Ipassan Manager User Guide: 1 Summary
Ipassan Manager User Guide: 1 Summary
Ipassan Manager User Guide: 1 Summary
1 Summary
iPassan Manager user guide.................................................................................................................... 1
1 First start of the software ................................................................................................................ 6
1.1 Login ................................................................................................................................................ 6
2 Site wizard ....................................................................................................................................... 7
2.1 Site property .................................................................................................................................... 7
2.2 Features ........................................................................................................................................... 9
2.3 Network ......................................................................................................................................... 11
2.4 Architecture ................................................................................................................................... 12
2.5 Controllers ..................................................................................................................................... 15
2.6 Doors ............................................................................................................................................. 15
2.7 Door stations ................................................................................................................................. 16
2.7.1 2Voice integration through interface .................................................................................... 16
2.7.2 2Voice integration through 2Smart panels ........................................................................... 18
2.7.3 Setting.................................................................................................................................... 19
2.8 Lift .................................................................................................................................................. 20
2.8.1 Low level integration ............................................................................................................. 20
2.8.2 Kone COP (car operating panel) ............................................................................................ 21
2.8.3 Kone DOP (destination operating panel)............................................................................... 21
2.9 Zones ............................................................................................................................................. 23
2.10 Access profiles ............................................................................................................................... 24
2.11 Keys ............................................................................................................................................... 24
2.12 Read / encode ............................................................................................................................... 25
3 Settings & parameters ................................................................................................................... 26
3.1 Companies ..................................................................................................................................... 27
3.1.1 Activation of the feature ....................................................................................................... 27
3.1.2 Create companies .................................................................................................................. 28
3.1.3 Assign companies to hardware ............................................................................................. 28
3.1.4 Assign companies to access profiles...................................................................................... 29
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
1
3.1.5 Operator group...................................................................................................................... 30
3.1.6 Creation of operator(s) .......................................................................................................... 31
3.1.7 Multi companies & Monitoring ............................................................................................. 31
3.2 Network ......................................................................................................................................... 32
3.3 Controllers ..................................................................................................................................... 32
3.3.1 Basic settings ......................................................................................................................... 33
3.3.2 Activation card....................................................................................................................... 34
3.3.3 How to check the availability of extra features in the controller? ........................................ 36
3.4 Doors ............................................................................................................................................. 36
3.5 Readers .......................................................................................................................................... 38
3.5.1 Standard settings: .................................................................................................................. 38
3.5.2 RS485 reader ......................................................................................................................... 39
3.5.3 ANPR reader type ................................................................................................................. 39
3.5.4 Wireless reader : Aperio ........................................................................................................ 43
3.5.5 Reader custom behavior ....................................................................................................... 45
3.6 Lift .................................................................................................................................................. 47
3.6.3 Basic settings ......................................................................................................................... 47
3.6.4 Kone Cop lift .......................................................................................................................... 48
3.6.5 Kone DOP lifts ........................................................................................................................ 51
3.7 I/O expander.................................................................................................................................. 55
3.8 Input .............................................................................................................................................. 55
3.8.3 Input option adjustment ....................................................................................................... 56
3.9 Outputs .......................................................................................................................................... 57
3.10 Apb / counting zones..................................................................................................................... 57
3.10.3 Create a counting zone.......................................................................................................... 58
3.10.4 Apb ........................................................................................................................................ 61
3.11 Time profile & maintenance / holiday time .................................................................................. 61
3.11.3 Time profile ........................................................................................................................... 62
3.11.4 Time profile for relays (door, output, floor) .......................................................................... 62
3.11.5 Time profile for readers......................................................................................................... 63
3.11.6 Key time profile ..................................................................................................................... 64
3.11.7 Door phone time profile ........................................................................................................ 64
3.11.8 Process time profile ............................................................................................................... 65
3.11.9 Time profile importation ....................................................................................................... 65
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
2
3.11.10 Holiday period / maintenance period ............................................................................... 66
3.12 Video integration ........................................................................................................................... 67
3.12.3 Overview................................................................................................................................ 67
3.12.4 Synoptic ................................................................................................................................. 67
3.12.5 Settings .................................................................................................................................. 68
3.13 Emergency action .......................................................................................................................... 68
4 Users & access profiles .................................................................................................................. 68
4.5 Door access profile ........................................................................................................................ 68
4.6 Lift access profile ........................................................................................................................... 71
4.6.3 Kone Dop ............................................................................................................................... 71
4.7 Copy an access profile ................................................................................................................... 72
4.8 Sub access profile .......................................................................................................................... 72
4.9 Individual access ............................................................................................................................ 72
4.10 Users & Credentials ....................................................................................................................... 73
4.10.3 Users ...................................................................................................................................... 74
4.10.4 Credentials............................................................................................................................. 74
4.11 Automatic creation of users & credentials.................................................................................... 75
4.12 Excel Importation .......................................................................................................................... 76
4.13 Importation through the encoder ................................................................................................. 78
4.14 Importation through the events.................................................................................................... 78
5 Supervision .................................................................................................................................... 79
5.5.3 Events .................................................................................................................................... 80
5.5.4 Network status ...................................................................................................................... 81
5.5.5 Manual commands ................................................................................................................ 81
5.5.6 Report .................................................................................................................................... 81
5.5.7 People on zone ...................................................................................................................... 83
6 Booking management (V3) ............................................................................................................ 83
6.5 Overview........................................................................................................................................ 83
6.6 Booking Asset management .......................................................................................................... 83
6.7 Create asset(s) ............................................................................................................................... 84
6.7.3 General asset definition and settings .................................................................................... 86
6.7.4 Advanced settings ................................................................................................................. 87
6.7.5 Actions ................................................................................................................................... 89
6.7.6 Instruction ............................................................................................................................. 90
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
3
6.8 Add user(s)..................................................................................................................................... 90
6.9 Add a booking request .................................................................................................................. 91
6.9.3 Booking request from software operator interface .............................................................. 92
6.9.4 See all booking requests (past and upcoming)...................................................................... 96
6.9.5 Check and confirm booking requests (all assets) .................................................................. 97
6.9.6 Purge old booking and visitors .............................................................................................. 97
6.9.7 Booking request from user interface : resident portal.......................................................... 98
7 Resident portal .............................................................................................................................. 99
7.5 Create a user account.................................................................................................................. 100
8 Visitor management .................................................................................................................... 102
8.5 Activation of the visitor management......................................................................................... 102
8.6 Create visitor access profiles ....................................................................................................... 103
8.7 Creation of visits .......................................................................................................................... 103
8.8 Add a visit .................................................................................................................................... 104
8.9 Create an instant visit .................................................................................................................. 105
8.10 Management of the credential validity ....................................................................................... 105
8.10.3 Manual management .......................................................................................................... 106
8.10.4 Automatic management...................................................................................................... 106
9 Advanced programing ................................................................................................................. 106
9.5 Custom fields ............................................................................................................................... 106
9.6 Tool for automatic modification.................................................................................................. 110
9.6.3 Modify the IP address of the controllers ............................................................................. 110
9.6.4 Modify the information of the controllers .......................................................................... 111
9.6.5 Modify the inputs ................................................................................................................ 111
9.6.6 Modify the outputs.............................................................................................................. 112
9.7 Tools for automatic creation of users / credentials .................................................................... 113
9.8 Reflexes ....................................................................................................................................... 114
9.9 Message....................................................................................................................................... 116
10 Tools ............................................................................................................................................ 116
10.5 Export site(s) to Files (back up) ................................................................................................... 117
10.6 Import site(s) from file (restore) ................................................................................................. 117
10.7 Configuration backup .................................................................................................................. 118
10.8 Configuration restoration ............................................................................................................ 118
10.9 Automatic tasks ........................................................................................................................... 118
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
4
10.10 Hardware upgrade................................................................................................................... 119
10.10.3 Upgrade the firmware of the controller .......................................................................... 119
10.10.4 Upgrade the firmware of the RS485 I/O expanders ........................................................ 120
10.10.5 Update the reader firmware ........................................................................................... 121
10.11 Controller detection ................................................................................................................ 121
10.12 Set the email server ................................................................................................................. 122
11 Access software ........................................................................................................................... 122
11.5 Add or modify an operator profile .............................................................................................. 123
11.6 Add, modify an operator ............................................................................................................. 123
11.7 Logs .............................................................................................................................................. 124
12 Integration ................................................................................................................................... 124
12.5 Special users ................................................................................................................................ 125
12.5.3 Add a special user ................................................................................................................ 125
12.5.4 Access to the database ........................................................................................................ 125
12.5.5 Event view ........................................................................................................................... 127
12.5.6 SQL insertion or modification .............................................................................................. 130
12.6 Onvif API ...................................................................................................................................... 130
12.6.3 What is Onvif? ..................................................................................................................... 130
12.6.4 Network discovery / WS_Discovery .................................................................................... 130
12.6.5 Authentication ..................................................................................................................... 131
12.6.6 Add functions ...................................................................................................................... 131
12.6.7 Testing tools ........................................................................................................................ 133
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
5
1 First start of the software
The software is web based. Once it is install, you only need a web browser. A shortcut is available
through the icon in the task bar (bottom right).
A left click on the shortcut opens the menus. Select launch interface.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
6
2 Site wizard
Click on Create a site push button from the main window. A site wizard guides you step by step.
Important : all the feature of the system are note included in the site wizard. It has been designed to be
easy and doesn’t manage all the features.
It could be necessary after creating the site through the wizard to manage advanced features in Settings
and parameters (see chapter )
Transfer mode
Note, in the optimized mode, only the relevant data are transferred to the controllers. For example, the
names of the door, access profiles, users don’t need to be sent to the controllers to manage the access.
The controllers must know the key serial number, door and floor access profiles.
In this mode, the transfer delays are shorter but in case the computer is stollen or damage without
backup, it will be possible to rebuild the site on a new computer with the minimum data (keys doors,
access profiles etc without name)
In the reconstruction mode, all data are sent to the controllers even if the name of the key, for example,
isn’t required to provide access to the key.
But in this mode, it will be possible to rebuild the full data from the controllers to the server in case this
is necessary.
The transfer delays are longer, especially when the communication between controllers is rs485.
In Ipassan.com, the default choice is Optimised as the backup is managed by FDI Matelec (every night,
Europe time)
In local installation of Ipassan manager, the default choice is Optimised in case the operator doesn’t
manage regular back up of a memory stick for example.
Transfer option
Check the transfer date : the controllers save the time and date of the latest server modification. The
server also manages this information.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
8
When the box is ticked, the server always compares both time and date and if they don’t match, it offers
the possibility to force an update of the selected controller or to rebuild the site.
