About
Secure Entry is a component of AXIS Camera Station Pro. Use it to add devices and manage schedules. For more information, please see the AXIS Camera Station Pro User Manual.
Configure access control
If you add an Axis network door controller to your system, you can configure the access control hardware in AXIS Camera Station version 6.x or later.
For a complete workflow to set up Axis network door controller in AXIS Camera Station Pro Secure Entry, see Set up an Axis network door controller.
Before you start, do the following:
- Upgrade the controller AXIS OS version under Configuration > Devices > Management.
- Set date and time for the controller under Configuration > Devices > Management.
- Turn on HTTPS on the controller under Configuration > Devices > Management.
For more information see the AXIS Camera Station Pro User Manual.
Workflow to configure access control
To edit the predefined identification profiles or create a new identification profile, see Identification profiles.
To use a custom setup for card formats and PIN length, see Card formats and PIN.
Add a door and apply an identification profile to the door. See Add a door.
Configure the door.
Add a zone and add doors to the zone. See Add a zone.
Device software compatibility for door controllers
Keep in mind the following when you upgrade the AXIS OS on your door controller:
- Supported AXIS OS versions: The supported AXIS OS versions listed below only apply when upgrading from their original recommended AXIS Camera Station Pro version and when the system has a door. If the system doesn't meet these conditions, you must upgrade to the recommended AXIS OS version for the specific AXIS Camera Station Pro version.
- Minimum supported AXIS OS version: The oldest installed AXIS OS version in the system determines the minimum supported AXIS OS version, with a limit of two prior versions. Suppose you're using AXIS Camera Station Pro version 6.5 and upgrade all devices to the recommended AXIS OS version 12.0.86.2. Then, AXIS OS version 12.0.86.2 becomes the minimum supported version for your system moving forward.
- Upgrading beyond recommended AXIS OS version: Suppose you upgrade to an AXIS OS version above the recommended one for a particular AXIS Camera Station Pro version. Then, you can always downgrade back to the recommended AXIS OS version without any issues, as long as it's within the support limits set for the AXIS Camera Station Pro version.
- Future AXIS OS recommendations: Always follow the recommended AXIS OS version for the respective AXIS Camera Station Pro version to ensure system stability and full compatibility.
The table below shows the minimum and recommended AXIS OS version for each AXIS Camera Station Pro version:
| AXIS Camera Station version | Minimum AXIS OS version | Recommended AXIS OS version |
|---|---|---|
| Pro 6.13 | 12.5.68.1 | 12.6.102.1 |
| Pro 6.12 | 12.2.63.13 | 12.6.94.1 |
| Pro 6.11 | 12.0.101.4 | 12.5.68.1 |
Doors and zones
Go to Configuration > Access control > Doors and zones to get an overview and configure doors and zones.
Pin chart | View the controller pin chart associated with a door. If you want to print the pin chart, click Print. |
Identification profile | Change identification profile on doors. |
Secure Channel | Turn on or off OSDP Secure Channel for a specific reader. |
| Doors | ||||||
| Name | The name of the door. | |||||
| Door controller | The door controller connected to the door. | |||||
| Side A | The zone that side A of the door is in. | |||||
| Side B | The zone that side B of the door is in. | |||||
| Identification profile | The identification profile applied to the door. | |||||
| Card formats and PIN | Shows the type of card formats or PIN length. | |||||
| Status | The status of the door.
| |||||
| Zones | ||||||
| Name | The name of the zone. | |||||
| Number of doors | The number of doors included in the zone. | |||||
Example of doors and zones
There are two zones: green zone and blue zone.
There are three doors: green door, blue door, and brown door.
The green door is an internal door in the green zone.
The blue door is a perimeter door for the blue zone only.
The brown door is a perimeter door for both the green zone and blue zone.
Add a door
- You can configure a door controller with one door that has two locks, or two doors that have one lock each.
- If a door controller has no doors and you're using a new version of AXIS Camera Station Pro Secure Entry with older firmware on the door controller, the system will prevent you from adding a door. However, the system does allow new doors on system controllers with older firmware if there's already an existing door.
Create a new door configuration to add a door:
Go to Configuration > Access control > Doors and zones.
Click
Add door and select a door type from the drop-down list.Door types Door A regular door with a door monitor that supports locks and readers. Requires a door controller. Wireless door A door you can configure with ASSA ABLOY Aperio® wireless locks and communication hubs. For more information, see Add a wireless lock. Monitoring door A door that can report whether it’s open or closed. For more information, see Add a monitoring door. Provisioned door A door you can add as a placeholder in the system without the requirement of selecting the hardware for it. Floor A door type for elevator control that authenticates access to elevator floors using card readers. For more information, see Add a floor for elevator control. Enter a name for the door and select a door controller in the Device drop-down menu to associate with the door. The controller grays out when you can’t add another door, when it’s offline, or HTTPS isn’t active.
Click Next to go to the door configuration page.
In the Primary lock drop-down menu, select a relay port.
To configure two locks on the door, select a relay port from the Secondary lock drop-down menu.
Select an identification profile. See Identification profiles.
Configure the door settings. See Door settings.
Configure the security level. See Door security level.
Click Save.
Copy an existing door configuration to add a door:
Go to Configuration > Access control > Doors and zones.
Click
Add door.Enter a name for the door and select a door controller in the Device drop-down menu to associate with the door.
Click Next.
In the Copy configuration drop-down menu, select an existing door configuration. It shows the connected doors, and the controller grays out if it was configured with two doors or one door with two locks.
Change the settings if you want.
Click Save.
To edit a door:
Go to Configuration > Access control > Doors and zones > Doors.
Select a door in the list.
Click
Edit.Change the settings and click Save.
To remove a door:
Go to Configuration > Access control > Doors and zones > Doors.
Select a door in the list.
Click
Remove.Click Yes.
Door settings
Go to Configuration > Access control > Door and Zones.
