User Settings

You can view and administer user information in the user detail. Click the selected user list item on the Users page to open ther user detail.

The user detail is split into the Overview, Attendance and Change log tabs. Attendance is only displayed to the users whose attendance monitoring has been enabled, refer to User Attendance. The Attendance module is available depending on the license.

User Name and Photo Change

Find the user renaming and photo setting options in an advanced menu ikona-three-dots-acom in the user detail header.

The image resolution will be adjusted to 432 x 432 px automatically.

Credentials

This card helps you set the user authentication methods on devices. The user has to authenticate themselves on a device and, if granted access, will be allowed to access the device.

RFID Card – add an existing RFID card to the user. A dialog box opens for you to enter the card identifier. To do this, tap a card on the reader or enter the card ID via a keypad. The identifier must be a hexadecimal number including 6 characters at least. One user may be assigned up to 2 access cards.

Mobile Key – used for interconnection with 2N Mobile Key app, which provides authentication via Bluetooth, refer to Subs. Bluetooth Authentication.

PIN Code – automatic generation of a 6-digit PIN code.

A user can be assigned a PIN code or a QR code, never both of them at the same time.

QR Code – automatic generation of QR code. The devices that allow QR codes to be read are included in Supported Devices and Applications.

A user can be assigned a PIN code or a QR code, never both of them at the same time.

Fingerprint – a dialog box helps you enroll fingerprints for authentication on the devices that support fingerprint reading. Each user can enroll up to 2 fingerprints. Refer to Subs. Fingerprint Enrollment for details.

License Plate – set the vehicle license plate to be scanned by the device and used for user authentication.

Virtual Card – set the user virtual access card ID. Each user can be assigned just one virtual card. The virtual card ID is a sequence of 6–32 characters: 0–9, A–F. The virtual card ID is used for user identification in the devices connected via the Wiegand interface.

Switch Code – set up to 4 switch activation codes (e.g. for the door lock). The switch code is used for door unlocking via the device keypad even as a DTMF code.

Caution|/-/media/Images/Manuals/css/caution.png Caution

Remember to keep the sequence of authentication methods while using multi-factor authentication.

Tip|/-/media/Images/Manuals/css/tip.png Tip

It is possible to send the generated access PIN/QR code to an e-mail address if available.

Account

A user can be assigned access to the Access Commander interface by setting a login name and one-time password. The user will be prompted to change the password upon the first login. Upon login, the user can follow their attendance (if available), and change their e-mail or profile image.

On the Account card, the users with login data can be assigned rights to administer Access Commander through user roles. Refer to Subs. User Rights for a description of role rights.

Simplified Interface

It is possible to run a simplified user interface for the visitor manager of one company. The simplified interface allows the visitor manager to add, remove and manage visitors. Logs and Presence cannot be viewed in the simplified interface. The primary purpose of the simplified interface is to facilitate visitor access to users’ apartments. All the visitors created in the simplified interface are always assigned to the default group for new visitors. The visitor manager cannot change this group. It is necessary to select the default group for new visitors in the company settings and set valid apartment access rules for the group, including the path to the apartment. Thus, the apartment user can manage the authentication methods and visit duration in the simplified interface.

Caution|/-/media/Images/Manuals/css/caution.png Caution

Before activating the simplified interface, the system administrator must set the default group for new visitors in Company Settings. The default group must be assigned such access rules that allow visitors to access the required spaces. No visitor access can be guaranteed in the simplified interface without a properly set default group.

Personal Information

Used for adding basic information on the user. The user e-mail address to which account info shall be sent and a user contact phone number can be added.

The following can be written on the card:

  • E-Mail– address to which information related to the user’s account in Access Commander will be sent;

  • User number (User ID) – specific identifier necessary for bulk synchronization with the CSV file (refer to User Synchronization);

  • Note.

Access

The Access card helps assign a user to a group and set the time interval in which the user access data shall be valid. Click ikona-three-dots-acom to open an advanced menu to set the time interval.

Tip|/-/media/Images/Manuals/css/tip.png Tip

Time limitations for accesses from the devices are set using time profiles.

The card shows the group the user is assigned to. If not assigned to a group, a user can be added on this card. A group can be changed or deleted in an advanced menu ikona-three-dots-acom.

Phone Numbers

This card helps you set connection with a user. The phone number is the calling destination of the device assigned to the user.

A virtual phone number can be used for user calling via the numeric keypad on the device. A virtual number can include two to four digits. Virtual numbers are not related to the users’ personal phone numbers and thus help hide the users’ personal phone numbers on the device. A deputy can also be defined on the card to which a call is forwarded in the case of user unavailability. The deputy can be chosen among the other users in the company.

Access Log

The Access Log shows access history.

Change Log

All the user setting changes can be displayed in the Change Log folder. The basic arrangement is based on the change time. It is possible to find out who made the change in the log. Click the row to find details on the change accomplished.

Can we advise you on anything else?

Take advantage of our technical support and sales specialists.