13.07.2015 Views

Software Well-Contact Suite Office Linee guida ed ... - Vimar S.p.A.

Software Well-Contact Suite Office Linee guida ed ... - Vimar S.p.A.

Software Well-Contact Suite Office Linee guida ed ... - Vimar S.p.A.

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The Reception sectionIntroductionThe Reception section of the <strong>Well</strong>-<strong>Contact</strong> <strong>Suite</strong> software allows the management of the following:• User data management: integration and modification of personal data of the users. Such management is access<strong>ed</strong> from the subsection"Users" of the "Reception" section of the <strong>Well</strong>-<strong>Contact</strong> <strong>Suite</strong> software.• Access control (for the users) system cards management: design, programming, activation and deletion. Such management is access<strong>ed</strong> fromthe subsection "Users" of the "Reception" section of the <strong>Well</strong>-<strong>Contact</strong> <strong>Suite</strong> software.Note: The staff cards can be manag<strong>ed</strong> from the "Administration" section.<strong>Well</strong>-<strong>Contact</strong> system access cards managementIntroductionThe part of the <strong>Well</strong>-<strong>Contact</strong> system that takes care of access control consists of transponder readers (external and pocket ones), card programmer andcards themselves.Access to an environment is grant<strong>ed</strong> only after approval by the transponder reader that oversees that area, of a valid card, or a card whose data (accesstype and access period) coincides with that on the reader.Access card creationFrom the standpoint of the <strong>Well</strong>-<strong>Contact</strong> automation system management, with particular reference to access control management, to create a valid cardthat provides access to an area of the <strong>Well</strong>-<strong>Contact</strong> system with a transponder reader, you must have complet<strong>ed</strong> the following steps:1. Logical creation of the access card. Through this proc<strong>ed</strong>ure, you create all access data to be associat<strong>ed</strong> with the specific card.The data to be defin<strong>ed</strong> is summariz<strong>ed</strong> in the following list:a. Access type to associate with the card: user access, staff member access (service staff, maintenance staff, m<strong>ed</strong>ical staff…)b. Environments to which the card must give right of access. It consists of the list of environments to which the card should allowaccess.c. Access period. Represents the period of validity of the card.2. Programming of the card. This proc<strong>ed</strong>ure, perform<strong>ed</strong> by the <strong>Well</strong>-<strong>Contact</strong> <strong>Suite</strong> software through the card programmer of the <strong>Well</strong>-<strong>Contact</strong>system, writes on the card all data relat<strong>ed</strong> to the access rights previously defin<strong>ed</strong> for the operation of "Logical creation of the access card".At the conclusion of this proc<strong>ed</strong>ure, the access data are transferr<strong>ed</strong> to the card but the card is still not "active", or the programm<strong>ed</strong> card doesnot yet allow access to the areas defin<strong>ed</strong> during the "Logical creation of the access card".3. Activation of the card. This proc<strong>ed</strong>ure allows to make the validity of the card effective. It is carri<strong>ed</strong> out by the <strong>Well</strong>-<strong>Contact</strong> <strong>Suite</strong> softwareand does not require writing operations on the card.Only after having successfully complet<strong>ed</strong> this operation, the card allows access to the desir<strong>ed</strong> areas.Note: Steps 2 and 3 are execut<strong>ed</strong> in sequence and automatically in the <strong>Well</strong>-<strong>Contact</strong> <strong>Office</strong> <strong>Suite</strong> software, starting from the writing proc<strong>ed</strong>uresand replacement of the cards.Revoking the validity of an access cardYou can at any time revoke the access rights of a card. With this operation, the rights of access of that card to the desir<strong>ed</strong> environments (and then to thetransponder readers that control such access) are revok<strong>ed</strong>.To revoke access rights of a card you do not physically ne<strong>ed</strong> to reprogram the card itself, hence you can revoke the access rights even if you aren't physicallyin possession of the card,.This operation is carri<strong>ed</strong> out through the <strong>Well</strong>-<strong>Contact</strong> <strong>Suite</strong> software.17

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!