This depends of which side (computer or controller) owns the latest data.
UTF 8 protocol : This option is only relevant when using 2Smart panels. This authorizes to send to the
controller and the 2Smart panel special characters as Æ, Ø, å, æ, ø for example.
Without this option, those special characters aren’t managed.
Enable / disable type of credential
Ipassan manages many types of credential. It could be different generations of FDI keys 125Khz,
13.56Mhz Mifare or Mifare+. Ipassan manages also access codes, car plate number or BLE access for
example. When wiegand readers are used, those credential types could be only decimal or
hexadecimal.
Plate number : With integrated camera or OCR (optical character recognition), Ipassan manages the
access of the cars and users through the plate number.
In this case, it isn’t a wiegand conversion. The plate number is read and sent to the controller with full
letters and digits. If the car isn’t authorized, the events report “AG891CX” / access denied / out of
validity for example.
In March 2020, two integrations are managed
- ITC237 Dahua camera for Australian market (European firmware of the camera not compatible)
- Innova OCR software (installed on a computer or built in in an Axis camera)
BLE : since the 1.07 ipassan manager release (and fv1071 firmware for the controller), Ipassan manage
BLE access through IOS or android mobile.
The mobiles are used as prox or remote keys depend of number of credits.
This management requires an account on the partner.fdimatelec.com portal where the credits for those
virtual credentials are delivered.
2.2 Features
In the second step, features needed for this site have to be ticked. The software is designed to be easy
to use but offers advanced features.
When the manager doesn’t need counting zone, lift management or just door contacts, the software will
not display those settings.
if later, door contacts are used, it’s possible to tick the box and discover the tab in the door menu.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
9
Detail :
Use site architecture (see chapter Notion of architecture :)
Use door switches
The door contacts (or door switches) are built in the controller. A door contact is used to detect a
door left open, a forced door, etc
Use zones
The zones allow the counting and / or the anti pass back features. On Ipassan system, it is possible
to count globally, by access profile, by user, by company.
Use integrate door phone system
Ipassan manages two types of integration.
Integration of 2Smart door station (2Voice panels by FDI Matelec)
integration of 2Voice bus through a 2Voice interface. In this second option, the call modules are
from Urmet Italy
Use reflexes
A reflex is a link between a condition and a process. For instance, a relay is activated when a door
is forced until a valid key is present to a specific reader.
Use lift
This option authorises the lift management (up to 110 floors per lift car).
Note, when the lift feature is ticked, the architecture feature is automatically ticked because the
lift management requires it. (see chapter Notion of architecture :)
Companies management
The software is designed to manage operators which cannot see the doors, access profiles, keys
or events of other operators.
Different companies use the same building for example, the administrator of Ipassan site see and
manage all settings and all keys, access profiles, etc but the operator of the company A see only
what he is authorized to. Operator of the company B, see his door, keys, events.
When this building owns a common door or lift, each operator see this door.
The multi companies feature is useful for business and commercial buildings but could be used
also for residential jobs where there are, for example, a property manager for some floors + social
housing for some other floors. It could be a car park used by different manager, etc
Advanced management of the remote
The system manages 4 push button remotes. In standard mode, we choose for each door one or
several push button. With the advanced mode, this choice is made for each user.
For example, all users will open an entrance barrier with the first push button and an exit barrier
with the second push button.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
10
In the advanced mode, a user 1 uses push button 1 and 2, but user 2 uses push buttons 1 and 4
for the same doors.
Emergency mode
This feature is used with fire alarm system. All time an input is activated, all time the selected
door(s) are forced open.
Site code / facility codes
This option is usefull when a site requires a particular code per block for example
Facility, booking management
Ipassan manager offers the possibility to manage assets or facilities in the site. Those assets are
created in the software so the operators are able to book those assets for themselves, residents
or visitors.
An example of asset is a tennis court, a meeting room or a car park for visitors.
CCTV
Ipassan manager is compatible with the Rtsp (real time streaming protocol). Some cameras are
linked in the software to doors, inputs, outputs, etc so the streaming is displayed in live when an
event occurs on the linked door, input, etc,
The main benefit is the playback as the software is able to display the video just by clicking on the
event when a door has been forced for example.
This is possible because the time & date of both controllers and NVR are synchronised by the
same ntp (network time protocol) server. So when the door is forced at 5h01:02, the computer is
asking to right NVR, right camera the streaming beginning at 5h00:32 to 5h01:32 (This is settable)
Resident portal
this option is linked to the facilities booking as it is an extra option. Through a light Ipassan portal,
the residents have access to the booking of the tennis court for example. They could book a car
spot for their visitors.
This resident portal (http://residents-portal.ipassan.com/?login) is designed to be used on a 7’’
screen, it could be their door phone monitors.
People group management
The software manages three different views.
Classic => Users and keys are sorted by access profiles
Architecture => Users and keys are sorted by blocks, floors and appartments
Group of keys => keys are sorted by groups. A group could be a department of a company.
Note, all three options could be used in the same time.
Personal extra access management
With this box ticked, the operator directly adds door(s) to a user. It isn’t compulsory to create
specific access profiles.
BLE
This option gives the possibility to link the Ipassan site to the partner account so to provide to
users virtual credentials.
The users download K-app from Apple or Android store then receive their authorisations through
a notifications.
The building manager manages the mobile access through their phone numbers.
2.3 Network
The software is multi network. Those networks could be TCP/Ip, RS485 or mixt of both.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
11
What is an Ip network ?
A tcp/ip network contains up to 64 controllers which are communicating together.
When a site requires more than 64 controllers, a second network has to be created.
from a software point of view, several network could be managed.
What is a Rs485 network ?
A RS485 network authorizes 32 controllers on 1km. The first controller of the network communicates with
the server through Ip or Usb.
What is a mixt network ?
It is a network which contain Ip and rs485 network.
Important, starting from the server, the network could only be Tcp/ip then Rs485. After a rs485 bus, it’s
not possible to becomes again a tcp/ip network.
An example of a mixt network is a tcp/ip network between buildings and some rs485 network from the
basement of each building to the tops for the lift controllers.
Enter the number of network and the number of controllers per network then click on Next or click on
magnifying glass if the server is already connected to the controllers.
In this case, the server searches on the network (or usb plug) the controller.
This option is helpful because it discovers the controllers, the option cards and the expanders.
2.4 Architecture
Notion of architecture :
The software is able to manage buildings, floors, apartments or offices. This notion of architecture is
useful, later in the management, to sort devices or users per building, floor, etc
This architecture is optional when the system manages only door access control but is required when lifts
access control is used.
This explain why, when you ticked lift management in features, Use architecture is also ticked.
One benefit of this system is the user friendly side. The operator easily finds the users, keys, etc in the
software rather than searching in a long list of keys.
The second benefit is the keys are authorized to floors. If a building has 4 lifts, when the operator
authorizes the user to a floors, it does in the same time for the 4 lifts.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
12
Use :
The first view bellow shows a sort by access profile.
The second one shows a sort by architecture.
Both views are available at any time. An icon on top of the treeview (left frame) is designed to switch
from one view to the second one.
Example, a site contains three buildings. The B one has 7 floors and this 7nd floor has 4 apartments 71
to 74.
Apart 71 Apart 72
Detail of
floor 7
Apart 74 Apart 73
Floor 7
Floor 6
Floor 5
Floor 4
Floor 3
Floor 2
Floor 1
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
13
View by architecture
In this view, users and their keys are sort by building, floor, apartment.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
14
In the architecture tab, enter the number of main entrance. Those entrances are doors or barriers outside
of the buildings. Doors inside the buildings are settable in a newt step.
This option is not compulsory but is useful is later, you want to sort doors by building, parking, area, etc
The number of building is required as soon as lift management is used in the software. When operator
gives access to a user for block B floor 5, the software translates to a list of relays even if several lifts are
available for this floor.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
15
2.5 Controllers
At this step, enter the number of controllers and the options / expanders they manage.
The number of door and/or lift per controller has also to be entered.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
16
Extra settings :
- If architecture is used on this site, select the location through the pen.
- Entre a different door delay if needed (5 secs by default)
- Eventually, select a door time profile. A door time has three behavior
o Free access, the door is unlock
o Forbidden, no access even if a valid card is presented to the reader
o Normal, a valid card has to be present to open the door
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
17
Interface
A) How it works ?
Call modules and apartments are created in the “Ipassan Manager” software. The configuration must
match the installation wiring layout.
When a visitor calls a resident from an Urmet call module, the 2Voice interface sends the number to the
controller as well as the type of call module and the handset number together with the type of event (call
in progress, Push button 1 pressed, door open, etc).
Ipassan displays in the event list the right apartment name as entered in the software.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
18
In second option, the lock push button of the handsets is set to open a door of the same controller, so
when the 2Voice interface sends the event “push button 0” to the controller, the right relay of Ipassan is
activated.
In this case, the door is wired on the controller, not on the call module.
In third option, lift and floor are set for each apartment so when the resident opens the door for the
visitor, Ipassan authorises also the right lift and right floor for the visitor. This lift management requires an
activation card (ref FD-050-096).
Without this last feature, 2Voice special decoders would be required (at least, one per floor).
2.7.2 2Voice integration through 2Smart panels
A) Overview
Synoptic
1083/55
2
LINE1
1083/20
LINE2
2
By using the 2Smart panels, you will get the following benefits:
• Manage door and lift access control plus intercom system from one software.
• Manage events from the same software
• Simplify the wiring as the controller relay is used for both access (reader and intercom calls)
• Improvement of the security as the door relay is inside the building
• Create a high level interface between the 2Voice system and the access control which can already
manage the lifts, in other words manage an easier integration between the door phone system
and the lift.
You don’t need to use the 2Voice special decoder when you install the 2Smart panel
In term of wiring, the installation of the 2Smart panels is similar to the others 2Voice system
They can be set as main, secondary (0) or secondary (1).
A 2Voice installation can be a mix of 2Smart paneIs and Urmet panels.
The power supply of the 2Smart panel is provided by the 2Voice bus, so the wiring is very easy. Only 4
wires:
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
19
- 2 for 2Voice Bus
- 2 for 2Smart connection with the controller
B) How it works ?
Call modules and apartments are created and managed in the software. The setting of the door stations in
the software must match the setting of the 1083/50.
When a visitor calls a resident from the 2Smart panel, it sends to the controller the handset number
together with the type of event (call in progress, Push button 1 pressed, door open, etc).
Ipassan displays, in the event window, the right apartment name as entered in the software.
