5. Select the appropriate partition from the Partition drop-down list if required.
6. See Partitions for more information about partitions.
7. Click Add/Delete. The Add/Delete dialog box, showing a list of room names, is
displayed.
8. Select the available rooms from the left-hand panel and click the chevron. The
selected rooms are now displayed in the right-hand panel.
9. You can hold down the Ctrl key while clicking the rooms to make multiple selections.
10. Click Accept. The selected rooms are displayed in the Check-in groups information
screen.
11. Click Save Check-In Group. The group check-in information is saved.
From the check-in screen it’s possible to print all the check-in groups lists defined in this
section. It’s also possible to print the information of all the list rooms related to a single
specific check-in group:
204
Figure 174: Check-in groups
In order to print the information about the rooms related to a specific check-in group you
have to select to print the selected check-in group information:
In this way it’s possible to print a document with all the rooms detailed related to a single
check-in group:
205
Figure 176: Room status report
206
Figure 177: Check-in groups screen
Double-click the check-in group. The Check-in group information screen is displayed.
The Rooms with Pre-Edited Keys information field (shown in grey at the top of the
Check-in group information screen) displays how many rooms have had pre-edited
keys added.
Click Pre-Edit Guest Key. The Guest Key pre-edition dialog box is displayed.
207
Figure 179: Guest key pre-edition dialog box
208
Figure 180: Check-in group information screen
209
Figure 181: Check-in groups screen
210
Figure 183: Guests screen
211
Figure 184: Guest information screen
212
8. 17. Re-Rooming
The re-rooming functionality allows the hotel operator to assign a different room to a guest
without the guest having to return to the front desk. For example, a guest arrives to his room
but doesn’t like the view and then calls the reception desk to ask for a room change. The
front-desk operator can use the re-rooming function to assign the guest to a new room
without the guest having to go to reception for a new room key.
The following sections describe how to re-room a guest.
NOTE: The new check-in data is sent automatically to RF doors, and the new access
information is automatically transferred to the guest’s key when they present it to
an SVN wall reader. In the case of non-RF doors, the key must be updated at an
SVN wall reader or at an encoder in reception. To allow guest key updates, you
must enable this functionality in ProAccess SPACE General options. See
Changing Stay Duration for more information about this process.
213
Figure 186: Re-rooming dialog box
Type the room to which you want to re-room the guest in the To room field.
Click Accept. A pop-up is displayed informing you that the re-rooming was successful.
Click OK. The guest’s key is now valid for the new room and can no longer be used to
access their previous room.
214
9. KEYS
This chapter contains the following sections:
About Keys
Read Key
Assigning User Keys
Delete Key
Reset Locker data
Automatic Key Update
Assigning Keys Automatically
About Blacklists
9. 1. About Keys
In the SALTO system, a key (also known as a carrier) controls access to an area, building,
and/or site asset (for example, a cupboard or locker). SALTO keys are encoded with the
access data that controls who can enter, as well as when and where they can enter. This is
why the technology is called SALTO data-on-card. See SALTO Data-on-Card for more
information. For example, all staff can be given access to a company’s main building
entrance but access to certain internal areas can be restricted to specific members of staff
and to specific times.
This chapter describes the various types of keys that can be used with the SALTO system. It
also describes how to assign, read, delete, update, and cancel user keys.
NOTE: You must install the Local IO Bridge to use a USB encoder when assigning,
reading, deleting, and updating keys. See Local IO Bridge for more information
about the Local IO Bridge.
215
Amend options for visitor keys
See Visitors Tab for more information.
You can also select particular key configuration settings on the Access points and Users
tabs. See Access Points Tab and User Tab for more information.
9. 1. 2. Types of Keys
Key is a generic term in the SALTO system as keys are available in a wide range of formats,
for example, bracelets, fobs, or keycards. These formats are described in the following table.
216
Icon Description
to be re-edited. For smart cards, a solid orange light is displayed to
indicate that they need to be re-edited.
Indicates that a user’s key needs to be updated at an SVN wall
reader or on an encoder. This icon is displayed if you make
Update required changes to a user’s access data. It is also shown if a user’s key is
due to expire within a period of seven to fifteen days and needs to
be revalidated. This depends on when the key was edited. If the
key was edited between seven to fifteen days ago, the system
recommends an update seven days before its expiration date. If it
was edited more than fifteen days ago, the system recommends
an update 15 days before the expiration date. Note that if you
encode keys for a period of less than seven days, the icon is not
displayed.
9. 2. Reading Keys
In the case of keys that are found and the owner is unknown, you can read the key details by
placing the key on the encoder.
To read a key, perform the following steps:
1. Select Keys > Read key. A pop-up is displayed asking you to place the key on the
encoder.
2. Place the key on the encoder when the LED light begins to flash. A pop-up is displayed
showing the key data – for example, the owner, expiry date, and the key access points. If
you have enabled and configured specific tracks for keys, this information is also shown
with other relevant technical data. See Configuring Tracks for more information about
tracks.
Click Close.
You can click Read Another Key if you want to continue reading keys.
217
9. 3. Assigning User Keys
Keys assigned to users are encoded with the access information relevant to the specific
user. For this reason, you must set up and configure user profiles before assigning keys to
these users. See Users for more information.
When you assign a key to a user, the Update Key and Cancel Key buttons are added to the
User information screen, and you can use them to update or cancel the assigned key. See
Updating Keys and Cancelling Keys for more information. The period for which the key is
valid is displayed in the Valid Until information field. The key status is also shown. For
example, you can see if a key update is required or if the key has expired.
NOTE: The status of keys is also displayed in the Key status column on the Users
screen. See Key Status Icons for more information. The period for which keys are
valid is also displayed in the Key Expiration column on the Users screen.
Double-click the name of the user to whom you want to assign a key. The User
information screen is displayed.
218
Figure 189: User information screen
Click Edit Key. A pop-up is displayed asking you to place the key on the encoder.
Place the key on the encoder when the LED light begins to flash. The user access
information is transferred to the key. A pop-up is displayed confirming that the operation
was successful.
Remove the key and click OK.
219
To format the Desfire key perform the following steps;
1. Go to System > SAM & Issuing options. In Active keys, select Desfire, click the
pencil. See Configuring Desfire keys settings for more information about SAMing Desfire
cards. SAM & Issuing options functionality is license-dependent. See Registering and
Licensing SALTO Software for more information.
2. Click the Read SAM card button to read the SALTO SAM key (SALTO Application
Media). The SAM keys will be represented by dots and won’t be shown for security
reasons.
3. Ensure the emission type is AES.
4. Ensure Updateable by NFC is checked.
5. Click Save.
Once the SAM keys are in the system, you can now assign the card to the user.
1. Go to Cardholders > User. In Mobile phone data, type the phone number in the
International phone number field. Click on the down arrow and select the country the
mobile phone line is from. Alternatively, you can type the sign +, the country code and
then the phone number.
2. In mobile app, select JustIN mSVN from the dropdown menu. JustIN mSVN must be
selected before the key is assigned. If the user key was assigned before, you have to
Cancel key and re-assign after selecting JustIN mSVN. See Cancelling keys for more
information about how to cancel a user key.
3. Make sure the key expiration is 7 days or less. The system won’t allow a key expiration
higher than 7 days.
4. Assign the user key. See Assigning a user key for more information.
220
5. The system will send updates directly to the mobile phone. JustIN mSVN can then be
used to update the user key. Tap the white key on the blue background circle and
present the key on the back of the mobile phone.
NOTE: The updates sent over the air (OTA) to your mobile phone have to be encrypted.
To do so, a SALTO Ethernet encoder is used as Dongle. See Devices tab in
System > General options for more information.
The mobile phone has to be online in order to receive the access data information
and NFC feature has to be enabled.
NOTE: The mobile key has some limitations comparing to standard keys. Mobile key do
not support data on Tracks, Wiegand application, Free assignment lockers,
Antipassback, Last rejection or Audit on key. The readers are not capable to write
any data in the mobile key.
When you downloaded the JustIN Mobile application, follow your phone instructions for
registration.
To assign a mobile key perform the following steps:
1. Select Cardholders > Users. The Users screen is displayed.
2. Double-click the name of the user to whom you want to assign a key. The User
information screen is displayed.
Type the phone number in the International phone number field. Click on the down
arrow and select the country the mobile phone line is from. Alternatively, you can type
the sign +, the country code and then the phone number.
In mobile app, select JustIN Mobile from the dropdown menu.
Click Assign key. The data is sent to the user mobile phone.
221
NOTE: The data sent over the air (OTA) to your mobile phone has to be encrypted. To do
so, a SALTO Ethernet encoder is used as Dongle. See Devices tab in System >
General options for more information.
The mobile phone has to be online in order to receive the access data
information.
Tap the white key on the green background circle and present the mobile phone to the
lock.
NOTE: Make sure Bluetooth is ON in the mobile phone. A message will pop up in case it
is not.
9. 3. 4. Cancelling Keys
You can cancel a user’s key at any time, for example, if a user loses their key. This means
that the key can no longer be used to access the site.
When you cancel a valid user key before it has expired, it is sent to the blacklist by default.
See About Blacklists for more information. However, keys that are cancelled after they have
expired are not sent to the blacklist.
NOTE: You can choose to select if user keys will be sent to the blacklist when cancelled.
To activate this option, you must enable the MORE_THAN_64K_USERS
advanced parameter in ProAccess SPACE General options. See Advanced Tab
and Managing Blacklists for more information.
To cancel a key, perform the following steps:
1. Select Cardholders > Users. The Users screen is displayed.
2. Double-click the name of the user whose key you want to cancel. The User information
screen is displayed.
222
Figure 195: User information screen
Click Cancel Key. A pop-up is displayed asking you to confirm that you want to cancel
the key.
9. 4. Deleting Keys
You can remove a user’s access to a site by deleting all their access data from their key.
When all information has been removed from their key, the user may still exist on the
system, but they can no longer use their key with any of the access points.
To delete a key, perform the following steps:
1. Select Keys > Delete key. A pop-up is displayed asking you to place the key on the
encoder.
Place the key on the encoder when the LED light begins to flash. A pop-up is displayed
confirming that the operation was successful.
Remove the key and click Close.
You can click Delete Another Key if you want to continue deleting keys.
223
9. 5. Reset Locker data
You can reset a user’s key in the event that the key becomes corrupted or the key cannot
open the user’s locker.
To reset the key, perform the following steps:
1. Go to Keys > Reset locker data. The reset locker data screen is displayed.
2. Present the key to the encoder. The key is now reset and can capture another locker.
9. 6. Updating Keys
Users can update their keys at any SVN wall reader in your site. You can also update user
keys using an encoder. Like SVN wall readers, encoders update keys with new access point
data. However, only encoders can re-edit keys. This modifies the structure of keys.
When you make changes to access point data, an Update required icon is displayed in the
Key status column on the Users screen. In this case, the key can be updated when the
user presents it to an SVN wall reader. If the Re-edition required icon is displayed,
however, this means that an encoder is required to re-edit the key. See Key Status Icons for
more information.
NOTE: You can configure Ethernet encoders to update keys automatically when users
present their keys to them. In this case, the encoders run continuously but can
only be used to update keys and modify their structure. They cannot be used to
encode keys with access data. These encoders are usually located in areas of a
site where there is no reception desk. Users can update their keys at the encoder
as they pass through the area. See Adding Ethernet Encoders for more
information.
To update a key using an encoder, perform the following steps:
1. Select Cardholders > Users. The Users screen is displayed.
2. Double-click the name of the user whose key you want to update. The User information
screen is displayed.
224
Figure 197: User information screen
Click Edit Key. A pop-up is displayed asking you to place the key on the encoder.
You must place the key that belongs to the selected user on the encoder. If you place a
different user key on the encoder, an Invalid user key pop-up message is displayed.
Place the key on the encoder when the LED light begins to flash. A pop-up is displayed
confirming that the operation was successful.
Remove the key and click OK.
225
functionality means that users do not have to wait in line to have their key encoded. Instead,
their key is assigned automatically when it is presented to an SVN wall reader, or an
encoder with a running update reader. See Adding Ethernet Encoders for more information.
The automatic key assignment functionality is license-dependent. See Registering and
Licensing SALTO Software for more information.
NOTE: For security purposes, when you cancel keys that have been assigned
automatically, you cannot use them for automatic key assignment again. Instead,
you must assign these keys manually. See Assigning User Keys for more
information.
9. 8. About Blacklists
The blacklist is a record of cancelled keys. See Cancelling Keys for more information about
cancelling keys. When a cancelled key is sent to the blacklist, the information is
communicated throughout the system. As users update their keys at SVN wall readers and
present their keys to locks, the new blacklist information is circulated to all access points.
If you delete valid user keys, they are sent to the blacklist by default. See Deleting Keys for
more information about deleting keys.
An unlimited amount of users and four million keys can be created, but a maximum of
65,535 keys can be cancelled through the blacklist. If the blacklist is full, you cannot create
any new users on the system, and you cannot edit new keys for users. This can be avoided
by monitoring the blacklist. You can view the blacklist status on the System resources
screen. See System Resources for more information about viewing the blacklist status.
NOTE: If the blacklist is full, you can perform a blacklist recovery. You should consult
your SALTO technical support contact for more information about this process.
9. 8. 1. Managing Blacklists
You can choose to select if user keys will be sent to the blacklist when cancelled by enabling
the MORE_THAN_64K_USERS advanced parameter in ProAccess SPACE General
options. This parameter also allows you to control whether visitor and guest keys are sent to
the blacklist. See Advanced Tab for more information.
The process is different for user, visitor, and guest keys.
226
SPACE General options if required. However, it cannot be higher than seven days for
security reasons. See Users Tab for more information.
227
10. MONITORING
This chapter contains the following sections:
About Monitoring
Audit trail
Online monitoring
Lockdown monitoring
Limited occupancy monitoring
Roll-call monitoring
NOTE: The audit trail and system auditor track different system information. The System
auditor information screen shows system and operator events. The Audit trail
information screen shows access point events only.
See Collecting Audit Trail Data from Offline Doors for information about how to
collect audit trail data from offline doors.
You can view the audit trail information by selecting Monitoring > Audit trail.
228
Figure 199: Audit trail information screen
229
2. Click the Funnel icon above the filter item. A search dialog box is displayed.
For example, if you want to filter by access point name, click the Funnel icon at the top
of the Access Point column.
For the Operation and Type filters, you can see a predefined drop-down list of search
terms by clicking on the down arrow in the dialog box.
For the Date/Time range, you can define a date range by using the From and To fields.
3. Type your search term.
Or
Select a predefined search term from the drop-down list.
Or
Select a date range.
You can apply multiple filters. The applied filters are displayed, highlighted in blue, at the
top of your screen. You can click the Close icon on an applied filter to remove it.
However, you cannot remove the Date/Time filter.
4. Click the Search icon. A filtered audit trail list is displayed.
230
Figure 201: Advanced filtering screen
231
Click the Access levels tab if you also want to filter by access levels. A list of access
levels is displayed.
Select the required access levels in the left-hand panel and click the chevron. The
selected access levels are displayed in the right-hand panel.
Click Accept. The selected cardholders, operators, and access levels are displayed in
the Who panel.
Follow the procedure described in Steps 1 to 7 to add the access points and zones you
want to filter to the Where panel.
Follow the procedure described in Steps 1 to 7 to add the operations and operation
groups you want to filter to the What panel.
2. Click the Edit icon to change the date period and time interval if required.
You can also click Add to add additional periods. For example, you can add a period to
filter the audit trail data between 09:00 and 11:00 each day within a specified date
period, and add another period to filter the audit trail data between 14:00 and 17:00 each
day within the same date period.
3. Click Accept when you have finished editing or adding periods. The changes are
displayed in the When panel.
4. Select the Any partition or Some partitions option in the Partitions panel.
See Partitions for more information about partitions. If you select the Some partitions
option, you must select the appropriate partitions from the list.
Click Apply Filter. The Audit trail information screen, showing the relevant entries and
the name of the advanced filter, is displayed.
232
Alternatively, you can click Save to save the filter you have created. You can click
Advanced Filtering or the name of the advanced filter on the Audit trail information
screen to return to the Advanced filtering screen and change the filter configuration or
save the filter. When you save a filter, it is automatically added to the drop-down list in
the Name field on the Advanced Filtering screen. To view a saved filter, select it from
the drop-down list.
NOTE: You can also filter audit trail data by using the events stream functionality in
ProAccess SPACE Tools. See Events Streams for more information.
NOTE: Automatic purges of the audit trail are scheduled by default. See Automatic Audit
Trail Purging for more information.
To purge the audit trail, perform the following steps:
1. Select Monitoring > Audit trail. The Audit trail information screen is displayed.
Click Purge. The Audit trail purging dialog box is displayed.
Type the appropriate destination folder name in the Purge file destination field.
You can click Verify to verify the file directory exists and is correct.
2. Select a format from the File format drop-down list.
This specifies the format of the file containing the purged events.
3. Select the required date by using the calendar in the Purge events before field.
All events prior to the date you select are purged.
Click OK. A pop-up is displayed confirming the operation was completed successfully.
Click OK.
233
To access the monitoring functionality, select Monitoring > Online monitoring. The Online
monitoring screen is displayed.
Two tabs are displayed on this screen: Access points and Events. While Access points
shows online peripheral status, Events shows real-time events from all the connected doors.
234
The Online monitoring tab buttons are described in the following table.
The columns at the top of the Access point tab are described in the following table.
10. 3. 2. Events
The Events tab displays a real-time record of every event involving the door, including the
particular action, the name of the door, the user, the user picture and the time and date.
Click Clear events to remove all events from this panel. Note that events removed from this
panel are still listed in the audit trail. See Audit Trail for more information about audit trails.
The Pause events notification button stops new events from showing momentarily. This is
useful in case an important event is shown and you don’t want new events to replace it. The
picture of the user is also show at the top of the Events screen if the feature is enabled. See
General tab in the ProAccess SPACE General options for more information.
235
Figure 206: Online monitoring Events tab
The columns at the top of the Events tab are described in the following table.
In the upper part of the window, in User related events, you can see the user picture icon.
Click on the picture icon to see the event data.
236
Figure 207: Online monitoring Events tab
You can also click the user name under the Cardholder / Operator column shown in blue,
and the user event data will pop up.
237
Figure 208: Lockdown tab
Click the Expand button next to a lockdown area to show the doors associated with that
area. Click the Collapse button next to a lockdown area to hide the doors.
The Lockdown tab buttons are described in the following table.
NOTE: Only users with the override lockdown functionality enabled on their profile can
open a door closed by lockdown. The Override lockdown checkbox is located in
the Key Options panel on the User information screen. See Key Options for
more information.
238
specified limited occupancy area. See Limited Occupancy Areas and Limited Occupancy
Groups for more information.
The limited occupancy functionality is license-dependent. See Registering and Licensing
SALTO Software for more information.
In ProAccess SPACE, the limited occupancy monitoring functionality allows you to control
limited occupancy groups.
To add or remove a user from a limited occupancy group, perform the following steps:
1. Select Monitoring > Limited occupancy monitoring. The Limited occupancy
monitoring screen is displayed.
Select the limited occupancy group from which you want to add or remove a user.
Click Update counter. The Current users in dialog box, showing the number of users in
the limited occupancy group, is displayed.