Select the door you want to edit.
Click
Edit.
Access time (sec) | Set the number of seconds the door remains unlocked after access was granted. The door remains unlocked until the door opens or until the set time ends. The door locks when it closes even if there is access time left. |
Open-too-long time (sec) | Only valid if you have configured a door monitor. Set the number of seconds the door stays open. If the door is open when the set time ends, it triggers the door open too long alarm. Set up an action rule to configure which action the open too long event triggers. |
Long access time (sec) | Set the number of seconds the door remains unlocked after access was granted. Long access time overrides the access time for cardholders that has this setting turned on. |
Long open-too-long time (sec) | Only valid if you have configured a door monitor. Set the number of seconds the door stays open. If the door is open when the set time ends, it triggers the door open-too-long event. Long open-too-long time overrides the already set open-too-long time for cardholders if you turn on the Long access time setting. |
Relock delay time (ms) | Set the time, in milliseconds, that the door stays unlocked after the it’s opened or closed. |
Relock |
|
| Door forced | Select whether you want the system to trigger an alarm when a door has been forced open. |
| Door open too long | Select whether you want the system to trigger an alarm when a door has been held open too long. |
Door security level
You can add the following security features to the door:
- Two-person rule
- The two-person rule requires two people to use a valid credential to gain access.
- Double-swipe
- The double-swipe allows a cardholder override the current state of a door. For example, they can use it to lock or unlock a door outside the regular schedule, which is more convenient than going into the system to unlock the door. Double-swipe does not affect an existing schedule. For example, if a door is scheduled to lock at closing time, and employee leaves for lunch break, the door will still lock according to the schedule.
You can configure the security level while you’re adding a new door, or you can do it on an existing door.
To add Two-person rule to an existing door:
Go to Configuration > Access control > Doors and zones.
Select the door you want to configure a security level for.
Click Edit.
Click Security level.
Turn on Two-person rule.
Click Apply.
| Two-person rule | |
| Side A and Side B | Select which sides of the door to use the rule on. |
| Schedules | Select when the rule is active. |
| Timeout (seconds) | Timeout is the maximum allowed time between card swipes or other type of valid credential. |
To add Double-swipe to an existing door:
Go to Configuration > Access control > Doors and zones.
Select the door you want to configure a security level for.
Click Edit.
Click Security level.
Turn on Double-swipe.
Click Apply.
Apply Double-swipe to a cardholder.
Open an Access Management tab.
Click
on the cardholder you want to edit and click Edit.Click More.
Select Allow double-swipe.
Click Apply.
| Double-swipe | |||||||
| Timeout (seconds) | Timeout is the maximum allowed time between card swipes or other type of valid credential. | ||||||
Time options
- Access granted - lock unlocks
- Access time
- No action taken - lock locks
- Action taken (door opened) - lock locks or stays unlocked until door closes
- Open-too-long time
- Open-too-long alarm goes off
- Access granted - lock unlocks
- Access time
- 2+3: Long access time
- No action taken - lock locks
- Action taken (door opened) - lock locks or stays unlocked until door closes
- Open-too-long time
- 6+7: Long open-too-long time
- Open-too-long alarm goes off
Add a wireless lock
AXIS Camera Station Pro Secure Entry supports the ASSA ABLOY Aperio® wireless locks and communication hubs. The wireless lock connects to the system via an Aperio communication hub connected to the door controller’s RS485 connector. You can connect 16 wireless locks to one door controller.
- The setup requires Axis door controller to have AXIS OS version 11.6.16.1 or later.
- The setup requires a valid license for AXIS Door Controller Extension.
- The time on Axis door controller and AXIS Camera Station Pro Secure Entry server must be synchronized.
- Before you start, use the Aperio application that ASSA ABLOY supports to pair the Aperio locks with the Aperio hub.
- Wireless locks will not follow unlock schedules when offline.
Access the door controller.
Go to Configuration > Devices > Other devices.
Open the web interface of the door controller connected to the Aperio communication hub.
Turn on AXIS Door Controller Extension.
In the door controller web interface, go to Apps.
Open AXIS Door Controller Extension context menu
.Click Activate license with a key and select your license.
Turn on AXIS Door Controller Extension.
Connect the wireless lock to the door controller through the communication hub.
In the door controller web interface, go to Access control > Wireless locks.
Click Connect communication hub.
Enter a name for the hub and click Connect.
Click Connect wireless lock.
Select the lock address and capabilities for the lock you want to add and click Save.
Add and configure the door with the wireless lock.
In AXIS Camera Station Pro Secure Entry, go to Configuration > Access control > Doors and zones.
Click
Add door.Select the door controller connected to the Aperio communication hub, select Wireless door as Door type.
Click Next.
Select your Wireless lock.
Define the door sides A and B, and add sensors. For more information, see Doors and zones.
Click Save.
Once you’ve connected the wireless lock you can see its battery level and status in the overview of doors.
| Battery level | Action |
|---|---|
| Good | None |
| Low | The lock works as intended but you should replace the battery before the battery level becomes critical. |
| Critical | Replace the battery. The lock might not work as intended. |
| Lock status | Action |
|---|---|
| Online | None |
| Lock jam | Resolve any mechanical issues with the lock. |
Add a door monitor
A door monitor is a door position switch that monitors the physical state of a door. You can add a door monitor to your door and configure how to connect the door monitor.
Go to the door configuration page. See Add a door.
Under Sensors, click Add.
Select Door monitor sensor.
Select the I/O port you want to connect the door monitor to.
Under Door open if, select how the door monitor circuits are connected.
To ignore the state changes of the digital input before it enters a new stable state, set a Debounce time.
