Kentix SmartAccess user manual

Purpose: This manual guides you step by step through the commissioning, secure operation and predictive maintenance of Kentix SmartAccess. It is designed for technically experienced users and requires basic knowledge of network technology, locking technology and IT administration.

System overview

You operate Kentix SmartAccess as an IP-based access management system that works with wired wall readers on the AccessManager (BUS) or with battery-operated DoorLocks (RADIO), depending on the door situation. You use wall readers if you want to control motor locks, motor cylinders or electric strikes, and you use DoorLocks if you need a quick, low-wire retrofit on the fitting. You carry out all setup and administration in the web-based KentixONE interface, where you register components, manage authorizations and evaluate events.

Tips & tricks – system overview:
For unprotected external doors, you consistently choose components with a high protection rating, you prefer to size heavily frequented doors with a wall reader plus motorized lock, and you reserve DoorLocks primarily for indoor areas or retrofit scenarios without new door wiring.

1. commissioning

1.1 Mechanical and electrical installation

You start with a structured door and environment analysis and check the lock type, panic function, door stop, cylinder mount, environmental influences and mechanical ease of movement. You select the right component for each door: a DoorLock fitting for direct door installation without a bus cable or a wired wall reader on the AccessManager for controlling a locking device. You install DoorLocks without voltage, insert the batteries correctly and ensure that the housing is tight and the seals are undamaged; in the case of wall readers, you lay a clean bus cable, supply the AccessManager via PoE and connect the locking device according to the Datasheet, taking into account the permissible duty cycle for pulse and permanent opening.

Commissioning checklist – Installation

  1. You document the door data in full by recording the lock type, panic function, door stop, surroundings and planned frequency of use.
  2. You choose the right component for each door by providing wireless DoorLocks for retrofitting and wall readers for high robustness and outdoor areas.
  3. You install the fitting or reader professionally by ensuring a stress-free fit, defined cable routing and correct polarity.
  4. You parameterize the locking device correctly by setting the pulse times, permanent opening and current consumption according to the manufacturer’s specifications.
  5. You verify the mechanics by testing the engagement, the handle function and the door movement without friction.

Tips & tricks – Installation:
Only plan permanent openings if the locking device used is expressly approved for operation with 100 % duty cycle, and always have a complete set of seals ready in the service case for external doors.

1.2 System integration and configuration

You put the AccessManager into operation, assign IP configuration and time synchronization, and then carry out the automatic search for the components. You register DoorLocks and wall readers in KentixONE, create users, groups and finely granulated schedules and assign these to the doors. You store two-factor authentication with PIN on the keypad reader in areas requiring special protection, and you control relay outputs for elevators, barriers or alarm links according to your security concept.

Commissioning checklist – Configuration

  1. You integrate AccessManager, wall readers and DoorLocks into KentixONE by successfully registering the devices and checking the time synchronization.
  2. You model the access logic by defining roles, groups and zones and assigning suitable schedules.
  3. You activate two-factor authentication at critical doors by combining PIN and RFID and verifying the booking chain.
  4. You issue media in a structured manner by assigning RFID cards or smartphones and documenting the issue in an audit-proof manner.
  5. You test the complete function chain by checking booking, signaling, lock activation, door contact and alarm links.

Tips & Tricks – Configuration:You instruct users to hold the medium calmly in front of the reader and only operate the mechanism after a visual or acoustic acknowledgement, and you point out a minimally extended booking time for encrypted media.

1.3 Acceptance and handover

You complete commissioning with a formal acceptance procedure in which you create configuration and topology screenshots, serial numbers, firmware versions and a complete baseline backup. You document the terminal assignment, the bus topology and the parameterization of the locking devices and hand over a compact operating aid as well as a door and component plan to the operations team.

Checklist commissioning – acceptance

  1. You document the configuration completely by recording screenshots, serial numbers and firmware versions.
  2. You create a baseline backup by exporting the KentixONE configuration and storing it securely.
  3. You test each door in all operating modes by testing normal operation, time window outside, two-factor, permanent opening and alarm paths.
  4. You permanently label cables and components by keeping labels and door lists synchronized.
  5. You hand over a quick guide to service and reception by summarizing the most important operating procedures on one page.

