Select your region or visit global site

Support
Open navigation

Viewing the Key Properties

This section describes how to view the properties of keys on iLOQ Manager.

Proceed as follows.

  1. Select Basic data > Browse keys.

  2. The keys are shown in the grid view. For more information on an individual key, double-click the key to open key-specific details.
    Note:

    You can view object data in two ways:

    • Show sought-after situation — Select this radio button to view object data as it will be, when all pending changes have been programmed for the object.
    • Show the effective situation — Select this radio button to view object data as it currently is.

    Key-specific details are, by tabs:

    • Basic information — The Basic informationtab contains the basic information on the selected key. The columns are:
      • The name of the key — The name of the key.

      • The name of the person — The name of the person to whom the key is assigned.

      • Date of hand over — The date when the key was handed over to the person.

        For a Key Fob, this column indicates the date when the key was handed over to the person. For a Phone Key, this column indicates the date when the key was received by the phone.

      • Programming state — The programming state of the key. Possible values are:

        • Programmed — The key has been programmed and the physical key has the same data as shown in iLOQ Manager. This is the desired state for the keys in the system.

        • Ordered — The key has been ordered. A key programming task has been created for the key. It is either a task for initial programming of a new physical key, or a re-programming task for an existing key. However, the key programming is pending.

        • Transferred to programming — A key programming task has been transferred to the Programmer or to another Key Fob.

        • Issued to programming

          • For a phone key, the phone has fetched the programming task from the server, but has not yet replied that the task has been programmed.
          • For a physical key, Net Bridge or iLOQ Manager has fetched the programming task from the server, but they have not yet replied that the task has been programmed.
        • In planning — Some changes for an existing key has been done, or a new key has been added, but not yet created as a programming task (that is, ordered).

      • Editor — The user that has last changed the key programming state.

      • On the blocklist — This status field indicates whether the key has been blocklisted or not.

      • Label — The label of the key.

      • Hidden — This field indicates whether the key is hidden or not.

      • Expired — This field indicates whether the planned return date for the key has passed or not.

      • Expiration date — This field indicates the planned return date for the key.

      • Last edited — This field column indicates when the key programming state was last changed.

      • Count of access rights — This field indicates the number of access rights assigned for the key.

      • Time limited — This field indicates whether the key is time limited or not.

      • S10 Online ID — This field indicates the internal RFID number of the S10 Online system.

      • ROM_ID — This field indicates the serial number of the key. This information is only shown for keys that have been programmed in the system.

      • RFID tag number — This field indicates the RFID tag UID number, if the key has one.

      • Footnotes — Additional information on the key.

      • Company/Department — The company or department information of the person to whom the key is attached.

      • Replaced — This field indicates if this key has been replaced by another key or not.

      • Access with PIN code — This field indicates the kind of access the key has to a lock that requires a PIN code.

      • Main zone — This field indicates the main zone of the key.

      • PIN code has been set — This field indicates if a PIN code for the key has been set or not.

      • Name of replaced key — This field indicates the key that has been replaced by this key.

      • Replacement key — This field indicates if this key is replacing another key or not.

      • Key type — Key type refers to the type of the key.

    • Access to locks — The Access to locks tab contains information on the locks which the key has access to. The columns are described in section Browsing Locks.

    • Access rights — The Access rights tab contains information on the access rights that the key has. The columns are:

      • Access right — This column contains the name of the access right.

      • Description — This column contains the description of the access right.

      • Status — The traffic light icon in this column indicates if the access right is blacklisted or not. The color codes are:

        • Green — The access right is not blacklisted.
        • Red — The access right is blacklisted.
      • Estate — This column indicates the estate where the access right belongs to.

      • Zone — This column indicates the zone where the access right belongs to.

      • Default access right — The check box in this status column indicates if the access right is the default access right or not.

      • Type — This column contains the access right type.

    • Person attached to the key — The Person attached to the key tab contains information on the person that is attached to the key. The columns are described in section Browsing Persons.

    • Timelimit — The Timelimit tab contains information on the key time limits. Time limits are described in section Adding a Key.

    • Zones — The Zones tab contains a list of zones where the access key belongs to.

    • History — The History tab contains information on the key history. By clicking the plus sign next to a history row, you can see more detailed history information. You can see:

      • The history of key programmings
      • The history of key hand over changes
      • If this key replaces another key, the name of the replaced key
    • See also Browsing Keys

    • Documents — The Documents tab contains key hand over and/or key returning documents, if digitally signed.

    • Blocklist carried by the key — The Blocklist carried by the key tab contains information on the blocklist version of the key. See also Blocklist.

    • Key audit trail — The Key audit trail tab contains the audit trail of the key.

  3. When done, press the Close button.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select atleast one of the reasons

Feedback sent

We appreciate your effort and will try to fix the article

Didn't find what you were looking for?

Submit a ticket