
5
..
CLIQ™ Go Locking Systems
45
The access log is copied from the cylinder to the key.
...
...
3)
Copy the access log to the system from the key (K2).
a)
Go back to the system.
b)
Connect the key to the system via the programming device.
If the updater key is Connect key, start CLIQ™ Connect app to connect the
key to the system.
The access log is copied from the key to the system.
The events in the access log can now be viewed in the cylinder view.
See also Section 5.6.8
, page 47.
5.6
Principles for Authorisation
5.6.1
Authorisation Overview
For a key to be able to open a cylinder, the following requirements need to be fulfilled:
•
The key has been
programmed to have access
to the cylinder, see Section
, page 45.
•
The key is
valid
. This requires that the key is valid according to the key validity
settings, see Section 5.6.4
, page 45.
•
at the current time, see Section 5.6.5
•
The key is
not blocked
in cylinder.
5.6.2
Offline System
Even though CLIQ™ Go is managed in an online environment, it is important to remember
that the system is offline. This means that any modified settings do not change in real time.
For changes to take effect, the keys and cylinders need to be programmed, see Section
5.6.7
“Programming keys and cylinders”
, page 46.
5.6.3
Key Access List
The
key access list
is stored in the key and contains the cylinders to which the key has
access. The key access list is easily updated in PDs.
5.6.4
Key Validity
Key validity means that a key at any given time is either
Always valid
,
Never valid
or
Valid
between
two dates. A valid key has access according to authorisation and schedule
settings, whereas an invalid key is blocked from all access.
NOTE!
Note that key validity and key schedule are two different concepts. See
also Section 5.6.5
, page 46.
Summary of Contents for Zi IKON CLIQ Go
Page 1: ...CLIQ Go Reseller Guide 2020 02 10 The global leader in door opening solutions ...
Page 53: ...6 Appendix 53 ...
Page 54: ......