239
Multiple Limited Occupancy Groups can be updated at the same time, just by selecting them
on the Limited occupancy monitoring screen:
Click Update counter. The Current users on all Limited Occupancy Groups could be
changed to the desired number of users:
Click Save. The updated number of users in the selected limited occupancy groups will be
updated.
240
Note that the roll-call functionality is license-dependent. See Registering and Licensing
SALTO Software for more information.
241
Select the required user in the left-hand panel and click the arrow. The selected user is
displayed in the right-hand panel.
Click Ok. The selected user is now added to the roll-call area.
Click Close.
242
To remove a user from a roll-call area, perform the following steps:
1. Select Monitoring > Roll-call monitoring. The Roll-call screen is displayed.
2. Select the user’s name in the roll-call area.
3. Click Remove user. The user is removed from the roll-call area.
243
The Attendance monitoring window can be accessed by typing the following address in your
browser; http://server:port/kiosk/attendance/index.html.
Note that in lieu of server, the server name must be entered and in lieu of port, the port
number has to be entered.
The correct link for your property can be found in System > Attendance configuration and
in About under Kiosk URLs.
The Attendance monitoring screen allows selecting different languages. Click the gear
icon on the right-hand top corner. Select the language and click save.
At Attendance monitoring logout, you can login using the same operator data you use in
ProAccess SPACE. You can also ckeck the box Remember me so your password is
memorized for Attendance monitoring.
NOTE: A maximum of 20 areas can be created and a maximum of 20 users per area can
be added. The Attendance Monitoring screen can show a maximum of 5 areas
per page.
244
Two Locker Kiosks are available:
3. View Locker data.
4. Reset Locker data.
Two URLs are required to access the Locker Kiosks. You can find both URLs in About,
under Kiosk URLs section:
At Kiosk logout, you can login using the same operator data you use in ProAccess SPACE.
You can also ckeck the box Remember me so your password is memorized for future
connections.
245
Figure 219: Kiosk URLs View
The screen will prompt to place the key on the encoder. Up to 3 lockers data can be shown
per key. The priority will be for Free Assignment Lockers names. See Configuring Lockers
for more information about Free Assignment Lockers. For example, if the key contains 5
lockers, only the first 3 will be shown on screen and if 3 of the 5 lockers are from Free
Assignment Lockers only those 3 will be shown. The View Locker Kiosk displays what keys
are captured.
246
Click the gear icon on the right-hand top corner to enter settings. You can select the type of
encoder to use and the operator settings such as the language of the graphical interface.
See Managing Local Settings and Installing the Local IO Bridge for more information about
the encoder settings.
247
Place your key on the encoder and the key will be reset. Now your key can be used to
capture any other available Free Assignment Locker. The Reset Locker Kiosk displays
what keys were reset.
See Locker for more information about creating and configuring lockers.
Click the gear icon on the right-hand top corner to enter settings. You can select the type of
encoder to use and the operator settings such as the language of the graphical interface.
248
10. 9. Relay outputs
This feature allows operators to activate relays from both the CU42E0 Control Units and the
expantion relay boards on demand.
For a relay to be displayed in the “Relay output” section, it needs to be defined as output.
249
Once the relay is set to work as an output, it will be displayed in the Monitoring -> output
relay section:
The operator can choose one or several relays to activate by selecting the corresponding
checkbox on the left and then click on “SWITCH ON”. The system will prompt for the number
of seconds that the relay should be switched on.
250
Figure 228: Select reley outputs
The operator can decide at any time to switch the relay off by clicking on “SWITCH OFF”.
251
11. PROACCESS SPACE TOOLS
This chapter contains the following sections:
About ProAccess SPACE Tools
Entity Exportation
Scheduling Jobs
Creating Scheduled Jobs
Manual Synchronization
Make DB Backup
Events Streams
Card Printing
252
Figure 230: Scheduled jobs screen
253
Using macros, for example, ($YEAR), allows you to save the file with a unique name so
it is not overwritten by the next file that is created.
Double-click the appropriate macro to insert it in the file name.
Each macro you insert is displayed in the file name in the File To Export field.
Click OK when you have finished inserting macros and the appropriate file name is
displayed in the File To Export field.
You can click Verify on the Job configuration screen to verify the file directory exists
and is correct.
5. In Entity type, select the entity you want to export. You can select User, Door, User
access level, Zone Locker or Room.
6. In Entity partition, select the partition the users to export are from. See Partitions for
more information about partitions. The default option is Any partition, meaning that
users from any partition will be exported.
Click Next Step. The Field configuration screen is displayed.
254
Figure 233: File path dialog box
255
Figure 234: File fields dialog box
256
The order of the fields in the Fields list determines the order in which the fields are exported.
You can select fields and click the up and down chevrons to change the order of the fields if
required.
Click Next Step. The Confirmation screen is displayed.
You can click Previous Step to amend the job configuration and scheduling details.
Click Save to save the exportation template if you need to export the same entity in the
future. Type Name and Description and select the apropriate Partition.
You can also click Export to perform a one time exportation. The Operation completed
successfully message is displayed.
257
11. 3. Scheduling Jobs
Scheduled jobs are system tasks that are set up to be performed automatically. You can
view the scheduled jobs on the system by selecting System > Scheduled jobs.
The following three job types are scheduled on the system by default:
Database backup
Audit trail purging
System auditor purging
Different icons are displayed in the Status column on the Scheduled jobs screen,
depending on the status of each job. These icons are described in the following table.
You can change the configuration and scheduling options for the default jobs, or create
additional scheduled jobs. If you create an additional scheduled job, you have the option to
delete the entry. However, you cannot delete any of the default job types.
NOTE: Scheduled jobs are not performed when the SALTO Service is not running.
258
11. 3. 1. Automatic Audit Trail Purging
Audit trail purging removes all audit trail data within a selected time frame from the system.
The purged data is saved to a text file in a specified folder location. See Audit Trail for more
information about audit trails. Automatic purges of the audit trail are scheduled to be
performed every 60 days by default but you can change the configuration and scheduling
options for this job.
NOTE: It is strongly recommended that you purge the audit trail at least once a month.
This is because system communication can slow down if the audit trail is very full.
Regular audit trail purges also allow you to perform more efficient searches on
audit trail entries.
The sections below describe how to complete each step in this process.
The Name of scheduled job and Purge file destination folder fields are automatically
populated but you can change the text in these fields if required. It is recommended that
you click Verify to verify the file directory exists and is correct.
6. Select a format from the File format drop-down list.
This specifies the format of the file containing the purged events. The appropriate format
depends on the alphabet you are using. In general, the system selects the required
format by default. However, you can amend this if required.
259
7. Select the required time parameters using the up and down arrows and the options in the
Purge events older than field.
All events prior to the time you select are purged.
8. Click Next Step. The Schedule screen is displayed.
2. Select either the Occurs once at or the Occurs every option and type the required time
parameters for the selected option.
These options allow you to specify whether the job occurs once on the scheduled day or
at specific intervals during that day.
3. Select a start date for the job using the calendar in the Start date field in the Duration
panel.
4. Select the End date checkbox and select an end date for the job using the calendar if
required.
If you do not select an end date the job is performed indefinitely.
5. Click Next Step. The Confirmation screen is displayed.
260
Figure 241: Confirmation screen
You can click Previous Step to amend the job configuration and scheduling details or
click Cancel to discard all your configuration changes.
2. Click Finish if all your configuration is complete and correct.
NOTE: It is strongly recommended that you purge the system auditor at least once a
month. They system auditor expands quickly as all system operator events are
saved, and system communication can slow down if this is very full. It is
particularly important to purge the system auditor regularly if you schedule
automatic synchronization jobs. See Automatic CSV File Synchronization and
Automatic Database Table Synchronization for more information.
The sections below describe how to complete each step in this process.
261
Figure 242: Job configuration screen
The Name of scheduled job and Purge file destination folder fields are automatically
populated but you can change the text in these fields if required. It is recommended that
you click Verify to verify the file directory exists and is correct.
Select a format from the File format drop-down list.
This specifies the format of the file containing the purged events. The appropriate format
depends on the alphabet you are using. In general, the system selects the required
format by default. However, you can amend this if required.
3. Select the required time parameters by using the up and down arrows and the options in
the Purge events older than field.
All events prior to the time you select are purged.
4. Click Next Step. The Schedule screen is displayed.
262
11. 3. 3. Automatic Database Backups
Automatic database backups are scheduled to be performed every seven days by default
but you can change the configuration and scheduling options for this job.
You can also make database backups by using the appropriate menu option in ProAccess
SPACE. See Making Database Backups for more information.
NOTE: It is recommended that you perform database backups once a week. This
ensures data is up to date if you need to restore system backups. Large sites may
opt to perform database backups daily. You should not allow more than a month
to elapse between backups. System backups are the only means of restoring the
system in the event of a total system crash.
The sections below describe how to complete each step in this process.
The Name of scheduled job and Backup file name fields are automatically populated
but you can change the text in these fields if required. It is recommended that you click
Verify to verify the file directory exists and is correct.
Click Next Step. The Schedule screen is displayed.
263
11. 3. 3. 2. Step Two: Schedule
All the schedule steps for the jobs described in this chapter are performed in the same way.
See Step Two: Schedule for more information and a description of the procedure you should
follow.
NOTE: See the SALTO_Data_Sync document for more information about CSV file
synchronization.
The sections below describe how to complete each step in this process.
264
Figure 244: Job configuration screen
5. Type a name for the job in the Name of scheduled job field.
6. Type the name of the file that you want to import in the Select file to
import/synchronize field.
You can click Verify to verify the file directory exists and is correct.
7. Select the appropriate format from the File format drop-down list.
8. Select the required number of rows by using the up and down arrows in the Skip rows
field.
This specifies the row in the file where you want to begin importing data.
9. Select either the Tabbed or Custom option.
The Secondary separator and Text qualifier fields are automatically populated but you
can change the characters in these fields if required. The secondary separator is used to
separate each access level ID in the file. The text qualifier is used for text fields that
contain spaces.
10. Select the Entity to import. Five entities can be selected, Users, Doors, Zones, User
access levels and Operators.
NOTE: The content of the fields may vary depending on if you are exporting Users,
Doors, User access level or Zones. For example, if you are synchronizing or
importing Doors, the fields will be those found in the door list.
265
11. Select a partition from the Partition drop-down list if required.
12. Click Next Step. The Mapping Configuration screen is displayed.
Repeat Steps 1, 2, and 3 until you have specified the mapping between all the
appropriate source and destination fields and the order of the fields.
NOTE: You must select the Ext ID option as one of the destination fields to proceed to
the next step. The extension ID is a unique ID that is used to identify users in the
system. Selecting this option ensures that the file data is associated with the
appropriate users.
Click Next Step. The Schedule screen is displayed.
266
11. 4. 1. 3. Step Three: Schedule
You can schedule CSV file synchronization to occur as frequently as required, for example,
every 24 hours or every second. All the schedule steps for the jobs described in this chapter
are performed in the same way. See Step Two: Schedule for more information and a
description of the procedure you should follow.
267
Figure 246: Job configuration screen
5. Type a name for the job in the Name of scheduled job field.
6. Select the appropriate data source type from the Data source type drop-down list.
The following options are available:
SQL server
Oracle
ODBC data sources
7. Enter the required information in the fields in the Connection Parameters panel.
The information you must enter in the Connection Parameters panel varies depending
on which option you select from the Data source type drop-down list.
Type the name of the database table in the Table name field.
The Separator field is automatically populated but you can change the character in this
field if required.
8. Select the Entity to import. Five entities can be selected, Users, Doors, Zones, User
access levels and Operators.
NOTE: The content of the fields may vary depending on if you are exporting Users,
Doors, User access level or Zones. For example, if you are synchronizing or
importing Doors, the fields will be those found in the door list.
268
9. Select a partition from the Partition drop-down list if required.
See Partitions for more information about partitions. The data is only imported to the
partition you select.
Click Next Step. The Mapping configuration screen is displayed.
Repeat Steps 1, 2, and 3 until you have specified the mapping between all the
appropriate source and destination fields and the order of the fields.
You must select the following options as destination fields to proceed to the next step:
Ext ID
269
Control field (to be processed by SALTO)
Control field (processed date/time)
Control field (error code)
Control field (error message)
The system uses these fields to write a report after database table synchronization
occurs. If all of these options are not selected, the synchronization job cannot be
performed.
Click Next Step. The Schedule screen is displayed.
NOTE: When you export audit trail data, you can still access the data in ProAccess
SPACE as it is not removed. However, when you purge the audit trail, the data is
permanently removed from the audit trail and the database. See Automatic Audit
Trail Purging for more information.
See also the SaltoAutomaticExportOfAuditTrail document for more information
about exporting audit trail data.
The sections below describe how to complete each step in this process.
270
Figure 248: Job configuration screen
6. Type a name for the job in the Name of scheduled job field.
The default option in the Type of file to export field is a CSV file. This option cannot be
changed.
7. Type a name for the file that you want to export in the File to export field.
Press F2 to display the File path dialog box and insert macros in the file name if
required.
Using macros, for example, ($YEAR), allows you to save the file with a unique name so
it is not overwritten by the next file that is created.
Double-click the appropriate macro to insert it in the file name.
271
Each macro you insert is displayed in the file name in the File To Export field.
Click Accept when you have finished inserting macros and the appropriate file name is
displayed in the File To Export field.
You can click Verify on the Job configuration screen to verify the file directory exists
and is correct.
Click Next Step. The Field configuration screen is displayed.
272
Figure 251: Select fields dialog box
The order of the fields in the Fields list determines the order in which the fields are
exported. You can select fields and click the up and down chevrons to change the order
of the fields if required.
Click Next Step. The Filter configuration screen is displayed.
273
11. 4. 3. 3. Step Three: Filter Configuration
The filter configuration step allows you to filter the type of audit trail data that is exported
within a specified time period. The default option is to export all of the audit trail data within
the previous 12-month period.
You can filter audit trail events by the following:
Cardholders and/or operators
Access points
Operations
Date and time period
To complete Step three:
1. Click Add/Delete in the Who panel on the Filter configuration screen. The Add/Delete
dialog box, which contains a list of cardholders and operators on two tabs, is displayed.
Select the required cardholders in the left-hand panel and click the chevron. The
selected cardholders are displayed in the right-hand panel.
You can hold down the Ctrl key while clicking the fields to make multiple selections. As
soon as you select a cardholder, the default Any cardholder option is automatically
moved to the left-hand panel. You can use the default option if you want to export audit
trail data for all the cardholders in the system.
Click the Operators tab if you also want to filter by operator. A list of operators is
displayed.
Select the required operators in the left-hand panel and click the chevron. The selected
operators are displayed in the right-hand panel.
Click Accept. The selected cardholders and operators are displayed in the Who panel.
274
Follow the procedure described in Steps 1, 2, and 5 to add the access points you want to
filter to the Where panel.
Follow the procedure described in Steps 1, 2, and 5 to add the operations you want to
filter to the What panel.
Click Add/Delete in the When panel. The Add/delete periods dialog box, showing the
default period, is displayed.
Click the Edit icon to change the date period and time interval if required.
You can also click Add to add additional periods. For example, you can add a period to
export the audit trail data between 09:00 and 11:00 each day within a specified date
period, and add another period to export the audit trail data between 14:00 and 17:00
each day within the same date period.
Click Accept when you have finished editing or adding periods. The changes are
displayed in the When panel.
275
Figure 255: Edit period
NOTE: When you export users data, you can still access the data in ProAccess SPACE
as it is not removed.
The sections below describe how to complete each step in this process.
276
2. Click Add Scheduled Job. The Add scheduled job dialog box is displayed.
3. Select Users exportation from the drop-down list.
4. Click OK. The Job Configuration screen is displayed.
5. Type a name for the job in the Name of scheduled job field.
The default option in the Type of file to export field is a CSV file. This option cannot be
changed.
6. Type a name for the file that you want to export in the File to export field.
Press F2 to display the File path dialog box and insert macros in the file name if
required.
277
Figure 257: File path dialog box
Using macros, for example, ($YEAR), allows you to save the file with a unique name so
it is not overwritten by the next file that is created.
Double-click the appropriate macro to insert it in the file name.
Each macro you insert is displayed in the file name in the File To Export field.
Click OK when you have finished inserting macros and the appropriate file name is
displayed in the File To Export field.
You can click Verify on the Job configuration screen to verify the file directory exists
and is correct.
7. In Entity type, the default option User. This option cannot be changed.
8. In Entity partition, select the partition the users to export are from. See Partitions for
more information about partitions. The default option is Any partition, meaning that
users from any partition will be exported.
Click Next Step. The Field configuration screen is displayed.
278
Figure 258: User Export Field configuration screen
279
Figure 259: Select fields dialog box
280
The order of the fields in the Fields list determines the order in which the fields are
exported. You can select fields and click the up and down chevrons to change the order
of the fields if required.
Click Next Step. The Filter configuration screen is displayed.
NOTE: The scheduling steps in the sections referenced above are not relevant when you
are manually performing CSV file synchronization or database table
synchronization jobs.
NOTE: Automatic database backups are scheduled on the system by default. See
Automatic Database Backups for more information.
To make a database backup in ProAccess SPACE, perform the following steps:
1. Select System > Make DB Backup. The Make DB Backup dialog box is displayed.
281
Figure 261: Make DB Backup dialog box
Type a file path based on the database server file system or backup file name.
Click OK. The database backup is performed. A pop-up is displayed confirming that the
operation was completed successfully.
Click OK.
282
To provide the general information, perform the following steps:
1. Select Tools > Events streams. The Events streams list dialog box is displayed.
2. Click New. The Events stream configuration dialog box is displayed.
Click Next.
3. Type the events stream name in the Name of events stream configuration field.
4. Select either UDP or TCP/IP in the Transport layer panel.
Event streams can be received through UDP or TCP/IP protocols.
5. Type the machine name in the Host name field and the port number in the Port number
field.
Event streams will be notified through the machine name and port number of the
listening socket you specify.
6. Select either JSON or CSV in the Event message format panel.
JSON uses a string format. CSV uses a list format where a list of field values is
separated by a semi-colon. See examples of each below.
283
[
{
"EventID" : "11223344556677889900",
"EventDateTime" : "2012-04-14T13:03:20",
SALTO HAMS……p.321
"EventTime" : "13:03:20",
"EventDateTimeUTC" : "2012-04-14T11:03:20Z",
"OperationID" : 17,
"OperationDescription": "Door opened: key",
"IsExit" : false,
"UserType" : 0,
"UserName" : "John Smith",
"UserGPF3" : "Marketing department",
"DoorName" : "Gym",
"DoorGPF1" : "Leisure area",
}
]
7. Select the applicable character encoding from the Encoding drop-down list.
You can select ANSI, UTF-8, Unicode, or Unicode Big Endian.
8. Click Next. The dialog box to select the data fields is displayed.
You can also click Back on any step to return to the previous dialog box.
284
Figure 265: Select fields dialog box
2. Select the data fields that will be sent as part of the events stream.
The fields listed here match the information passed by keys to the SALTO SQL DB and
to the third-party systems.
Click the chevron to transfer the selected fields to the right side of the dialog box.
Click Ok. The fields you selected are displayed. Note that if you want to have a specific
order in the list, you must select them one at a time. When the fields are added to the
list, you cannot change the order.