To trigger an event when an interruption in the connection between the door controller and the door monitor occurs, turn on Supervised input. See Supervised inputs.
| Door open if | |
Circuit is open | The door monitor circuit is normally closed. The door monitor sends the door an open signal when the circuit is open. The door monitor sends the door a closed signal when the circuit is closed. |
Circuit is closed | The door monitor circuit is normally open. The door monitor sends the door an open signal when the circuit is closed. The door monitor sends the door a closed signal when the circuit is open. |
Add a monitoring door
A monitoring door is a door type that can show you if it’s open or closed. For example, you can use this on a fire safety door that doesn’t require a lock but where you need to know if the door is open.
A monitoring door is different from a regular door with a door monitor. A regular door with a door monitor supports locks and readers but requires a door controller. A monitoring door supports one door position sensor but only requires a network I/O relay module connected to a door controller. You can connect up to five door position sensors to one network I/O relay module.
A monitoring door requires an AXIS A9210 Network I/O Relay Module with the latest firmware including the AXIS Monitoring Door ACAP application.
To set up a monitoring door:
Install your AXIS A9210 and upgrade it with the latest version of AXIS OS.
Install the door position sensors.
In AXIS Camera Station Pro, go to Configuration > Access control > Doors and zones.
Click Add door.
Enter a name.
Under Type, select Monitoring door.
Under Device, select your network I/O relay module.
Click Next.
Under Sensors, click + Add and select Door position sensor.
Select the I/O that's connected to the door position sensor.
Click Add.
Add emergency input
You can add and configure an emergency input to initiate an action that locks or unlocks the door. You can also configure how to connect the circuit.
Go to the door configuration page. See Add a door.
Under Sensors, click Add.
Select Emergency input.
Under Emergency state, select the circuit connection.
To ignore the state changes of the digital input before it enters a new stable state, set a Debounce time (ms).
Select what Emergency action to trigger when the door receives the emergency state signal.
| Emergency state | |
Circuit is open | The emergency input circuit is normally closed. The emergency input sends an emergency state signal when the circuit is open. |
Circuit is closed | The emergency input circuit is normally open. The emergency input sends an emergency state a signal when the circuit is closed. |
| Emergency action | |||||
Unlock door | The door unlocks when it receives the emergency state signal. | ||||
Lock door | The door locks when it receives the emergency state signal. | ||||
Add a reader
You can configure a door controller to use two wired readers. Select to add a reader on one side or both sides of a door.
If you apply a custom setup of card formats or PIN length to a reader, you can see it in Card formats under Configuration > Access control > Doors and zones. See Doors and zones.
- You can also add up to 16 Bluetooth readers to a door controller. For more information, see Add a Bluetooth reader.
- If you use an Axis network intercom as IP reader, the system uses the PIN configuration set on the device webpage.
Go to the door configuration page. See Add a door.
Under one side of the door, click Add.
Select Card reader.
Select the Reader type.
To use a custom PIN length setup for this reader.
Click Advanced.
Turn on Custom PIN length.
Set the Min PIN length, Max PIN length, and End of PIN character.
To use a custom card format for this reader.
Click Advanced.
Turn on Custom card formats.
Select the card formats you want to use for the reader. If a card format with the same bit length is already in use, you must deactivate it first. A warning icon displays in the client when the card format setup is different from the configured system setup.
Click Add.
To add a reader to the other side of the door, do this procedure again.
For information on how to set up an AXIS Barcode Reader, see Set up AXIS Barcode Reader.
| Reader type | |
OSDP RS485 half duplex | For RS485 readers, select OSDP RS485 half duplex and a reader port. |
Wiegand | For readers that use Wiegand protocols, select Wiegand and a reader port. |
IP reader | For IP readers, select IP reader and select a device from the drop-down menu. For requirements and supported devices, see IP reader. |
| Wiegand | |||||||
LED control | Select Single wire or Dual wire (R/G). Readers with dual LED control use different wires for the red and green LEDs. | ||||||
Tamper alert | Select when the reader tamper input is active.
| ||||||
Tamper debounce time | To ignore the state changes of the reader tamper input before it enters a new stable state, set a Tamper debounce time. | ||||||
Supervised input | Turn on to trigger an event when there is interruption in the connection between the door controller and the reader. See Supervised inputs. | ||||||
Add a Bluetooth reader
You can use the AXIS A4612 Network Bluetooth Reader to expand the wired door limits of Axis door controllers, which allow up to 16 of these readers to be assigned to their own door. Each reader can manage the door lock, Request-to-Exit (REX), and Door Position Switch (DPS).
Adding and using these readers does not require any additional licensing.
To add an AXIS A4612 Network Bluetooth Reader to a door:
Make sure you have paired the AXIS A4612 with the door controller. See Use AXIS Mobile Credential app as a Bluetooth credential.
Go to the door configuration page. See Add a door.
Under one side of the door, click Add, then Card reader.
Select IP reader and choose the paired AXIS A4612 from the drop-down menu. If this reader will be used for pairing credentials, mark it for pairing. Click Add.
In the Overview tab, change the identification profile. You can use the profiles Tap in app or Touch reader if you only have the AXIS A4612 attached to one side of the door and use a REX on the other.
IP reader
It’s possible to use Axis network intercoms as IP reader in AXIS Camera Station Secure Entry.
- It requires AXIS Camera Station 5.38 or later, AXIS A1601 Network Door Controller with firmware 10.6.0.2 or later.
- It doesn’t require special configuration to use the intercom as an IP reader.
Supported devices:
AXIS A8207-VE Network Video Door Station with firmware 10.5.1 or later
AXIS A8207-VE Mk II Network Video Door Station with firmware 10.5.1 or later
AXIS I8116-E Network Video Intercom
Add a REX device
You can select to add a request to exit (REX) device on one side or both sides of the door. A REX device can be a PIR sensor, REX button, or push bar.
Go to the door configuration page. See Add a door.
Under one side of the door, click Add.
Select REX device.
Select the I/O port that you want to connect the REX device to. If there is only one port available, it will be selected automatically.
