This section describes how to edit the locking system settings on iLOQ Manager.
Proceed as follows.
Select Administration > Edit locking system information.
Select Settings in the Views area.
The system settings screen is opened. The settings are:
Handed over key can be attached to another person without returning the key — If this setting is in use, you can detach or re-attach a handed-over key to another person without returning the key first. This feature is useful, if the key changes owner without returning the key to the administrator.
If you attach a handed-over key to another person without returning the key first, pay attention to the audit trails on locks that have no clocks. These audit trails will show that the key owner is the person to whom the key was attached to at the audit trail picking moment, as a clockless lock does not know when the person has changed. If the key is returned before handing it over to a new person, even the clockless locks will know which user has accessed the lock. Therefore, it is recommended to return the key before handing it over to a new person.
Estate functionality active — If this setting is used, estates are enabled. For more information, see Estates.
Code-access groups in use — If this setting is used, code-access groups are enabled. For more information, see Calendar Controlled Doors.
Key PIN-codes in use — If this setting is used, key PIN-codes are enabled. For more information, see Calendar Controlled Doors.
Divided lock time limitation in use — If this setting is used, locks can use divided time limitations.
Locks with software version 94 or older can only handle both time limits, or no time limits at all.
Locks with software version 95 or newer can handle time limit 1 or time limit 2, both time limits, or no time limits at all. In other words, these locks can handle divided lock time limitations.
This selection is irreversible.
You can check the software version of a programmed lock in the lock grid view, in the Sw version column. By default, this column is hidden.
Key RFID tag number function available — The keys can contain RFID tags. If this is the case, the RFID data can be managed as follows:
Not in use — The keys contain no RFID tags.
Field locked — The keys with RFID tags are delivered by iLOQ, and the tags contain unique IDs. The unique ID is automatically transferred to the software when the key is programmed. You cannot edit the ID manually.
Field editable — The keys are delivered by iLOQ. The keys are equipped with RFID tags by the customer, and the tags contain identifiers. The user must type in the tag identifier manually when programming the key. The user can later edit the identifier.
Default access right — You can select the system default access right in this drop-down menu. The default access right will be automatically added to new locks.
Net Bridge firmware remote update in use — If this setting is in use, Net Bridge automatically updates the software and firmware on itself and on the bus devices.
Update time — You can define the start time for the allowed software and firmware installation period. The allowed installation period lasts for three hours.
Postponed Hot spot key update in use — If this setting is in use, you can define access right changes on keys for the future. These changes are not available at the Key Programming Hot Spot until the defined date.