This section describes how to view the properties of keys on iLOQ Manager.
Proceed as follows.
- Select Basic data > Browse keys.
- The keys are shown in the grid view. For more information on an individual key, double-click the key to open key-specific details.Note:
You can view object data in two ways:
- Show sought-after situation — Select this radio button to view object data as it will be, when all pending changes have been programmed for the object.
- Show the effective situation — Select this radio button to view object data as it currently is.
Key-specific details are, by tabs:
- Basic information — The Basic information tab contains the basic information on the selected key. The columns are:
- The name of the key — This column contains the name of the key.
- The name of the person — This column contains the name of the person the key is attached to.
- Date of hand over — This column contains the date when the key was handed over to the person.
- Programming state — This column contains the programming state of the key. Possible values are:
- Programmed — The key has been programmed and the physical key has the same data as shown in iLOQ Manager. This is the desired state for the keys in the system.
- Ordered — The key has been ordered. A key programming task has been created for the key. It is either a task for initial programming of a new physical key, or a re-programming task for an existing key. However, the key programming is pending.
- Transferred to programming — A key programming task has been transferred to the Programmer.
- Issued to programming — The Net Bridge or iLOQ Manager has fetched the programming task from the server, but they have not yet replied that the task has been programmed.
- In planning — Some changes for an existing key has been done, or a new key has been added, but not yet created as a programming task (that is, ordered).
- Last edited — This status column indicates when the key programming state was last changed.
- Editor — This column indicates the user that has last changed the key programming state.
- On the blacklist — This status column indicates whether the key has been blacklisted or not.
- Label — This column contains the label of the physical key.
- Expired — This status column indicates whether the planned return date for the key has passed or not.
- Expiration date — This column indicates the planned return date for the key.
- Count of access rights — This column indicates the number of access rights assigned for the key.
- Count of hidden access rights — This column indicates the number of key access rights hidden from the user, on a foreign zone.
- Hidden — This column indicates whether the key is hidden or not.
- Access right with version — If the key has a versional access right, this column contains the name of the versional access right.
- Version number — This column indicates the version number, if the key has a versional access right.
- Time limited — This status column indicates whether the key is time limited or not.
- Start date — This column indicates the date as of which a time-limited key is valid.
- Key is valid to — This column indicates the last date when a time-limited key is valid.
- RFID tag number — This column indicates the RFID tag UID number, if the key has one.
- Footnotes — This column contains additional information on the key.
- Company/Department — This column contains the company or department information of the person to whom the key is attached.
- Access with PIN code — This column indicates the kind of access the key has to a lock that requires a PIN code.
- PIN code has been set — This column indicates if a PIN code for the key has been set or not.
- S10 Online ID — This column indicates the internal RFID number of the S10 Online system.
- Postpone date — This column indicates the starting date for key change availability at the Key Programming Hot Spot.
- Replaced — This column indicates if this key has been replaced by another key or not.
- Name of replaced key — This column indicates the key that has been replaced by this key.
- Replacement key — This column indicates if this key is replacing another key or not.
- S10 Online key — This column indicates the type of S10 Online key.
- Access to locks — The Access to locks tab contains information on the locks which the key has access to. The columns are described in section Browsing Locks.
- Access rights — The Access rights tab contains information on the access rights that the key has. The columns are:
- Access right — This column contains the name of the access right.
- Description — This column contains the description of the access right.
- Conditional access — The check box in this status column indicates whether the access right has conditional access or not.
- Status — The traffic light icon in this column indicates if the access right is blacklisted or not. The color codes are:
- Green — The access right is not blacklisted.
- Red — The access right is blacklisted.
- Estate — This column indicates the estate where the access right belongs to.
- Zone — This column indicates the zone where the access right belongs to.
- Default access right — The check box in this status column indicates if the access right is the default access right or not.
- Version number — This column contains the version number, if the access right is versional.
- Version status — This column indicates if the key has up-to-date information on the access right version. The version status may be outdated, for example, if you have added a key that has a higher version number.
- Person attached to the key — The Person attached to the key tab contains information on the person that is attached to the key. The columns are described in section Browsing Persons.
- Timelimit — The Timelimit tab contains information on the key time limits. Time limits are described in section Adding a New Key.
- History — The History tab contains information on the key history. By clicking the plus sign next to a history row, you can see more detailed history information. You can see:
- The history of key programmings
- The history of key hand over changes
- If this key replaces another key, the name of the replaced key
See also Browsing Keys.
- Documents — The Documents tab contains key hand over and/or key returning documents, if digitally signed.
- When done, press the Close button.