Select what Action to trigger when the door receives the REX signal.
Under REX active, select the door monitor circuit connection.
To ignore the state changes of the digital input before it enters a new stable state, set a Debounce time (ms).
To trigger an event when an interruption in the connection between the door controller and the REX device occurs, turn on Supervised input. See Supervised inputs.
| Action | |
Unlock door | Select to unlock the door when it receives the REX signal. |
None | Select if you don’t want to trigger any action when the door receives the REX signal. |
| REX active | |||||
Circuit is open | Select if the REX circuit is normally closed. The REX device sends the signal when the circuit is open. | ||||
Circuit is closed | Select if the REX circuit is normally open. The REX device sends the signal when the circuit is closed. | ||||
Add a zone
A zone is a specific physical area with a group of doors. You can create zones and add doors to the zones. There are two types of doors:
Perimeter door: Cardholders enter or leave the zone through this door.
Internal door: An internal door within the zone.
- Note
A perimeter door can belong to two zones. An internal door can only belong to one zone.
Go to Configuration > Access control > Doors and zones > Zones.
Click
Add zone.Enter a zone name.
Click Add door.
Select the doors you want to add to the zone, and click Add.
The door is set as a perimeter door by default. To change it, select Internal door from the drop-down menu.
A perimeter door uses door side A as entrance to the zone by default. To change it, select Leave from the drop-down menu.
To remove a door from the zone, select it and click Remove.
Click Save.
To edit a zone:
Go to Configuration > Access control > Doors and zones > Zones.
Select a zone in the list.
Click
Edit.Change the settings and click Save.
To remove a zone:
Go to Configuration > Access control > Doors and zones > Zones.
Select a zone in the list.
Click
Remove.Click Yes.
Zone security level
You can add the following security feature to a zone:
- Anti-passback
- Prevents people from using the same credentials as someone who entered an area before them. It enforces that a person must first exit the area before they can use their credentials again.
- With anti-passback, all doors in the zone must have door position sensors so the system can register that a user opened the door after swiping their card.
- If a door controller goes offline, anti-passback works as long as all doors in the zone belong to the same door controller. However, if the doors in the zone belong to different door controllers that go offline, anti-passback stops working.
You can configure the security level while you add a new zone, or you can do it on an existing zone. To add a security level to an existing zone:
Go to Configuration > Access control > Doors and zones.
Select the zone you want to configure a security level for.
Click Edit.
Click Security level.
Turn on the security features you want to add to the door.
Click Apply.
| Anti-passback | |
| Log violation only (Soft) | Use this if you want to allow a second person to enter the door using the same credentials as the first person. This option only results in a system alarm. |
| Deny access (Hard) | Use this if you want to prevent the second user from entering the door if they’re using the same credentials as the first person. This option also results in a system alarm. |
| Timeout (seconds) | The amount of time until the system allows a user to re-enter. Enter 0 if you don’t want timeout, meaning that the zone has anti-passback until the user leaves the zone. Only use 0 timeout with Deny access (Hard) if all doors in the zone have readers on both sides. |
Supervised inputs
Supervised inputs can trigger an event when there is interruption in the connection to a door controller.
Connection between the door controller and the door monitor. See Add a door monitor.
Connection between the door controller and the reader that uses Wiegand protocols. See Add a reader.
Connection between the door controller and the REX device. See Add a REX device.
To use supervised inputs:
Install end of line resistors as close to the peripheral device as possible according to the connection diagram.
Go to the configuration page of a reader, door monitor, or REX device, turn on Supervised input.
If you followed the parallel first connection diagram, select Parallel first connection with a 22 KΩ parallel resistor and a 4.7 KΩ serial resistor.
If you followed the serial first connection diagram, select Serial first connection, and select a resistor value from the Resistor values drop-down menu.
Connection diagrams
Parallel first connection
The resistor values must be 4.7 kΩ and 22 kΩ.
Serial first connection
The resistor values must be the same and within range 1-10 kΩ.
Manual actions
You can perform the following manual actions on doors and zones:
- Reset
- Returns to the configured system rules.
- Grant access
- Unlocks a door or zone for 7 seconds and then locks it again.
- Unlock
- Keeps the door unlocked until you Reset.
- Lock
- Keeps the door locked until the system grants a cardholder access.
- Lockdown
- No one gets in or out until you reset or unlock.
To perform a manual action:
Go to Configuration > Access control > Doors and zones.
Select the door or zone you want to perform a manual action on.
Click any of the manual actions.
Identification profiles
An identification profile is a combination of identification types and schedules. You can apply an identification profile to one, or more, doors to set how and when a cardholder can access a door.
Identification types are carriers of the credential information necessary to access a door. Common identification types are tokens, personal identification numbers (PINs), fingerprints, facial maps, and REX devices. An identification type can carry one or more types of information.
Supported identification types: Card, PIN, REX, static QR, and dynamic QR.
You must use dynamic QR and PIN together.
Go to Configuration > Access control > Identification profiles to create, edit, or remove identification profiles.
There are five default identification profiles available for you to use as they are or edit as required.
- Card
- Cardholders must swipe the card to access the door.
- Card and PIN
- Cardholders must swipe the card and enter the PIN to access the door.
- PIN
- Cardholders must enter the PIN to access the door.
- Card or PIN
- Cardholders must swipe the card or enter the PIN to access the door.
- QR
- Cardholders must show the QR Code® to camera to access the door. You can use the QR identification profile for both static and dynamic QR.
- License plate
- Cardholders must drive towards the camera in a vehicle with an approved license plate.
- Tap in app
- Cardholders must tap the credential in the AXIS Camera Station Mobile App while standing in range of the Bluetooth reader.
- Touch reader
- Cardholders must touch the Bluetooth reader while carrying a mobile phone with a mobile credential.
QR Code is a registered trademark of Denso Wave Incorporated in Japan and other countries.
