Select your region or visit global site

Support
Open navigation

Viewing the Key Properties

This section describes how to view the properties of keys on iLOQ Manager.

Proceed as follows.

  1. Select Basic data > Browse keys.

  2. The keys are shown in the grid view. For more information on an individual key, double-click the key to open key-specific details.
    Note:

    You can view object data in two ways:

    • Show sought-after situation — Select this radio button to view object data as it will be, when all pending changes have been programmed for the object.
    • Show the effective situation — Select this radio button to view object data as it currently is.

    Key-specific details are, by tabs:

    • Basic information — The Basic information tab contains the basic information on the selected key. The columns are:
      • The name of the key — This column contains the name of the key.
      • The name of the person — This column contains the name of the person the key is attached to.
      • Date of hand over — This column contains the date when the key was handed over to the person.
      • Programming state — This column contains the programming state of the key. Possible values are:
        • Programmed — The key has been programmed and the physical key has the same data as shown in iLOQ Manager. This is the desired state for the keys in the system.
        • Ordered — The key has been ordered. A key programming task has been created for the key. It is either a task for initial programming of a new physical key, or a re-programming task for an existing key. However, the key programming is pending.
        • Transferred to programming — A key programming task has been transferred to the Programmer.
        • Issued to programming — The Net Bridge or iLOQ Manager has fetched the programming task from the server, but they have not yet replied that the task has been programmed.
        • In planning — Some changes for an existing key has been done, or a new key has been added, but not yet created as a programming task (that is, ordered).
      • Last edited — This status column indicates when the key programming state was last changed.
      • Editor — This column indicates the user that has last changed the key programming state.
      • On the blacklist — This status column indicates whether the key has been blacklisted or not.
      • Label — This column contains the label of the physical key.
      • Expired — This status column indicates whether the planned return date for the key has passed or not.
      • Expiration date — This column indicates the planned return date for the key.
      • Count of access rights — This column indicates the number of access rights assigned for the key.
      • Count of hidden access rights — This column indicates the number of key access rights hidden from the user, on a foreign zone.
      • Hidden — This column indicates whether the key is hidden or not.
      • Access right with version — If the key has a versional access right, this column contains the name of the versional access right.
      • Version number — This column indicates the version number, if the key has a versional access right.
      • Time limited — This status column indicates whether the key is time limited or not.
      • Start date — This column indicates the date as of which a time-limited key is valid.
      • Key is valid to — This column indicates the last date when a time-limited key is valid.
      • RFID tag number — This column indicates the RFID tag UID number, if the key has one.
      • Footnotes — This column contains additional information on the key.
      • Company/Department — This column contains the company or department information of the person to whom the key is attached.
      • Access with PIN code — This column indicates the kind of access the key has to a lock that requires a PIN code.
      • PIN code has been set — This column indicates if a PIN code for the key has been set or not.
      • S10 Online ID — This column indicates the internal RFID number of the S10 Online system.
      • Postpone date — This column indicates the starting date for key change availability at the Key Programming Hot Spot.
      • Replaced — This column indicates if this key has been replaced by another key or not.
      • Name of replaced key — This column indicates the key that has been replaced by this key.
      • Replacement key — This column indicates if this key is replacing another key or not.
      • S10 Online key — This column indicates the type of S10 Online key.
    • Access to locks — The Access to locks tab contains information on the locks which the key has access to. The columns are described in section Browsing Locks.
    • Access rights — The Access rights tab contains information on the access rights that the key has. The columns are:
      • Access right — This column contains the name of the access right.
      • Description — This column contains the description of the access right.
      • Conditional access — The check box in this status column indicates whether the access right has conditional access or not.
      • Status — The traffic light icon in this column indicates if the access right is blacklisted or not. The color codes are:
        • Green — The access right is not blacklisted.
        • Red — The access right is blacklisted.
      • Estate — This column indicates the estate where the access right belongs to.
      • Zone — This column indicates the zone where the access right belongs to.
      • Default access right — The check box in this status column indicates if the access right is the default access right or not.
      • Version number — This column contains the version number, if the access right is versional.
      • Version status — This column indicates if the key has up-to-date information on the access right version. The version status may be outdated, for example, if you have added a key that has a higher version number.
    • Person attached to the key — The Person attached to the key tab contains information on the person that is attached to the key. The columns are described in section Browsing Persons.
    • Timelimit — The Timelimit tab contains information on the key time limits. Time limits are described in section Adding a New Key.
    • History — The History tab contains information on the key history. By clicking the plus sign next to a history row, you can see more detailed history information. You can see:
      • The history of key programmings
      • The history of key hand over changes
      • If this key replaces another key, the name of the replaced key
    • See also Browsing Keys.

    • Documents — The Documents tab contains key hand over and/or key returning documents, if digitally signed.
  3. When done, press the Close button.


Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article

Didn't find what you were looking for?

Submit a ticket