Tips & tricks – Acceptance:
Have the acceptance checked by a second person and record open points immediately as a ticket so that no details are passed on to the company without clarification.

2. operation

2.1 User, media and rights management

You manage a role-based authorization model in which you permanently assign standard rights and strictly limit special rights. You immediately block lost media, document the reissue and log all changes in an audit-proof manner. You use time-limited profiles for visitors and service providers and permanently enforce two-factor access at sensitive doors.

Operation checklist – Rights

  1. You recertify authorizations regularly and remove outdated accesses promptly.
  2. You handle media losses by process by immediately locking the medium and issuing a replacement medium.
  3. You keep schedules up to date by mapping seasonal changes and operating times.
  4. You consistently enforce two-factor at critical doors by documenting and approving exceptions.
  5. You archive changes and evaluations by creating exports and storing them in an audit directory.

Tips & tricks – Rights:
You can avoid the creeping expansion of rights by always setting an end date for guest and project access and configuring automatic deactivation.

2.2 Events, monitoring and reporting

They monitor access events, failed attempts, battery levels, online status and door contacts at fixed intervals. You check the PoE budget for the AccessManager, the power consumption of the locking devices and the parameterization for impulse and continuous operation. You create regular reports and initiate training or technical measures in the event of anomalies.

Operation checklist – Monitoring

  1. They view event and error logs according to a fixed plan and initiate root cause analyses in the event of anomalies.
  2. They monitor battery levels, plan preventive replacements and avoid unplanned outages.
  3. They check the online status of all components and test alarms for offline statuses.
  4. You verify PoE reserves and locking device load by comparing measured values with the design.
  5. You generate monthly reports for compliance and management and archive them in a structured manner.

Tips & Tricks – Monitoring:
You can establish threshold values and dashboards that allow you to recognize rising incorrect booking rates at an early stage and provide targeted retraining.

2.3 Integrations and couplings

You link access events with alarm and video systems and use I/O signals to control elevators, barriers or revolving doors. You integrate time servers, syslog and network segmentation and document terminal assignment, signal levels and test cases for each integration.

Operation checklist – Integrations

  1. You test the chain of effects from access to alarm and video by defining and logging start and end conditions.
  2. You name terminals and I/O points clearly by recording designations, measured values and limit values.
  3. You regularly check time, log and VLAN integrations by ensuring synchronization and accessibility.
  4. You evaluate fault scenarios and define fallbacks by simulating interrupted lines and failure modes.
  5. You maintain integration changes centrally by keeping and releasing a change register.

Tips & tricks – Integrations:
You can avoid false activations by clearly defining directional logic, debounce times and door statuses in the chain and testing them repeatedly.

3. maintenance

3.1 Preventive maintenance and life cycle

You prevent failures by regularly checking and maintaining the mechanics, seals, contacts and batteries. You change batteries on a time-based basis, preferably before the start of the cold season on external components, and you replace seals when changing batteries to ensure permanent IP protection. You carry out semi-annual function tests for permanent opening, two-factor and door contacts.

Checklist Maintenance – Prevention

  1. You plan and document time-based battery changes to avoid spontaneous failures.
  2. They check and replace seals to maintain the required degree of protection over the life cycle.
  3. They check the smooth running of the mechanics and eliminate stiffness at an early stage.
  4. You test permanent opening, two-factor and door contacts on all doors twice a year and document the results.
  5. They keep a stock of spare parts and tools that includes batteries, seals and at least one replacement reader or replacement fitting kit.

Tips & tricks – Prevention:
Take into account the flat discharge curve of lithium batteries and do not rely exclusively on residual displays, but combine displays with fixed replacement dates.


Discharge curve lithium cells
  1. Full battery, battery life
  2. Empty battery, discharged

3.2 Software, firmware and backups

You keep KentixONE and the device firmware up to date, carry out complete configuration backups before making changes and test the relevant door scenarios after updates. You establish a documented recovery plan for backups and practise restoring at least once a year.