To create an identification profile:
Go to Configuration > Access control > Identification profiles.
Click Create identification profile.
Enter an identification profile name.
Select Include facility code for card validation to use facility code as one of the credential validation fields. This field is only available if you turn on Facility code under Access management > Settings.
Configure the identification profile for one side of the door.
On the other side of the door, do the previous steps again.
Click OK.
To edit an identification profile:
Go to Configuration > Access control > Identification profiles.
Select an identification profile and click
.To change the identification profile name, enter a new name.
Do your edits to the side of the door.
To edit the identification profile on the other side of the door, do the previous steps again.
Click OK.
To remove an identification profile:
Go to Configuration > Access control > Identification profiles.
Select an identification profile and click
.If the identification profile is used on a door, select another identification profile for the door.
Click OK.
| Edit identification profile | |
To remove an identification type and the related schedule. | |
Identification type | To change an identification type, select one, or more, types from the Identification type drop-down menu. |
Schedule | To change a schedule, select one, or more, schedules from the Schedule drop-down menu. |
| Add an identification type and the related schedule, click Add and set the identification types and schedules. |
Card formats and PIN
A card format defines how a card stores data. It’s a translation table between the incoming data and the validated data in the system. Each card format has a different set of rules for how to organize the stored information. By defining a card format, you tell the system how to interpret the information that the controller gets from the card reader.
There are predefined commonly used card formats available for you to use as they are or edit as required. You can also create custom card formats.
Go to Configuration > Access Control > Card formats and PIN to create, edit, or activate card formats. You can also configure PIN.
The custom card formats can contain the following data fields used for credential validation.
- Card number
- A subset of the credential binary data encoded as decimal or hexadecimal numbers. Use the card number to identify a specific card or cardholder.
- Facility code
- A subset of the credential binary data encoded as decimal or hexadecimal numbers. Use the facility code to identify a specific end customer or site.
To create a card format:
Go to Configuration > Access Control > Card formats and PIN.
Click Add card format.
Enter a card format name.
In the Bit length field, type a bit length between 1 and 256.
Select Invert bit order if you want to invert the bit order of the data received from the card reader.
Select Invert byte order if you want to invert the byte order of the data received from the card reader. This option is only available when you specify a bit length that you can divide by eight.
Select and configure the data fields to be active in the card format. Either Card number or Facility code must be active in the card format.
Click OK.
To activate the card format, select the checkbox in front of the card format name.
- Two card formats with the same bit length can’t be active at the same time. For example, if you have defined two 32-bit card formats, only one of these can be active. Deactivate the card format to active the other.
- You can only activate and deactivate card formats if the door controller has been configured with at least one reader.
Click to see an example of the output after inverting bit order. | |
Range | Set the bit range of the data for the data field. The range must be within what you have specified for Bit length. |
Output format | Select the output format of the data for the data field. Decimal: Also known as base-10 positional numeral system, consists of the numbers 0–9. Hexadecimal: also known as base-16 positional numeral system, consists of 16 unique symbols: the numbers 0–9 and the letters a–f. |
Bit order of subrange | Select the bit order. Little endian: The first bit is the smallest (least significant). Big endian: The first bit is the biggest (most significant). |
To edit a card format:
Go to Configuration > Access Control > Card formats and PIN.
Select a card format and click
.If you edit a predefined card format, you can only edit Invert bit order and Invert byte order.
Click OK.
You can only remove the custom card formats. To remove a custom card format:
Go to Configuration > Access Control > Card formats and PIN.
Select a custom card format, click
and Yes.
To reset a predefined card format:
Go to Configuration > Access Control > Card formats and PIN.
Click
to reset a card format to the default field map.
To configure PIN length:
Go to Configuration > Access Control > Card formats and PIN.
Under PIN configuration, click
.Specify Min PIN length, Max PIN length, and End of PIN character.
Click OK.
Card format settings
Overview
The card number in decimal is
64332.One reader transfers the card number to hexadecimal number
FB4C. The other reader transfers it to hexadecimal number4CFB.AXIS A1601 Network Door Controller receives
FB4Cand transfers it to decimal number64332according to the card format settings on the reader.AXIS A1601 Network Door Controller receives
4CFB, changes it toFB4Cby inverting byte order, and transfers it to decimal number64332according to the card format settings on the reader.
Invert bit order
After inverting bit order, the card data received from the reader is read from right to left bit by bit.
Invert byte order
A group of eight bits is a byte. After inverting byte order, the card data received from the reader is read from right to left byte by byte.
26-bit standard Wiegand card format
- Leading parity
- Facility code
- Card number
- Trailing parity
Encrypted communication
OSDP Secure Channel
AXIS Camera Station Secure Entry supports OSDP (Open Supervised Device Protocol) Secure Channel to active line encryption between controller and Axis readers.
To turn on OSDP Secure Channel for an entire system:
Go to Configuration > Access control > Encrypted communication.
Enter your main encryption key and click OK.
Turn on OSDP Secure Channel. This option is only available after you enter the main encryption key.
By default, the main encryption key generates a OSDP Secure Channel key. To manually set the OSDP Secure Channel key:
Under OSDP Secure Channel, click
.Clear Use main encryption key to generate OSDP Secure Channel key.
Enter the OSDP Secure Channel key and click OK.
To turn on or turn off OSDP Secure Channel for a specific reader, see Doors and zones.
AXIS Barcode Reader
AXIS Barcode Reader is an application that can be installed on Axis cameras. Axis door controller uses the authentication key to grant access and authenticate AXIS Barcode Reader. For a complete workflow on how to set up AXIS Barcode Reader, see Set up AXIS Barcode Reader.
To create a connection between a door controller and AXIS Barcode Reader:
In AXIS Camera Station Pro Secure Entry:
Go to Configuration > Access control > Encrypted communication.
Under External Peripheral Authentication Key, click Show authentication key and Copy key.
