*iProtect™ Workstation

This manual represents the knowledge at the above-mentioned time. TKH security works non-stop to improve her products. For the most recent technical information please contact your consultant or dealer.

1. Introduction

This document explains how you can implement a “Workstation” and how the settings and functions work.

2. Support and license

Below is an overview of support for both the hardware and the software, including the necessary license:

Version

License

Version

License

= > 10.3.15

iProtect basic license

3. How does it work

With a workstation we can link certain hardware components to the client PC. Its also possible to enforce system users rights or grant additional rights to a system user.

4. Implementation

This chapter explains how the setup can be made in iProtect.

4.1.1 Setup workstation

In iProtect browse to menu: Installation | Settings | Workstation | Workstation settings.

  • Right mouse click in the treeview dialogue and click Add workstation.

5. Workstation details

This chapter explains the settings on the workstation details page, the page will be shown when the workstation is selected in the treeview.

Workstation details

Workstation details

Label

Description

Comment

Name check: identical coockie

Checkbox to save these settings to the cookie on this client pc.

True / False

Name

Equal to the IP address of the workstation

 

Store as cookie

Store the name setting {IP address} to the cookie on this client pc.

Only when checkbox is true by Name check: identical coockie

Coockie

Stored name

The set name {IP address}on this client pc.

 

Remove as cookie

Remove the stored cookie from the client pc.

Button

Login restriction

Reader

This setting is only to create a relation for iProtect Trails functionality, it has no function in iProtect

 

Area

If the area is set, the system user must be present in the set area to be able to login.

When someone tries to login while the card of the system user is not in the set area, an event will be generated with an error description "User is not present in verify area with card”.

Authorization

Authorization rights handling

extra authorization rights user defaults

 

extra authorization rights workstation defaults

 

replaces authorization rights workstation defaults

 

Authorization user group

 

 

Workstation settings:

This chapter descripted the workstation settings, the settings are displayed when the plus sign is pressed for the workstation.

Treeview

Description

Comment

Card enrollment

Card enrollment: reader name

Select the enrollment reader that belongs to this workstation. The enrollment function must be enabled by the reader itself before the reader is visible in the list.

 

Card enrollment: timer interval (msec)

Enrollment interval time in milliseconds.

 

Card replacement, alarm action

End date option

Free selection

The operator has the option to give a custom end date to the replacement card.

From replaced key:

The end date of the replaced card will be taken.

Today:

The replacement card will have today's end date.

Intercom

Intercom station

Select the intercom station that will be connected to the workstation.

 

Default return to master station

active

 

inactive

 

Autoselect time out (msec)

 

 

Logging

Log request to console

 

True / False

Offline reader

Offline reader: Card programmer option

Local

Select the programmer that will be connected to the workstation.

Not local

Select the programmer that will be connected to the workstation.

None

 

Offline reader: Not local programmer

 

Select the programmer that will be connected to the workstation.

Offline reader: Local programmer

Salto Server

Select the programmer that will be connected to the workstation.

SimonsVoss

Select the programmer that will be connected to the workstation.

Printer

System printer

Printer for e.g. printing a precense report

 

Custom printer

Printer for e.g. Keybadge

 

Show keybadge print button

 

True / False

 

 

 

 

Related pages