procontrol ProxerSafe KeySafe User Manual Download Page 10

 

 
 

 
 

 

10/ 23   

KeySafe Lock User Guide 

 

User interface/Cabinet software 

 

Cabinet management software can be split into two parts: 

 

software running on the cabinet’s built-in computer: 

KCS

 

 

software running on the external management computer in the network (ProxerNet software KeySafe 
Module): 

KMS

 

They have different functionalities. In this document only KCS is discussed. 

 

User levels 

There are two user types in KCS: 

1.  Key user 

2.  Superuser/ Admin 

The difference between the key user and the superuser is in their rights. 

 

User rights 

Key user has right to login, select, pick up and return keys. 

Superuser is authorized to login, select, pick up and return keys, and also for basic management functions.

 

The Admin menu is displayed only for Superusers/ Admins in KCS. 

 

 

Functions of the KeySafe Cabinet Software (KCS) for key 

users 

Detailed  management  functions  are  available  only  in  external  cabinet  management  software,  ProxerNet 
software KeySafe module. 

The main screen of the KCS software looks like: 

 

The actual time and date are displayed in the upper right corner of the screen. 

Summary of Contents for ProxerSafe KeySafe

Page 1: ...1 23 KeySafe Lock User Guide PROCONTROL ProxerSafe family KeySafe Lock RFID technology based safety key cabinet User Guide Version 14 1 Date October 2018...

Page 2: ...11 Login 11 Login using card 11 Login using PIN code 11 Login with combination of card and PIN code 12 Login with fingerprint 12 Login with combination of fingerprint and PIN code 12 Key handling 13...

Page 3: ...3 23 KeySafe Lock User Guide Check user event log 22 Monitoring using other functions 23 KeySafe cabinet Questions and Answers 23 Installation 23 Installation guide is in the Administrator Manual 23...

Page 4: ...he equipment only for the purpose it has been designed for About the security Use the power supply provided by manufacturer for the device Use electric power connection as specified in this guide Atte...

Page 5: ...an built in computer It is possible to connect it to a computer network and to check remotely who and when took which key and for how long time The KeySafe Lock does not allow taking any key just the...

Page 6: ...ffline online communication operates in its own manageable via the touchscreen of the built in PC and can be managed from a remote PC via Internet Can be combined with the access and time management m...

Page 7: ...o be able to pull out the plug The module s own RFID reader reads the available RFID IDs and sends them to the PC software When someone identifies himself the cabinet starts to investigate whether the...

Page 8: ...rm tone alarm out The motor mechanics of the key latch get jammed alarm out email The door was left open for too long successful identification keys have been removed but the door remained open Alarm...

Page 9: ...ck Bio type the fingerprint reader works only after the device has waken when the fingerprint reader is blue During power outage mode the key LEDs light only at use The key modules check the keys in e...

Page 10: ...dmin The difference between the key user and the superuser is in their rights User rights Key user has right to login select pick up and return keys Superuser is authorized to login select pick up and...

Page 11: ...glish by default To select other available languages please consult the Admin Guide At request other translations can be available Login Login using card Place your card close to the card reader next...

Page 12: ...till waiting Login with fingerprint Put your finger on the fingerprint reader The device beeps at the fingerprint scan In case a fingerprint is not entitled a Not authorized message appears on the scr...

Page 13: ...les mark the keys available for you If keys are reserved the software shows them in full orange rectangles The full grey rectangle means that another user who also has right for this key has picked up...

Page 14: ...hile the green an open one If the person has no activity for 90 sec after the door has been opened the latches of the opened key slots will lock again timeout Key position slots also close if the user...

Page 15: ...ways find the keys with the key finder function Switching off marking the misplaced keys optional The function described in the previous paragraph can be switched off In this case the key map does not...

Page 16: ...se the KeySafe for managing bunch of keys in the FindKey menu you can see the subkeys which belong to a key The key position number of the subkey is the same as of the main key If you choose one of th...

Page 17: ...the keyboard in the lower right corner E g let s search for vehicles with letter C It is possible to search in more columns at once the search result will be displayed accordingly To close the keyboa...

Page 18: ...ew users into the system manage all the keys and user rights per keys set time and read event logs User cards can be also requested These can be used to open the cabinet and certain key slots if the r...

Page 19: ...the entered PIN is to be confirmed Then press Save Modify a user When you tap on a username their data is shown on the right You can edit those data a pencil icon appears next to the username and when...

Page 20: ...rights Edit keys You can change the name and modify the RFID number of a selected key in Admin menu Key edit menu Choose a key modify its data and finally tap Save Replacing RFID key holders To replac...

Page 21: ...menu point too If you click on a user name a key list will appear on the right side Mark the empty checkbox in the Authorized column or unmark it if you need to revoke key rights from the user Finally...

Page 22: ...thin a specified time interval just set the From start date and To end date fields and then press the Update button Press the Back button if you would like to return to the Admin menu KCS shows the fo...

Page 23: ...One person can take out more keys at the same time The event log records the key numbers username and the date of removal What happens if I put the key back not to its own position e g Key 22 into th...

Reviews: