Open navigation

Viewing the Key Properties

This section describes how to view the properties of keys on iLOQ Manager.

Proceed as follows.

  1. Select Basic data > Browse keys.

  2. The keys are shown in the grid view. For more information on an individual key, double-click the key to open key-specific details.
    Note:

    You can view object data in two ways:

    • Show sought-after situation — Select this radio button to view object data as it will be, when all pending changes have been programmed for the object.
    • Show the effective situation — Select this radio button to view object data as it currently is.

    Key-specific details are, by tabs:

    • Basic information — The Basic information tab contains the basic information on the selected key. The columns are:
      • The name of the key — This column contains the name of the key.
      • The name of the person — This column contains the name of the person the key is attached to.
      • Date of hand over — This column contains the date when the key was handed over to the person.
      • Programming state — This column contains the programming state of the key. Possible values are:
        • Programmed — The key has been programmed and the physical key has the same data as shown in iLOQ Manager. This is the desired state for the keys in the system.
        • Ordered — The key has been ordered. A key programming task has been created for the key. It is either a task for initial programming of a new physical key, or a re-programming task for an existing key. However, the key programming is pending.
        • Transferred to programming — A key programming task has been transferred to the Programmer.
        • Issued to programming — The Net Bridge or iLOQ Manager has fetched the programming task from the server, but they have not yet replied that the task has been programmed.
        • In planning — Some changes for an existing key has been done, or a new key has been added, but not yet created as a programming task (that is, ordered).
      • Last edited — This status column indicates when the key programming state was last changed.
      • Editor — This column indicates the user that has last changed the key programming state.
      • On the blacklist — This status column indicates whether the key has been blacklisted or not.
      • Label — This column contains the label of the physical key.
      • Expired — This status column indicates whether the planned return date for the key has passed or not.
      • Expiration date — This column indicates the planned return date for the key.
      • Count of access rights — This column indicates the number of access rights assigned for the key.
      • Count of hidden access rights — This column indicates the number of key access rights hidden from the user, on a foreign zone.
      • Hidden — This column indicates whether the key is hidden or not.
      • Access right with version — If the key has a versional access right, this column contains the name of the versional access right.
      • Version number — This column indicates the version number, if the key has a versional access right.
      • Time limited — This status column indicates whether the key is time limited or not.
      • Start date — This column indicates the date as of which a time-limited key is valid.
      • Key is valid to — This column indicates the last date when a time-limited key is valid.
      • RFID tag number — This column indicates the RFID tag UID number, if the key has one.
      • Footnotes — This column contains additional information on the key.
      • Company/Department — This column contains the company or department information of the person to whom the key is attached.
      • Access with PIN code — This column indicates the kind of access the key has to a lock that requires a PIN code.
      • PIN code has been set — This column indicates if a PIN code for the key has been set or not.
      • S10 Online ID — This column indicates the internal RFID number of the S10 Online system.
      • Postpone date — This column indicates the starting date for key change availability at the Key Programming Hot Spot.
      • Replaced — This column indicates if this key has been replaced by another key or not.
      • Name of replaced key — This column indicates the key that has been replaced by this key.
      • Replacement key — This column indicates if this key is replacing another key or not.
      • S10 Online key — This column indicates the type of S10 Online key.
    • Access to locks — The Access to locks tab contains information on the locks which the key has access to. The columns are described in section Browsing Locks.
    • Access rights — The Access rights tab contains information on the access rights that the key has. The columns are:
      • Access right — This column contains the name of the access right.
      • Description — This column contains the description of the access right.
      • Conditional access — The check box in this status column indicates whether the access right has conditional access or not.
      • Status — The traffic light icon in this column indicates if the access right is blacklisted or not. The color codes are:
        • Green — The access right is not blacklisted.
        • Red — The access right is blacklisted.
      • Estate — This column indicates the estate where the access right belongs to.
      • Zone — This column indicates the zone where the access right belongs to.
      • Default access right — The check box in this status column indicates if the access right is the default access right or not.
      • Version number — This column contains the version number, if the access right is versional.
      • Version status — This column indicates if the key has up-to-date information on the access right version. The version status may be outdated, for example, if you have added a key that has a higher version number.
    • Person attached to the key — The Person attached to the key tab contains information on the person that is attached to the key. The columns are described in section Browsing Persons.
    • Timelimit — The Timelimit tab contains information on the key time limits. Time limits are described in section Adding a New Key.
    • History — The History tab contains information on the key history. By clicking the plus sign next to a history row, you can see more detailed history information. You can see:
      • The history of key programmings
      • The history of key hand over changes
      • If this key replaces another key, the name of the replaced key
    • See also Browsing Keys.

    • Documents — The Documents tab contains key hand over and/or key returning documents, if digitally signed.
  3. When done, press the Close button.
R
Rosalind is the author of this solution article.

Did you find it helpful? Yes No

Send feedback
Sorry we couldn't be helpful. Help us improve this article with your feedback.