This section describes how to view the properties of keys on iLOQ Manager.
Proceed as follows.
- Select Basic data > Browse keys.
- The keys are shown in the grid view. For more information on an individual key, double-click the key to open key-specific details.Note:
You can view object data in two ways:
- Show sought-after situation — Select this radio button to view object data as it will be, when all pending changes have been programmed for the object.
- Show the effective situation — Select this radio button to view object data as it currently is.
Key-specific details are, by tabs:
- Basic information — The Basic informationtab contains the basic information on the selected key. The columns are:
The name of the key — The name of the key.
The name of the person — The name of the person to whom the key is assigned.
Date of hand over — The date when the key was handed over to the person.
For a Key Fob, this column indicates the date when the key was handed over to the person. For a Phone Key, this column indicates the date when the key was received by the phone.
Programming state — The programming state of the key. Possible values are:
Programmed — The key has been programmed and the physical key has the same data as shown in iLOQ Manager. This is the desired state for the keys in the system.
Ordered — The key has been ordered. A key programming task has been created for the key. It is either a task for initial programming of a new physical key, or a re-programming task for an existing key. However, the key programming is pending.
Transferred to programming — A key programming task has been transferred to the Programmer or to another Key Fob.
Issued to programming
- For a phone key, the phone has fetched the programming task from the server, but has not yet replied that the task has been programmed.
- For a physical key, Net Bridge or iLOQ Manager has fetched the programming task from the server, but they have not yet replied that the task has been programmed.
In planning — Some changes for an existing key has been done, or a new key has been added, but not yet created as a programming task (that is, ordered).
Editor — The user that has last changed the key programming state.
On the blocklist — This status field indicates whether the key has been blocklisted or not.
Label — The label of the key.
Hidden — This field indicates whether the key is hidden or not.
Expired — This field indicates whether the planned return date for the key has passed or not.
Expiration date — This field indicates the planned return date for the key.
Last edited — This field column indicates when the key programming state was last changed.
Count of access rights — This field indicates the number of access rights assigned for the key.
Time limited — This field indicates whether the key is time limited or not.
S10 Online ID — This field indicates the internal RFID number of the S10 Online system.
ROM_ID — This field indicates the serial number of the key. This information is only shown for keys that have been programmed in the system.
RFID tag number — This field indicates the RFID tag UID number, if the key has one.
Footnotes — Additional information on the key.
Company/Department — The company or department information of the person to whom the key is attached.
Replaced — This field indicates if this key has been replaced by another key or not.
Access with PIN code — This field indicates the kind of access the key has to a lock that requires a PIN code.
Main zone — This field indicates the main zone of the key.
PIN code has been set — This field indicates if a PIN code for the key has been set or not.
Name of replaced key — This field indicates the key that has been replaced by this key.
Replacement key — This field indicates if this key is replacing another key or not.
Key type — Key type refers to the type of the key.
Access to locks — The Access to locks tab contains information on the locks which the key has access to. The columns are described in section Browsing Locks.
Access rights — The Access rights tab contains information on the access rights that the key has. The columns are:
Access right — This column contains the name of the access right.
Description — This column contains the description of the access right.
Status — The traffic light icon in this column indicates if the access right is blacklisted or not. The color codes are:
- Green — The access right is not blacklisted.
- Red — The access right is blacklisted.
Estate — This column indicates the estate where the access right belongs to.
Zone — This column indicates the zone where the access right belongs to.
Default access right — The check box in this status column indicates if the access right is the default access right or not.
Type — This column contains the access right type.
Person attached to the key — The Person attached to the key tab contains information on the person that is attached to the key. The columns are described in section Browsing Persons.
Timelimit — The Timelimit tab contains information on the key time limits. Time limits are described in section Adding a Key.
Zones — The Zones tab contains a list of zones where the access key belongs to.
History — The History tab contains information on the key history. By clicking the plus sign next to a history row, you can see more detailed history information. You can see:
- The history of key programmings
- The history of key hand over changes
- If this key replaces another key, the name of the replaced key
See also Browsing Keys
Documents — The Documents tab contains key hand over and/or key returning documents, if digitally signed.
Blocklist carried by the key — The Blocklist carried by the key tab contains information on the blocklist version of the key. See also Blocklist.
Key audit trail — The Key audit trail tab contains the audit trail of the key.
- When done, press the Close button.