1. Home
  2. DoorLock

DoorLock

General

The basic settings for each device include the activation status (on/off) and a name under which all alarms and warnings reported by this device are displayed. This should be as clearly descriptive as possible in order to distinguish the devices.

By selecting the higher-level alarm group, the device is assigned to the system hierarchy.
Alarms are signaled in the higher-level alarm group.

A DoorLock can be set as the default reader for teaching in RFID tokens. In this case, it is preselected when new tokens are added. In addition, the period of time during which the DoorLock remains engaged after a successful booking can be configured. If desired, you can set the DoorLock to activate a switching output when a booking is made.

A DoorLock must be assigned to an access profile so that it can be opened by users.

Extended

Wall readers with a keypad offer the option of activating double authentication. In this case, in addition to presenting their RFID token, users must also enter their PIN in order to open the door.

A time profile can be stored for access doors that are to remain open for fixed periods. After the first successful booking in the configured period, the DoorLock now remains open for the rest of the period.

Events

Webhooks

Webhooks in KentixONE offer the option of sending an HTTP request to an external server when an event occurs. Each webhook can be assigned the types of alarms or warnings for which it should be sent.

Webhooks also offer the option of mapping functions via the KentixONE SmartAPI that are not available via the standard configuration.
For example, if a fire alarm occurs, the switching outputs of an AccessManager could be activated to unlock the connected motorized locks.

Network camera

If a camera has been assigned to a DoorLock, the system takes pictures with it every time a booking is made and displays them in the access logbook.

Data protection

To ensure data protection, the storage behavior of the system for this DoorLock can be adjusted in stages.

  • Standard logbook: Personal data such as name and images are saved and displayed in the access logbook. All bookings are recorded.
  • No user-related data: Personal data such as the name and images are not saved and are not displayed in the access logbook. All bookings are recorded.
  • Only unauthorized bookings: Only bookings that have not opened a door are recorded. Personal data is not stored.
  • Do not save: No booking data is recorded and saved. There is no booking history in the access logbook.

Dismantling protection

Some DoorLock readers have integrated dismantling detection. If the alarm evaluation for the function is active, an alarm is triggered if the reader is removed from its holder.

Door contacts

If a door contact has been connected to an external sensor of the host AccessManager, this can be assigned to the DoorLock. As with all monitored sensors, an alarm assignment must also be assigned to the door contact in order to activate the alarm evaluation.

NameAPI valueDescription
FromoffThe alarm is deactivated for this input and the status/measured value is not updated.
Sharp-Activearmed-activeIf the higher-level alarm group has been armed, alarms can be triggered. The status/measured value of the input is updated.
Permanently activealways-activeAlarms can be triggered independently of the switching status of the alarm group. The status/measured value of the input is updated.
firefireAlarms can always be triggered. These are reported as fire alarms.
SabotagesabotageAlarms can always be triggered. These are reported as sabotage/intrusion alarms.
System messagesystemAlarms can always be triggered. These are reported as a system message.

The time after opening until the alarm and the digital input connected to the DoorLock can also be selected.

Door opener

If the DoorLock is to be opened via an external trigger (e.g. a button or switch), this can be connected to an external sensor of the Host Access Manager and assigned to the DoorLock here.

Alerting

In addition to the door contact, DoorLock-RA4 rack locks also have an evaluation of the bolt status, which also requires an alarm assignment.

NameAPI valueDescription
FromoffThe alarm is deactivated for this input and the status/measured value is not updated.
Sharp-Activearmed-activeIf the higher-level alarm group has been armed, alarms can be triggered. The status/measured value of the input is updated.
Permanently activealways-activeAlarms can be triggered independently of the switching status of the alarm group. The status/measured value of the input is updated.
firefireAlarms can always be triggered. These are reported as fire alarms.
SabotagesabotageAlarms can always be triggered. These are reported as sabotage/intrusion alarms.
System messagesystemAlarms can always be triggered. These are reported as a system message.

The time after opening until the alarm is triggered can be set and the alarm evaluation can be inverted.

Door contact bypass

With DoorLock-WAx, a bypass can be configured for the connected door contact. A relay time can be specified for this, which indicates how long the bypass should last, as well as a signaling time, which indicates how long the switching output should be activated if the door contact is still open after the relay time has expired.

Alarm systems

If a booking is successful, a selected alarm group can be activated. A single booking disarms the linked alarm group, a double booking arms it.

A user requires authorization to switch alarm groups in order to be able to use this function.

Was this article helpful?