In the device web interface where AXIS Barcode Reader runs:
Open AXIS Barcode Reader application.
If the server certificate wasn’t configured in AXIS Camera Station Pro Secure Entry, turn on Ignore server certificate validation. See Certificates for more information.
If the server certificate wasn’t configured in AXIS Camera Station Pro Secure Entry, turn on Ignore server certificate validation. See Certificates for more information.
Turn on AXIS Camera Station Secure Entry.
Click Add and enter the IP address of the door controller and paste the authentication key.
Select the reader that reads barcodes from the door drop-down menu.
In AXIS Camera Station Pro Secure Entry:
Go to Configuration > Access control > Encrypted communication.
Under External Peripheral Authentication Key, click Show authentication key and Copy key.
In the device web interface where AXIS Barcode Reader runs:
Open AXIS Barcode Reader application.
If the server certificate wasn’t configured in AXIS Camera Station Pro Secure Entry, turn on Ignore server certificate validation. See Certificates for more information.
If the server certificate wasn’t configured in AXIS Camera Station Pro Secure Entry, turn on Ignore server certificate validation. See Certificates for more information.
Turn on AXIS Camera Station Secure Entry.
Click Add and enter the IP address of the door controller and paste the authentication key.
Select the reader that reads barcodes from the door drop-down menu.
Multi server BETA
The connected sub servers can, with multi-server, use the global cardholders and cardholder groups from the main server.
- One system can support up to 64 sub servers.
- It requires AXIS Camera Station 5.47 or later.
- It requires that the main server and sub servers are on the same network.
- On main server and sub servers, make sure to configure Windows Firewall to allow incoming TCP connections on the Secure Entry port. The default port is 55767. For customized port configuration, see .
Workflow
Configure a server as a sub server and generate the configuration file. See Generate the configuration file from the sub server.
Configure a server as a main server and import the configuration file of the sub servers. See Import the configuration file to the main server.
Configure global cardholders and cardholder groups on the main server. See Add a cardholder and Add a group.
View and monitor global cardholders and cardholder groups from the sub server. See .
Generate the configuration file from the sub server
From the sub server, go to Configuration > Access control > Multi server.
Click Sub server.
Click Generate. It generates a configuration file in .json format.
Click Download and choose a location to save the file.
Import the configuration file to the main server
From the main server, go to Configuration > Access control > Multi server.
Click Main server.
Click
Add and go to the configuration file generated from the sub server.Enter the server name, IP address, and port number of the sub server.
Click Import to add the sub server.
The status of the sub server shows
Connected.
Revoke a sub server
You can only revoke a sub server before you import its configuration file to a main server.
From the main server, go to Configuration > Access control > Multi server.
Click Sub server and click Revoke server.
Now you can configure this server as a main server or sub server.
Remove a sub server
After you import the configuration file of a sub server, it connects the sub server to the main server.
To remove a sub server:
From the main server:
Go to Access management > Dashboard.
Change the global cardholders and groups to local cardholders and groups.
Go to Configuration > Access control > Multi server.
Click Main server to show the sub server list.
Select the sub server and click Delete.
From the sub server:
Go to Configuration > Access control > Multi server.
Click Sub server and Revoke server.
Active directory settingsBETA
User accounts in Microsoft Windows and Active Directory users and groups can access AXIS Camera Station Pro Secure Entry. The way you add users in Windows varies depending on your version. For more information, go to support.microsoft.com. Consult your network administrator if you use an Active Directory domain network.
The first time you open the Active Directory settings page you can import Microsoft Active Directory users to cardholders in AXIS Camera Station Pro Secure Entry. See Import active directory users.
After the initial configuration, the following options appear on the Active directory settings page.
Create and manage cardholder groups based on groups in Active Directory.
Set up scheduled synchronization between Active Directory and the access management system.
Manually synchronize to update all cardholders imported from Active Directory.
Manage data mapping between user data from Active Directory and cardholder properties.
Import active directory users
To import Active Directory users to cardholders in AXIS Camera Station Pro Secure Entry:
Go to Configuration > Access control > Active directory settingsBETA.
Click Set up import.
Follow the on-screen instructions to complete these three main steps:
Select a user from Active Directory to use as a template for data mapping.
Map user data from the Active Directory database to cardholder properties.
Create a new cardholder group in the access management system and select which Active Directory groups to import.
You can’t change any of the imported user data, but you can add credentials to an imported cardholder, see Add credentials.
Configure access management
Workflow of access management
The access management structure is flexible, which allows you to develop a workflow that suits your needs. The following is a workflow example:
Add groups. See Add a group.
Add cardholders. See Add a cardholder.
Add cardholders to groups.
Add access rules. See Add an access rule.
Apply groups to access rules.
Apply zones to access rules.
Apply doors to access rules.
Add a cardholder
A cardholder is a person with a unique ID registered in the system. Configure a cardholder with credentials that identifies the person and when and how to grant the person access to doors.
You can also choose to map users in an Active Directory database as cardholders, see Active directory settingsBETA.
Open an Access management tab.
Go to Cardholder management > Cardholders and click + Add.
Enter the first and last name of the cardholder and click Next.
Optionally, click Advanced and select any options.
Add a credential to the cardholder. See Add credentials
Click Save.
Add the cardholder to a group.
Under Groups, select the group you want to add the cardholder to and click Edit.
Click + Add and select the cardholder you want to add to the group. You can select multiple cardholders.
Click Add.