Second advantage: the lock push button of the handsets is set to open a door of thecontroller, so when
the 2Smart panel sends the event “push button 0” to the controller, the right relay of Ipassan is activated.
There is no need to connect two dry contacts (door phone + access control) in parallel.
Third advantage: lift and floor are set for each apartment so when the resident opens the door to the
visitor, Ipassan authorises also the right lift and right floor for the visitor.
Up to four lifts could be linked to the same door phone installation as we don’t know which lift will be
sent to the ground floor when the building owns more than one.
2.7.3 Setting
The type of integration must had been set previously. See below.
The second option is the choice to manage the call and handset number per apartment or per user.
Both options are possible, the choice depends of the way the manager will assign handset and call
number to users.
The “apartment” choice has to be chosen when the manager wants to display “Apart 001”, “Apart 002”,
etc on the door stations. In this case, the manager could change the names of the keys without changing
the name of the apartment.
With the choice “par user”, when the manager changes the user from “Bond” to “Blair”, he updates the
key and the directory of all the door stations in the same time.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
20
With this second option, it is possible to display several names for the same handset. As an example,
“Concierge” and “Tigana” are the same handset, but “Concierge” is displayed only on day period.
At the door integration step of the site wizard, enter the type of call module and location. The number is
automatically generated by the software.
Type of call module
- Main : the call module is able to call any risers
- Secondary (0) or (1) :the call module calls only the selected riser
Note, the type of call module must match the wiring of the 1083/50, 1083/75, 1083/76
Location: the architecture (blocks, floors, apartments) of the site have to be set at the previous step of the
site wizard.
As an example, a site contains five blocks all independent for the door phone. Each block has one riser
and one door station.
In this case, there must exist 5 blocks in the software and 5 door stations (1 per block)
If those 5 blocks are linked through main door station(s) from which it is possible to call all blocks then it
will be one block and 5 risers in Ipassan manager.
Of course, each riser has a different riser number. This riser number in the software must match the
1083/50 setting.
The position (second column) is the slot where is connected the two wires of the 2smart panel. This
matches the position of the door set in the previous step of the site wizard.
2.8 Lift
The lift management in Ipassan could be low level (dry contacts) or could be high level. Most ofen of the
time, a high level integration uses tcp/ip connection between Ipassan manager or controllers and the lift
server or controllers.
Only the conventional lifts could be set in the site wizard. For high level integration, the setting has to be
done in Settings and parameters / lift.
The following paragraphs are given as information.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
21
2.8.1 Low level integration
The readers are in the lift car. The user swipes their card to the reader then press an authorized floor.
Ipassan provides to the lift one dry contact per floor. If a building contains 18 floors and two lifts,
Ipassan provides 36 dry contacts through the 22 outputs expanders for example.
2.8.2 Kone COP (car operating panel)
For the users, the way it works is the same than the low level (see above). But when an 80 floors building
owns 10 lifts, this would need 800 relays from Ipassan expanders to connect to lift.
Ipassan integrates Kone KGC (Kone group controller) so both systems communicate through tcp/ip. The
expanders and dry contacts aren’t required.
This high level integration requires an activation card FD-xxx-xxx
2.8.3 Kone DOP (destination operating panel)
On each floor of the building, there are Kone destination panels. The users swipe their cards on this
panel then press the selected floor. If they are authorized, the panel tells them which lift to use.
Basically, the lift management is more efficient as all users which are going to the same floor at the same
time will use the same lift car.
The integration is software to software. Ipassan manager reads from Kone access, the names of the floor
access profiles then the Ipassan manager operator assigns one or several floor access profiles to a
user/key.
The controllers are not involved in this development.
2.8.3.1 Doorphone integration
The lift management in Ipassan manager concerns the users who own a key but also the visitors who call
a resident through the door phone system.
As Ipassan also integrates lift management, the integration is full between the door phone, the access
control and the lift.
There are several options to activate only the right floor to those visitors. The first one is a low level
integration. Through Ipassan inputs, the door phone system provides one dry contact per floor.
in Ipassan, this input is linked to one block / one floor and up to 4 lifts.
When the resident authorises the visitor to enter, the door phone activates the right relay (right floor).
Ipassan activates the authorised floor for the lift(s) for the programmed time.
Note, Ipassan manages two floor release times. The first one (5 secs by default) is the one used when a
user swipe and is authorised to floors.
The second floor release time is the one for the visitor. By default, it is 180 secs so when the resident
authorises the visitor, he has 180 secs to open the door, comes in the lobby, call the lift to the ground
floor, enter in the lift and press the authorised push button.
Of course, both release times could be adjusted.
Ipassan manages also a high level integration with 2Voice door phone system. So the dry contacts
between the intercoms and the Ipassan controllers aren’t required. The communication is done through
the 2Voice interface or 2smart panels.
As the Ipassan system knows where the handsets are (blocks and floors), Ipassan knows which lift and
floor have to be authorised to the visitor.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
22
When lift have been added at the previous step, the software had automatically done the following
operations :
- Link the lift to the buildings
- Choose an available reader for the lift cars
- Choose the relays of the expansion card / expanders for the floors
To modify those lifts, use the pen under Building to change the location or the pen under Actions to
display the setting of the lift (second screen capture)
Setting of a lift :
In the following view, it is possible to modify those settings :
- Add a second reader : when a lift car is equipped of two readers, they could be added by unticking
« By default » then ticking the readers.
- Activation time : the system offers two different activation times. When a valid key is present to
the reader, the relay is activating for some seconds but when the authorization for the floor
comes from the intercom system, this delay is in min.
- Eventually, affect a floor time profile to each floor. A floor time profile manages three behaviors.
o Free access : the push button of the floor is authorized. No need of a key
o Forbidden : even a valid key is not authorized to the floor
o Normal : a valid key is compulsory to go to the floor
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
23
High level door phone integration
As the apartment details (name, call number, handset number, block and floor) are already entered in
the system, it is only necessary to tick “smart link with the panel” The controllers know where is the called
handset and which lift(s) and floor have to be authorized for the visitor.
Note, the high level integration between the 2Voice door phone system and the lift through Ipassan is
free when using 2Smart panels but requires an activation card when combined with the 2Voice interface.
2.9 Zones
The Ipassan system is able to manage counting and / or anti pass back zones. The following window is
available when « Use the zone » has been ticked in the site property.
Good to known,
A counting zone is useful to
- Know the number of car, of user in an area
- Limit the number of car, user, etc
- Know where is a user, car, etc
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
24
- The anti pass back could be added to the counting so a user A can’t entre then present its card to
a user B.
note, it is possible to use apb without counting
In the following window, enter the number of zone(s) then for each one, select the readers (In and Out)
Tick, if necessary, the options anti pass back and counting.
A temporary access profile is a list of authorised doors or floors that a user could use from a beginning
date to an end date.
When a user must have access to the offices and the workshop, the operator has to create an extra
access profile including doors of both zones.
2.11 Keys
The wizard allows to automatically create users, keys, key code, etc
The tool manages different additions. For example, 20 users for a first access profile then 15 for a
second one, etc
Those additions are applied to site, building, floor, access profiles or group of people.
Click on Automatic creation on the following screen capture. The second screen capture shows the
details of the tool.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
25
In the following window, enter the number of user to create (access, Building, Floor, etc…)
Then select the access profile, building, floor, etc…
In the part « User Description » you can enter a name and refers to the creation file to manage the
automatic creation.
The following example shows how to create 10 users with 1 remote with the access profile « Only
parking » and named: “Parking 001”, “Parking 002”, etc
The second example below shows how to create 6 people (or apartment) per floor for the Block C with
the following characteristics:
- They all have the access profile « Block C »
- The 6 people of the 1st floor have the floor access « Floor 1 » which will be automatically created
- The 6 people of the 2nd floor have the floor access « Floor 2 » which will be automatically created
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
26
On the right hand side of the screen, you will see the user for whom you are programming the
credential. The left part of the screen will give you the opportunity to pass directly to another profile,
group, user…
When a credential is programmed the software goes directly to the next user. No extra action is
necessary between each key programming.
3 Settings & parameters
You can modify all the parameters by clicking on the button representing on the screen shot below.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
27
3.1 Companies
This feature is sometimes called “management unit” or “database partitioning”. Depending of his access
rights, the operator of the software is only able to see and manage its doors, readers, lifts, etc
Another operator manages its doors, lifts, access profiles, etc
Any door, lift, access profile, etc could be used by different companies. Only the operators with an
admin right sees everything on the site.
This feature is designed for a building where different companies use different floors for example. Some
doors, gates or lift are used by all the companies, but some other doors are privates.
It could be used also for a car park where different operators manage their own keys or in a residential
building where some floors are managed by a property manager but some other floors by a social
housing company.
3.1.1 Activation of the feature
By default, this feature isn’t available and needs to be ticked in the site settings / features
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
28
3.1.2 Create companies
In settings & parameters, select the Companies choice then click on Add a company
Example of a controller
Example of a door
In the following example, the “car park entrance” door is seen by all 4 companies. This means the
operators of each company will be authorized to manage access profiles using this door.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
29
In this second example (see below), only the operator of the company three will be able to manage this
door.
Example of a user
In the next screen capture, only operators with “company three” rights could see this user and the keys.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
30
3.1.5 Operator group
In Software operators, Add an operator group, enter a name for this group and tick “Multi companies”.
See second screen capture.
In the list of available operations, tick the ones the operators will be authorized to use.
Note, the Setting and Parameter options are only available for operators which have higher rights
(configurator or administrator for example). When selecting the multicompanies option, the ability to
change the controller, door, lift setting is disable.
Click Save
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
31
3.1.6 Creation of operator(s)
Under this group of operators, click on Add an operator as describe here but add also onr or more
companies to this operator.
An operator with rights on the door and reader but not on the user see the below event. He knows
someone was authorized to open the door but doesn’t know who.
Without rights nor on the door nor the user, the operator doesn’t see anything.
The administrators have all rights so aren’t concerned by this filter.
3.2 Network
A network is composed of 64 controllers maximum which will communicate to each other. If you need
more than 64 controllers you should create another network.
When 1 site in the software is linked to several sites in different places, we create additional network. For
example, a company has several subsidiaries in France and England and a manufacture in a different
place, it means that you need to create 3 networks in the software.
For the daily use, the credentials can be added without managing the transfer to one or another network.
Please note that a tool has been created to modify the configuration of several controllers with only one
action.
By clicking on the icon “Controller” on the left hand side of the screen, the controllers appear divided
by network on the right. Click on the “Action” button (1) then select the controllers (2) where the TCP/IP
configuration must be changed and click on the icon (3).