285
Click Delete if you want to remove entries from this field.
Click Next. The Who, Where, What, and When panels and the Real time window fields
are displayed.
286
Figure 268: Panels and the Real time window
2. Click the Add/remove items button below the Who panel. The Who dialog box, showing
a list of cardholders, is displayed.
3. Select the required user in the Non-selected items panel and click the arrow. The
selected user is displayed in the Selected items panel.
By default, Any cardholder is displayed in the Selected items panel. This means that
all users are included in the events stream. To remove this value, select Any cardholder
287
in the Selected items panel and click the inverted arrow. Any cardholder is displayed in
the Non-selected items panel. You must repeat these steps if you want to remove Any
operator from Operators, Any door from Doors, and Any operation from Operations,
as applicable.
4. Click Ok.
5. Click the Operators tab.
6. Repeat the above steps for operators.
7. Click Ok.
The selected users and operators are displayed in the Who panel.
8. Repeat the above steps to select the required doors in the Where panel.
9. Repeat the above steps to select the required operations in the What panel.
10. Click Add below the When panel. The Select period dialog box is displayed.
11. Select the applicable time interval using the arrows in the From and To fields.
This specifies the active period for the events stream. In the above example, the system
only sends events during the period 08:00 to 18:00.
12. Click Ok. The selected time interval is displayed in the When panel.
13. Specify the frequency of events stream notifications by typing the applicable number in
the Real time window field and selecting either seconds, minutes, or hours, as
applicable.
For example, if you specify 30 seconds, the system only sends events created 30
seconds ago or less.
288
Figure 271: Select period dialog box
2. Click Finish. A message is displayed confirming that the changes will not take effect until
you restart the SALTO Service.
The events stream you created is displayed in the Events streams list dialog box.
289
Figure 272: Created event stream
3. Click Close.
290
Figure 273: Card template list screen
Select either Horizontal or Vertical as your template orientation and click OK. The Card
template design screen is displayed.
291
Figure 275: Card template design screen
The Toolbox section within the Card template design screen is comprised of four features:
Text
Image
Shape
Line
After you select any of the Toolbox features, you can customize it on the blank template in
the centre of the screen. When you select the feature on the template, a Properties menu,
specific to the feature, is displayed in the top right of the screen.
The four Toolbox feature menus are described in the following sections.
11. 8. 1. Text
The Text menu allows you to customize the text used in the template.
The options are described in the following table.
292
Option Description
Font Text font on the template
Location Location of the text on the template. You can specify the X and Y
coordinates.
Size Height and width of the text
Text Text that appears on the template
Text Color Colour of the text on the template
11. 8. 2. Image
The Image menu allows you to customize images imported into the template.
The options are described in the following table.
After you create a badge template, you can associate it with an individual user in ProAccess
SPACE. See Card Printing Templates for more information.
11. 8. 3. Shape
The Shape menu allows you to customize shapes on the template.
The options are described in the following table.
293
11. 8. 4. Line
The Line menu allows you to customize lines on the template.
The options are described in the following table.
Open
Allows you to save a card template
Save
Allows to you save card templates with different names, for
example, in case you need to use the current design as a basis
Save As for another template design
Allows you to print your template
Print
Allows you to use a grid reference to place design elements
accurately
Grid
294
Figure 276: Add back side option
3. Click the Back tab to design the back of the card template.
295
11. 9. Using Card Printing Templates
After you create your badge templates, you can print these as user cards (keys) in
ProAccess SPACE. The card printing functionality is license-dependent. See Registering
and Licensing SALTO Software for more information.
NOTE: To print card templates, the template must contain dynamic fields with a specific
data field in the user list.
To print card templates perform the following steps:
1. Select Cardholders > Users. Select the user associated with the card template to print.
The Print button is visible in Card Printing Template.
296
11. 10. Alarm Events
At the current version of this writing, there are 2 type of triggers that can be configured:
“audit trail events” and “alarm inputs”.
1. Any audit trail event can be defined as a trigger (see list of events of the software).
These are defined in the alarm area:
297
Figure 280: Alarm events input
These triggers can be defined per user, per door, per operation and for a period of time
298
Figure 282: Alarm event triggers
2. A relay contact input can also be defined as an “alarm input” hence as a trigger (ie:
emergency button or fire detector). These are only valid when using CU42E0 online
units, CU4200 online units and/or online CUEB8 and are defined in the online inputs
through Salto network with an specific name (ex:prueba).
First of all it is necessary to define the physical input in Space:
299
hen the alarm input with detector needs to be raised according to this physical input:
300
And add to it the previously created online input:
301
And defining it as an alarm output:
Coming back to “alarm event” (Tools- Alarm event) in “actions” we need to select the type of
output, the pre-created relay output and the duration of the relay activation.
The alarm output name has been defined when editing the relay.
NOTE: Duration 0 means the relay wil be activated without an automatic interruption (so
will remain active indefinitely).
302
Figure 290: Defining action
2. Switch Off alarm output; disable a relay output in online CU42E0, online CU4200 or
online CUEB8 It is defined the name of the alarm to disable
303
3. Send email
For this functionality to work it is necessary to create a sender email address in General
options-> Notifications tab. Below is an example about how to define the required host, port
and protocol.
Within the “alarm event” menu-> actions, when selecting “send email” it is necessary to
define who is going to receive the email. For this step it is necessary to create previously a
trigger as explained before.
304
Figure 293: Defining send email as an action
NOTE: we can only have one email address receiver per alarm.
4. Start Lockdown. It is necessary to define the action to start a lock down area, which
area is affected and what is the operation to be done.
305
5. End lockdown
In the case of reports, we have the possibility of having two different reports:
• Access points inactivity report
• Locks clock drifta
306
11. 11. 1. Access points inactivity report
This report allows to show up all the locks that have not been accessed lately. It’s possible to
focus the analysis on doors, lockers or rooms:
The report indicates locks (wireless or stand alone) with no opening registered in the audit
trail. It’s possible to define for how many days it’s necessary to filter the lock’s inactivity
period (in days, the minimum ones).
This document could be generated in two specific formats (PDF or Excel):
307
In the report it’s also possible to find the last activity information (time/date) and for how
many days a lock hasn’t registered any opening.
308
2. Select the checkboxes of “Lockers” or “Rooms” depending on the report of which doors
you need
3. Select the Inactivity period (in days) you want to do the report.
4. Select “PRINT” to show the report you need.
309
12. PROACCESS SPACE SYSTEM
CONFIGURATION
This chapter contains the following sections:
About ProAccess SPACE System
ProAccess SPACE System Process
System auditor
Operators
Operator groups
Partitions
PPD
SALTO Network
Calendar
Time Zones
General options
SAM & Issuing options
PMS authorizations
System resources
310
The admin operator associates operator groups with the specified operators.
Operator groups created and configured
The admin operator creates operator groups and configures the operator group options.
Operator groups associated
The admin operator associates operators with the specified operator groups.
2. Partitions created
The admin operator creates partitions and adds items to partitions.
Partitions associated
The admin operator associates operator groups with the specified partitions.
PPD
The admin operator loads the PPD and operators on doors.
SALTO network devices added and configured
a) The admin operator adds encoders, RF gateways, RF nodes, CU42E0 gateways,
and CU4200 nodes to the system.
b) The admin operator configures online connection types. These are as follows:
- Online IP (CU5000)
- Online IP (CU42E0)
- Online RF (SALTO)
- Online RF (BAS integration)
See Adding Network Devices and Configuring Online Connection Types for more
information about these tasks.
Calendars created and configured
The admin operator creates calendars and configures the calendar options.
Multiple time zones added and configured
The admin operator adds additional time zones to the system and configures the time
zone options if required. The admin operator configures the DST options for the default
system time zone. Note that you must enable the multiple time zones functionality in
ProAccess SPACE General options. See Time Zones for more information.
General options
The admin operator configures all the general options in the system. Many of the options
in the general options will enable features in ProAccess SPACE.
SAM & Issuing options
The admin operator configures the system to use third-party keys.
PMS authorizations
The admin operator configures the Property Management System (PMS)
System resources
The admin operator manages the blacklist status and recovery.
311
events for the previous seven days only. To see earlier events, you must define the specific
date range in the Date/Time filter. See Filtering System Auditor Data for more information.
You can view the System Auditor information screen by selecting System > System
auditor.
312
Figure 302: System Auditor information screen
2. Click the Funnel icon above the filter item. A search dialog box is displayed.
For example, if you want to filter by operator type, click the Funnel icon at the top of the
Operator column.
For the Event and Object filters, you can see a predefined drop-down list of search
terms by clicking the arrow in the dialog box.
For the Date/Time range, you can define a date range by using the From and To fields.
3. Type your search term.
Or
Select a predefined search term from the drop-down list.
Or
Select a date range.
You can apply multiple filters. The applied filters are displayed, highlighted in blue, at the
top of your screen. You can click the Close icon on an applied filter to remove it.
However, you cannot remove the Date/Time filter.
4. Click the Search icon. A filtered audit trail list is displayed.
313
NOTE: Automatic purges of the system auditor are scheduled by default. See Automatic
System Auditor Purging for more information.
To purge the system auditor, perform the following steps:
1. Select System > System auditor. The System Auditor information screen is displayed.
2. Click Purge. The Purge system auditor dialog box is displayed.
3. Type the appropriate destination folder name in the Purge file destination field.
You can click Verify to verify the file directory exists and is correct.
4. Select a format from the File format drop-down list.
This specifies the format of the file containing the purged events.
5. Select the required date by using the calendar in the Purge events before field.
All events prior to the date you select are purged.
6. Click OK. A pop-up is displayed confirming the operation was completed successfully.
Click OK.
12. 4. Operators
The system has one default operator: admin. However, there are no limitations on the
number of operators that can be added.
The admin operator has full access to all of the menus and functionality within ProAccess
SPACE. However, other types of operators that you create, such as hotel operators, can
have their access restricted to a subset of menus and functionality, depending on the
permissions you set for their operator group. See Admin Interface, Hotel Interface, and
Operator Groups for more information.
NOTE: Operators, as referred to throughout this manual, are operators of the SALTO
applications, for example, access and security managers, hotel front-desk staff, or
IT system administrators.
314
Figure 304: Operators screen
Type the full name of the new operator in the Name field.
A maximum of 56 characters can be entered. The name is not case sensitive.
Type the name the operator that will be used to access ProAccess SPACE in the
Username field.
A maximum of 64 characters can be entered. The user name is not case sensitive.
Select the appropriate operator group from the Operator group drop-down list.
Select the display language for the operator in the Language drop-down list.
315
Type a password for the new operator in the Password Configuration panel.
The password is case sensitive.
Confirm the password.
Click Save.
NOTE: If you delete an operator group, any operators associated with the operator group
are also deleted. You cannot delete the default Administrator operator group on
the system.
316
Click Add Operator Group. The Operator group information screen is displayed.
317
12. 5. 1. 1. Operator Group Settings
The admin operator can define the operator group settings by selecting specific options in
the Settings panel.
The options are described in the following table.
318
Permission Description
Lockers Selecting these permissions means that operator group members
can:
View a list of lockers applicable to their group
Modify the locker configuration settings
Modify who has access to the lockers
Add and delete lockers
Rooms and Suites Selecting these permissions means that operator group members
can:
View the hotel room and suite list applicable to their group
Modify the hotel room and suite configuration options
Add and delete hotel rooms and suites
Zones Selecting these permissions means that operator group members
can:
View a list of zones applicable to their group
Modify the zone configuration settings
Modify who has access to the zones
Add and delete zones
Locations/Functions Selecting these permissions means that operator group members
can:
View a list of locations and functions applicable to their
group
Modify who has access to the locations and functions
Modify the location and function parameters
Add and delete locations and functions
Outputs Selecting these permissions means that operator group members
can:
View a list of outputs applicable to their group
Modify the output configuration options
Modify who has access to the outputs
Add and delete outputs
Roll-Call areas Selecting these permissions means that operator group members
can:
View a list of roll-call areas applicable to their group
Modify the roll-call area configuration options
Add and delete roll-call areas
Limited occupancy areas Selecting these permissions means that operator group members
can:
View the limited occupancy list applicable to their group
Modify the limited occupancy area configuration options
Add and delete limited occupancy areas
Lockdown areas Selecting these permissions means that operator group members
can:
View a list of lockdown areas applicable to their group
Modify the lockdown area configuration options
Add and delete lockdown areas
319
Permission Description
Timed periods and Automatic Selecting these permissions means that operator group members
changes can:
View a list of timed periods and automatic changes
applicable to their group
Modify the timed periods and automatic changes
configuration settings
Cardholders Permissions
See Cardholders for more information about the various cardholder options described in the
following table.
320
Keys Permissions
See Keys for more information about the various key options in the following table.
Hotels Permissions
See Hotels for more information about the various hotel options described in the following
table.
321
Monitoring Permissions
See ProAccess Space Tools for more information about the various system tool options
described in the following table.
Peripherals Permissions
See Peripherals and SALTO Network for more information about the various peripheral
options described in the following table.
322
System Permissions
See ProAccess SPACE System Process for more information about the various system
management and configuration options described in the following table.
323
12. 5. 2. Associating Operator Groups
After you have created an operator group, you must associate operators with that group.
You can do this by selecting the operator group from the Operator group drop-down list on
the Operator information page. See Adding Operators for more information.
To view the operators associated with an operator group, perform the following steps:
1. Select System > Operator groups. The Operator groups screen is displayed.
Double-click the operator group with the operator list you want to view.
Click Operators in the sidebar. The Operators dialog box, showing a list of operators, is
displayed.
12. 6. Partitions
Partitions are items in the system that are grouped together to allow operators to manage
different parts of the SALTO network. Partitions make it easier for different operators to
manage the various sections of a site. For example, a partition could be the Humanities
building in a university. Operators who have access to this partition can manage the items
belonging to it (such as particular access points, users, user access levels, etc.) depending
on the partition permissions set by the admin operator. See Creating Operator Groups for
more information about the permissions for partitions. Operators who do not have access to
a partition cannot manage the items belonging to it.
NOTE: If you delete a partition, you must select another partition to which items in that
partition should be moved.
324
Figure 308: Partitions screen
325
Click Add/Delete in the Doors panel. The Add/Delete dialog box, showing a list of
doors, is displayed.
Select the appropriate partition from the Partition drop-down list. The list updates to
show all the doors in the selected partition.
Select the required door in the left-hand panel and click the chevron. The selected door
is displayed in the right-hand panel.
You can hold down the Ctrl key while clicking the doors to make multiple selections. You
can also select different partitions from the Partition drop-down list to see a list of doors
in each partition and add additional selected doors to the right-hand panel. Note that you
can move a door in the right-hand panel back to its original partition if required. However,
if you want to move the door to a different partition, you must do the following:
a) Click Accept in the Add/Delete dialog box.
b) Click Save on the Partition information screen.
c) Click Add/Delete to display the Add/Delete dialog box again.
d) Select the partition to which you want to move the door from the Partition drop-down
list.
e) Select the door in the right-hand panel and click the chevron. The selected door is
displayed in the left-hand panel.
If you do not follow steps a-e above, a Lock icon is displayed beside the name of the
door when you select a different partition from the Partition drop-down list.
Click Accept. The selected door is displayed in the Door panel on the Partition
information screen.
Follow the procedure described in Steps 6 to 10 for each entry in the Access points list.
Follow the procedure described in Steps 5 to 10 for each family in the Families panel.
The family types are described in Partition Family Types.
326
Click Save when you have finished adding items for each family to the Partition
information screen. All of the selected items are added to the partition.
NOTE: When you create partitions, you can move items (such as doors or users) from
one partition to another using the Add/Delete dialog boxes on the appropriate
Partition information screen. You can also do this on the information screen for
each item. For example, you can move a door to a different partition by selecting
the new partition in the Partition field on the Door information screen and clicking
Save. Note that you must select Access points > Doors and double-click the
required door on the Doors screen to view the Door information screen.
327
3. Click Operator Groups in the sidebar. The Operator groups dialog box, showing a list
of operator groups, is displayed.
12. 7. PPD
PPDs are connected to the operator’s local PC through either a USB or COM port. See PPD
Settings for more information. PPDs allow data to be transferred between the operator’s PC
and the locks. Data is downloaded from the PC to the PPD, and the PPD is used to perform
tasks such as lock initialization and emergency openings. In the process, the PPD retrieves
information (such as battery status) from the locks. This information is communicated to the
system when the PPD is connected to the operator’s PC.
See the Portable Programming Device by SALTO document for more information about
PPDs and their configuration settings.
Table 58: PPD
Used by admin operators to transfer
configuration changes to a lock or by
maintenance operators to check the battery
Portable Programming Device (PPD) status of the lock and collect the lock’s audit trail
NOTE: It is important that the time is set correctly for the PC on which the SALTO
software is running, as this controls the time and date settings for locks.
PPDs are configured in ProAccess SPACE General options. See Devices Tab for more
information. The PPD information screen in ProAccess SPACE is used to download access
point data to PPDs. This allows you to perform tasks with PPDs such as initializing and
328
updating locks. You can also view the status of PPDs and update their firmware by using the
PPD information screen.
329
Figure 311: PPD information screen
The PPD information screen shows the following information about the PPD:
Version
Serial number
Factory date (or date of manufacture)
Battery status
Language
330
Wait for the update to complete. A pop-up is displayed confirming that the operation was
completed successfully.
Click OK.
331
Figure 313: PPD information screen
Click Update PPD Firmware. The Update PPD Firmware dialog box, showing the
available firmware files, is displayed.
332
To download a firmware file to a PPD, perform the following steps:
1. Connect the PPD to the PC.
2. Select System > PPD. The PPD information screen is displayed.
3. Click Download Firmware Files. The Download Firmware files dialog box, showing
the available firmware files, is displayed.
333
5. Click Send. The PPD progress screen is displayed.
6. Wait for the download to complete. A pop-up is displayed confirming that the operation
was completed successfully.
7. Click OK.
You can now use the PPD to update the firmware of locking electronic components by
selecting Update Firmware in the PPD’s menu and connecting the PPD to the lock. See
the Portable Programming Device by SALTO document for more information about this
process.
NOTE: You can configure PPDs to assign IP addresses to online IP (CU5000) doors
during initialization if required. You must enter each IP address on the system by
using the Access point: Online IP CU5000 information screen. Note that you
must select System > SALTO Network and double-click the required online IP
(CU5000) door on the SALTO Network screen to view the information screen.
You must enable this option in ProAccess SPACE General options by selecting
the Enable control unit IP addressing by PPD checkbox in System > General
options > Devices. See Devices Tab for more information.
PPDs can also be used to transfer SAM data to SALTO locks and wall readers
during initialization (or when you perform updates). See SAM and Issuing options
General options
See General options section.
SAM and Issuing Data for more information.
To initialize a lock, perform the following steps:
1. Connect the PPD to the PC.
2. Select System > PPD. The PPD information screen is displayed.
334
Figure 317: PPD information screen
3. Ensure that the appropriate time zone is selected in the Time Zone drop-down list.
Only access points for the time zone you select in the Time Zone panel are shown on
the PPD information screen. Note that the Time Zone panel is only displayed if you have
enabled the multiple time zones functionality in ProAccess SPACE General options. See
Activating Multiple Time Zones and Time Zones for more information.
