0% found this document useful (0 votes)
22 views57 pages

OT04 Access Control System Operation - HikCentral Access Control

Uploaded by

anthonyfrank405
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views57 pages

OT04 Access Control System Operation - HikCentral Access Control

Uploaded by

anthonyfrank405
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 57

HCSA-Access Control

System Operation
HikCentral Access Control
Training Objectives

Know about what HikCentral Access Control is

Master how to configure and apply basic access


control function on HikCentral Access Control

Master how to configure and apply advanced access


control function on HikCentral Access Control
Contents

Basic Configuration
and Application

Introduction of Advanced
HikCentral Configuration and
Access Contol Application
System Structure
Card Enrollment
HikCentral USB
USB
Access Control RVVP 4/7*0.75
USB
RVV 4*1.0
Finger Enrollment
CAT5

TCP/IP RVV 2*1.0

Access
controller

RS485/
Wiegand Wi-Fi

Card reader
Terminal
Device Model Selection
Product showcase

HikCentral DS-K1TXXX Terminal


Access Control
 Facial anti-spoofing
 Unique verification, avoid cloned card
 Match speed <0.5s
 Attendance shifts supported
TCP / IP network

DS-K26/28XX Access Control Controller


 100,000 Cards, 300,000 Event Records
 Support Wiegand and RS485 reader
 4-zone alarm input function, fire alarm relay
Terminals Access Controllers
HikCentral Access Control Overview

HikCentral Access Control

 Person

 HikCentral Access Control v1.3  Access Control

 1024 Access Points;  Time & Attendance

 50,000 persons, 250,000 cards, 200,000 fingerprints  Event Center

 512 access levels  Monitoring


System Requirement

Minimum i3 CPU / 4G RAM


Reuse the existing computer to deploy HikCentral
Access Control.

The administrator can directly manage the whole system

from any computer and mobile phone.


System Installation
Basic Function - Access Control Wizard

 Select Wizard (Top Right) -


Access control;
Note: Select wizard for beginners,
follow the sequence to configure
on software
Basic Function - System

 Import/Export configuration file:


restore/backup iVMS-4200
database
 Auto Backup: Set plan for
automatic database backup
Basic Function – NTP

 System Configuration –
Network - NTP
Contents

Basic Configuration
and Application

Introduction of Advanced
HikCentral Configuration and
Access Contol Application
Basic Configuration & Application
 To implement Access Control function, please follow the steps below:

General Access Control Application

Check the
Add access Add access Check access control
Add access control status of the
Add person real-time events and
device schedule level person or
history records
door

Resource management Person Basic Setting Access Level Troubleshooting Web Client
Add Access Control Device
Resource Management -> Device and Server -> Access Control Device
 Option 1. click ‘Add’;
 Option 2. add online device

Add Access Control Device

1. Device IP address;
2. Device Name;
3. Password;
4. When adding device,
users can either import
access point to existing
area or import access
point to an new area.
Add Access Control Device
Resource Management -> Area

 Configure doors:
 Basic information
 Related camera
 Image storage
 Card reader
Add Person
Person -> Add Person Group -> Add Person One by One/in Batch

 Add Person
 Import in Batch
 Import by Template
 Import Profile Picture
 Import Domain Persons
 Import from Device
Add Person One by One
Person -> Add Person Group -> Add Person One by One

 Basic Information
 Person Group
 Name
 Gender
 Profile Picture
 Credential Management
 Card
 Fingerprint
Add Person One by One
Person -> Add Person Group -> Add Person One by One

 Face Information
 From device:
Access control
device/Video intercom
device/Enrollment station
 Take a picture:
by PC’s build-in camera
 Upload picture:
From PC
Add Person in Batch: by Template
Add Person -> Import by Template

 Download Template
 Edit Template
 Name
 Person Group
 Upload Template
Add Person in Batch: Profile Pictures
Add Person -> Import Profile Pictures
 Prepare Profile Picture
(Zipped file)
 Naming rule for profile
photos: First Name +
Last Name_ID
 Upload file
Add Person in Batch: from Device
Add Person -> Import from Device
 Select Device Type
 Select Device
 Import from Device
Add Person in Batch: Domain Persons