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
34
3
1
Indicate the first IP address and then follow the indication of the last chapter to choose the others.
The software gives a different IP address to each controller but the same mask, gateway and DNS.
3.3.2 Activation card
Ipassan manager is free software, nevertheless some extra features require an activation card to be
available in the software.
Example of activation cards :
- HLI (high level interface) of ANPR (automatic number plate recognition)
- HLI with lift
- Booking management
- Open reader.
With the last option, all readers of the controller become open. This means they aren’t checking the AES
encryption of the FDI keys and read any Mifare CSN (card serial number).
An activation card is linked to a controller. Click on the following button on top of the screen.
Note, there are two ways to activate a card : online and offline.
Online :
Using Ipassan.com or a local server connected to internet, choose the first choice “Activate my module
card” in the following window.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
35
The following window appears.
Enter the card number (printed on the label) then press validate. That’s it.
Offline
The local server isn’t connected to internet. From another computer which is connected to internet, open
Ipassan.com web page then on the following bouton
Enter both card number and activation number (coming from Ipassan.com) then press Validate.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
36
3.3.3 How to check the availability of extra features in the controller?
In the controller window, the list of the extra features is displayed as shown below.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
37
* The type.
This optional field is added when “Wireless locking device” option is ticked in site’s features list
It offers to specify if this door used a “Wired” (standard) or “Wireless locking device” so the additional
field “Lock” to specified which “Wireless device” is attached
A time profile with free access, forbidden (even a valid credential cannot open the door) and normal
access (a valid credential to open the door).
See chapter xxx for the setting of the time profile.
Reverse mode. The relay operates in opposite mode if this box is ticked. So the NO (normally open)
contact operates as a NC (normally closed) and vice versa.
With this setting, the installer choose the status of the relay when the psu is off.
Reader: By default, the door 1 is linked to the reader 1 and so on…
You can link 2 reader or more (max 6) on a same door if you need a valid credential to go in and to go
out for instance.
Only 1 reader can also be linked to several doors. For example, by swiping a valid credential on a same
reader, a user A will open the pedestrian access and a user B the car access.
REX button: By default, the push button works 24/7 but it is possible to set a time profile to limit the
using of the push button after a designated time. This functionality can be set to avoid people to go out
by one designated door after the working hour, for instance.
See chapter x.x.y to create a time profile on the REX button.
In advanced mode you can modify the link between the exit push button and the exit of the door. By
default, the REX 1 is set to the Door 1, REX 2 => Door 2, etc… but it is possible to linked 2 exit push
button for a same door.
Door contact: The door contact input is directly on the controller with no extra devices required. The
door contact can be:
• 2 state input (on/off)
• EOL management input. In that case you should set the value of the end of line resistors
• Remote contact (attached to wireless locks) .
You can tick also « monitor the door event » if you want to get the events « Door forced » or « Door
open for too long ». Then you should set the time when you consider that the door is open for too long.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
38
3.5 Readers
The readers could be the 2Smart range, the FDI RS485 range or logical readers (LPR for example).
It could be wiegand readers with the corresponding Ipassan controllers.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
39
- Double authentication depending on the time profile. A valid card opens the door during the
working hour, but you need to swipe your card and type a code after. You can program the time
between the presentation of the card and the code (by default 10 seconds).
- Dry contact: for example, to enter in a car park you need a valid credential and the loop has to
detect that a car is in front of the barrier to avoid the pedestrian.
- Door contact: to open the door B the door A has to be closed.
- Presence on site of one designated person: for example, in a production site the manager has to
be on site if any other person wants to open the door.
Type of reader: the default type is the 2Smart protocol of the FDI Matelec 2Smart range of readers. It is
possible here to select a RS485 reader, a LPR camera or Wireless reader. This is explained in the next
chapters.
Reader profile: In operating mode, only the blue led of the readers are on. The green led turns on when
the key is valid and it is the red led which turns on for a denied access. The setting of custom behavior
is explained below.
Wiegand configuration: By default, the controller manages the wiegand protocol received. iPassan
accepts the basics wiegand 26, 30, 32 et 34 bits hexadecimal.
You can choose the 34 bits decimal for the brail keypad, for instance.
3.5.2 RS485 reader
Any Rs485 reader in the software uses a slot as if it was a 2Smart one.
A RS485 reader takes of a 2Smart reader. So the limit of the controller stays 6 readers at all
Change the type of reader from “By default” to “RS485” then enter the Id (sticker) of the reader in
“device number” or click on the magnifying glass to search the reader on the aux Rs485 bus (if
connected).
Click Save.
All the other settings are the same than a 2Smart reader.
To add plate number to the users in the software, the “plate number” type of credential has to be ticked
in “Site property / Type of credential”.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
40
ANPR type reader feature requires to “actuate a third party module” in controller configuration screen.
Up to 4 ANPR camera can be manage /controller
Ipassan Server
Dahua ITC237
Dahua ITC237
Note: this integration is based on a tcp/ip connection. The controller opens a server connection so the
cameras, up to 4 per controller, connect to the controller and provide the plate numbers.
Only after the activation card has been entered in the controller configuration screen, it becomes
possible to setup the camera in the Ipassan software: site/reader’s menu.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
41
Select “ANPR” for the type of reader then enter the Ip address and port of the selected camera.
Note : Start and end characters are the default ones for the Dahua camera and must not be changed.
To define the IP communication between camera and controller a “mode selection box” propose to
select available processes :
Socket communication : Available for Dahua Australian firmware camera (ITC237) and
OCR Innova scenario n°4
Communication by http/json : Available for current ANPR Dahua camera
(ITC 437; ITC 415; ITC 237; ITC 215)
When the setting is done, it is possible to create plate number credential. The max number of characters
is 8 (numeric or alpha numeric)
The events show the plate numbers as they are read. In case the car isn’t correctly read or is denied, the
event shows “Access denied – unknow credential” or “access denied – out of validity” for example.
The ANPR camera needs to be set. See the application note for integrated ANPR.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
42
3.5.3.2 ANPR External trigger
This feature is available in any countries where Innova OCR (optical character recognition) is able to read
the plate numbers. See the flowing web site www.innovagroupbcn.com
The integration is based on a tcp ip connection between the computer where is installed the Innova OCR
and the Ipassan controller. See synoptic below.
Each controller is able to manage up to 4 cameras (four OCR softwares).
To add plate number to the users in the software, the “plate number” type of credential has to be ticked
in Site property / Type of credential.
After the activation card has been entered in the software for the controller, it becomes possible to setup
the camera in the Ipassan software.
Select “ANPR” for the type of reader then enter the Ip address and port of the selected Innova OCR and
select the input which is designed to trigger the car plate reading. This input could be connected to a
loop on the floor or an infra-red sensor.
When this Ipassan input is triggered, Ipassan controller asks to the right OCR the plate number. If the car
is authorised, the relay of the controller operates.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
43
In the previous window, type in :
• The ip address of the computer and the port of the Siram software.
• Line number (row)
• The input where is connected the floor loop (or motion detector)
• Communication Time out adjustment
Note, if there are 4 cameras on site and 4 Siram software, each one uses a different port.
The input has to be set as 2 states (active / not active). The dry contact could be normally closed or
normally open.
By default, the line 1 use the port 22601, line 2 => 22602, line 3 => 22603 and line 4 => 22604
Camera to be used must be configured and adjusted following its builder instruction to
optimized ANPR
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
44
Possibility to combinate standard (wired) and wireless readers on a single controller in same limit.
A- To add Wireless locking device menu in your site, this feature must be ticked in
Site property/Features
B- in the controller menu:
a. Select “Aperio rs485 bus type” only compatible with Aperio items
b. Activate a“third party module” referenced FD-050-106. (1 per controller using wireless
technology)
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
45
Tick the “select box” of each line to automatically register needed Identifier and type information
New events attached will be introduced to diagnose to Aperio’s Hub & locks state and behaviour
See list in Monitoring/Events/Settings/Electronic locks
E- Manual commands and time profile accesses with Aperio’s : idem other door type
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
46
When those settings don’t match the customer needs, it is possible to create different custom behaviors
and apply one profile to readers, another behavior profile to other readers, etc
In Settings and Parameters, select readers and readers profiles then click on Add a profile.
In the following window, select for each action or event the way the leds and buzzer must operate.
The readers manages a blue led + a red / green led and a buzzer.
The behavior for the led could be On / off / flashing 3 times per sec (Quick) / once per sec (Slow)
The buzzer could be On / off / one long bip / three short beeps.
Note, the choice “event” for the duration means the behavior stays active until the action that triggered is
finish. As example,
For an access granted, the green led will stay on for the door release time.
For a door left open, the red led or buzzer stay on until the door is closed.
For a tampering of the reader or a forced door, both red led and buzzer stay active until a valid key is
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
47
presented to the reader.
In the lower part of this window, select the controllers which will use this new reader profile.
Custom behavior
It is possible to add to this reader profile up to 4 custom behaviors. Those reader custom behaviors will
operate on the selected readers through reflexes. For example, the customer wants to turn on the red led
of the readers when an alarm is activated.
The alarm provides a dry contact to an input of Ipassan. Through a reflex, the reader behavior is
triggered for the selected readers when the alarm is On (input activated). See example below
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
48
3.6 Lift
Ipassan manages lift integration through different ways
- Conventional. Ipassan provides dry contacts to third party
- Kone COP. Ipassan communicates with KGC (Kone group controller)
- Kone DOP. Ipassan manager talks to Kone access. It is a software to software integration
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
49
It necessary to tick the box « intercom », indicate the release time in minutes and the input used for each
floor.
Floor / output: Because you choose the building above, the software shows you the right floor list.
Select the relay linked to each floor.
Time profile: a time profile has the time profile when the floor is:
• Free access: you can choose any floors without swiping your credential
• Forbidden: even a valid credential cannot go to one designated floor
• Normal: you need a valid credential to go to one floor
Intercom: when you should give an access to a lift to a visitor via an intercom system, we use in iPassan
inputs related to the dry contact of the intercom.
Select the input corresponding at each floor.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
50
Ipassan Server
Kone KGC
1881 TCP 1881 TCP
1880 TCP
1880 TCP
1881 TCP
1880 TCP
2005 TCP
3.6.4.3 Settings
1) On both sides, access control and lift, the group id, elevator Id and floor id must match so when
the access control authorise a user to elevator 3, floor 15, it gives access to the user to the right
lift and floor.
