Overview
Introduiction
SecurOS Access Control System (ACS) is designed to ensure the security of tenants, monitor and control employee access to premices or resources. It regulates the entry of visitors and vehicles to the protected areas.
It may use various forms of verification, such as cards, , biometric scanners, face recognition modules to grant or deny access.
ACS includes the following functional groups:
- Hardware
- Database
- System Configuration
- Alarms Configuration
- System Settings
- Cardholders Profiles
- Maps
- Notifications
- Reports
Let’s take a brief look.
Hardware
This is a group of physical components including:
- Tenants
- Device Gateways
- Controllers
- Card formats (associated with controllers)
- Inputs and Outputs
- Card Readers
- Doors, Elevators, Floors,
Database
There are three database schemas engaged in the operations:
- ACS system DB, storing all physical and logical units configuration and current status
- Notification DB, receiving all events data
- Master DB, maintaining customer-specific information
Database operations:
- backup
- restore
- cardholders export
- cardholders import
System Configuration
Defines settings, parameters, permissions and access rules
Access rules determine who can access what, when, and how.
Configuration section include:
- Holidays
- Time Periods
- Access Levels
- Device Groups
- Agents
- Agent levels
- Current Threat levels
- Threat Levels Settings
- Alarm Cards
- Event triggers
Alarms Configuration
The ACS provides alarms monitoring and acknowledgement:
- Alarm definitions
- Routing templates
- Acknowledgements Templates
- Acknowlegment comments
- Alarm messages
Settings
Settings are necessary to configure the operations:
- System settings (customer name, session timeout, time zone)
- SMTP settings
- Operator settings (GUI language)
- Notification archiving (parameters and schedule)
- Badging (upload and update templates)
- Product License
Cardholders
Each cardholder profile is stored in the database and includes the folowing entries:
- Name
- Personal information
- Photo
- Access cards attributes (up to 3 cards total)
- Attachment documents list
- Associated visitors list
Maps
Maps help to monitor the status of controllers, doors, floors, cameras and other equipment in real time. It allows operators to visually monitor and manage security by providing a top-down view of components disposition and their current status.
This section includes:
- Device map
- Active agents
- Floor maps
- Visitor map
Notifications
- Notification view is designed to filter events by certain criteria
- Notification archiving assists in events backup according to a certain schedule.
Reports
Reports Infrastructure supports running and maintaining reports. New report templates may be added if necessary.