Click Save.
| Advanced | |
|---|---|
Long access time | Select to let the cardholder to have long access time and long open-too-long time when there is an installed door monitor. |
Suspend cardholder | Select to suspend the cardholder. |
Allow double swipe | Select to allow a cardholder to override the current state of a door. For example, they can use it to unlock a door outside the regular schedule. |
Exempt from lockdown | Select to let the cardholder to have access during lockdown. |
Exempt from anti-passback | Select to give a cardholder an exemption from the anti-passback rule. Anti-passback prevents people from using the same credentials as someone who entered an area before them. The first person must first exit the area before their credentials can be used again. |
Global cardholder | Select to make it possible to view and monitor the cardholder on the sub servers. This option is only available for cardholders created on the main server. See Multi server BETA. |
Add credentials
You can add the following types of credentials to a cardholder:
PIN
Card
License plate
QR Code
Mobile phone
To add a mobile credential to a cardholder:
Under Credentials, click + Add and select Mobile credential.
Enter a name for the credential.
Set the start and end date for the credential.
Select Send the mobile credential to the cardholder after saving. The cardholder receives an email with instructions for pairing.
Click Add.
See example in Use AXIS Mobile Credential app as a Bluetooth credential.
To add a license plate credential to a cardholder:
Under Credentials, click + Add and select License plate.
Enter a credential name that describes the vehicle.
Enter the license plate number for the vehicle.
Set the start and end date for the credential.
Click Add.
See example in Use license plate number as a credential.
To add a PIN credential to a cardholder:
Under Credentials, click + Add and select PIN.
Enter a PIN.
To use a duress PIN to trigger a silent alarm, turn on Duress PIN and enter a duress PIN.
Click Add.
A PIN credential is always valid. You can also configure a duress PIN that opens the door and triggers a silent alarm in the system.
To add a card credential to a cardholder:
Under Credentials, click + Add and select Card.
To manually enter the card data, enter a card name, card number, and bit length.
- Note
Bit length is configurable only when you create a card format with a specific bit length that’s not in the system.
To automatically get the card data of the last swiped card:
Select a door from the Select reader drop-down menu.
Swipe the card on the reader connected to that door.
Click Get last swiped card data from the door’s reader(s).
- Note
You can use 2N desktop USB card reader to get the card data. For more information, see Set up 2N desktop USB card reader.
Enter a facility code. This field is only available If you have enabled Facility code under Access management > Settings.
Set the start and end date for the credential.
Click Add.
To add a QR credential to a cardholder:
Using QR codes as credentials requires that the time on the system controller and the camera with AXIS Barcode Reader is synchronized. We recommend using the same time source for both devices for perfect time synchronization.
Under Credentials, click + Add and select QR-code.
Enter a name for the credential.
Dynamic QR is on by default. You must use dynamic QR with PIN credential.
Set the start and end date for the credential.
To email QR code automatically after you save the cardholder, select Send QR code to cardholder when credential is saved.
Click Add.
| Expiration date | |
|---|---|
Valid from | Set a date and time for when the credential should be valid. |
Valid to | Select an option from the drop-down menu. |
| Valid to | |
|---|---|
No end date | The credential never expires. |
Date | Set a date and time when the credential expires. |
From first use | Select how long after the first use the credential expires. Select days, months, years, or number of times after the first use. |
From last use | Select how long after the last use the credential expire. Select days, months, or years after the last use. |
Use license plate number as a credential
This example shows you how to use a door controller, a camera with AXIS License Plate Verifier, and a vehicle’s license plate number as credentials to grant access.
Add the door controller and the camera to AXIS Camera Station Pro Secure Entry. See
Set date and time for the new devices with Synchronize with server computer time. See .
Upgrade the firmware on the new devices to the latest available version. See .
Add a new door connected to your door controller. See Add a door.
Add a reader on Side A. See Add a reader.
Under Door settings, select AXIS License Plate Verifier as Reader type and enter a name for the reader.
Optionally, add a reader or REX device on Side B.
Click Ok.
Install and activate AXIS License Plate Verifier on your camera. See the AXIS License Plate Verifier user manual.
Start AXIS License Plate Verifier.
Configure AXIS License Plate Verifier.
Go to Configuration > Access control > Encrypted communication.
Under External Peripheral Authentication Key, click Show authentication key and Copy key.
Open AXIS License Plate Verifier from the camera’s web interface.
Don’t do the setup.
Go to Settings.
Under Access control, select Secure Entry as Type.
In IP address, enter the IP address for the door controller.
In Authentication key, paste the Authentication key that you copied earlier.
Click Connect.
Under Door controller name, select your door controller.
Under Reader name, select the reader you added earlier.
Turn on integration.
Add the cardholder that you want to give access to. See Add a cardholder
Add license plate credentials to the new cardholder. See Add credentials
Add an access rule. See Add an access rule.
Add a schedule.
Add the cardholder that you want to give license plate access to.
Add the door with the AXIS License Plate Verifier reader.
Use AXIS Mobile Credential app as a Bluetooth credential
This example shows how to add an AXIS A4612 Bluetooth Reader to your system to allow cardholders to unlock doors using the AXIS Mobile Credential app.
Install the Bluetooth reader and connect it to a door controller.
Add the Bluetooth reader in the door controller's web interface.
Access the door controller and go to Peripherals > Readers.
Click Add reader.
Enter the required information in the Add Bluetooth reader dialog.
Click Add.
Add the Bluetooth reader to a door in AXIS Camera Station Pro.
Go to Configuration > Access control > Doors and zones.
Select the door you want to add the Bluetooth reader to and click Edit.
Click + Add on the side of the door where the Bluetooth reader is located.
Select Card reader.
Under Add IP reader, select IP reader.
Under Select IP reader, select your Bluetooth reader.
Click Add.
Select a Bluetooth reader for pairing. You must do this for at least one Bluetooth reader in your system.
Select the Bluetooth reader you just added.
Click Edit.
Under Edit bluetooth reader, select Use this reader for pairing.
Click Apply.
Choose the Tap in app or Touch reader identification profile. See Identification profiles for more information.
Add the mobile credential to the cardholder. See Add credentials.
Pair the mobile credential with the pairing reader.
Bring the cardholder's mobile phone to the pairing enabled Bluetooth reader.