2) The Kone high level interface needs to be activated for the controller (s) then it is possible to
setup the lifts in the Ipassan manager software. There are three part numbers for Kone COP
integration :
a. FD-020-091 50 floors
b. FD-020-092 100 floors
c. FD-020-093 200 floors
3) One activation card is for one controller. An activation of 100 floors authorizes the controller to
manage 100 floors in total. This could be one lift of 100 floors or 6 lifts for a total of 100 floors.
4) When several controllers manage lifts, several activation cards are required.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
51
The lift has to be set as “High level interface Kone COP” instead of “Dry contacts (relays)” (See *1) in the
following screen capture.
Then enter the Ip address + port of the KGC (s) (see *2)
It could exist a backup KGC, enter this second setting if required.
Enter the group + elevator Id (See *3)
3
In the second part of the window, assign a floor number to each floor of the building. From Kone point of
view, the first available number is 1 so it could exist a mismatch between floors of the building and floor
number in the software (see example below).
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
52
In normal operation mode, users and keys are managed as if the lift was conventional.
3.6.5 Kone DOP lifts
The Kone DOP (destination operating panel) is a software to software integration. Ipassan manager reads
from Kone access, the names of the floor access profiles then the Ipassan manager operator assigns one
or several floor access profiles to a user/key.
This means Kone access software is compulsory on site. The access right have to be set first in this
software to be used later in Ipassan manager.
Practically speaking, the user enters his destination floor on the Kone panel then present his key to the
reader. If he is authorised to this floor, the display tells him which lift he must use.
This involves there are as many DOP as they are floors. The solution is different from the COP where
there is only one reader in the lift car. The user then calls the lift, enters in the lift car, swipe and press
the destination floor.
With the DOP, the floor authorisation is done before the lift is called. Basically, the lift management is
more efficient as all users which are going to the same floor at the same time will use the same lift car.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
53
3.6.5.2 Synoptic
DOP
Kone Access
Ipassan manager
Kone lift
1881 TCP controller
1881 TCP
1880 TCP
1880 TCP
1881 TCP
1880 TCP
3.6.5.3 Settings
Kone access have to be installed on the same network than Ipassan server but it is two different
computers.
This feature requires an activation card which has to be entered on a controller. See here.
In Equipment & Settings, lift node, select “Kone Dop” then enter the url of the Kone API.
Enter the login and password which has been defined in Kone side.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
55
This means it is possible on a site to mixt Kone Dop lift and another technology (low level or high level
Cop)
In the following screen capture, “Kone Access” tab displays the Kone Access lift floor profile.
The Floors tab displays the classic floor access profiles.
Note, with low level or HLI COP integration, an access profile contains a list of floors / time profiles.
With Kone Dop, an Ipassan floor access profile is a list of Kone floor access profiles. In the previous
screen capture, “KGEGC_Group1 2(access grid)” could be many floors and / or many lifts.
3.6.5.7 Edit a user
In the following example, the user has access to the floor access profile “Day_Shift” with the time profile
“Mo FR 0:00 23:59”
Both Kone floor access profiles and time profiles cannot be edited in Ipassan manager. It has to be done
in Kone Access software.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
56
3.6.5.8 Monitoring
The Kone live events are displayed in Ipassan manager in the same way the Ipassan controller events are
displayed.
Manual commands are not available through Ipassan manager. This has to be done in Kone access.
3.7 I/O expander
Each controller manages up to 10 Input / Output expanders. Each expander has a unique number which
has to be indicated in the software during the commissioning.
Definition of an expander:
A name: 32 characters
A unique device number like: 517xxxx
An additional option: 12 inputs or 12 outputs.
The software indicates on which controller the expander is linked and also all the details of the I/O
manage by this expander.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
57
3.8 Input
From a hardware point of view, inputs can be an option card of 12 inputs plugged on the
controller/expander or an expander of 10 inputs which communicates with the controller via the auxiliary
RS485 bus.
Definition of an input:
A name: 32 characters
A type of inputs:
• 2 state input (on / off). You can set if the input is normally open or normally close
• EOL management input. There is a difference between an open electrical circuit (cut wires…), a
short-circuit, an inactive input and an active input.
You have to choose the value of the resistor 1(series) & 2 (parallel).
Please note that an EOL management input is always NC.
• Decimal. Not in use
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
58
Anti-bounce back value to filter
Input signal and prevent parasite
disturbances.
Differential validating threshold is the
minimum value require before
switching from a status to another (Full
range is from 0 to 4095)
Short circuit, No detection, Detection and Unplugged are 4 different status calculated
according to R1 & R2 resistors selection for the EOL selection OR Activation,
Deactivation for 2 states ON/OFF selection.
Those status information transfer to controller can be delayed in the input card
introducing a “continuous activation time” before transfer per status to adjust your equipment behavior :
“Introduce a 30seconds timer to the position sensor to ensure that the movement is stopped” for
example
3.9 Outputs
From a hardware point of view, outputs can be an option card of 12 outputs plugged on the
controller/expander or an expander of 10 outputs which communicates with the controller via the
auxiliary RS485 bus.
Definition of an output:
A name: 32 characters
A time profile: you have the possibility to set a time profile on an output. A time profile has time profile
when the output can be:
• Forced closed: the output remains activated whatever the action programed (process, relation,
lift management)
• Forced inactive: the output remains inactive whatever the action programmed
• Normal: an action is required (process or a card swiped at the reader of the lift for instance) to
activate the output
Monostable or Maintained: Monostable means that the output is activated during the time set. Maintained
means that the output is activated until the next deactivation.
Activation release time: enter the time release in second of the activation of the output
Output inverted: you can choose if the relay is normally close or open in case of power failure. For
example, you want to have an output close in normal use but open in case of power failure.
You will then have to wire the NO contact, but indicate an inverted output.
Inverted mode: the NO contact works as a NC contact and vice versa. So the installer choose the status
of the relay in case of power failure.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
59
3.10 Apb / counting zones
Ipassan system gives the possibility to manage the number of credentials in a zone. When the zone is
full, it isn’t possible to enter another car or user until someone leaves.
An extra setting is useful to limit the number of car per company, per user or per apartment for
residential market.
For example, a residential building has 200 apartments and 300 car spots. Some apartments own 2 car
spots, some other only one even if they have 2 authorised credentials. This means the first credential has
to leave the car park if the second user of this apartment want to enter his car.
3.10.3 Create a counting zone
Ipassan manages zones which can have option as anti pass back, anti pass time or counting per
apartment, per user, per company.
The zone feature must have been ticked in the site setting then click on Add a zone from Equipment and
settings push button.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
60
A zone is defined as below:
- Reader(s) in
- Reader(s) out
- List of the access profiles managed by this zone. For example, the master access as the door
keeper or the concierge must have unlimited access to the carpark. Only the residents have
restricted access to this zone
- Thresholds
o Warning and intervention threshold are just events which can be used for the relation
(send an e mail, turn on a flash, etc)
o Alarm threshold is the threshold where no more credential is authorized. In other words,
the carpark is full and a valid key is not authorized until someone leaves this zone
- Advanced settings
o Reset the zone daily. It is possible through this setting to empty the zone every night for
example.
o Authorise the entrance to the zone in case of communication lost. When readers in and
readers out are connected to different controllers. The controller where the user swipes
must know if the credential is already in the zone or not
To do this, the controller mays ask to other controllers. If the network is not working
when requested, it is possible in the software to authorise the credential anyway.
Note, the counting feature authorises a user to go in twice and to be counted as once. For a reliable
counting, the anti pass back has to be set.
Ii is possible via le software to make the anti bass back more flexible by adding a delay (anti pass time)
so the user cannot enter twice in a short time frame but could after a delay.
It is also possible to use anti pass back only for entrance, but not for exit. In this case, the exit is always
free.
The anti pass back is managed on the credential. So in case there are two different technologies to enter
or leave in a zone (prox + rf or prox + anpr), the user has to use the same credential for both entrance
and exit (until 1.05.xx software release / fv10.5x firmware)
3.10.3.2Counting per apartment, user, etc
1) Create the architecture
The architecture feature must have been ticked in the site setting.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
61
2) Create the apartments, users and credentials in the software.
A counting zone must have been declared first; then tick counting per apartment in the combo box.
By default, the number or car spot(s) is the same for all apartments but could be customized by unticking
the box “Setup the same threshold for all elements”
In this case, a new window is displayed where you can enter the number of car spot per apartment.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
62
3.10.4 Apb
The anti pass back feature is an extra security to prevent entering twice in a zone. A tenant who rent a
car spot for example, can’t get in with a second car as long as he doesn’t leave the carpark with the first
one.
Ipassan manages different level of anti pass back.
- Full managed. Users have to leave first before getting in and had to get in before they can leave.
- Free exit. In this case, the anti pass back feature only operates on entrance. It isn’t possible to
enter twice, but the exit is always possible.
This option prevents to block people inside the carpark when there isn’t door keeper nor door
station to call.
In case, the entrance barrier was already opened, the user didn’t use his credential so the system
considers him outside. With the free exist option, the user can leave the carpark.
- Anti pass time. The anti pass back option is removed after a delay. So you can enter a second time
after, for example, 45 minutes.
- Soft Apb. This option authorises to leave the zone even if the validity period is finished. This
option could be useful for visitors.
The holiday and maintenance period have to be programed at the chapter x.x.x.x. They are then applied
on the door, output, floor and process time profiles.
iPassan can have up to 200 time profiles (all included)
3.11.3 Time profile
The time profiles are used for any type of door, reader, access profile, process , etc
In the screen shot below the access is granted for the valid credentials during the green periods.
By clicking on the + or – button you can increase or decrease the size of the zone.
Note, for all the following time profiles, it is possible to manually add a frame by selecting the days then
entering the time. Click save.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
64
• Forced inactive: even a valid credential cannot open the door or output
• Normal: the relays are activated according to the process set
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
65
3.11.6 Key time profile
A user may have access 24/7 to door, but only office hours on other doors.
In the following example, the users and keys which will use this key time profile will have access to the
selected doors only in the green period.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
66
3.11.8 Process time profile
It is possible with Ipassan to manage reflexes. A reflex combines one or more condition which
automatically operate some processes.
An example of a reflex could be : if a door is left open for too long time then activate a relay and send
an e mail. With the process time profile, it is possible to activate this relay only when this happens on
night period. So the e mail is sent any time, but the relay operates on night period only.
The time profile is set for the process not for the reflex.
In the example below, the process (activate a relay for example) will operate only between 8pm and 7am
+ week end.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
69
3.12.5 Settings
Important, this feature must be seen as an extra option but couldn’t be considered as the single option to
open the doors in case of fire for example. Green brake glass or any other options should be installed.
This feature may be used for example to open many doors from one contact. In a company, when the
first employee activate a contact, all doors of the warehouse, stock, etc are released.