4. Select the checkbox of the access point for which you want to initialize the lock.
You can select more than one access point if required. You can select access points with
different calendars thanks to the possibility to download on the PPD more than one
calendar at a time (the maximum number of calendars that you can charge on the PPD
is 16). If you select a different time zone from the Time Zone drop-down list, any access
points you have previously selected are cleared.
Select the Initialize locks checkbox in the Actions To Do panel.
Click Download. The PPD progress screen is displayed.
Wait for the download to complete. A pop-up is displayed confirming that the operation
was completed successfully.
You can now use the PPD to initialize the lock of the selected access point by selecting
Initialize Lock in the PPD’s menu and connecting the PPD to the lock. See the Portable
Programming Device by SALTO document for more information about this process.
NOTE: If you initialize a lock that is already in use, its audit trail is deleted.
335
NOTE: You can initialize rooms and their associated ESDs either together or separately.
However, all of the rooms and ESDs that you select during the initialization
process must have the same calendar.
3. Ensure that the appropriate time zone is selected in the Time Zone drop-down list.
Only access points for the time zone you select in the Time Zone panel are shown on
the PPD information screen. Note that the Time Zone panel is only displayed if you have
336
enabled the multiple time zones functionality in ProAccess SPACE General options. See
Activating Multiple Time Zones and Time Zones for more information.
4. Select the checkbox of the access point for which you want to update the lock.
You can select more than one access point if required. However, you cannot select
access points with different calendars; multiple selections must be controlled by the
same calendar. If you select a different time zone from the Time Zone drop-down list,
any access points you have previously selected are cleared.
Click Download. The PPD progress screen is displayed.
Wait for the download to complete. A pop-up is displayed confirming that the operation
was completed successfully.
5. Click OK.
You can now use the PPD to update the lock of the selected access point by selecting
Update Locks in the PPD’s menu and connecting the PPD to the lock. Alternatively, you
can simply connect the PPD to the lock. In this case, it recognizes the lock and
automatically displays the appropriate data. See the Portable Programming Device by
SALTO document for more information about this process.
NOTE: You can configure PPDs to automatically collect audit trail data when they are
used to update locks. You must enable this option in ProAccess SPACE General
options by selecting the Collect audit trails automatically when updating locks
checkbox in System > General options > Devices. See Devices Tab for more
information.
NOTE: You can perform emergency openings of online doors without using a PPD. See
Lockdown for more information.
To perform an emergency opening, perform the following steps:
1. Connect the PPD to the PC.
2. Select System > PPD. The PPD information screen is displayed.
337
Figure 319: PPD information screen
3. Ensure that the appropriate time zone is selected in the Time Zone drop-down list.
Only access points for the time zone you select in the Time Zone panel are shown on
the PPD information screen. Note that the Time Zone panel is only displayed if you have
enabled the multiple time zones functionality in ProAccess SPACE General options. See
Activating Multiple Time Zones and Time Zones for more information.
4. Select the checkbox of the access point for which you want to perform the emergency
opening.
You can select more than one access point if required. However, you cannot select
access points with different calendars; multiple selections must be controlled by the
same calendar. If you select a different time zone from the Time Zone drop-down list,
any access points you have previously selected are cleared.
Select the Allow emergency opening checkbox in the Actions To Do panel.
The checkbox is greyed out if you have set emergency opening as a default option in
ProAccess SPACE General options. See PPD Tab for more information. Otherwise, you
must select it each time you want to perform an emergency opening.
Type a password for the emergency opening in the Password field if required.
The password can only contain digits. If you type a password, you must enter this
password in the PPD before you can perform the emergency opening. Otherwise, the
PPD does not require a password. The Password field is greyed out if you have set
emergency opening as a default option in ProAccess SPACE General options and
entered a password there already for the option. See Devices Tab for more information.
Your PPD firmware must be version 01.29 or higher to use this option.
Click Download. The PPD progress screen is displayed.
338
Wait for the download to complete. A pop-up is displayed confirming that the operation
was completed successfully.
Click OK.
You can now use the PPD to perform an emergency opening of the selected access
point by selecting Emergency Opening in the PPD’s menu and connecting the PPD to
the lock. Note that you are required to enter a password in the PPD if you have enabled
this option in either ProAccess SPACE PPD window or ProAccess SPACE Devices
window. See the Portable Programming Device by SALTO document for more
information about this process.
339
NOTE: You can view the enabled channels for RF signals in ProAccess SPACE General
options. To do so, select System > General options > Devices. There are 16
channels available and all of these are enabled by default. The frequency range
of each channel is also displayed. You can disable a channel if required by
clearing the checkbox for the channel and clicking Save. This only applies to
RFnet and not to BLUEnet.
You can view the list of SALTO network items by selecting System > SALTO Network.
The SALTO Network screen displays a list of all network items that have been added and
are currently connected to the system.The screen also includes an Unreachable items tab.
Click on this tab to view and configure all items that require additional connection
information.
The following table describes the buttons use on the SALTO network main screen.
340
Item Description
Add Network device Allows you to add a new online device.
341
8. Select the Run update reader checkbox if required.
This option is used to configure an Ethernet encoder to update user keys automatically
when users present their keys to it. If you select this option, the encoder runs
continuously but it can only update keys. It cannot be used to encode keys with access
data from the SALTO software. See Updating Keys for more information.
9. Select the Enable beeper checkbox if required.
If you select this option, the encoder emits beeps when in use.
Select the appropriate time zone from the Time Zone drop-down list.
Note that the Time Zone panel is only displayed if you have enabled the multiple time
zones functionality in ProAccess SPACE General options. See Activating Multiple Time
Zones and Time Zones for more information.
Click Save.
342
Figure 323: RFnet/BLUEnet gateway information screen
The Add/Delete dialog box only displays RFnet/BLUEnet nodes if you have already
added them to the system.
You can also connect RFnet and/or BLUEnet nodes to Gateways when you add nodes
to the system. See Adding RFnet/BLUEnet Nodes for more information.
Select the required RFnet/BLUEnet node in the left-hand panel and click the chevron.
The selected Node is displayed in the right-hand panel.
You can hold down the Ctrl key while clicking the RF nodes to make multiple selections.
You cannot add RF nodes that already belong to another gateway.
Click Accept. The selected RF node is displayed in the RF Nodes panel.
Click Save.
343
Start Diagnosis option allows to analyze the quality of the Wireless communications
between a specific RFnet/BLUEnet Gateway (and its nodes) and the locks connected to it.
It’s necessary an updated FW version for the Gateway device (0083). Contact with Salto
TechSupport for more information about it.
Selecting this option is possible to generate logs for each Gateway section, the logs will be
generated as “.txt” files in the Salto Space logs folder.
Take into account that during this test, the locks under the specific gateway won’t be
online. Depends on the number of the locks, this test can take from 5 minutes to 1h and 30
minutes. It’s possible to stop this test only restarting Salto Service.
It make sense to manage this diagnosis test during a Wireless system configuration, at the
principle, to check the quality of the Wireless or if there are Wireless communication issue in
an Wireless RFnet or BLUEnet system.
NOTE: You must select Online RF (SALTO) in the Connection Type panel on the Door
or Room information screen to define a door as an RF access point.
To add an RF node, perform the following steps:
1. Select System > SALTO Network. The SALTO Network screen is displayed.
2. Click Add Network Device. The Add network device dialog box is displayed.
3. Select RF node from the drop-down list.
4. Click OK. The RF node information screen is displayed. There are 2 types of RF nodes
based on the radio platform(RFnet or BLUEnet). The same gateway could manage both
type of nodes at the same time.
344
Figure 324: Types of RF nodes
345
The Add/Delete dialog box only displays RF access points if you have already defined
doors as RF access points by selecting Online RF (SALTO) in the Connection Type
panel on the Door or Room information screens. You can also connect online RF
(SALTO) doors to RF nodes by using the Connected to field on the Online RF (SALTO)
information screen. See Online RF (SALTO) for more information.
10. Select the required RF access point in the left-hand panel and click the chevron. The
selected RF access point is displayed in the right-hand panel.
You can hold down the Ctrl key while clicking the RF access points to make multiple
selections. You cannot add RF access points that already belong to another RF node.
Click Accept. The selected RF access point is displayed in the RF Access Points
panel.
11. Click Save.
NOTE: RF gateways have a mini node connected to them. You must add this node in
ProAccess SPACE by following the procedure for adding RF nodes. Also, you
must connect the mini node to the RF gateway in ProAccess SPACE.
346
Figure 326: CU42E0 and CU4200 example
NOTE: The maximum distance between the gateway (CU42E0) and the last node
(CU4200) in line cannot be over 300 meters.
347
Figure 327: CU4200 gateway information screen
Note: This option implies the use of RS485 bus to integrate with Siemens so it is can not
possible to be add additional CU4200 online nodes in this mode.
10. Click Add/Delete in the CU4200 Node panel. The Add/Delete dialog box, showing a list
of CU4200 nodes, is displayed.
348
The Add/Delete dialog box only displays CU4200 nodes if you have already added them
to the system. You can also connect CU4200 nodes to CU42E0 gateways when you add
CU4200 nodes to the system. See Adding CU4200 Nodes for more information.
11. Select the required CU4200 node in the left-hand panel and click the chevron. The
selected CU4200 node is displayed in the right-hand panel.
You can hold down the Ctrl key while clicking the CU4200 nodes to make multiple
selections. You cannot add CU4200 nodes that already belong to another CU4200
gateway.
NOTE: When you add a CU42E0 gateway, an embedded CU4200 node is automatically
created. This one cannot be deleted. Each CU42E0 gateway can support its
embedded CU4200 node and a maximum of four other CU4200 nodes. The name
of the embedded node will be always the same than the parent CU42E0 gateway
preceeded by an underscore. For example: _CU4200.
12. Click Accept. The selected CU4200 node is displayed in the CU4200 Node panel.
You can select the CU4200 node and click Edit to change the number in the Address
(dip switch) column if required. See Adding CU4200 Nodes for more information about
the Address (dip switch) field. Note that embedded CU4200 nodes have a fixed
number (0). This cannot be changed.
Click Save.
NOTE: You must select Online IP (CU4200) in the Connection Type panel on the Door
and in Room information screen before you can connect an access point to a
CU4200 node.
To add a CU4200 node, perform the following steps:
1. Select System > SALTO Network. The SALTO Network screen is displayed.
2. Click Add Network Device. The Add network device dialog box is displayed.
3. Select CU4200 node from the drop-down list.
4. Click OK. The CU4200 node information screen is displayed.
349
Figure 328: CU4200 node information screen
350
Dip switch Address (dip switch)
0010 Address 2
0011 Address 3
0100 Address 4
0101 Address 5
0110 Address 6
0111 Address 7
1000 Address 8
1001 Address 9
1010 Address 10
1011 Address 11
1100 Address 12
1101 Address 13
1110 Address 14
1111 Address 15
8. Select the required number from the Access point count drop-down list.
You can select either 1 or 2. This defines the number of doors you want the CU4200
node to control. Each CU4200 node can control two readers. This means it can control
either one door that has two readers or two doors where each has one reader. If a door
has two readers, one reader controls access from inside to outside, and the other reader
controls access from outside to inside. You should select 1 if a door has two readers. If
you select 2, an Access point #2 field is displayed on the right-hand side of the Access
point #1 field, and you can select an additional door from the drop-down list.
Select the required door from the Access point #1 drop-down list.
The Access point drop-down lists only display doors if you have already defined some
as CU4200 access points. This is done by selecting Online IP (CU4200) in the
Connection Type panel on the Door information screen. You can also connect online IP
(CU4200) doors to CU4200 nodes in the Connected to field on the Online IP (CU4200)
information screen. See Online IP (CU4200) for more information.
351
Select the CU42E0 gateway to which you want to connect the CU4200 node from the
Connected to drop-down list.
Click Save.
In order to add an online CUEB8 into the system it is necessary to create the corresponding
CUEB8 Node in the “Salto Network” menu.
1) Select System > SALTO Network. The SALTO Network screen is displayed
2) Click Add Network Device. The Add network device dialog box is displayed.
3) Select CUEB8 node from the drop-down list.
4) Click OK. The CUEB8 node information screen is displayed.
352
Figure 331: CUEB8 configuration
Outputs
It has previously been defined as standard outputs in “access points - Outputs”
353
Table 65: CUEB8 outputs
Field Description
NOTE:
In online CUEB8 any relay can support any card output. This reader is related to the
access point(s) of the selected nodes of the system.
You can set the CU4200 outputs according to the wall reader input. To manage the wall
reader input, select the reader and click Edit.
354
Figure 334: CU4200 node Reader Input
Field Functionality
Type You can select None if no SALTO wall reader is connected or SALTO
wall reader if it is a SALTO wall reader. Other options may appear in
the future. If None is selected, inputs 3, 4 and 5, 6 can be used with a
third party wall reader.
Enable far opening Allow you to work with WRs in far opening. By default, in new DBs, wall
readers will work as near opening. With this flag, you will be able to put
the WRs in far opening. In order to have this function available, update
the FW to the latest version.
Access point number As the CU4200 can manage up to two different access points, you can
decide whether the reader will trigger an opening in access point #1 or
#2. See Adding CU4200 Nodes for more information.
Entry/Exit Select whether the wall reader is an Entry or an Exit.
Table 66: Reader Inputs fields
Field Functionality
Type You can select None if no SALTO wall reader is connected or SALTO
wall reader if it is a SALTO wall reader. Other options may appear in
the future. If None is selected, inputs 3, 4 and 5, 6 can be used with a
third party wall reader.
Enable far opening Allow you to work with WRs in far opening. By default, in new DBs, wall
readers will work as near opening. With this flag, you will be able to put
the WRs in far opening. In order to have this function available, update
the FW to the latest version.
Access point number As the CU4200 can manage up to two different access points, you can
decide whether the reader will trigger an opening in access point #1 or
#2. See Adding CU4200 Nodes for more information.
Entry/Exit Select whether the wall reader is an Entry or an Exit.
The CU4200 node can manage inputs from third party devices. Depending on the signal or
on the data arrived to the input, the CU4200 Node can act accordingly. Select the Input ID
and click Edit.
355
Figure 335: CU4200 node Reader Input
356
For example, according to the image below, a relay in normally opened position could send
a request to open a roller blind when presenting a valid key in reader #1 from IN1 and
request to close the roller blind from IN2.
A reader that is not from SALTO can also be used. Edit Reader Input Type must be set to
None. Type field in Edit Input shows the Third party reader option in the dropdown menu.
Only a Wiegand code is supported. See Devices Tab in General options for more
information about how to configure the Wiegand format. An authorization code has to be
entered for each user in the Authorization code field on the User profile. See Users in
Cardholders menu for more information. Select the Access point from the Access point
number dropdown menu and if it will be an Entry or an Exit.
The CU4000 offers the option to configure the CUADAP settings directly through the PA
Space as the CUADAP module is built inside the node of the CU. On the contrary, in the
CU5000 the settings are configured on the hardware(dipswitch) added to the door controller
or CU(see CU5000 documentation)
There are 3 different parameters to be defined on the software to set the CUADAP. The
settings can be found on the CU4200 node window: System/salto Network(see above(xx)
how to configure the CU4200 gateway and CU4200 node)
First define the input (3 or 5) under the type menu to which it will be connected the
third party device. Automatically the software will assign the following consecutive input for
the same purpose as showed below:
357
Figure 337: Type selection CUADAP
The second parameter defines the reader (Reader1, Reader 2 or both) from which the
specified data will be provided through the CUADAP to the third party device
The third parameter consist on selecting the interface and data type. Remember if the
data has to be added during the credential encoding (track data and wiegand) it has to be
defined previously on the software(See creating users on how to configure track data or
wiegand code for the user)
358
Figure 339: Data, Interface and format selection
The table below shows the different data, interface and formats available in PA Space
359
0X00+SN(2
25 bytes) WIEGAND Standard 26-bit
26 SN(3 bytes) WIEGAND Standard 26-bit
27 SN(4bytes) WIEGAND 32-bit + 2 paritybits
28 PAC code WIEGAND
The next table describes when relays 1 to 4 will be triggered. If the access is granted, the
relays will trigger accordintly to the following table. Their connection can be Normally Open
(NO) or Normally Close (NC).
Table 72: Relay Type fields
Type Functionality
Strike The relay will be triggered when a valid key I presented. Access point
#1, #2 or both can be used.
Open roller blind The relay will be triggered alternativally with Close roller blind relay
type to open a roller blind. If a relay is set as Open roller blind, there
must be another relay set as Close roller blind. Access point #1, #2
or both can be used.
Note: if a door is defined as a roller blind and a relay is set as Strike,
the door will work as such in Toggle mode.
Close roller blind The relay will be triggered alternativally with Open roller blind relay
type to close a roller blind. If a relay is set as Close roller blind,
there must be another relay set as Open roller blind. Access point
#1, #2 or both can be used.
Note: if a door is defined as a roller blind and a relay is set as Strike,
the door will work as such in Toggle mode.
360
Type Functionality
Card output The relay will be triggered when a certain output is in the key access
plan. When selecting this type, the Output dropdown menu will be
shown so you can chose the output. Access point #1, #2 or both can be
used.
Timed The relay will be triggered automatically according with a Timed period.
When selecting this type, the Timed period dropdown menu will be
shown so you can chose the needed timed period.
Timed and Card output The relay will be triggered automatically according with a Timed period
or when presenting a valid key, any that comes first. When selecting
this type, the Output dropdown menu will be shown so you can chose
the output. The Timed period dropdown menu will be also shown so
you can chose the needed timed period. Access point #1, #2 or both
can be used.
Tamper The relay will be triggered when a wall reader Tamper alarm occurs. It
occurs when the reader head is removed or when it stops
communicating with the controller. Access point #1, #2 or both can be
used.
Door left open The relay will be triggered when the Door is left opened. In Access
point number, select the Access Point related with the door position
sensor. Access point #1, #2 or both can be used.
Intrusion The relay will be triggered when an Intrusion occurs at an access
point. Access point #1, #2 or both can be used.
Replicate door detector The relay will be triggered to replicate the door detector alert. This can
be used to send a signal to another application when the door was
opened.
Card read The relay will be triggered when a card is read.
Card rejected The relay will be triggered when a card is rejected.
Card updated The relay will be triggered when a card is updated.
Card not updated The relay will be triggered when a card is not updated.
Combined The relay will be triggered according with a combination of conditions.
For example, according to the image below, the relay will be triggered if
in Access point #1 the Door is left opened, if there is an Intrusion
or if there is a Card rejected. Access point #1, #2 or both can be
used.
361
Figure 340: Combined relay type
NOTE: Even if updates are performed automatically every 5 minutes for the CU42x0, a
manual update can be performed immediately by selecting the device and clicking
the Update button in SALTO network.
362
Online RF (BAS integration)
To filter the SALTO network data, perform the following steps:
1. Select System > SALTO Network. The SALTO Network screen is displayed.
2. Click Filters. The Items filtering dialog box is displayed.
3. Select a pre-defined search term from the Type drop-down list.
4. Type the name of the item you want to search for in the Name field.
5. Type the description of the item you want to search for in the Description field.
6. Type the IP address in the IP address field if appropriate.
The IP address field is only displayed for relevant search term types.