Follow the instructions provided in the email sent to the cardholder.
Add a group
Groups allow you to manage cardholders and their access rules collectively and efficiently.
Open an Access management tab.
Go to Cardholder management > Groups and click + Add.
Enter a name and optionally initials for the group.
Select Global group to make it possible to view and monitor the cardholder on the sub servers. This option is only available for cardholders created on the main server. See Multi server BETA.
Add cardholders to the group:
Click + Add.
Select the cardholders you want to add and click Add.
Click Save.
Add an access rule
An access rule defines the conditions that must be met to grant access.
An access rule consists of:
- Cardholders and cardholder groups
- who to grant access.
- Doors and zones
- where the access applies.
- Schedules
- when to grant access.
To add an access rule:
Open an Access management tab.
Go to Cardholder management.
Under Access rules, click + Add.
Enter a name for the access rule and click Next.
Configure the cardholders and groups:
Under Cardholders or Groups, click + Add.
Select the cardholders or groups and click Add.
Configure the doors and zones:
Under Doors or Zones, click + Add.
Select the doors or zones and click Add.
Configure the schedules:
Under Schedules, click + Add.
Select one or more schedules and click Add.
Click Save.
An access rule that’s missing one or more of the components described above is incomplete. You can view all incomplete access rules in the Incomplete tab.
Export system configuration reports
You can export reports that contain different types of information about the system. AXIS Camera Station Pro Secure Entry exports the report as a comma-separated value (CSV) file and saves it in the default download folder. To export a report:
Open an Access management tab.
Go to Reports > System configuration.
Select the reports you want to export and click Download.
Cardholders details report | Includes information about the cardholders, credentials, card validation, and last transaction. |
Cardholders access report | Includes the cardholder information and information about the cardholder groups, access rules, doors, and zones related to the cardholder. |
Cardholders group access report | Includes the cardholder group name and information about the cardholders, access rules, doors, and zones related to the cardholder group. |
Access rule report | Includes the access rule name and information about the cardholders, cardholder groups, doors, and zones related to the access rule. |
Door access report | Includes the door name and information about the cardholders, cardholder groups, access rules, and zones related to the door. |
Zone access report | Includes the zone name and information about the cardholders, cardholder groups, access rules, and doors related to the zone. |
Create cardholder activity reports
A roll call report lists cardholders within a specified zone, helping identify who's present at a given moment.
A mustering report lists cardholders within a specified zone, helping identify who's safe and missing during emergencies. It assists building managers in locating staff and visitors after evacuations. A muster point is a designated reader where personnel report during emergencies, generating a report of people on and off-site. The system marks cardholders as missing until they check in at a muster point or until someone manually marks them as safe.
Both roll call and mustering reports require zones to track cardholders.
To create and run a roll call or mustering report:
Open an Access management tab.
Go to Reports > Cardholder activity.
Click + Add and select Roll call / Mustering.
Enter a name for the report.
Select which zones to include in the report.
Select any groups you want to include in the report.
If you want a mustering report, select Mustering point and a reader for the mustering point.
Select a time frame for the report.
Click Save.
Select the report and click Run.
| Roll call report status | Description |
|---|---|
| Present | The cardholder entered the specified zone and did not exit before you ran the report. |
| Not present | The cardholder exited the specified zone and did not enter again before you ran the report. |
| Mustering report status | Description |
|---|---|
| Safe | The cardholder swiped their card at the mustering point. |
| Missing | The cardholder didn’t swipe their card at the mustering point. |
Access management settings
To customize the cardholder fields used in the access management dashboard:
On the Access management tab, click Settings > Custom cardholder fields.
Click + Add and enter a name. You can add up to 6 custom fields.
Click Add.
To use facility code to verify your access control system:
On the Access management tab, click Settings > Facility code.
Select Facility code on.
- Note
You must also select Include facility code for card validation when you configure identification profiles. See Identification profiles.
To edit an email template for sending a QR or mobile credential:
On the Access management tab, click Settings > Email templates.
Edit your template and click Update.
Import and export
Import cardholders
This option imports cardholders, cardholder groups, credentials, and cardholder photos from a CSV file. To import cardholder photos, make sure that the server has access to the photos.
When you import cardholders the access management system automatically saves the system configuration, including all hardware configuration, and deletes any previously saved one.
You can also choose to map users in an Active Directory database as cardholders, see Active directory settingsBETA.
| Import options | |
|---|---|
New | This option removes existing cardholders and adds new cardholders. |
Update | This option updates the existing cardholders and adds new cardholders. |
Add | This option keeps existing cardholders and adds new cardholders. Card numbers and cardholder IDs are unique and can only be used once. |
On the Access management tab, click Import and export.
Click Import cardholders.
Select New, Update, or Add .
Click Next.
Click Choose a file and go to the CSV file. Click Open.
Enter a column delimiter and select a unique identifier and click Next.
Assign a heading to each column.
Click Import.
| Import settings | |
|---|---|
First row is header | Select if the CSV file contains a column header. |
Column delimiter | Enter a column delimiter format for the CSV file. |
Unique identifier | The system uses Cardholder ID to identify a cardholder by default. You can also use first and last name, or the email address. The Unique identifier prevents the import of duplicate personnel records. |
Card number format | Allow both hexadecimal and number is selected by default. |
Export cardholders
This option exports the cardholder data in the system to a CSV file.
On the Access management tab, click Import and export.
Click Export cardholders.
Choose a download location and click Save.
AXIS Camera Station Pro Secure Entry updates cardholder photos in C:\ProgramData\Axis Communications\AXIS Camera Station\Components\AXIS Secure Entry\Cardholder photos whenever the configuration changes.
Undo import
The system automatically saves its configuration when you import cardholders. The Undo import option resets the cardholder data and all hardware configuration to the state before the last cardholder import.
On the Access management tab, click Import and export.
Click Undo import.
Click Yes.