The following example displays how one input is linked to the door group “All doors block C”.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
70
The door group has to be created first.
In the screen shot below, you can see the button “Doors” and the 4 authorized doors for this profile
with, for each door, their time profile.
Zones
Counting zones and/or anti-pass back zone have been created during the programing. You can select
the access profile, so the users, where you have to apply these parameters.
For example, the group “Manager” is not counted even is the zone is full.
The screen shot below shows you what are the anti-pass back zone and counting zone.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
71
Holiday/Maintenance period
The holiday and/or maintenance periods are set for this access profile. Choose in the following window
the holiday and/or maintenance periods for this access profile.
Users
You will see the users having this access profile.
Note that you can import users from others access profile by clicking on “Assign other users”. In that
case a window will appear. Push Ctrl and select the users you want to import.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
72
By clicking on the button “Actions” you can export users from this access profile to another one. Tick the
box which appeared to select the users you want to export (see below).
In the screen shot below, you will see the 1st tab « Floors » and the 3 floors authorized for this profile
with, for each one, their own time profile.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
73
See the chapter 2.4 to set the tabs « Holidays/Maintenance periods », « Common credential » and
« users ».
4.6.3 Kone Dop
When the Ipassan site manages also Kone Dop, a new tab appears in the lift access profiles.
Select from the Kone list the floor access profiles.
Note, Lift access profiles have to be created first in Kone Access software then they could be used by
Ipassan manager.
One Ipassan manager lift access profile could be a sum of several Kone ones.
One Ipassan lift access profile could be a mixt of conventional lift + Kone Dop. Some lifts of the building
are low level integration for example, but some other lifts are high level integration through Kone DOP.
The software creates the new access profile and select the same doors / floors, zones, etc
Enter a name for this access profile, add or remove doors or floors then press Save.
4.8 Sub access profile
Ipassan manages sub access profiles. Instead of using many access profiles, the operator creates one
access profile “Block A” for example + sub access profile “Block A + carpark”, etc
All the child access profiles inherit of the doors or floors of the parent access profile. So later, when the
operator will change a door or time profile for a top access profile, this will apply to all sub profiles.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
74
Example of a door access profile / sub access profile:
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
75
Tick this box then select the extra doors which will be authorised for this user.
Note, those doors are added to the doors already included in the door access profiles (see below in
grey).
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
77
The following window opens:
1) Select the number of users to create.
2) Select in the list
a. Per door access profile
b. Per floor access profile
c. Block
d. Floor
e. Apartment
3) Depending of the previous choice, select
a. On or more access profiles, floor, blocks
4) Enter a name
This name contains some digits or letters which will be always the same + contains some variable
digits. Those digits could be
a. A floor number
b. An apartment number
c. User number
5) It is possible to start by any number (Start with n°)
6) Door access profile: Select the door access profile
7) Floor access: Select the floor access profile or choose automatic creation
With this last option, the software will automatically create the floor access profiles
8) Common floors : If the automatic creation of the lift access profiles is ticked, then select the
floors which will be authorized for all the floor access profiles. It could be the basement for
example.
9) Validity: it is possible to choose start and end of validity for all the users the software will create
10) Credentials: select the number and type of credential per user.
In case access code is ticked, the software could, automatically, generate access code
Click on Validate.
The following capture shows how the software create the floor access profiles, the users and credentials
and rename those access profiles and users.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
78
4.12 Excel Importation
In an access profile, click on Automatic creation push button then choose Import credentials.
The
Excel sheet contains different columns as explained below:
Comment
Code: compulsory CSN or access code. Up to 14 digits
Credential Type: compulsory Select in the combo box the type :Prox, access code,
plate number, etc
Last name compulsory Up to 32 characters
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
79
First name Not compulsory Up to 32 characters
Number Not compulsory Registration number (used in a company for example)
Address Not compulsory Up to 32 characters
ZIP code Not compulsory Up to 10 digits
City Not compulsory Up to 32 characters
Phone number Not compulsory “+” + 14 digits
E mail Not compulsory
Others Not compulsory text field, up to 255 characters
Door access profile Not compulsory
Lift access profiles Not compulsory
Note, for the two latest columns (door and lift access profiles), there are two ways to manage this.
1) When those fields are blanked, the users and credentials are added to the origin access profile. If
you launch the automatic creation from “Block A residents”, the users are created in this access
profile.
2) If you enter in the excel sheet a door and/or lift access profile, the users are created in those
access profiles. In case, those access profiles don’t exist yet, they are automatically created in the
software without door nor floor.
This means the excel sheet could be created before commissioning the site. The second step is to
tick the doors or floors in the access profiles when they are added to the software
After the Excel sheet is filled, save it. Click on Browse in Ipassan Manager, select the file and click on
display. The first lines of the excel sheet are shown as example.
In the lower part of the window, extra options are available for the importation:
Contractors or Users: The key could be added in the software as user or as contractors.
Door access profile: The importation uses the door access profiles from the Excel file or uses the
selected one from the list.
Lift access profile: The importation uses the door access profiles from the Excel file or uses the selected
one from the list.
Companies: when the multi companies feature is used on the site, the users will be assigned to the
selected company.
Bluetooth: When the BLE feature is activated in the site and an credit account is also linked to the site, it
is possible to create mobile access from this import file.
In an access profile, click on Automatic creation push button then choose Desktop reader.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
80
The following window appears. Present the keys to the encoder, the CSN (card serial number) and type
are added to the list.
Select if the keys must be added as “Contractors” or “Users” then press Save.
The software automatically names the users user 0001, user 0002, etc
4.14 Importation through the events
Present the keys to a reader of the site. Those keys appear as Unknown credential in the live events. See
below.
In
an access profile, click on Automatic creation push button then choose Events.
Filter by date and or reader then click Display. The unknown keys appear.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
81
Select if the keys must be added as “Contractors” or “Users” then press Save.
The software automatically names the users user 0001, user 0002, etc
5 Supervision
By clicking on the screen icon on the left hand side you can have a view on the events and on the status
of the network (controllers, connected expanders with the version of the firmware).
Several tools give you the opportunity to have a view of the sites:
• The events window gives you a view on the live events. All the new events will appear on the
screen
• The network status will show you if the controllers and expanders are connected and their
firmware version
• With the manual commands, you can activate the relays of the doors/floors/outputs from a
customizable table
• The reporting can be used to export in an Excel file the list of credentials, users, events…
• The zone tab shows you the list of users on a zone
• Message shows you only the events which you set a specific appearance. In general, the events
are alert such as “door forced” …
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
82
5.5.3 Events
Each controller can manage 20000 events which will be sent to the server in real time if you have a
communication between server controllers.
5.5.3.2 Visualization
Each kind of events has priority number from 1 to 9 in order to set what kind of events you want to see
or only the most important. The event “door forced” has the priority number 8 when the event “door
open” has the number 2.
With a level priority of 5 the event “door open” will not be displayed.
You can also add a filter on how to display: by kind of events, by element (door, floor…) or depending
of the event (only access refused for instance)
5.5.3.3 Download
Each controller stores 20000 events off-line. When the network is connected to the server, only the last
events are transferred to the server.
By clicking on “download”, you can search in the controller the missing events.
You can also set the filter described above for the downloading.
5.5.3.4 Global settings
You can set which events, by priority, you want to store in the controller and which events will be
displayed on the screen.
5.5.3.5 Settings
You can choose a priority and a specific color which will depend on the event.
Then, the events will be displayed with you the colors or priority you choose.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
83
5.5.4 Network status
A window will show you the network status (connected or disconnected), their firmware version and the
associated expanders of each controller.
5.5.6 Report
The report function is used to create reports on events, users, doors, floors…
It creates et report on an Excel sheet which can be launched manually or via an automatic task or with a
specific event.
5 reports are directly set in the software:
• List of users: List of users and their credentials.
• Access permissions to doors: List of authorized doors per access (with time profiles).
• Access permission to floors: List of authorized floors per access (with time profiles).
• User form: User information, list of credentials and their access permissions
• Event export: List of the site events (see the 2nd screen shot below)
• Zone (if you use programed zones in the site functionality): export the list of the users who are on
a zone
Select the filters. In the screen shot below: by date (today), by events types (access granted) and the
« visitor entrance » only.
Select what you want to see in the Excel file in the last step.
NOTE: the report is dated at today. You can change it for today, yesterday, last week…
5.5.7 People on zone
When you have created a zone in your site, by clicking on the tab « zone » the users in the zone.
3 buttons on right hand side propose you to:
• Edit the zone (pencil)
• See the details of the zone (function only available if you use the counting by company,
profiles or users)
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
85
• People on site (tab representing an eye) with the possibility to export this list
• Reset manually the zone
6.5 Overview
Software manages assets (or premises) to be booked too.
Asset could be a BBQ area, a meeting room, tennis court or a visitor car park for example.
Numerous advanced parameters are available to define each asset's uses and limits in accordance with
users’ needs and managers' requirements:
- List of people authorized to book each asset, possibility to add visitors ...
- Quantity of people agreed simultaneously
- time slot and maximum booking time
- limits of booking per designed period (time and /or quantity)
- Possible programming action attached to booking time (at arrival, end of time ...)
Automatic validation or manager agreement required, booking status evolution can be check through
user's interface (resident portal) and by every selected "booking managers"
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
86
B- “Facility booking management” needs to be ticked in the optional site features to add it in
“Equipment and settings” menu.
Even if you can create and define the assets, to use booking function you need to activate the booking
module
C- activate a “booking module” ref : xx-050-097 in “Equipment and setting/controllers/Activate
third party module”
Module activation list in progress show up in controllers’ page:
In “Equipment & settings” click on “Assets” menu, and “Add an asset” . The second screen capture
shows the settings and parameters list available to define your asset.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
87
Click on “Add an asset to
start a new asset definition
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
88
6.7.3 General asset definition and settings
Name :
You must give a significant name to your asset. To improve its symbolic view for users in planning you
can add an icon and select a specific font chart (background & character colour, bold and/or italic)
Type :
Type define "authorized public" in booking possibility : 1 of the 3 different types can be selected
Display :
Usual weekly display : single asset display with availability graduation from
green (fully available), orange (partially available) to red (fully booked)
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
89
Manage Persons visited :
Single user or a group of people (sport association, social group, …) or a company can be integrated in
users list able to book this asset if selected in this setting.
If you want to manage booking for “groups” or “companies” you must primarily add those selections in
your site’s features.