7. Click Apply Filter. A filtered SALTO network list is displayed.
When a filter has been applied, on the SALTO Network screen when you have applied a
filter, the search type is displayed in light blue. You can click the search type to once
again display all items on the list screen. You can click Delete Filter to delete the filter
and to redefine the filter parameters.
Click the Close icon in the Applied Filters field when you have finished reviewing the
filtered list or click Filters to apply another filter.
NOTE: Your BAS integration must be fully configured in ProAccess SPACE General
options before you can select this option. See BAS Tab for more information.
See Connection Types for more information about selecting the correct connection types in
non-hotel sites. For information about connection types in non-hotel sites, see Connection
Types.
363
Figure 341: Access point: Online IP (CU5000) information screen
364
Figure 342: Online IP (CU4200) information screen
Select the CU4200 node to which you want to connect the door from the Connected to
drop-down list.
Select either 1 or 2 from the Door number drop-down list.
You cannot select 2 unless you have selected 2 in the Access point count drop-down
list on the CU4200 node information screen. Otherwise, this exceeds the door number
count for the node. See Adding CU4200 Nodes for more information.
Click Save.
365
Figure 343: Online RF (SALTO) information screen
Select the RF node to which you want to connect the door from the Connected to drop-
down list.
Click Save
366
Figure 344: Address and Maintenance
The Address and Maintenance tab buttons are described in the following table.
The columns at the top of the Maintenance tab are described in the following table.
367
Table 75: Maintenance columns
Column Functionality
Name Specifies the name of the item (the icon immediately before the item
name indicates the peripheral type)
Shows the peripheral update status. If no update is required, no icon
Update Status will be shown. The status could be Update required, Address
required or Unknown. Note that this column does not have a title on
the screen.
Hostname/ IP address Specifies the network name that identifies the item
MAC Address Specifies the MAC address of the device.
Description Matches the details of the item entered in the Description field in
ProAccess SPACE
12. 8. 4. 1. 1. Peripherals
You can select multiple items on the SALTO Network peripheral list if required.
3. Select the checkbox next to the item that you want to update. The Browse button is
enabled.
If required, you can click Check all to update the firmware for multiple items
simultaneously. You can only update multiples of the same item (for example, online
CUs only or Ethernet encoders only) simultaneously.
4. Click Browse to select the required firmware file.
368
5. Click Send firmware. A confirmation screen is displayed when the firmware update is
complete.
NOTE: You can update the firmware for local encoders by using the Show
Firmware button on the Settings screen in ProAccess SPACE. See Updating
Encoder Firmware for more information.
1. Select System > SALTO Network. The SALTO Network screen is displayed.
2. Select the required Node/Repeater and perform a Show firmware. The Firmware
information dialog box is displayed.
369
4. Wait until the FW has arrived to Node/Repeater
Figure 349: Bluenet devices Firmware list & process dialog box
6. If the process has finished with errors (see the error messages and try again with the
devices which has errors)
370
Figure 350: Bluenet devices Firmware list & process dialog box with errors
12. 9. Calendars
The calendars functionality defines your organization’s working calendar. For example, you
can define public holidays, company holidays, and company shutdowns. If your organization
consists of multiple sites that operate according to different workday calendars, a separate
calendar can be created for each site. Up to 255 calendars can be set up on the SALTO
system.
A calendar day can be defined as a normal day, a holiday (H1), or a special day (there are
two special day definitions available, S1 and S2). Special days may be site-specific holidays
or site shutdown days. After you have created a calendar, you can then set up time periods,
automatic changes, and cardholder timetables specific to each day type or user. See Access
Point Times Periods, Access Point Automatic Changes, and Cardholder Timetables for more
information.
371
Figure 351: Calendars screen
372
Figure 352: Calendars copy
In Calendar to copy from, select the appropriate calendar. In Year, select the year the
calendar to copy is from.
In Days to copy, select the days to copy. If the box is not checked, the days won’t be
copied.
Click OK to copy.
Click Save. The new calendar is saved.
373
Figure 353: Time zones screen
Click Add Time Zone. The Time zone information screen is displayed.
Click Copy. The System world time zones dialog box, showing a list of time zones, is
displayed.
374
Figure 355: System world time zones dialog box
375
Note that the fields for the DST Rule option are not populated if the time zone you select
does not use DST. You must manually enter the details for the Fixed Days option on the
system if required. Both options are described in DST Options.
Alternatively, you can manually enter the appropriate information for the time zone in the
fields on the Time zone information screen.
Click Save.
You can select a time zone on the Time zones screen and click Delete to delete it.
However, you cannot delete the default system time zone.
NOTE: It is recommended that you allow the system to update for DST automatically.
Otherwise, you must manually update each door with a PPD on the date of the
time change.
376
Figure 358: Default information screen
Clear the default text and type a name in the Name field, for example, Daylight Saving
Time. The new screen name is displayed.
Type a description for the DST in the Description field.
The Enable daylight saving time (DST) checkbox is selected by default. If you clear
this checkbox and click Save, this disables the DST feature, and the DST Rule and
Fixed Days options are not displayed.
Type the appropriate value in the Offset from GMT field.
This value is used to calculate the time zone according to Greenwich Mean Time.
Select either the DST Rule or the Fixed Days option.
The DST Rule option is selected by default. Both options are described in DST Options.
You can click Copy to display the System world time zones dialog box and select a
time zone from the list. When you do this, the Name, Description, and Offset from
GMT fields, and the fields for the DST Rule option are populated with the information for
the selected time zone. The fields for the DST Rule option are not populated if the time
zone you select does not use DST. You must manually enter the details for the Fixed
Days option on the system.
Click Save.
377
12. 10. 2. 2. DST Options
The DST options are described in the following table.
378
The SAMing process involves three steps:
1. Issuing the keys
This reserves and secures a designated space on keys for the SALTO application.
SAMing the SALTO readers
You must add the SAM keys to the SALTO readers. This enables the readers to access
the reserved space in keys and read the SALTO data.
SAMing the encoders
You must add the SAM keys to the system encoders. This enables the encoders to
access, and read and write data to the reserved space.
NOTE: If you need to use multiple SAM cards for Mifare or Legic keys, you may need to
perform your SAM configuration manually. In this case, you should consult the
SALTO SAMing documentation and your SALTO technical support contact.
SALTO can provide a unique SAM kit to sites.
Select System > SAM & issuing options.
Ensure that the appropriate key types are selected in the Active cards panel.
This defines the key types that will be read by the SALTO locks, encoders, and readers. All
of the checkboxes in the panel are selected by default. You should clear the checkboxes for
key types that are not used in your site as this increases the speed of the SALTO readers. If
you disable a key type, the SALTO readers will not recognize it, even if they are compatible
with the key type. You must use a PPD to update the SALTO locks with these changes. See
Updating Locks for more information.
379
NOTE: The BLE readers use a little more of battery power. If the lock is not meant to be
used with the JustIN mobile application BLE can be unchecked to save battery
life. See Assigning a user JustIN mobile key for more information.
Select the checkbox in Active keys to enable and configure each option and define the
required key technology. You can then download this information to the PPD, and transfer it
to offline or online locks when they are initialized or updated. See Initializing Locks and
Updating Locks for more information.
You can transfer the information to online doors or encoders by using the SALTO Network
dialog box in ProAccess SPACE. For doors, you must select the required door on the
SALTO Network and click Update. For Ethernet encoders, you must select the required
encoder on the SALTO Network tab and click Signal. See SALTO Network for more
information. The SAMing is done automatically for local encoders when you use them to
read SAM cards. You can also SAM local encoders by clicking the Supported Keys button
on the Settings screen in ProAccess SPACE. See Encoder Settings for more information.
SALTO readers are compatible with the SAM functionality. However, you need specific
software and hardware versioning to use PPDs or the SALTO Network Update option with
the SAM functionality.
The following table shows the required software and hardware versioning.
Table 77: Minimum hardware and software requirements for the SAM functionality
Component Requirement
Software Version 12.0.1.195 or higher
Encoder Version 04.11 or higher
XS4 reader module Version 04.11 or higher
Aelement Version 01.31 or higher
XS4 locker Version 01.31 or higher
GEO cylinder Version 01.12 or higher
Wall reader Version 04.11 or higher
380
NOTE: It is assumed that operators performing Mifare configurations would be familiar
with the technologies and associated terms mentioned in this section.
SAM Data displays information that is transferred to the SALTO locks, encoders, and
readers.
The Mifare Classic and Mifare Plus fields, and the AMK 3DES and AMK AES fields in
the DESfire panel are editable if you have the SAM custom keys defined by user
381
functionality enabled in your license. In this case, you can add the key data manually in
the required fields. Otherwise, these fields are automatically populated with the relevant
Mifare Classic, Mifare Plus, and DESfire keys data when you read the SAM card. See
Registering and Licensing SALTO Software for more information.
NOTE: In special cases, the system can be configured to allow operators to create SAM
cards and use them with the SALTO software. You should consult with your
SALTO technical support contact if you want to avail of this option.
3. Click Read SAM card if required. A pop-up is displayed asking you to present the key to
the encoder.
This copies the key data on the SAM card to the SALTO software.
4. Place the appropriate SAM card on the encoder when the LED light begins to flash.
Different SAM cards are used for the Mifare and Legic technologies.
NOTE: You can verify what keys are supported by clicking Supported Keys on the
Settings screen in ProAccess SPACE. See Encoder Settings for more
information.
Select the SIM emulated cards checkbox if required.
You should consult with your SALTO technical support contact if you require additional
information about this option.
Click Save.
When you click Save the key data is masked on the screen for security purposes.
12. 12. 1. 2. Step Two: Entering the Data for Issuing Keys
Complete Step two as appropriate. This depends on whether you are using Mifare or
DESFire keys in your site.
Mifare Keys
To complete Step two:
1. Step two is performed in the Issuing data section.
382
Figure 362: Issuing data tab
The Mifare 1K option is selected in the Card type panel by default, which means that
the configuration fields for this option are displayed.
Type the required keys in the Key A and Key B fields in the Transport keys panel.
You must use hexadecimal format for these. Note that you may need to request these
from your SALTO technical support contact.
Type the Mifare Application Directory (MAD) key in the MAD key field.
You must use hexadecimal format. All Mifare keys have a MAD, which is the directory of
the key, and contains data about the properties of the key sectors.
2. Click Read SAM card. A pop-up is displayed asking you to present the key to the
encoder.
3. Place the appropriate SAM card on the encoder when the LED light begins to flash.
Select the Get other sectors if unable to get selected checkbox if required.
This option allows the SALTO software to select another key sector if a selected sector is
already in use by another application.
Select the Enable MAD reserved sectors checkbox if required.
This enables the MAD key and secures reserved sectors on the key for the SALTO
software.
Select the checkboxes for the appropriate key sectors in the Mifare 1K panel.
When you select the checkbox for each sector, this reserves it for the SALTO software.
However, you must issue keys for the changes to take effect. This can be done by
assigning the keys to users. If you make changes to this selection subsequently, they
take effect when you update keys. See Assigning User Keys and Updating Keys for
more information. Note that you can only reserve sectors in keys if you are using a SAM
383
card distributed by SALTO. The amount of space reserved for SALTO data in keys is
displayed in the Assigned memory field. You cannot manually amend the value that is
shown in this field.
Repeat the process to complete the configuration for the Mifare 4K, Mifare Plus 2K, and
Mifare Plus 4K options in the Card type panel.
When you select each option, the screen is updated to show the appropriate
configuration fields. The checkboxes and the number of key sectors available vary for
each option.
NOTE: You can reserve up to 39 key sectors when configuring the Mifare 4K and Mifare
Plus 4K keys. If you need to encode these keys with information from multiple
sites (rather than a single SALTO site), you must assign at least one of the last
four sectors (36, 37, 38, and 39) to each site. The maximum number of sites that
can be included in these key types is four. You are required to SAM the Mifare
keys if you use this option, so the SALTO readers can operate effectively.
384
Figure 363: Desfire configuration fields
The DESFire PMK field is not editable. This field is automatically populated with the
relevant Desfire keys data when you read the SAM card.
2. Click Read SAM card. A pop-up is displayed asking you to present the key to the
encoder.
3. Place the appropriate SAM card on the encoder when the LED light begins to flash. The
DESFire PMK field is populated.
Select either the 3DES or AES option in the Emission type field.
The AES option uses a more complex form of bits encryption.
4. Select the Updateable through NFC checkbox if required.
You should consult with your SALTO technical support contact if you require additional
information about this option.
5. Select the appropriate value in the Memory size field by using the up and down arrows.
This value defines the amount of memory space that is reserved for SALTO data in
DESFire keys.
6. Select an option from the Diversification type drop-down list if required.
The default option is None. Diversification types are only available for specific SALTO
projects. You should consult with your SALTO technical support contact if you require
additional information about this option.
7. Click Save.
Click Close. The SAM & Issuing options is updated to show the MIFARE option is
enabled.
Click Save.
385
12. 12. 3. Configuring Legic Settings
To configure the Legic settings, perform the following steps:
1. Select System > SAM & Issuing options.
2. Select Legic Prime or Legic Advant as required in Active keys. The SAM & Issuing
options dialog box is displayed.
386
Figure 365: SAM & Issuing options dialog box
This defines the key types that can be used with the SALTO locks, encoders, and readers.
You should not select key types that are not used in your site as this can slow the speed of
the SALTO readers. If you disable a key type, the SALTO readers will not recognize it, even
if they are compatible with the key type. You must use a PPD to update the SALTO locks
with these changes. See Updating Locks for more information.
Click Save.
Click Close. The SAM and issuing data tab is updated to show the LEGIC
option is enabled.
Click Save.
Once the stamps are inserted as explained above, if Legic Advant cards must be issued, the
size of application to be created must be defined on the “Issuing Data” section, which
depends on the memory size of the cards to be used:
387
Figure 366: SAM & Issuing option issuing data
Bear in mind that Legic Advant cards cannot be issued with a standard SALTO Legic
Encoder, but the Wall Reader Design Legic (WRDG), connected to an online CU42E0 unit,
and as part of the cards auto-assigment process. Just an auto-issuing process cannot be
carried out without an auto-assigment of the card to the related user. Please check out the
auto-assigment process on section 13.7.6 Automatic Key Assignment.
Once confirmed that the software and hardware complies with the minimum versions, the
WRDG must be SAMed. The following steps must be taken:
1. Press the CLR while the TAMPER loop is out of its position. A 30 seconds time
window will be opened to perform the next steps.
2. Present the Legic SAM card to the wall reader. This will allow the wall reader to read
and write information on the Legic Advant cards.
3. Present the Legic XAM card to the wall reader. This will allow the wall reader issue
the necessary segments on the Legic Advant card.
388
Once the WRDG is SAMed, a non-assigned user card could be presented to the WRDG.
The WRDG will blink blue during the auto-assignment process, showing afterwards green
(granted access) or red (rejection) signals, depending on the assigned user accesses.
Keeping the card patiently on the wall reader until the process is over is crucial for a correct
card auto-issuing, and auto-assignment. The whole process can take around 10 seconds.
389
HID SEOS cards can be used within a SALTO system.
The main difference on this cards technology in comparison to the rest of technologies, is
the fact that SALTO cannot provide SEOS SAM cards to issue cards, but the cards
manufacturer must provide the necessary keys to be inserted into the SAM and Issuing
options configuration:
Privacy ENC key
Privacy MAC key
AUTH key
See the options on the HID SEOS cards configuration window:
Figure 368: SAM & Issuing options dialog box: HID SEOS
In order to be able to use a HID SEOS card, this must have an ADF (Application Dedicated
File) of 1000 bytes. Cards without this application cannot issued and therefore cannot be
used on the SALTO hardware.
Once keys are inserted on the window shown above, they are saved on the database. The
HID encoder must be SAMed in order to allow issuing cards with those specific keys. Please
use the “Supported Keys” button available on the operator configuration window to SAM the
HID encoder:
390
Figure 369: SAM the HID encoder
The issuing process for HID SEOS cards is slower than on other technologies, so leaving
the card on the encoder, and not touching it, is advisable while the issuing process lasts, and
until the a completion message is shown.
In order to be able to encode cards, a HID encoder with a minimum firmware version is
required, being this v05.02 (FW file 0085).
391
The software will include by default the possibility to use the SALTO long-distance reader:
All the necessary settings for the correct Wiegand code output for these specific readers are
already preconfigured, and cannot be modified.
In order to understand how to set up correctly a given Wiegand code, the explanations below
are focused on Standard 26 Wiegand format. The example will follow the specifications from
below:
This example uses a hexadecimal format. Taking into account that 1 byte equals 8 bits, and
that one byte is represented by two digits in hexadecimal format (from 0 to 9, and from A to
F), therefore a 26 bits Wiegand code will be represented by 24 data bits (8 x 3 bytes), and
two additional bits for the parity.
392
Based on the example from above, a Wiegand code represented by two groups of bits would
have to be configured in order to represent properly the “Facility Code” and “Card Number”
data of the example:
In order to configure a new third party reader on the software like the one above, click the
Add button:
Type in a name in the Name field for the new third party reader to be integrated. Click on
the Add Code button:
393
Figure 375: Adding code
This allows you to specify the different parts that form the Wiegand code, and define their
characteristics:
394
Type a letter to identify the code in the Code field. Any letter can be entered except ‘P’,
as this is used to identify the parity of the codes at the beginning and at the end of the
Wiegand code. Type a description for the code in the Description field.
Select the appropriate bit ordering option for the code in the Bit order panel.
If you select the MSB option, the bit order will begin with the most significant bit. If you
select the LSB option, the bit order will begin with the least significant bit.
Type in the appropriate number of code digits in the Number of digits field. The default
value is 5 but can be changed if required.
Following the example, the “Facility Code” is defined as code A, and 1 hexadecimal byte
(8 data bits) would be represented with 2 digits. “Card Number” would be represented
with code B, and 2 hexadecimal bytes (16 data bits) would be represented with 4 digits.
Select the variable number of digits checkbox if required.
You must select this checkbox if the code has a variable number of digits. When you
select it, the value in the Number of digits field is automatically set to 0.
Select the appropriate digit format for the code in the Digit format panel, selecting the
decimal, hexadecimal or binary format.
Click Save. The code details are displayed in the list of codes, as showed below:
Double click to view or change the code details or click Delete to delete the code.
Click Add Code again and repeat the process for each required code.
When you have finished adding codes, type in the separators that you want to use for
the codes in the Interface format field. This controls how the codes are communicated
between the different components in the system. For example, if you have three codes
named A, B, and C, you can type ‘A-B/C’. In this case, code A is separated from code B
by a dash (-), and code B is separated from code C by a slash (/).
395
The practical example used on this section would require a format like A-B (just an
example):
Type in the appropriate bit order of the Wiegand code in the Bit composition field.
This defines how each code that you have created in the code list is ordered as far as
the Wiegand code is concerned. The length of the entry should correspond to the
number of digits in each code you included, and it should begin and end with the parity
(P). In the example from above, if the codes A, and B contain 8, and 16 digits
respectively, you could enter ‘PAAAAAAAABBBBBBBBBBBBP’. The parity indicates
whether the number of bits is odd or even.
Once codes, interface format, and bit composition are defined, parity rules must be
configured:
As per the example above, 13 (12 data + 1 parity) even parity bits and 13 odd parity bits
(12 data + 1 parity) should be defined.
Therefore, type in the appropriate parity format for even numbers in the Parity rule1
field, and the appropriate parity format for odd numbers in the Parity rule2 field.
