Chapter
7
Operating instructions
RFID Access Management
86
Operating instructions | SICK
8018582/2015-11-03
Subject to change without notice
Working with RFID Access
Management
Displaying access logs using the four eyes principle
1. Open RFID Access Management with the
Operator
or
Integrator
user role.
2. Click the
Access Log
icon on the toolbar. You will receive a prompt for the security
password for the Information Security Officer role to be entered.
3. Once the Information Security Officer has entered the password and clicked
OK
to
confirm it, the
Access Log view
opens.
7.4.2
Filtering the list of access logs
The
Access Log
view is a type of logbook that records every access made by the
authorized participants. The access is listed along with all the access-related information.
This includes the time it was called up, the name of the participant, the personnel number,
the access point, and the reading time of the RFID interrogator.
The view that is only authorized for the Information Security Officer has a red border to
differentiate it from the other views.