Limitation in “advanced settings / Limitation periods” (quantity or total time / period) can be applied
on group or company too
Maximum number of people: Available limit of people in the asset at the same time
Max. number of people per booking : Available limit per booking
Max. number of applicants per time slot : In addition to previous parameter, to prevent “multi-booking
user”, the manager can define a limit on “total quantity of people booked by a single user”
Authorized recurring booking :
Opportunity to book an asset for recurring date and time If not, single booking only
Linked assets :
A preset association of assets with “same type and mode” can be selected to automatically generate
booking for linked assets even if each asset can be booked separately:
A “basket hall” and “main changing room” are linked in a gym but “main changing room” can be
booked independently with Dojo for example
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
90
6.7.4.2 Limitations period
In order to automatically manage booking quantity and/or duration on a period, software needs to
define period and its starting point.(for week, month or year)
Period can be defined in weeks, month or year quantity
Week can start on any day of the week, month any day in a month, Year any day in a year to customized
to users or manager needs.
Users offer to open the “authorized list of users” and assign other users (helpful wizard support)
Add extra users to portal offer (or not) possibility to add other users name in booking form to fill
To inform users about booking status (pending, validated, rejected) and confirm each date and time
which asset is booked, an emailing can be set to every concerned people
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
91
This standard information can be customized adding an “Email footer” selected in :
- Site settings
- Company settings
- Customized here in the asset settings
SMTP used for this emailing can be the selected one or by default (iPassan sever one)
6.7.5 Actions
Ipassan manages automatic actions when booking time start, stop, when users are granted or x minutes
before the beginning or end of the time slot.
Those actions are process which need to be previously created. An example of process could be an
activation of a relay which will turn on/off the lights.
Double swipes: when the applicant present his key or code to the asset reader, door opens. Of course,
this user must be authorized at this date and time.
When swiping twice in 3 secs, the controller can stop the current booking validity and/or launch a
process. This process could be the activation of relays to turn on a heating / air cooling system for
example.
Arrival of a planner: According to the “asset access behavior” selection, if a planner is programed then
this event can trigger selected process(es)
Start of the time slot: one or more processes could be launched at the beginning of the booking
period.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
92
End of the time slot: One or more processes could be launched at the end of the time slot. The light or
air cooling turns off for example. Ipassan output cards provides dry contacts.
X minutes before the time: one or more processes could be launched. They have to be created first
through Materials and settings / Reflexes. The air cooling can automatically start before the persons
come in.
X minutes before the end time: through processes, it is possible to decrease the level of the light so
inform the users that the booking time is almost finished.
X minutes after the end time: one or more processes may turn off the heating system or air cooling,
lights, etc
6.7.6 Instruction
It is possible to post some instructions the residents will read before their booking request.
A second option is available in “Users & access profiles”. This time, the users are sorted by asset.
Select Asset booking node then choose one. The list of the authorized users appears on the right part of
the window. Click “Add users” to add some to the asset (see second screen capture).
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
93
6.9 Add a booking request
According to your organization and asset parameters :
- Admin and designed managers can generate booking from software login
- Users can generate booking from resident portal access
- Both with their own login.
On software managers side from “Monitoring/Asset booking” menu every assets are sorted by display
selection : Week view.
or Planning view
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
94
Those 2 displays offer the same features and possibilities but on a different frame
On resident portal access, display is simplified and reduced to connected user’s information
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
95
6.9.3.3 Booking form in “Planning view”,
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
96
Every asset sorted in “planning view” can be displayed simultaneously in the same view
Calendar definition can be adjusted to day, week, month or year and “today” tag on the right always
centralized back information on “today”(today’s week, …)
Whatever the selected type of view, to open a new booking form to fill, click on “New booking” or
straight in desired time slot : following tab is open
A
A- On the top, a tab to sum-up asset’s limit in people quantity and time (gentle reminder)
B-
Assets linked - offer to book in one shot the selected list of assets
Only assets configured with the same “type” and “access behavior” can be linked
Users: Whatever the asset type, user(s) as to be set to valid a booking (who is booking for ?)
Nb of users: this counter will display selected people quantity to don’t exceed asset’s limit and inform if
other booking is possible on the same time slot
Except if is set in advanced settings
Planner : If planner is defined in access behavior, the field to define who is added
Frequency : If “recurring booking” option is set in asset’s parameter, then you must specify if it’s single
or recurring booking to open the required optional tab bellow:
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
97
Recurrency is weekly, so you can select :
C- Asset including “visitor” (Visitor car spot or Mixt) need to specify which visitor(s) is waited and
requested information if emailing is set
Automatically open in “visitor car spot” type, you need to open this visitor’s tab for mixt type
Click on to add requested information or select “visitor has been here” to show-up
list of previous assets visitors. If emailing is selected, visitor email address will be used to transfer
information required:
User will receive confirmation and validation email, his visitor only
when validation is done
Every registered information about asset, data/time and credential will
be report in a customizable email
D- Additional information
Object and description in the bottom of “booking form” Additional information field are designed for
user’s communication.
Object is displayed in planning available for all but not description
Object and description are in email sent to manager (if emailing selected for the asset)
Visit status display the current validation status and offer to software operator to valid it straight away
before registering
6.9.3.4 Registering and booking request sending:
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
98
In the bottom, “save” will submit to manager to valid it and trigger emailing and registration (according
to asset settings)
is a way to temporary save a first booking request and keep all selections in order to just
modify requested field to duplicate it another day, another time or for other people …
When last duplication is done, click on “save” to complete those registration
trigger booking request registration and validation procedure
If the request is acceptable then software will validate it and return following message
if validation is required
Actions
field offer
tools to
valid
“deletion”, “read” or “acknowledged” several booking requests in one shot
to valid or to reject.”booking request”
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
99
6.9.4 See all booking requests (past and upcoming)
In “Monitor/asset” menu in “All booking/Search” tab, every booking requests are stored and can be
filtered via “Search tab menu”
Select “the latest booking to keep”. Example: Older than 30 days will be purged
Purge must be set in accordance with “limitation period” (if this setting is used)
Example: Tennis club limit at 10h per month. Purge must keep 30 days for the less
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
100
2- Manually in “Users & Acces profiles/ Visitors” menu you can select and modify one or several
visitors in one shot or delete them
offer a preset deletion
With his login and password a user registered on a resident portal can connect on the installation to
monitor previous and generate new booking requests on every assets the manager set.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
101
Booking request status is available in “week booking list” (week view) or in calendar (Planning view)
Quick description …
7 Resident portal
Ipassan managers offers a resident portal. This feature could be seen as a second login page to the
software. This portal is web responsive which means it is designed to work on 7’’ screen for example.
The list of the available features are limited to the asset, booking and the visitor management.
The link is the following one when using Ipassan.com.
http://residents-portal.ipassan.com/?login
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
102
7.5 Create a user account
Two possibilities. Create the web account from the Ipassan manager user profile or provide an activation
code to the user so he will create the web account.
In the following screen capture (user), click on “Add a web access” then the second window appears.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
103
Create a web access to many users in one shot
In the following view, select the user(s) you want to provide a web access then click on the “Add a web
access“ push button (red circle)
The software provides an excel sheet with the right activation codes. Those activation codes have to be
provided to the users so they can create their own account by themselves.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
104
When the residents create their account, Ipassan manager is automatically updated (name, e mail, etc).
8 Visitor management
Ipassan manager offers a visitor management feature. The building manager and/or the residents
themselves through the resident portal could manage their visitors.
It could be, as an example, a visitor car park in a condominium where residents must book a car spot for
the visitors.
When visitors are authorized in the system, they automatically receive access rights to the right doors
and floors. The credential could be a key, an access code or a car plate number for a vivitor car park.
8.5 Activation of the visitor management
The feature has to be ticked in the site setting / features. See below.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
105
Activation of the visitor credentials: The authorization could be automatically managed by the software.
So as soon as the visitor is authorized in the access control system, he received the access rights for the
scheduled period.
If this choice is set to “Manual, managed by the software operator”, then the credentials will be
authorized only when an operator of the software will confirm that the visit starts or is finished. This is the
case, for example, when a concierge or door keeper manages the access right of the visitor.
it could be also the case in a company.
Management of the visited users in the resident portal: Ipassan manager provides a resident portal
where tenants are able to manage their visitors. Two choices are offered, the resident manages visitor for
himself only or resident manages visitor also for neighbors.
Enable / disable the credential types
The software manages many types of credential. A first selection has been done in the site property, a
smaller selection is possible for the visitor.
For example, the residents have access to a car park through a car plate number or a remote control but
the visitor have only the plat number solution. So by filtering the credential type here, the resident or
building manager who will add a visitor would not have the choice of the type of credential.
Of course, to authorize a type of credential for visitor, it has to be ticked in the site property.
Default fields:
Select the fields which will be asked when adding a visitor. Only the name is compulsory.
Custom fields:
The software manages some custom fields. It could be text, numbers, boxes to tick, combo box, etc
Those custom fields must be added in Tools / custom fields. See chapter
Select which custom fields must be required for the visitor management.
8.6 Create visitor access profiles
All the door and lift access profiles aren’t automatically available for the visitors. Those visitor access
profiles need to be ticked as shown below.
Only those ticked access profiles will be available when adding a visitor in the system.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
106
The different tabs are:
Dashboard: this filter shows only the visits in progress or upcoming
All visits: No filter, all scheduled (passed, in progress or upcoming) are displayed. But it is possible to
apply your own filter (see below)
In the first part of the form, enter the name of the resident or visited person. You could add more than
one persons.
Select the access profiles for the doors and for the lifts & floors. Remember those access profiles must
be ticked as shown below:
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
107
Select the frequency of the visit. It could be once or recurring and if recurring, the visit could be limited
by beginning and end dates. See an example below
Add a visitor or choose an existing one from the list. Select one or more credential as the visitor may
have access to a car park with a car plate number then access to building with an access code for
example.
It is also possible to add more visitor through the same form.
Enter a purpose for the visit if required and add a description (not compulsory).
Click Save. The visit is added to the list.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
108
8.10.3 Manual management
This mode could be chosen only when an operator welcomes visitors and is using the software. In
Equipment & Settings, Visit settings, the choice is set to “Manual, managed by the software operators”
In this mode, the credentials aren’t authorized to doors and floors until an operator set the visit to started.
In Monitoring, Visits, Dashboard, select the visitor(s) then click on the Play triangle to activate the
credentials. A message, second capture, informs the credentials are now authorized.
To remove the access rights of the credential after the visit is finished, use the same dashboard but click
on the square symbol as shown below. A confirmation is asked. See second screen capture.
9 Advanced programing
9.5 Custom fields
The software manages many fields for users and credentials. A user is defined, for example, by a name,
surname, address, etc
In case, it is requested to add extra field as a car park slot number, a choice yes / no or any numerical
or alphanumerical fields, the software manages this with ticked / unticked boxes.
In Tools / Customise, click on Add A custom field.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
109
The following window appears:
1) Enter a name for this extra field and select the type of custom field. It could be:
Text string: this field is designed to enter a name, phone n° for example and will appear on one line. See
example below
Text field: this field is designed to contain more than a word. It could be a note, comment, etc
The field contains several lines. See example below:
Single selection: It is a list of choice where the operator could select only one. When selecting this type
of field, it is also required to add the choices.
Click on the right + to add one or several choices.
When the custom field is created, it appears as shown below to the software operators.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
110
Dropdown list (or combobox): it is comparable to the single selection but will appears in a different
manner.
It is a list of choice where the operator could select only one. When selecting this type of field, it is also
required to add the choices.
Click on the right + to add one or several choices.
When the custom field is created, it appears as shown below to the software operators.
Multiple list choice: It is the same kind of field (as single selection or dropdown list), but the operator will
be able to select more than one choice. See example below.
2) Tick Compulsory if the field must be filled or untick the box if the filed is provided as an extra
information
3) Select the length of the field and the place of the screen where this extra filed will appear.
Upper zone means, the custom field will appear with the name, surname, access profiles, etc when
opening a user in the software. See below
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
111
Lower zone means the custom field will appears under Additional information. See below.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
112
Help: If you enter a sentence here, it will appear when the operator will place the mouse on the custom
field
Unit: It is possible to add a unit behind the input field. For example, if the software is waiting for a length
in meter, add “Meter” as show below:
Default text: This word or sentence will appear until the operator enter characters. It will help by
informing of the attended data. Example below:
Control: the software could check the data the operator will enter. The field could be:
- Numeric, only digit
- Hexadecimal, only digit + A to F
- url, www.fdimatelec.com for example
- e mail
3
1
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
113
In the example below, the 1st controller of the list will have the IP 192.168.1.51, the next one
192.168.1.52, and so on...
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
114
3
1
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
115
3
1
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
116
9.8 Reflexes
The reflexes have been developed to manage any feature which are not directly included in the system.
You will find below some examples of the functions you can set with the relations:
• Activate a relay when a door is forced
• Deactivate the relay when a particular card is swiped in front of a specific reader
• Activate a relay to disarm an alarm when a card with a specific profile is swiped in front of a
particular reader
• Display a message in the software when a suspended credential is swiped
• …
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
117
Example of easy mode: if the door « Block B main door » is forced, then the output n°22 of the I/O card
n°3 is activated during the time release set.
Step 2: process
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
118
Step 3 : Reflex
Virtual relays
A virtual relay could be used to save a status. For example, if the door A and B are closed then a virtual
relay is on.
The status of this virtual relay could be used later as a condition in a reflex.
9.9 Message
This tab of the monitoring window (which is only available when the alert messages have been set with
relation) displays the alerts, the time and date of the event, and the user which checks it.
10 Tools
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
119
The software gives you the possibility to use tool which can:
• Upgrade the firmware (controller, I/O expanders)
• Import / export sites (add 1 site from one computer to another for instance)
• Reporting
• Automatic tasks: force a controller upgrade, take the events, activate the sending of a report by
email
• Detect the controllers of a network and set the parameters
In the part « import one or several sites », click on Browse and select the file to save. Click on import,
the following window appears:
By default, all the sites saved are selected. It is possible to select them by clicking on the button “Add a
site to import “.
Click on import to launch it.
A last message will appear « Import successful »
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
120
10.7 Configuration backup
It is possible in one Ipassan site to create time profiles or reader behaviors which have to be duplicate in
other sites. For example, a list of holiday days or time profiles are used in many sites.
From the original site, select Tools / Partial export of the site data. Select the time profiles, holiday
periods or reader profiles you want to back up then click on Backup.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
121
In the example below, the task will be launched every 1st of month and will automatically delete logs older
than 6 months from the database.
Note this report cannot be sent if it is empty by ticking the option at the bottom of the window.
You can check if the task is working well. So another person will receive a report which say that the task
is in operation but will not receive the task.
10.10 Hardware upgrade
All the devices of the Ipassan system could be upgraded. This is useful when correction or
improvements are delivered by the manufacturer FDI Matelec.
In the tool window click on « Firmware upgrade ».
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
122
Select the firmware version then click on the button upgrade the firmware
In case the firmware is unknown from the server, you can add it.
At the bottom of the page, under the firmware list, click on Add a firmware then type a name for this new
firmware, then search on the computer the file by clicking on browse
When the file is loaded, the page will refresh and it is possible to send it to the controller.
Note, all readers connected to the same controller are updated automatically in one shot. This operation
takes 30 secondes per reader.
10.11 Controller detection
This tool is designed to detect all the hardware on the network. It could also be used to set Ip settings of
the controller or update the firmware.
Compare to the Monitoring / Network status, this tool uses UDP protocol which means the controller
may be on a different IP range than the computer.
For example, on a network where there isn’t dhcp server, all new controllers will use the following Ip
address 182.168.1.250 so using the multicast commands, it is possible to set a different Ip address to
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
124
those controllers.
An email account has to be created and iPassan Manager needs to have an access to this server.
Write the information in the right fields then test the sending by clicking on “test”.
11 Access software
You can give an access to a third person and then select the functionalities or the site he will be able to
use.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
125
An administrator has all the rights on the sites of his base and can create others users.
An operator who has the profile « installer » can do everything on the authorized site.
The others profile, except « administrator », can be modified. You can also create an unlimited number
of profile and there is no limit in the number of operators.
11.5 Add or modify an operator profile
When the profiles do not correspond to your need, you can create another profile.
In the screen shot below the profile « Security agent » can see the time profile and the access profile,
create and modify a user and see the events.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
126
11.7 Logs
It will show you the operator’s action. You can set the filters per user (dates, sites…).
12 Integration
Ipassan manager offers two ways to be integrated by other system. The first one is the availability for a
third party system to read or read/write in the Ipassan database.
This mode requires knowledge in Sql language and Ipassan database structure.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
127
The second mode is based on Onvif API. The third party system add or remove some keys through this
API, it is also able download the events or open doors, outputs, etc
12.5 Special users
Ipassan manager gives access to the Mysql database through special users. Two mode are availables:
- Read only : read but you can not modify the data
this option is secure as those special users could only read data. Insertion or modification aren’t
possible.
- Read / write : you can modify all data. Be careful, in this mode, you can damage the database and
the access control system will no longer work.
With these modes, you can view all events, all persons, all doors ….
12.5.3 Add a special user
In the software operators, select Special operators then click Add.
Enter a login + password and select the mode (read only or read/write)
Note, the read / write needs an extra security. Ask FDI Matelec for the activation password.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
128
-
When you are connected, you can select the database IPU_BASE_XXXX
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
129
12.5.5 Event view
A view has been created to facilitate access to events. You can see all events with this sql query :
select * from `view_event`
You see the list of events:
Important field:
- EVL_DATE : date of event
- SIT_ID : if you have several site on you database, each site have UID. To know this UID, use the
ctrl+alt+D shortcut.
- EVT_FAMILY : family of event (you can see it with ctrl+alt+D command – after v1.7.2 ):
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
130
o 0 : System
o 1 : PSU
o 2 : Access granted
o 3 : Access denied
o 4 : Neutral access
o 5 : door
o 6 : Input
o 7 : Output
o 8 : Status
o 9 : Reflexes
o 10 : Communication
o 12 : zone
o 13 : counter
o 14 : process
o 15 : condition
o 18 : reader
o 19 : peripherals
o 20: lift hli
o 21: intercom
- EVT_NUM : event number in the family (you can see it with ctrl+alt+D command – after v1.7.2 ):
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
131
- EVT_TABLE : type of element :
o SITE = 10
o NETWORK = 20
o DEVICE = 30
o UNIT = 40
o DOOR = 60
o RELAY = 70
o READER = 80
o RELAY/READER = 90
o PERSON = 110
o KEY = 120
o ZONE = 130
o IOCARD = 140
o INPUT = 150
o OUTPUT = 160
o LIFT = 170
o REFLEX = 180
o PROCESSUS = 260
o TASK = 270
o COUNTER = 350
o VIRTUAL_RELAY = 360
o INTERCOM = 500
- EVT_TABLE_ID : Id of the element in the table. You can display the element id with ctr+alt+D
shortcut.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
132
Example, if you want all event on one door, you have to filter on EVT_TABLE = 60 AND
EVT_TABLE_ID = 133
select EVL_DATE, EVT_FAMILY, EVT_NUM, EVT_TABLE, EVT_TABLE_ID, EVL_INFO1, EVL_INFO2
from `view_event` WHERE EVT_TABLE = 60 AND EVT_TABLE_ID = 133 ORDER BY EVL_DATE DESC
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
134
- M = Mandatory: features that must be supported in order to be conformant to the Profile
(implemented by the Onvif peripheral)
- O = Optionnal: function that may be implemented by an ONVIF Device or ONVIF Client
- C = Conditional: Function that shall be implemented by an ONVIF Device or ONVIF Client if it
supports that functionality.
If an Onvif peripheral is compliant with a service, it must be compliant with all the
commands of the WSDL service corresponding. If the specific command is not required for a
service and the peripheral is not compliant, the error answer must be the following code:
env:Receiver,
ter:ActionNotSupported.
The official documentations of the services are useful to understand the implementation of the features.
For example for the service ‘’credential’’:
https://www.onvif.org/specs/srv/access/ONVIF-Credential-Service-Spec-v1706.pdf
The command ‘’getSupportedFormatTypes’’ means that we should have, first, defined an authorized list in
our Web Service. For that reason, a link is added in the special user section – API.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
135
In this section, the list of the authorized credentials for each site is added. It is then possible for each
credential to define a ‘’FormatType’’. The type of credential is fixed: pt:Card or pt:PIN.
FormatType numéric:
SIMPLE_NUMBER16
SIMPLE_NUMBER32
FormatType Wiegand :
WIEGAND26
WIEGAND37
FASC_N_BCD
Onvif is based on soap technology. A free tool gives the possibility to test the protocol:
https://www.soapui.org/downloads/soapui.html (version: open source)
When installed, you should select the file: wsdl.
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
136
Disclaimer: Whilst every effort has been made to ensure accuracy in the representation of this product, neither FDI nor its employees, shall be
liable under any circumstances to any party in respect of decisions or actions they may make as a result of using this information. In accordance
with the FDI policy of enhanced development, design and specifications are subject to change without notice.
137