The parity is calculated according to the specified order so it is important that this value
is entered correctly. The text you entered should correspond to each bit from within the
Wiegand code. Enter an ‘X’ for the bits you want to be used and a dash (-) for the bits
you do not want to be used to calculate the parity on each case.
396
The system will assist on properly configuring the parity rules, specifying the remaining
digits to be inserted:
It will also warn in case the number of digits to be configured are exceeded or
overflowed:
397
Figure 382: Parity configuration
Additional parity rules can be specified in the Parity rule3 and Parity rule4 fields if
required.
Click Save when the Wiegand code configuration is complete and correct.
The newly created third party reader will be added to the existing list:
398
Figure 384: Attendance configuration dialog box
3. Select the required Roll-Call area in the left-hand panel and click the chevron. The
selected Roll-Call area is displayed in the right-hand panel.
4. Click on one of the areas under Roll-Call areas. The USERS panel is shown right-hand
side.
5. Click Add/Delete. The Add/Delete dialog box, showing the users, is displayed.
Note that users that are already assigned to an Attendance area are preceed by an icon
and cannot be assigned to another Attendance area. See Attendance Monitoring for
more information about the Attendance Monitoring limitations.
399
6. Select the required user in the left-hand panel and click the chevron. The selected user
is now displayed in the right-hand panel.
7. Click OK. The selected user is now displayed in the USERS panel within the Roll-Call
area.
8. Click Save.
This is the default number of entries for the Micros-Fidelio and Industry Standard
protocols.
Double Click the required entry number. The Authorization data dialog box is displayed.
400
Figure 387: Authorization data dialog box
The items displayed in this dialog box vary, depending on the selected option in the
Type drop-down list. For example, if you select the Output option, a list of outputs is
displayed.
Click the required zone to select it and click Ok. The selected zone is displayed in the
Reference field.
401
Click Save.
Click Close. The entry details are displayed in the authorization list.
You can click Clear to delete selected entries. You can also click Print to display the
Print Preview dialog box and print the authorization list.
Repeat the process for each required entry.
Click Close when you have finished adding entries to the authorization list.
NOTE: The authorization list you create is applied to all of the PMS protocols on the
system. The same authorization numbers must be used in the PMS and SALTO
software so they can communicate with each other. For example, if you assign
number 62 to the hotel leisure centre, this number must also be assigned to the
leisure centre in the PMS software.
402
Occupied codes
This represents the number of keys that have been configured to be sent to the blacklist
when deleted or cancelled.
A maximum of 65,535 keys can be cancelled through the blacklist. See About Blacklists for
more information about blacklists.
NOTE: If the blacklist is full, you can perform a blacklist recovery. You must consult your
SALTO technical support contact for more information about this process.
403
13. PROACCESS SPACE GENERAL
OPTIONS
This section contains the following parts:
About ProAccess SPACE General options
General Tab
Devices Tab
Hotel Tab
Access points Tab
Users Tab
SHIP Tab
BAS Tab
Locations and Functions Tab
Visitors Tab
PMS Tab
Advanced Tab
NOTE: You can click the Print button on any of the tabs on the Options screen in
ProAccess SPACE to print a hard copy of all of your configuration settings.
404
Figure 390: General tab
405
Hide user manual checkbox Hides the user manual from the software interface. The
question mark at the upper right-hand corner will not be
shown.
Show authorization code Allows you to have the field of Authorization code in the
checkbox users in Cardholders -> Users
Number of extra days to keep ID Define the period of grace to activate the process of erasing
of erased users and operators the remaining data of removed cardholders and operators
field within the DB. By default the value will be 120 days
Warning: events removed cardholders/operators will not be
identifiable any longer in both audit trail and system auditor.
First day of week drop-down list Specifies the first day of the week in the system calendar.
The selected day is displayed as the first day of the week in
the Days panel on the Cardholder timetables screen in
ProAccess SPACE.
Activate multiple time Activates the multiple time zones functionality in ProAccess
zones button SPACE. See Activating Multiple Time Zones and Time
Zones for more information.
Reports checkboxes Allows exporting reports to the following formats:
- PDF file
- Excel 2007 file
- CSV format
The Time zone name field displays the name of the default system time zone. You can
amend this text if required.
Select the appropriate time parameter using the up and down arrows in the Offset from
GMT field.
The value you enter is used to calculate the time zone according to Greenwich Mean
Time.
Click Ok. The General tab is updated to show that multiple time zones are enabled.
406
You can click Deactivate multiple time zones to deactivate the multiple time zones
functionality at any time. However, you must delete any additional time zones you have
created in ProAccess SPACE before you can do this.
Click Save.
See Time Zones for more information about using the multiple time zones functionality.
407
Table 79: Devices tab
Item Description
Dongle encoder for SALTO service Allows you to select a dongle encoder to be used for the
drop-down list SALTO Service. This Ethernet encoder has to be online. It
is used to encrypt the data that is sent over the air (OTA)
or when using a third party encoder. Any of the online
Ethernet encoders from the system can be selected.
Enable control unit IP addressing Controls whether PPDs assign the IP address you have
by PPD checkbox entered on the system to online IP (CU5000) doors during
initialization. See Initializing Locks and Online IP (CU5000)
for more information. This is useful for online IP (CU5000)
doors that are on different networks.
Set Subnet mask and gateway IP Activates a subnet mask and a gateway for IP addresses
on CUs by PPD checkbox for online IP (CU5000) doors in order to improve router
efficiency. When you select this checkbox, a Subnet mask
field and a Gateway IP address field are displayed on the
Access point: Online IP (CU5000) information screen in
ProAccess SPACE. Note that you must select System >
SALTO Network and double-click the required online IP
(CU5000) door on the SALTO Network screen to view the
information screen. To use this option, your CU 5000
board firmware must be version 02.01 or higher, and your
Ethernet board firmware must be version 01.40 or higher.
Do not send data to CUADAPT if Controls whether track data is transferred to the CU
card rejected checkbox adaptor when user cards are rejected
Data duration in PPD (days) field Defines the number of days for which access data
downloaded to a PPD is stored in the PPD’s memory. The
data is no longer displayed in the PPD’s menu after the
specified expiry date. The default value is one day but you
can change this if required.
Enable emergency opening Sets emergency opening as a default option in ProAccess
checkbox SPACE. When you select this checkbox, the Allow
emergency opening checkbox on the PPD information
screen in ProAccess SPACE is greyed out, and you can
perform emergency openings each time you download
data for specified access points to the PPD. See
Performing Emergency Door Openings for more
information. It is important to be careful when using this
option, as a security risk could arise if an unauthorized
person comes into possession of the PPD.
Password field Allows you to enter a password for performing emergency
openings with a PPD. The specified password must be
entered in the PPD before you can perform emergency
openings. If you enter a password in this field, the
Password field on the PPD information screen in
ProAccess SPACE is greyed out, and you cannot use it to
change the PPD password or enter a password.
Otherwise, you can edit the Password field in ProAccess
SPACE. See Performing Emergency Door Openings for
more information.
Collect audit trail automatically Controls whether PPDs automatically collect audit trail
when updating locks checkbox data when they are used to update locks
408
Item Description
Amount of days to extend the key Defines the number of days for which keys are revalidated
expiration date field when they are updated at a CU that is operating offline due
to a network issue, for example. The default option is three
days. You can amend this value if required. However, it
cannot be higher than 15 days. You must enable the
CUSVN_DATE_EXT parameter to activate this option. See
Advanced Tab in General Options for more information.
Maximum period between updates Defines the maximum period for which the CUSVN
to keep active this feature in the automatic date extension feature can be used with keys.
key field Outside of this period, keys cannot be revalidated at a CU
that is operating offline. Instead, they must be updated at
an online CU. The default option for cancellable keys is 30
days. However, you can set this value as high as 730 days
if required. For non-cancellable keys, the default option is
four days. You can amend this value but it cannot be
higher than seven days.
RF option – Enable Channels Enabled channels for RF signals in ProAccess SPACE.
checkboxes There are 16 channels available and all of these are
enabled by default. The frequency range of each channel
is also displayed. You can disable a channel if required by
clearing the checkbox for the channel and clicking Save.
Bear in mind the channels adjustmen only applies to RFnet
Wiegand format for third party Defines the code format for Wiegand keys. See
readers field Configuring Wiegand codes for more information
409
Figure 393: Hotel tab
410
Item Description
Enable guest keys update Controls whether guest keys can be updated at an SVN
checkbox wall reader. This is useful for re-rooming guests. If guest
keys can be updated with new access information at an
SVN wall reader, the guest does not have to return to the
front desk before accessing their new room. See Re-
Rooming for more information about re-rooming guests.
Allow copies of spare keys Controls whether copies of spare keys can be edited.
checkbox When you select this checkbox, an Edit Spare Key
Copies button is displayed on the Programming & spare
keys screen in ProAccess SPACE. See Editing Spare Key
Copies for more information about this process.
Enable predefined package at Predefined amount of check-in days for the guest stay.
check-in checkbox According to the guest arrival day, various options will be
shown;
Weekend: from Friday to Sunday, Week: from Monday to
Sunday and Midweek: from Monday to Friday. Selecting
one of these option will automatically sets the departure
date. See Guest check-ins for more information.
Enable access to zones before Controls whether guests can be given access to zones in a
room start time checkbox hotel site before the specified time that they can access
their room on the day of check-in. See Zones for more
information about giving guests access to zones. When
you select this option, the Rooms activation time drop-
down list is displayed on the Hotel tab and the Start date
time field is displayed on the Hotel check-in screen in
ProAccess SPACE. Note that they are also displayed
when you enable the CHECKIN_START_TIME parameter
in ProAccess SPACE General options. See Advanced Tab
for more information.
Default Room expiration time field Defines the hour when guests must vacate their rooms on
the day they check out of a hotel site. If you select 13 in
the drop-down list, for example, the guest’s key cannot be
used to access their room after 13:00 on the day of check-
out. This value is displayed in the Date of expiry time field
on the Hotel check-in screen in ProAccess SPACE, but
you can change the value for individual guests if required.
Default Rooms start time field Defines the hour when guests can enter their room on the
day they check in to a hotel site. If you select 16, for
example, the guest’s key can be used to access their room
any time after 16:00 on the day of check-in. This value is
displayed in the Start date time field on the Hotel check-
in screen in ProAccess SPACE, but you can change the
value for individual guests if required. Note that this option
is displayed on the Hotel tab when you enable the
CHECKIN_START_TIME parameter in ProAccess SPACE
General options. See Advanced Tab for more information.
It is also displayed when you select the Enable access to
zones before room start time checkbox on the Hotel tab.
Enable access to zones after room Defines the hour after which a guest’s access to zones in a
expiration time checkbox hotel site expires on the day of check-out, for example, the
hotel leisure centre. See Zones for more information about
giving guests access to zones.
Calendar for guest drop-down list Defines which calendar is applied to the guest during the
check-in operation. See Calendars for more information.
411
Item Description
Enable field checkboxes Allow you to add up to five general purpose fields for
guests. When you select the checkbox for each field, it is
displayed on the Guest information screen in ProAccess
SPACE. You can name the general purpose fields in
accordance with the information you want to capture by
typing a name in the field underneath each checkbox, for
example, special requirements.
Field to show on check-in drop- Allows you to select what General purpose fields, from 1 to
down list 5. When you select the field, it is displayed on the Check-
in screen in ProAccess SPACE. This field can be used to
add guest-related information related with the guest. If
required, the content of the general purpose field can be
added to a track. See Configuring Tracks for more
information.
Associated devices checkbox Gives you the option to enable associated devices in
rooms and suites. When you select this option, an
Associated device List panel is added to the Room and
Suite information screens in ProAccess SPACE. See
Associated Device Lists for more information.
Show details button Allows you to change the configuration options for
associated devices. See Configuring Associated Devices
for more information.
Hide room name in mobile app When selected, the room name won’t be shown in the
checkbox mobile phone screen. The JustIN mobile app is license
dependent. See Guest check-ins for more information.
Default notification message for Allows you to enter a default notification message for
mobile guest keys field mobile guest keys. Guests receive this message when
mobile keys are sent to their phones. See Room Options
for more information about the mobile guest keys option.
Track #1 checkbox for hotel guests Enables track 1 on guest keys. When you select this
checkbox, you can use the track to write additional data on
guest keys, for example, the key expiration date. See
Configuring Tracks for more information.
Size fields Allows you to define the number of bytes that are used for
tracks. You need to specify the size for each track used.
Content fields Allows you to specify what data is written on tracks. You
need to specify the content for each track used. See
Configuring Tracks for more information.
Track #2 checkbox for hotel guests Enables track 2 on guest keys. When you select this
checkbox, you can use the track to write additional data on
guest keys.
Track #3 checkbox for hotel guests Enables track 3 on guest keys. When you select this
checkbox, you can use the track to write additional data on
guest keys.
Wiegand code checkbox for hotel Activates the Wiegand code option for guest keys. This
guests enables the SALTO system to send the Wiegand code to
third-party applications if required. Note that only a
constant Wiegand code can be used for guest keys. This is
a fixed code that is the same for all guests.
412
To amend the configuration settings for ESDs, perform the following steps:
1. Select System > General options > Hotel Tab.
Click View details in the Associated devices panel. The Associated device dialog box
is displayed.
You cannot amend the default characters in the Prefix field. The prefix is included at the
beginning of ESD entries for hotel rooms and suites in ProAccess SPACE, for example,
@1_101.
Enter the required time parameters in the Disconnection timeout field by clearing the
default numerical value and typing a new value, and selecting either the seconds or
minutes option from the drop-down list.
These parameters define the period for which the ESD remains active after you remove
a key from it.
Clear the default value in the Increased disconnection timeout field and type a new
value if required.
This feature is designed for disabled or ‘hands full’ users or guests. The ESD remains
active for the increased period that you specify after users or guests remove their keys
from it. You must also enable this option in the user’s or guest’s profile.
Select the ESD with temporized AC activation checkbox if required.
This sets the AC in the room to activate automatically for a certain period at specified
time intervals. Note that access to the AC is controlled by the system-generated ESD_#2
entry. This is one of the outputs that activate the relays for ESDs. See Associated Device
Lists for more information.
Type a value in the Period and Time fields.
These values control the automatic activation of the AC. For example, if you type ‘60’ in
the Period field and ‘5’ in the Time field, the AC is automatically activated for five
minutes every hour.
413
Click Ok.
Click Save.
This dialog box allows you to specify the data that is written by default when new keys
are encoded.
Click the required macro in the Macros field to select it.
Macros are available for a number of the fields in ProAccess SPACE. Note that you can
use the $ASC macro for ASCII characters or non-printable characters.
Click OK. The selected macro is displayed in the Content field.
414
You can include a constant value before or after each macro by typing it in the Content
field, for example, ‘Date’ or ‘-’.
Click Ok when you have finished inserting macros and the correct macro format is
displayed in the Content field.
Click Save.
13. 5. Security
This section covers the password management in Space. Bear in mind this module is
included in Space v3.1 aor above. For that reason there are some aspects to be considered
related to the password policy.
When upgrading the software from previous versions to 3.1 it will require included a
password for the admin operator. The blank password is no longer available from Space
v3.1 or above. The Enforce password policy is not enabled when upgrading the software
from previous versions but it is enabled by default when creating a new system:
415
Figure 397: Associated device dialog box
416
13. 5. 1. LDAP for Operators
It is necessary to enable it in Security level in General Options:
Once this option is enabled then we need to fill the necessary setup to enable the
connectivity with our LDAP:
Remind that there is a specific manual for Technical Notes On The Use Of LDAP for specific
IT setup.
The synchronizing of LDAP operators, allows the synchronization of operators from an
Active Directory using LDAP protocol. There is no need to store operator’s credentials (i.e.,
username and password) in Space database for authentication purpose. The credentials are
directly saved in the Directory Service.
417
Figure 400: Operator importation
Once this setup is done is necessary to carry out a synchronization or a scheduled job.
Once this option is enabled then we need to fill the necessary setup to enable the
connectivity with our LDAP:
418
Remind that there is a specific manual for Technical Notes On The Use Of LDAP for specific
IT setup.
The synchronizing of LDAP users, allows the synchronization of standard users from an
Active Directory using LDAP protocol. These users can be lialised with a user access level
Once this setup is done is necessary to carry out a synchronization or a scheduled job.
419
Figure 405: Access points tab
420
Item Description
Enable “out of site” mode Controls whether Out of site mode can be enabled for online
checkbox IP (CU5000) and online IP (CU4200) doors. This option
generally applies to users only. Also, you can only use it
with doors that have two readers. You can enable this mode
by selecting the Out of site checkbox on the Door
information screen in ProAccess SPACE. See Door Options
for more information. Out of site mode strengthens system
security.
If a cardholder exits a site through either of these door
types, the expiration period for their key is shortened when
they present it to the exit SVN wall reader. A brief period is
set for revalidation of their key upon re-entry. This period
can vary depending on what time the key is presented to the
exit reader, but it is never longer than 15 minutes. The
cardholder’s key is revalidated when they present it to the
entrance SVN wall reader of the door, or another door that
has Out of site mode enabled. However, they must do so
within the specified period. Otherwise, access is denied as
their key is not revalidated.
When you select the Enable “out of site” mode checkbox,
the Strict ‘out of site’ mode checkbox is also activated in
ProAccess SPACE General options. This mode works in the
same way. However, the cardholder’s access permissions
are also removed from their key when they present it to the
exit SVN wall reader. Note that Strict out of site mode can
only be used in cases where the SVN wall reader is located
at a final exit point in a site. For example, it cannot be used
if the cardholder must subsequently enter an offline door in
order to leave the site.
Deactivate key override signal Controls whether locks emit beeps and a visible signal when
checkbox using a mechanical key override. This box is unchecked by
default. When you select this option, it is applied to all
system locks.
Openings by only keypad Enables the possibility to override privacy using keypad
overrides privacy modes of the lock
checkbox
Enable ‘Duress’ alarm Enables to activate a special security alarm in the audit trail
checkbox of the system. It can be activate only with two specific
opening modes: Keypad only and KEY + PIN mode, See
Opening Modes and Timed Periods. This specific event
can be generated only when the door has been opened. In
the audit trail it will be possible to see two specific events,
the opening of the door and the special Duress alarm.
It’s thought to prevent security situations when a person with
correct access permissions can be “forced” to someone to
accede to an access point with PIN/keypad code. The
Duress alarm is activated when a person open the lock with
the Duress code. The Duress code is the User or Door PIN
changing the last digit by the consecutive. For instance if the
PIN is “1234” the Duress code is “1235”, if the correct
Keypad code is “999999” the Duress code is “999990”.
This option doesn’t automatically activate any actions. In
order to generate any actions, it has to be managed in the
Event Stream or Alarm Event logic (See Events Streams
or Alarm Events section).
421
Item Description
Enable strict anti-passback Enables the strict antipassback functionality. See Enabling
checkbox Anti-passback for more information about strict
antipassback.
Enable time-constrained anti- Allows to enable Anti-passback duration (hh:mm). Anti-
passback chekbox passback duration (hh:mm) displays the period of time in
hours and minutes before a cardholder can re-enter a door
that has the anti-passback option enabled. See Enabling
Anti-passback for more information about antipassback. The
default value is 23:59 but you can amend this time
parameter if required. Note that if you enter 00:00, the anti-
passback period is unlimited, and cardholders must always
exit a door before they can re-enter it. You must update user
keys using an encoder when you select this option or
amend the time parameters. See Updating Keys for more
information.
Enable anti-passback in third Allows to enable antipassback functionality for Access
party readers checkbox points connected to third-party readers connected to
CU4000 online devices.
This antipassback logic is managed by DB, and not by card
as the standard antipassback. This type of antipassback is
always time constrained. See Enable time-constrained anti-
passback for more information.
It doesn’t exist strict antipassback option for this
antipassback connected to third party readers.
Exit leaves door open If the unlimited checkbox is selected, the door in Exit leaves
during…(minutes) checkboxes open mode will remain unlocked until the valid key is
presented to the reader again. If Unlimited is not checked,
a box will appear and allow to enter how many minutes the
lock has to remain unlocked until it re-locks automatically.
Enable field checkboxes Allows you to add up to two general purpose fields for locks.
When you select the checkbox for each field, it is displayed
on the Door, Locker, and Room information screens in
ProAccess SPACE. You can name the general purpose
fields in accordance with the information you want to
capture by typing a name in the field underneath each
checkbox.
Dynamic keys option Defines whether dynamic keys can be used with free
assignment lockers. When you select this option, users can
choose any locker within a free assignment zone each time
they enter the zone. They do not have to use the same
locker each time. See Creating Free Assignment Zones for
more information. Note that you must select this option if
your site uses both free assignment lockers and lockers that
have assigned access.
Static keys option Defines whether static keys can be used with free
assignment lockers. When you select this option, users can
choose any locker the first time they enter a free assignment
zone, but they must use the same locker subsequently. This
option also applies to sites that only use lockers with
assigned access.
422
Item Description
Control of lockers left closed Controls whether you can opt to reset the status of available
checkbox lockers to ‘open’ on the system. This task can be performed
by reception staff for information purposes, for example. It
shows which lockers are available for use. However, it does
not affect the physical lockers. When you select this
checkbox, the Set locker state as opened button on the
Keys tab is activated, and a Set Lockers States As
Opened button is added to the Lockers screen in
ProAccess SPACE. You can click this button to reset the
status of all the available lockers in the system. This
changes the status of the lockers to Open on the Locker
information screen in ProAccess SPACE. Note that this
option is generally used in sites where only free assignment
lockers are in use, for example, gyms or spas.
Set locker state as opened button Allows you to reset the status of available lockers to Open
on the system. The changed status is displayed on the
Locker information screen in ProAccess SPACE.
Time-limited occupancy checkbox Limits the amount of time for which keys can be used to
open free assignment lockers after they are chosen by
users. When you select this checkbox, you must enter the
appropriate time parameters in the Hours and Minutes
fields. Outside of the specified time period, for example, four
hours, only a master key can open lockers.
Reset timing when recapturing Controls whether the time-limited occupancy period for free
locker checkbox assignment lockers is reset each time lockers are opened
and closed by users. For example, if the time-limited
occupancy period is set to four hours, and a user opens and
closes the locker again after three hours have elapsed, they
can then use the locker for four more hours.
423
Figure 406: User tab
424
Item Description
Include last reject information on Controls whether data about a user’s most recent failed
keys checkbox access attempt is stored on keys. When you select this
option, you can access the data by reading keys. See
Reading Keys for more information.
Hide ROM code for automatic key Hides the ROM code field in the user profile.
assignment checkboxes
User ID configuration field Defines the format of user IDs. There is a default format on
the system, but you can amend this if required. See
Configuring User IDs for more information.
Enable field checkboxes Allow you to add up to five general purpose fields for
users. When you select the checkbox for each field, it is
displayed on the User information screen in ProAccess
SPACE. You can name the general purpose fields in
accordance with the information you want to capture by
typing a name in the field underneath each checkbox.
Wiegand format field Defines the code format for Wiegand keys. See
Configuring Wiegand Codes for more information.
Default notification message field Allows you to enter a default notification message for
mobile app keys. Users receive this message when mobile
keys are sent to their phones.
Track #1 checkbox for staff keys Enables track 1 on user keys. When you select this
checkbox, you can use the track to write additional data on
user keys.
Track # 2 checkbox for staff keys Enables track 2 on user keys. When you select this
checkbox, you can use the track to write additional data on
user keys.
Track #3 checkbox for staff keys Enables track 3 on user keys. When you select this
checkbox, you can use the track to write additional data on
user keys.
Wiegand code checkbox for staff Activates the Wiegand code option for users. When you
keys select this checkbox, the Wiegand code is written on user
keys when they are encoded. Also, a Wiegand code field
is displayed on the User information screen in ProAccess
SPACE. This field is automatically populated during data
synchronization jobs. You can also edit the field manually if
you have the required code. You must select either the
Profile code or Constant code option in ProAccess
SPACE General options when you select the Wiegand
code checkbox. The profile code is the code included in
user profiles. The constant code is a fixed code that is the
same for all users. If you select the Constant code option,
you must enter the constant code in the Constant code
field.
Automatic key assignment Specifies a mode for automatic key assignment. You must
enabled option select the #1 option, which is the standard mode. The #2
option is used by SALTO staff for demonstration purposes
only, as it allows the reuse of cancelled keys for automatic
key assignment. See Assigning Keys Automatically for
more information. SHIP cardholder must be selected only if
a SHIP integration exists. This allows an automatic key
assignment for users created with SHIP.
425
Item Description
Card serial number option Controls whether the serial numbers of keys are used for
automatic key assignment. You must select either the
Card serial number or Card data option. See Assigning
Keys Automatically for more information.
Card data option Controls whether key data is used for automatic key
assignment. This allows you to use codes that are located
in a specific sector in keys that is specified by the key
manufacturer. You must select either the Card serial
number or Card data option. See Assigning Keys
Automatically for more information.
426
The default macro format is displayed in the Content field.
Double click the required macro in the Macros field to select it. It will be added to the
Content field.
You can place the cursor where you want to insert a macro within the existing entry in
the Content field, or delete the entry to insert a new macro format.
Click Ok when you have finished inserting macros and the correct macro format is
displayed in the Content field.
NOTE: The new user data is displayed the next time you log in to ProAccess SPACE.
427
Figure 408: User ID configuration dialog box
In order to understand how to set up correctly a given Wiegand code, the explanations below
will be focused on the Standard 26 Wiegand format. The example will follow the
specifications from below:
428
This example uses a hexadecimal format. Taking into account that 1 byte equals 8 bits, and
that one byte is represented by two digits in hexadecimal format (from 0 to 9, and from A to
F), therefore a 26 bits Wiegand code will be represented by 24 data bits (8 x 3 bytes), and
two additional bits for the parity.
Based on the example from above, a Wiegand code represented by two groups of bits would
have to be configured in order to represent properly the “Facility Code” and “Card Number”
data of the example:
429
This allows you to specify the different parts that form the Wiegand code, and define their
characteristics:
Type in a letter to identify the code in the Code field. Any letter can be entered except
‘P’, as this is used to identify the parity of the codes at the beginning and end of the
Wiegand code. Type in a description for the code in the Description field.
Select the appropriate bit ordering option for the code in the Bit order panel.
If you select the MSB option, the bit order will begin with the most significant bit. If you
select the LSB option, the bit order will begin with the least significant bit.
Type in the appropriate number of code digits in the Number of digits field. The default
value is 5 but can be changed if required.
Following the example, the “Facility Code” is defined as code A, and 1 hexadecimal byte
(8 data bits) would be represented with 2 digits. “Card Number” would be represented
with code B, and 2 hexadecimal bytes (16 data bits) would be represented with 4 digits.
Select the variable number of digits checkbox if required.
You must select this checkbox if the code has a variable number of digits. When you
select it, the value in the Number of digits field is automatically set to 0.
Select the appropriate digit format for the code in the Digit format panel, selecting the
decimal, hexadecimal or binary format.
Click Save. The code details are displayed in the list of codes, as can be seen on the
image below:
430
Figure 412: Wiegand details
Double click to view or change the code details or click Delete to delete the code.
Click Add Code again and repeat the process for each required code.
431
Figure 413: Wiegand details
Type in the appropriate order of the Wiegand code in the Bit composition field.
This defines how each Wiegand code that you have created in the code list is ordered.
The length of the entry should correspond to the number of digits for each code you
included, and it should begin and end with the parity (P). In the example from above, if
the codes A, and B contain 8, and 16 digits respectively, you should enter
‘PAAAAAAAABBBBBBBBBBBBP’. The parity indicates whether the number of bits is
odd or even.
Once the codes, the interface format, and the bit composition are defined, parity rules
must be configured:
432
As per the example above, 13 (12 data + 1 parity) even parity bits and 13 odd parity bits
(12 data + 1 parity) should be defined.
Therefore, type in the appropriate parity format for even numbers in the Parity rule1
field, and the appropriate parity format for odd numbers in the Parity rule2 field.
The parity is calculated according to the specified order so it is important that this is
entered correctly. The text you enter should correspond to each bit in the Wiegand code.
Enter an ‘X’ for bits you do want to be used and a dash (-) for the bits you do not want to
be used to calculate the parity on each case.
The system will assist on configuring properly the parity rules, specifying the remaining
digits to be inserted:
It will also warn in case the number of digits to be configured are exceeded or
overflowed:
433
Figure 416: Wiegand parity rules error
434
Figure 417: Wiegand parity rules
Additional parity rules can be specified in the Parity rule3 and Parity rule4 fields if
required.
Click OK when the Wiegand code configuration is complete and correct.
The software will show the configured Wiegand code interface format on the Users tab:
435
13. 7. 5. Configuring Tracks
Keys have three tracks or areas in which you can encode data (track 1, track 2, and track 3).
You can enable these tracks on user and guest keys to store information from specific
ProAccess SPACE fields, for example room names, or key expiration dates. See User Tab
for more information. You must define what data is written on each track, and this is
displayed when you read keys. See Reading Keys for more information about reading keys.
To configure a track, perform the following steps:
2. Select System > General options > Users.
3. Select the checkbox for the required track.
4. Type the appropriate value in the Size field.
This defines the number of bytes on the key that are used for the track.
5. Click the button on the right-hand side of the Content field. The Tracks content
configuration dialog box is displayed.
This dialog box allows you to specify the data that is written by default when new keys
are encoded.
Click the required macro in the Macros field to select it.
Macros are available for a number of the fields in ProAccess SPACE. Note that you can
use the $ASC macro for ASCII characters or non-printable characters.
Click OK. The selected macro is displayed in the Content field.
You can include a constant value before or after each macro by typing it in the Content
field, for example, ‘Date’ or ‘-’.
Click Ok when you have finished inserting macros and the correct macro format is
displayed in the Content field.
Click Save.
436
13. 7. 6. Automatic Key Assignment
You can configure the system to assign keys to users automatically. See Assigning Keys
Automatically for more information about usage.
Note that this functionality is license-dependent. See Registering and Licensing SALTO
Software for more information.
The following table shows the firmware versions required to use the automatic key
assignment functionality.
Table 84: Minimum firmware requirements for the automatic key assignment functionality
Component Requirement
Ethernet board Version 01.41 or higher
CU5000 board Version 02.02 or higher
Wall reader Version 02.65 or higher
To configure the settings for automatic key assignment, perform the following steps:
1. Select System > General options > Users.
2. Select the appropriate mode in the Automatic key assignment panel.
3. Select either the Card serial number or the Card data option.
You should select the Card serial number option if you want to use the serial number of
keys for the automatic key assignment. This means the SALTO readers will use the
ROM or Unique Identifier (UID) to identify user keys. When you select this option, you
must select the appropriate UID format from the Key UID format drop-down list. The
default option is 7-byte ROM Code (SALTO Format) but you may need to select a
different option, depending on the type of keys you are using. It is important to select the
correct option so that the SALTO readers can correctly read the keys. Alternatively, you
can select the Card data option if you want to use another code instead of the serial
number for the automatic key assignment. See Configuring the Card Data Option for
more information.
NOTE: SALTO readers include any device that can read keys, including wall readers,
electronic locks, or encoders.
Click Save.
Mifare
To configure the settings for the Card data option for Mifare, perform the following steps:
437
1. Select Mifare from the Card data drop-down list in the Automatic key
assignment panel on the User tab. The Automatic key assignment panel is updated
to show the Mifare configuration settings.
See Assigning Keys Automitically for information about the other options in the Key
assignment panel.
2. Select the appropriate number from the Sector number drop-down list.
This number indicates the sector on the Mifare key where the code is located.
3. Select the appropriate number from the Block number drop-down list.
This number indicates the block on the Mifare sector where the code is located. The
sectors are divided into 16 blocks numbered from 0 to 15.
4. Select the Mifare plus card checkbox if required.
You should select this if you are using Mifare Plus keys.
5. Select either the B or A option in the Key type field.
This information is required if the Mifare sector is protected. The A option is used to read
the data in the sector. The B option is used to read the data in the sector and write data
to it. In this case, you can use either of the options.
Type the unblocking key in the Key field.
The unblocking key is a hexadecimal code. It is required if the Mifare sector is protected.
Note that you may need to request this from the key manufacturer.
6. Select the appropriate option from the Type drop-down list in Valid data, selectin the
format you want SALTO to use to read the key, ASCII, WIEGAND (HEX) , WIEGAND
(HEX SWAP), HEXADECIMAL or DECIMAL.
This defines the format of the data.
7. Select the appropriate parameters in the From and To drop-down lists.
This specifies the order of the bytes or bits for reading the code.
8. Select the Reverse bytes checkbox if required.
This allows the SALTO readers to interpret the code correctly if it is reversed in the
selected card data type.
9. Click Save.
438
DESFire
To configure the settings for the Card data option for DESFire, perform the following steps:
1. Select DESFire from the Card data drop-down list in the Automatic key assignment
panel on the User tab. The Automatic key assignment panel is updated to show the
DESFire configuration settings.
2. Type the Application Identifier (AID) number of the DESFire data application in the AID
field.
3. Select the appropriate option in the Key number drop-down list.
This specifies which key is used.
4. Select the appropriate option from the Comm. Settings drop-down list if required.
This activates an additional security for the use of DESFire key data as it changes the
format of the key identifier.
Select the appropriate option from the File number drop-down list.
This information is required if the DESFire data application contains more than one file.
5. Select either the DES or AES option in the AMK type field.
The AES option uses a higher level of encryption than the DES option. Note that AMK
refers to Application Master Key.
6. Type the unblocking key in the Key field if required.
The unblocking key is a hexadecimal code. It is required if the DESFire sector is
protected. Note that you may need to request this from the key manufacturer.
7. Follow Steps 6, 7, 8 in Mifare to select the appropriate settings in the Card data field.
8. Click Save.
439
Mifare and DESfire
it’s possible to combine the use of Mifare and Desfire cards when performing automatic key
assignment by following the steps from above.
Legic
To configure the settings for the Card data option for Legic, perform the following steps:
1. Select Legic from the Card data drop-down list in the Automatic key assignment
panel on the User tab. The Automatic key assignment panel is updated to show the
Legic configuration settings.
440
2. Type a stamp for the segment in the Legic segment data field.
This stamp allows the SALTO software to read the Legic segment data.
3. Select the appropriate option from the Initial segment drop-down list.
This defines the first segment from which the data is read. If the initial segment is
unknown, you should not change the default value of 0.
Follow Steps 6, 7, 8 in Mifare to select the appropriate settings in the Card data field.
Click Save.
The software also allows configuring the checking of the CRC (Cycling Redundancy Check)
of the Legic Cards before the autoassigment of the Legic card takes place in the Legic wall
reader.
As can be seen on the picture below, the CRC position and size can be defined, as well as
the location of the data (from-to of the data):
In order to have this functionality active on the Legic Wall readers, make sure that the very
latest firmware of the Legic wall reader is in place.
HID-iCLASS
To configure the settings for the Card data option for HID iClass, perform the following
steps:
Select HID-iCLASS from the Card type drop-down list. The Automatic key assignment
panel is updated to show the HID-iCLASS data configuration settings.
Two options are possible, using the PAC or DATA in memory:
441
Figure 425: HID-iCLASS configuration settings
Using PAC
1. In HID-iCLASS data, select PAC (Phisical Access Control) if your keys were issued with
a PAC key.
2. In Valid data, select the format you want SALTO to use to read the key, ASCII,
WIEGAND (HEX) or WIEGAND (HEX SWAP), HEXADECIMAL or DECIMAL.
3. Then type the segment of the PAC you want to use in From and To.
NOTE: To process the PAC bits, the reader has to integrate a SIO (Secure Identity
Objetc) processor.
442
NOTE: You must discuss your SHIP integration with your SALTO technical support
contact. A non-disclosure agreement must be signed before you can use this
feature.
Select System > General options > SHIP to view the tab.
443
Item Description
Number of connections field Defines the number of server connections that are to be
established
TCP/IP port field Specifies a TCP/IP port for server communication
Timeout (sec) field Defines the length of time that ProAccess SPACE waits for
a response from the server before it times out
Select System > General options > BAS to view the tab.
444
Item Description
Integration type field Allows you to select a building automation system.
Currently, INNCOM, Minxon RMS, In-room node (BLUENet)
and Customized (RF IEEE) systems can be integrated with
the SALTO system.
Start Diagnosis button Allows starting a diagnosis to troubleshoot any
communication problem with the third party system. The
diagnosis data will only be useful for SALTO developers,
hence, before starting the diagnosis, contact with your
SALTO technical support.
Description field Allows you to enter a description of the specified integration
type.
Host name field Defines the host name for the building automation system
server.
Port number field Specifies the port number that the building automation
system uses to connect with the SALTO system and the
SALTO network
Maximum round trip time Defines the maximum time period allowed for data to travel
(sec) field from the system to the locks and from the locks back to the
system. The system times out if this period is exceeded.
Disable communication with Controls whether the communication between the SALTO
SALTO service checkbox (Only for service and the In-room node is able or disable. If the
In-room node (BLUENet) case) communication is able, SPACE can execute lock actions or
the audit trail events are reported to SPACE through BAS. It
is like having a BLUENet online system. If it is disable, these
functionalities are not able to use (like having an offline
system).
Table 86: BAS integration tab parameters
NOTE: Remember that in this integrations the latest FWs are required.
445
NOTE: The locations and functions functionality is license-dependent. See Registering
and Licensing SALTO Software for more information.
Type a name for the location grouping in the Grouping name field.
This name is applied to the drop-down list that is displayed on the Location information
screen in ProAccess SPACE.
Click Add Group to add a new group. The Enter name dialog box is displayed.
Clear the default text and type a name for the new group.
Click Ok. The group is added to the Location grouping list on the Locations/Functions
tab.
446
You can select the group and click Rename to rename it, or click Delete to delete the
group.
Click Save when you have finished adding all the required groups.
447
Item Description
Size field Defines the character size for the selected track in the
Save additional data on drop-down list
Maximum number of days field Defines the maximum number of days for which a visitor
can be granted access. The default value is 30 days but
you can amend this if required. When you check in a
visitor, the date of expiry for the visitor cannot exceed the
specified value.
Keys expired X days ago will be Defines the number of days after which expired visitor
removed automatically field keys are automatically deleted by the system. This option
only applies if expired visitors have not been deleted
manually in ProAccess SPACE. See Deleting expired
Visitors for more information.
