Chapter
7
Operating instructions
RFID Access Management
88
Operating instructions | SICK
8018582/2015-11-03
Subject to change without notice
Working with RFID Access
Management
From here, the Information Security Officer is only able to access the access logs again or
gain severely restricted access to the
Configuration
view. There, the Information Security
Officer can only change his/her password or perform a data backup.
Logging out using the four eyes principle
You have logged in to RFID Access Management with the
Operator
or
Integrator
user role.
The list of access logs has been opened by the Information Security Officer entering the
security password.
Click the
Logout
icon. The System Overview opens.
All the program functions of the logged-in user role are available again.
7.5
Managing RFID Access Management
7.5.1
Performing a data backup/restoring the database
Perform a regular data backup to protect all RFID Access Management data and settings
against damage and loss. A data backup, for example, serves to protect against hardware
damage to the configuration PC, inadvertent deletion of data, or attacks by computer
viruses.
With the
Save data
function, RFID Access Management offers a simple option for creating
a system backup. The entire RFID Access Management database is saved in a ZIP file.
With the
Restore data
function, you can reimport the data from a data backup into RFID
Access Management. The current database is then replaced with the data backup that
had previously been created.
Getting started
Click the
Configuration
icon and switch to the
Settings
tab.
Backing up data
1. Next to
Save data
, click the
Select file
button.
This will open the Windows dialog box for saving files.