Add Person -> Import Domain Persons


 Set Domain Information
 Import Domain Persons
Add Access Schedule

Access Control -> Basic Settings -> Access Schedule Template


Add Access Level

Access Control -> Access Level -> Manage Access Level


 Select access point
 Select access schedule
Assign Access Level to Person

Access Control -> Access Level -> Option 1. Assign by Access Level
 Select access level
 Assign to person
Assign Access Level to Person
Access Control -> Access Level -> Option 1. Assign by Access Level
 Select access level
 Assign to person
 Apply to device
Assign Access Level to Person
Access Control -> Access Level -> Option 2. Assign by Person
 Select person
 Assign access level to sb.
 Select access level
 Apply to device
Assign Access Level to Person
Access Control -> Access Level -> Option 3. Assign by Person Group
 Select person group
 Assign access level to sb.
 Select access level
 Apply to device
Assign Access Level to Person
Access Control -> Access Level -> Option 4. Assign by Access Group
 Add access group
 Select person as group
member
 Select access group
 Assign access level to sb.
 Select access level
 Apply to device
Troubleshooting
Access Control -> Troubleshooting
 Add access group
 Select person as group
member
 Select access group
 Assign access level to sb.
 Select access level
 Apply to device
Real-time Monitoring
Access Control -> Real-time Monitoring
 View status of access
points
 Remote control
(lock/unlock/remain
locked/remain unlocked)
 View real-time event
 Click person name to view
detailed information
Identity Access Search
Access Control -> Search -> Identity Access Search
 Filter time/access
point/record type and so
on
 View identity access
records
 Click name to view
detailed person
information and access
information
Contents

Basic Configuration
and Application

Introduction of Advanced
HikCentral Configuration and
Access Contol Application
Product Types

Functions &
Anti-passback
 Products
Applications
 Multi-factor Authentication

Advanced  Authentication via PIN Code


Configuration and
Application
Advanced Configuration & Application Ⅰ
 To configure Anti-Passback function, please follow the steps below:

Area Anti-Passback Route Anti-Passback Application

Anti- Set Anti-


Passback Passback Set Card Enable First Forgive
Select geographic Check
-> Area -> Route Reader Card Reader Regularly/
Doors location result
Anti- Anti- Order (Optional) manually
Passback (Optional) Passback

Access Control Application -> Anti-Passback Web Client


Single-door Anti-pass back

Single-door anti-pass back


function is mainly applied in
entrance doors of bank vault,
Pass laboratories, prison; and also for
parking gates;

So long as the sequence is “in – out –


Out in – out – in – out”, everything works
Enter fine
Route Anti-pass back

Prescribed Route
Regional Anti-pass back
Regional anti-pass back function is
mainly applied in underground,
exhibition hall;

If a person did not enter through an approved


building entrance, he or she should not be
Exit permitted to use any of the readers within the
Entry building

The function usually works between multiple


controllers, so we also call this function as cross
controller anti-pass back
Add Anti-passback Rule
Access Control -> Access Control Application -> Anti-passback

 Area Anti-passback
If you need single door anti-
passback or regional anti-
passback, add area anti-
passback rule
 Route Anti-passback
Add Area Anti-passback
Access Control -> Access Control Application -> Anti-passback
 Select door
 Single door
 Multiple door (regional)
 Forgive anti-passback
regularly
Add Route Anti-passback
Access Control -> Access Control Application -> Anti-passback
 Configure card reader
order: select card reader
one by one
 If we enable ‘First Card
Reader’, there are two
functions:
 Forgive anti-passback
rule violation, if you
swipe card again from
the first card reader
 Swiping card route must
start from the first card
reader
Application of Anti-passback

 When anti-passback rule


violation is triggered, you
can find the event;
 You can manfully forgive
anti-passback violation in
both real-time monitoring
and identity access search
Product Types

Functions &
Anti-passback
 Products
Applications
 Multi-factor Authentication

Advanced  Authentication via PIN Code


Configuration and
Application
Advanced Configuration & Application Ⅱ
 To configure Multi-Factor Authentication, please follow the steps below:

Access control application Application

Add Multi-Factor Add a person to receive Add Multi-Factor


Check result
Authentication Group remote request (Optional) Authentication rule

Multi-Factor Authentication Web Client


Configure Multi-Factor Authentication Rule
Access Control -> Access Control Application -> Multi-Factor Authentication
 Add Multi-Factor
Authentication Group
Management
 Add Person to Receive
Remote Door Open
Request
 Add rule
 Select doors
 Select access mode
1. Unlock after access
granted
2. Remotely unlock after
granted
3. Enter super password
after granted
Configure Multi-Factor Authentication Rule
Access Control -> Access Control Application -> Multi-Factor Authentication
 Select access schedule
 Card swiping interval
 Relate to group
 Select number of
persons for
authentication in groups
 Adjust authentication
sequence for groups
Product Types

Functions &
Anti-passback
 Products
Applications
 Multi-factor Authentication

Advanced  Authentication via PIN Code


Configuration and
Application
Advanced Configuration & Application Ⅲ
 To configure Authentication via PIN Code function, please follow the steps below:

Authentication via PIN Code Application

Enable Select PIN Person Set reader Check record type of


Import
Authenticate Code Update Information authentication mode access control record:
Excel file
via Password Mode Page as password PIN authenticated

Person/Access Control Person -> PIN Code Authentication Mode Web Client

Notice:
Access controller and DS-K1T802 do not support PIN code function
Enable Authentication via PIN Code
General -> Person/Access Control -> Basic Settings -> General
 Two options:
 Person
 Access Control
Set PIN Code to person
General -> Person
 One by one:
Add person -> PIN code
 Batch import by excel
Fill in PIN code in Excel
Application of Authentication via PIN Code
Access Control -> Real-time Monitoring
 Record type: PIN
authenticated
Thank you

You might also like