Use anti-passback checkbox Controls whether the anti-passback function is used for
visitors. When you select this checkbox, the option is
applied to all visitors. See Enabling Anti-passback for
more information about anti-passback.
Visitors keys are cancellable Controls whether visitor keys are sent to the blacklist
through blacklist checkbox when cancelled. If you select this option, it is applied to
all visitor keys in the system. See Deleting Expired
Visitors and Managing Blacklists for more information.
You must enable the MORE_THAN_64K_USERS
parameter to activate this checkbox. See Advanced Tab
for more information.
448
Figure 431: PMS tab
449
13. 12. 1. Configuring Communication Settings
You must configure the communication settings for the PMS protocols that are used. The
settings vary depending on the specific protocol and port option selected.
450
RS232 Ports
To modify the settings for an RS232 serial port, perform the following steps:
1. Select System > General options > PMS.
Select the checkbox for the Micros-Fidelio protocol in the Protocol panel.
Click the Micros-Fidelio protocol to highlight it.
Click Modify. The Serial com. parameters dialog box is displayed.
Select the appropriate COM port from the Com. Port drop-down list.
Select the appropriate number from the Data bits drop-down list.
This value defines the number of data bits in each data character. The default option is 8
but you can select one of the other available values if required.
Select the appropriate option from the Parity drop-down list if required.
This allows you to specify the parity method used to detect data transmission errors. The
default option is None.
Select the appropriate option from the Baud rate drop-down list.
This value defines the speed at which data is transmitted.
Select the appropriate number from the Stop bits drop-down list.
This value defines the number of stop bits that are included at the end of each data
character.
Select the KA command include $2 checkbox if required.
When you select this checkbox, the UID code of guest keys is transferred to the PMS
software when the key is encoded. The default option for the code format is 7-byte ROM
Code (SALTO Format) but you can select a different option from the drop-down list if
appropriate.
Click Ok. The configuration information is displayed in the Param and Advanced
columns in the Protocol panel.
451
Click Save.
NOTE: When you use RS232 serial ports, you must use the same configuration settings
for both the SALTO and PMS software. The number of data bits and stop bits,
and the baud rate and parity type you select must be the same for both.
452
Figure 435: Serial com. parameters dialog box
5. Select the appropriate COM port from the Com. Port drop-down list.
Select the appropriate number from the Data bits drop-down list.
This value defines the number of data bits in each data character. The default option is 8
but you can select one of the other available values if required.
Select the appropriate option from the Parity drop-down list if required.
This allows you to specify the parity method used to detect data transmission errors. The
default option is None.
Select the appropriate option from the Baud rate drop-down list.
This value defines the speed at which data is transmitted.
Select the appropriate number from the Stop bits drop-down list.
This value defines the number of stop bits that are included at the end of each data
character.
Click Ok. The configuration information is displayed in the Param column in the
Protocol panel.
Click Save.
453
Figure 436: Operators tab
2. In System > Operators you will see the fields of GPF (General Purpose Fields) you
have created in the first step.
454
Figure 438: Advanced tab
The Advanced tab shows a list of available parameters. These are described in
Advanced Parameter Options. Any parameters you have enabled are displayed in the
Advanced parameters field.
Click the Add parameter button. The parameters list is displayed in the Add
parameters screen.
455
Double-click on the required parameter under the Parameters column. The Value field
‘1’ means the parameter is enabled.
You can adjust the parameter value if required. See Table 80 for more information.
Click OK.
NOTE: You can consult the SALTO RW Advanced Parameters document for more
information about advanced parameters. The Value field is Boolean data type,
having two values (usually denoted true= 1 and false= 0). In some cases, a
different value will be requires such as
DISCARD_PERSONAL_EVENTS_OLDER_THAN=7 or
AUTO_LOGOFF_TIMEOUT=120. See Table 80 for more information about the
values.
To remove an Advanced parameters from the list, highlight the parameter and click Delete
parameter. One or more parameters can be selected at a time by holding the CTRL key and
pressing Delete parameter button.
456
Advanced Parameter Description
DISCARD_PERSONAL_EVENTS_ Allows you to set system restrictions on the collection of audit
OLDER_THAN trail data. This can be done for the purposes of privacy. You
must define this value in days. There is no limit on the number
of days you can enter. For example,
DISCARD_PERSONAL_EVENTS_OLDER_THAN=7 means
that data older than seven days is not collected from the locks
or displayed in the audit trail. If you set the value to 0, the
parameter is not enabled.
DORM_KEYPAD Allows you to specify whether user keys automatically update
lock keypads with changes to the keypad code when the key is
presented to the lock. When you enable this parameter, a
Dormitory Door panel is displayed on the User information
screen in ProAccess SPACE. See Dormitory Doors for more
information.
EXIT_LEAVES_OPEN Activates the Exit leaves open mode for rooms and suites, and
adds the Exit leaves open option to the opening mode options
on the Door information screen in ProAccess SPACE. See
Opening Modes and Timed Periods for more information about
opening modes.
FAL_MULTIPLE Enables additional locker zone options that allow you to specify
whether users can access lockers within two different free
assignment zones using the same key. When you enable this
parameter, Group#1 and Group#2 options are displayed on
the Zone information screen in ProAccess SPACE. You can
select these options when the zone has been defined as a free
assignment zone. See Configuring Zones for more information.
FREE_ASSIGNMENT_LOCKER Enables the free assignment locker option, which allows users
to choose any locker within a zone (rather than a pre-assigned
locker). When you enable this parameter, an Is free
assignment locker checkbox is displayed on the Locker
information screen in ProAccess SPACE. See Creating Free
Assignment Zones and ¡Error! No se encuentra el origen de
la referencia. for more information.
INHIBIT_USER_NAME_CHANGE Activates system restrictions for user names. When this
parameter is enabled, you cannot amend a user’s name in the
Title, First name, and Last name fields on the User
information screen in ProAccess SPACE if you have assigned
them a key at any point. If you need to change a user name, for
example, you must delete the existing user and create a new
user profile for them. This ensures that the audit trail data for
users is accurate. Note that when the parameter is enabled,
you can amend a user’s name if they have never been
assigned a key.
LIMITED_USER_ACCESS Allows you to specify the number of individual users that can be
granted access to a particular door. Note that this restriction
does not apply to users in a user access level associated with
the door, or users that have access to a zone with which the
door is associated. When you enable this parameter, a Limit
user access field is displayed on the Door information screen
in ProAccess SPACE. See Door Options for more information.
457
Advanced Parameter Description
MORE_THAN_64K_USERS Allows you to specify whether user, visitor, and guest keys are
sent to the blacklist when cancelled. When this parameter is
enabled, a New key can be cancelled through blacklist
checkbox is displayed on the User information screen in
ProAccess SPACE. In addition, a Maximum expiration period
for non cancellable keys field is displayed on the User tab in
ProAccess SPACE General options > Users tab. See
Cancelling Keys for more information. A Visitors keys are
cancellable through blacklist checkbox is also displayed on
the Visitors tab in ProAccess SPACE General options. See
Visitors Tab for more information.
PROX_ANTICLONING Controls the display of proximity card data. When you enable
this parameter, data written in proximity cards is mixed with key
ROM codes.
SHOW_EXT_ID Controls the display of the Ext ID field. When you enable this
parameter, the Ext ID field is added to various screens in
ProAccess SPACE, for example, the User and Door
information screens. The Ext ID field is populated when CSV
file synchronization and database table synchronization is
performed. See Automatic CSV File Synchronization and
Automatic Database Table Synchronization for more
information.
SHOW_KEY_DETECT_MODE Allows you to define whether key detection is done in pulsed
mode (instead of continuous) for locks with IButton readers.
When you enable this parameter, an IButton key detection:
pulsed mode checkbox is displayed on the Door, Room, and
Locker information screens. See Door Options for more
information. This option is only compatible with PPDs that have
firmware version 1.02 or higher.
SHOW_ROM_CODE Controls the display of ROM codes. When you enable this
parameter, the ROM codes of user keys are displayed when
you read keys or export audit trail data. See Reading Keys and
Automatic Audit Trail Exports for more information.
SUBSUITE_OFFICE Allows hotel staff (user) keys to be used to activate Office mode
for doors in subsuites. See Opening Modes and Timed Periods
for more information about opening modes.
SUBSUITE_OFFICE_GUEST Allows guest keys to be used to activate Office mode for doors
in subsuites (if the guest has been granted access to the suite).
See Opening Modes and Timed Periods for more information
about opening modes.
SVN_TIMEOUT Defines the length of time (in milliseconds) before a CU times
out when a key is presented for updating. If the CU times out
before a response is received from the SALTO software, the
key update is not performed. The default option is 2000
milliseconds but this value can be changed. This is useful if
network communication is slow due to narrow bandwidth, for
example.
NOTE: If an advanced parameter that you require is not displayed in the Available
parameters field for any reason, you should consult with your SALTO technical
support contact. The parameters shown are linked with your SALTO product
licensing. Your licensing options may need to be updated if you do not have
access to all the required functionality. See Registering and Licensing SALTO
Software for more information.
458
13. 15. Elevators Tab
SALTO is able to interface with Elevators Dispatch System. At the time of this writing,
Schindler is the only system SALTO is compatible with (through the PORT protocol). More
will be added in the future.
This interface works in conjunction with the alarm events feature, both subject to license.
ProAccess SPACE will send to Schindler customizable information (see below) in PORT
format (Schinlder proprietary protocol).
When defining the alarm event, the TRIGGER will be a card event (the user presents its
credential to a SALTO reader), resulting in an ACTION “send PORT message” that provides
the necessary information for Schindler to determine and display in its terminal the floors that
the User or Guest has access to. When the floor is selected on the Schinlder terminal by the
User, Schinlder will display the Elevator to go to.
To setup the interface:
Define where the Schindler server is (to send the messages there):
459
As a TRIGGER, an audit trail with its corresponding filters
460
As an ACTION, select “send PORT telegram”:
Note : “telegram type”, “Terminal ID”, “Profile name” and “User number” is info that needs to
be defined by Schindler.
461
Figure 444: Thyssenkrupp Configuration
If you want to have log communications, remember to check the Log communications flag.
Once you have entered this data, you can go to System -> Elevator Groups and
introduce the number of floors and the amount of kiosks.
While configuring the kiosks we can configure the floor number for these kiosks,
which is the kiosk number for the user, the side where we have the kiosk in the
elevator and the access point used for this kiosk.
462
Figure 446: Thyssenkrupp Kiosks
Finally, you will be able to choose these floors in Access Level -> Floors.
When selecting the floors for giving access in the different access levels we will be able to
choose if we want to have access to these floors depending to different timetables or always,
and we will be able to choose the sides of these different floors (Front, Rear or Front and
rear enabled).
463
14. PERIPHERALS
This chapter contains the following sections:
About Peripherals
Encoders
ESDs
Encoders and ESDs are set up in ProAccess SPACE. See ProAccess SPACE System
Configuration for more information. These devices can be monitored by using Online
Monitoring in ProAccess SPACE Monitoring and updated by using SALTO Network in
ProAccess SPACE System.
This chapter describes the different types of peripherals available and the tasks associated
with them.
464
Table 91: Peripheral types
Peripheral Functionality
Encoder Connects to the system either by a USB or serial connection, or by
an Ethernet connection. The Local IO Bridge allows USB encoders
to be used with ProAccess SPACE. See Local IO Bridge for more
information.
Encoders are used to:
Read the information encoded on a key (user name, issuing
date, expiry date, available memory, etc.)
Allow the issuing and encoding of a key, assign access to a
user, and edit the user card with up-to-date access data
Delete all the information stored on a key, allowing the key to
be reused
Allow the updating of a key with new data and permissions
ESD Reduces energy consumption by controlling the activation of
electrical equipment in a room or an area.
ESDs are used to:
Activate electrical equipment in a room (lights, sockets, etc.)
Indicate real-time presence of guests or staff in a room (online
ESDs) in a hotel site. You can view whether or not a room is
currently occupied by selecting Hotel > Room status and
clicking Show ESD.
14. 2. Encoders
Encoders are used to read keys, and encode keys with access permission data. They are
connected to the system either by a USB or serial connection, or by an Ethernet connection.
You can add Ethernet encoders to the system by using the SALTO Network screen. See
Adding Ethernet Encoders for more information.
You must specify how encoders connect to the system on the Settings screen in ProAccess
SPACE. See Encoder Settings for more information. Note that you must address Ethernet
encoders by using the SALTO Network screen in ProAccess SPACE before you select
them on the Settings screen in ProAccess SPACE. See SALTO Network for more
information.
NOTE: This software option can be used with EH, E7000, E8000 (Legic), and E9000
technology.
To update the firmware of an encoder, perform the following steps:
1. Click admin (or other appropriate operator login) on the top right-hand side of the home
screen. The Settings screen is displayed.
465
2. Click Show Firmware in the Encoder Settings panel. The Show firmware dialog box,
showing the available firmware files, is displayed.
The Show Firmware button is located on the right-hand side of the Local option. See
Encoder Settings for more information about encoder settings.
Select the required file.
Click Update. The Update encoder progress screen is displayed.
Wait for the update to complete. A pop-up is displayed confirming that the operation was
completed successfully.
Click OK.
14. 3. ESDs
ESDs are used to control the activation of electrical equipment in a room or area. They can
be used in both hotel and non-hotel sites. However, the process for enabling and setting up
ESDs on the system is different for both. The procedures for giving hotel guests and users
access to ESDs also vary. See Associated Device Lists, Checking ESD Status, and
Configuring Associated Devices for more information about using ESDs in hotel sites. See
Energy Saving Devices for more information about using ESDs in non-hotel sites.
466
15. GLOSSARY
The following terms and acronyms are used throughout this manual.
467
Term Definition
CU5000 A specific SALTO control unit model
Data-on-card A term used to describe the saving of access permissions to a key
(card) rather than a lock. Changes to a user’s access permissions are
retrieved from the SALTO system and written to a key through the
SVN.
DHCP Dynamic Host Configuration Protocol
Door A door within the SALTO system that has controlled access. Doors
can be either online or offline.
DST Daylight Saving Time
Encoder A peripheral that reads and updates keys with access information.
Encoders can be enabled for USB or Ethernet.
ESD Energy Saving Device – a peripheral mounted on the wall at an
access point. It is used to activate the electrical devices in a room or
area. The electrical devices only work if a valid SALTO key is inserted
into the ESD. These are commonly used in hotels but can also be
used in non-hotel sites.
Free assignment zone An area where users are free to choose any locker. They do not have
pre-assigned individual lockers.
Function A category of permissions within a SALTO location that can be
associated with users, for example, a maintenance function for
electricians
Guest A person who is given a key to allow access for the duration of their
stay at a hotel
Guest profile A system entry for guests that is automatically generated when a
room or suite is created
Hotel interface A subset of the overall ProAccess SPACE interface. It contains menu
options, quick-access tiles, and screens specific to hotel sites. These
options are related to guest activities such as check-in and check-out,
and cancellation of guest keys.
Key A carrier that controls access to an area, building, and/or site asset
(for example, a cupboard or locker). Keys come in a wide variety of
formats, including, bracelets, fobs, and keycards.
Limited occupancy Defines specific limited access areas. For example, if a parking area
contains 20 spaces, the system counts how many valid users have
accessed the area. When 20 users have occupied a space, the next
user will be denied access, even if they have a valid key.
Local IO Bridge A Windows service that allows USB devices (like encoders or PPDs)
to be used with ProAccess SPACE
Location A large area of designated access points in the SALTO system, for
example, all of the access points in the headquarters or regional
offices of an organization
Lock An electronic locking device. The lock can be mechanical, electrical,
or magnetic. Data can be transferred to the lock by a key or a PPD.
Lockdown area A defined area where all access points can be closed or opened in an
emergency situation
Locker A generic term used to describe lockers, cupboards, display cabinets,
boxes, or cases fitted with an electronic device that controls the lock
MAC address Media access control address
MAD Mifare Application Directory
NFC Near Field Communication
468
Term Definition
Opening mode Defines the working mode of a door, for example, Standard or Office
opening mode
Opening time Defines how long a door stays open after it is unlocked
Operator A person who uses the ProAccess SPACE applications to control
access within their site. The system has one default operator: admin.
Different operators access different features, for example, when an
admin operator logs in to ProAccess SPACE, they have full access to
all of the menus and functionality. However, other types of operators,
such as hotel front-desk staff, can have access only to a subset of
menus and functionality, depending on the permissions set by the
admin operator.
OTA Over the Air
Output A type of electrical permission or authorization used to activate relays
for CUs or ESDs
Partition Items within the system that are grouped together for ease of
management. Partitions allow admin operators to separate a SALTO
network into different ‘parts’ that are then individually managed by
other operators.
Peripheral An external hardware device such as an encoder or PPD that is used
to perform routine system management tasks. This term can also
refer to a device such as an ESD which is mounted on a wall and
used to activate the electrical devices in a room or an area.
PMS Property Management System
PPD Portable Programming Device – a portable electronic device that can
be physically connected to a lock. This device communicates
information such as door identification and configuration details to the
lock. It is used to initialize locks and update offline doors, as well as
other maintenance tasks.
Re-rooming Defines scenarios where the hotel operator assigns a different room
to a guest. In the SALTO system, the guest does not have to go to
the front desk to do this. The new information can be conveyed to the
doors in two ways:
Manual: The guest updates their key on an SVN wall reader.
Online: The updated data is sent automatically to the new room
door.
RF doors Online doors within the SALTO network that are updated using radio
frequency technology
RFID Radio-frequency identification
Roll-call area A list of how many and which users are in a specified area at a
particular time
Room A room assigned to one or more guests in a hotel site
ProAccess SPACE A desktop application that is used to set up communication between
Configurator the various components of the SALTO system. It is also used to start
and stop the SALTO Service.
SALTO reader A device that can read keys, for example, a wall reader or an encoder
SAM SALTO Authorization Media
Scheduled job A system task such as an audit trail purge that is set up to be
performed automatically
SHIP SALTO Host Interface Protocol
Suite A series of rooms containing one or more rooms with individual
entrance doors from the outside and a connecting door between
469
Term Definition
SVN SALTO Virtual Network – a technology that enables keys to be
updated with the most current access data and permissions through
the use of wall readers and CUs. These devices facilitate the
communication of data between the various components of the
SALTO system by transferring access data to keys and uploading
information such as audit trail data from the keys back to the system.
System auditor A chronological list of all system operator events
Thumbturn A part of the lock that is used to unlock a device mechanically. It is
designed to be turned by the thumb and finger.
UDP User Datagram Protocol
UID Unique Identifier
User A member of staff in an organization who has a valid key
Visitor A person requiring temporary access to a site for a specified time
period, for example, to do site maintenance
Wall reader An electronic device mounted on a wall that is connected directly to a
CU. Wall readers are used to control access to a site’s access points,
for example, doors. They can also be configured to operate as
updaters. In this case, they are termed SVN wall readers. When a
user presents their key to an SVN wall reader, the latest up-to-date
access information is automatically transferred to the key and the
data on their key is transferred back to the system.
Zones A specified group of doors or lockers that are grouped together to
make them easier to manage in the system. For example, a zone
could be the doors on the first floor, all the locker doors in the gym
area, or all the doors in the financial services area.
470