We Service Existing Equipment
We Service Existing Equipment
The touch App is proprietary to the ProdataKey platform. It is available for both Apple and Android smart devices and is used with the touch io reader and other reader devices to maintain a high level of security as well as convenience.
With touch App, you can use your smart device to remotely access and open (unlock) any door you have been granted access to anywhere an internet connection is available.
As an example, an employee, from the convenience of their office or wherever they may be, can use the touch App to open their building’s front door for a visitor. Or, from your gated community, you can grant access to the pizza delivery man through the security gate for delivery to your house, without having to leave your home.
The touch App can be used by anyone who has been granted credentialed access to reader devices. All door operations handled by the user’s touch App are conditioned upon their access permissions defined by the administrator.
NOTE: The touch App requires a data/internet connection with your mobile provider.
Providing and granting access rights and rules for multiple users in a Group can be done far easier and faster than it would be to provide those same rules and access rights for multiple users one person at a time. The difference is that it eliminates the time-consuming process of adding, changing, and removing access rights individually for each person, making the process for Groups much simpler.
A user can be assigned to a group or to multiple groups. If any group(s) have been previously assigned to the user, they are displayed in this Groups list. If no groups have been assigned to the person, it can be done here.
These are the people in your organization that have been invited to this account and can be added to rules or groups or whatever is required.
The People icon in the Cloud Node Appliances home screen is used to add new users (those who will be using and/or configuring door and elevator access control devices) as well as to view and edit existing users.
The People icon is accessed and managed from the Cloud Node’s home screen. People are users who will be using the system based on their assigned role and the permissions granted to them for access control.
To manage credentials and their users, select People from the main dashboard. Select the + icon to add a new person. Enter the user's first and last name and select ADD.
Use the default SINGLE tab in the Add Person screen to add new people one at a time.
Enter the First Name and Last Name of the person being added. Click ADD.
When new users are added, the Person screen is displayed.
The First Name and Last Name of the user is shown in this Person screen.
In the People screen, hover the cursor over the user to be deleted and click the trash icon. Once a person is deleted from the system, their information is unrecoverable.
NOTE: Assigning a person to a blank group is an easy way to revoke access without deleting their information from the system. Adding them back into a group will instantly restore their access rights.
Click RECENT AUDIT LOGS (in the top right of the Person screen) to view the Recent Audit Logs screen. The audit log screen provides an account of changes and shows system activity from controller events, commands, additions, and modifications to access control devices, the device names, and the names of persons who caused those events and changes.
NOTE: This Recent Audit Logs list only shows the ten most recent events. If desired, the Reports feature can be used to view all logged events and modifications for a specific time period, by device name, user names, etc.
ALL - Shows all of the ten most recent commands and filtered results that have occurred for the available devices.
MODIFICATION - Shows the ten most recent modifications made to doors and elevators by device name, rules and groups used, and the names of those making changes.
By clicking on each of the column headings (Occurred, Info Text, Event, and Result), an edit field opens that enables entering search text on which to filter and refine the contents of the listed column topic. This can be useful when there is a specifically desired list of audit log items needed for a particular date and time, specific text content, a particular event, or a result.
Click on the column heading and enter the text to search on within that column.
Date and time when the event occurred in the form: YYYY-MM-DD HH:MM:SS (Year, Month, Day, Hour, Minutes, Seconds)
Information on the person / device / input that was affected by the addition / modification.
A brief description of the added or modified event that occurred. (For example: Entity Modified or Entity Added)
The result, if any, of the event.
To the far right of each log entry is the DETAILS link. Clicking the DETAILS link displays a Log Entry Details informational window showing the Card Number / Group Name / Person Name.
Click REFRESH to update and display the most recent Audit Log additions / changes / updates.
Use the IMPORT tab in the Add Person screen to import a list of people and cards through the use of a CSV file. If a list of users exists from another application in the form of a CSV file, multiple users can be imported (for a maximum of 1000 records), eliminating the need to add each person individually, one at a time.
NOTE: Importing is most effective when adding a large batch of people and cards at one time. Listing an existing group in the Group column of the CSV spreadsheet file adds the person to the group. Entering a group that does not yet exist will create that group as a new group and adds each of the persons to that group.
Populate the spreadsheet file with a list of people and cards to be imported into the system. Save the spreadsheet file as a .csv file.
NOTE: Be sure any duplicate first and last names and card numbers in the CSV file are eliminated. Duplicate names and card numbers are not imported. Legitimate duplicate names need to be added manually.
With the .csv file name and location information, click SELECT CSV to browse to the file’s location and import the file in the following format.
NOTE: The header information in row 1 (First Name, Last Name, Cards, Groups, Email, Touch, and Token) MUST be included in the file, otherwise the file import will give an error and the information will not import.
Click Open to import the file.
Click ADD in the IMPORT tab of the Add Person screen to accept and begin the import process.
The Partition field only appears if a partition or partitions have been created previously. If this person being added is to be assigned to a partition, click inside this Partition field or on the down arrow to select a listed partition. (See Partitions for additional information.)
NOTE: A Default partition exists but the Partition field does not appear until after an initial partition is created.
Click RECENT AUDIT LOGS (in the top right of the Person screen) to view the Recent Audit Logs screen. The audit log screen provides an account of changes and shows system activity from controller events, commands, additions, and modifications to access control devices, the device names, and the names of persons who caused those events and changes.
NOTE: This Recent Audit Logs list only shows the ten most recent events. If desired, the Reports feature can be used to view all logged events and modifications for a specific time period, by device name, user names, etc.
American Veterans Security, LLC
4420 SW 110th ave Beaverton, OR 97005
Copyright © 1998 American Veterans Security, LLC - All Rights Reserved.
Powered by Veterans