Maintenance checklist – Software

  1. You take an inventory of firmware versions and plan updates in defined maintenance windows.
  2. You create complete backups before making changes and store them securely.
  3. After updates, you check the key functions by testing two-factor, permanent opening and alarm links.
  4. You have a backup plan ready so that you can revert to tested, executable versions.
  5. They carry out an annual recovery and power-off test to verify the restart capability in practice.

Tips & Tricks – Software:
You can link firmware series with planned function tests so that you can use downtimes efficiently and avoid duplication of effort.

3.3 Training and operation

You train employees in the correct operating sequence at the door: they hold the medium calmly in front of the reader, wait for acknowledgement and only then operate the lever handle or knob. You analyze operating errors using the event logs and adapt training content. You provide compact information sheets in technical and reception areas.

Maintenance checklist – Training

  1. You carry out initial training with a practical test at the door and have participation confirmed.
  2. They point out the slightly longer booking time for encrypted media and practise keeping the media quiet.
  3. They regularly update information sheets and place them in suitable locations.
  4. They analyze incorrect bookings and initiate targeted retraining.
  5. You plan annual refresher training and document its effectiveness.

Tips & Tricks – Training:
You can increase the quality of operation by integrating short acceptance tests into the training and summarizing the most important steps on one page.

4. faults and emergencies

4.1 Safely rectifying typical faults

If a DoorLock radio does not open, first check the battery, authorizations and time window and remind the user of the correct operating sequence. If a DoorLock wall reader signals correctly but the lock does not respond, check the power supply, wiring, parameterization of the switching times and the suitability of the door opener for continuous operation. If components appear offline, check the network paths, PoE budget, time synchronization and the status of the respective AccessManager.

Fault checklist

  1. You first check the physical basics by checking the battery, seal, mechanics and supply.
  2. They verify the authorizations, the schedules and any two-factor authentication that may be required.
  3. You check the accessibility by checking the network, PoE budget, NTP and AccessManager status.
  4. You check the switching parameters and load by adjusting the pulse and permanent opening as well as the current consumption of the closing device.
  5. You complete the fault processing by documenting test bookings and closing the ticket with cause and action.

Tips & Tricks – Malfunction:
You can shorten the downtime by keeping a small spare parts kit with batteries, seals and a replacement reader or replacement fitting kit.

4.2 Emergency access and restart

You ensure that defined persons are granted access in an emergency by providing an organizationally secured mechanical locking system and storing emergency authorizations in accordance with your internal guidelines. You practise the restart regularly and proceed in a fixed order: You establish the network and PoE supply, you check the AccessManager, you test the readers and locking devices, and you then validate the doors on a random basis.

Emergency checklist

  1. They maintain and test emergency access points for critical doors at fixed intervals.
  2. They ensure mechanical locking and store the keys in an organizationally protected manner.
  3. You check the UPS autonomy and define escalation and contact paths.
  4. You practise the restart at least once a year and document the results.
  5. You have a run book with brief instructions ready at the technical site.

Tips & tricks – Emergency:
You can reduce stress in an emergency by preparing one-page quick reference guides for each location and practicing the most important test and action steps in spot checks.

5. component guide (compact)

You prefer to use DoorLocks in indoor areas or for retrofitting without new door cabling, and you use wall readers with AccessManager wherever high frequencies, outdoor climate, two-factor or integration into building technology are required. You plan the maximum number of connected readers and locking devices per AccessManager and take PoE power reserves, cable lengths and the power consumption of the locking device into account.

Tips & tricks – Components:
You can increase the service life by using motor locks or motor cylinders with a suitable load capacity for external and permanent opening applications and by not operating the electric strike permanently in limit operation.

Concluding remarks

With this approach, you can put Kentix SmartAccess into operation in a structured manner, keep it stable in day-to-day business and ensure availability over the entire life cycle. The checklists, tips and procedures described can be incorporated directly into your operating processes and create clear traceability for operations, audits and malfunctions.

Related Articles