Adding Online Locks

This section describes how to add online locks, such as door modules and I/O cards, to iLOQ Locking System.

Note:

You do not necessarily need the actual physical locks to add locks in iLOQ Locking System. You can define the locks and associate them with the physical locks at a later phase.

Proceed as follows.

  1. Select Basic data > Browse locks.

  2. Select Add lock.
    The Add lock wizard is opened.
  3. Select Add lock.
  4. Define the lock settings as follows:
    • PlacementPlacement refers to the location of the lock on the floor plan. If you are adding several locks at a time, set the first placement in a way that it ends with a number, such as A1. In this way, the system adds consecutive placement numbers as follows:

      • A1
      • A2
      • A3
      • ...
    • Approach directionApproach direction refers to the direction where the lock will be opened from, if the door is equipped with double side lock.

    • Locking targetLocking target provides a more detailed description or name of the room or premises, where the lock will lead to.

      If you are adding several locks at a time, set the first locking target in a way that it ends with a number, such as Apartment A1. In this way, the system adds consecutive locking targets as follows:

      • Apartment A1
      • Apartment A2
      • Apartment A3
      • ...
    • Lock cylinderLock cylinder refers to the lock cylinder type. Select the type from the drop-down list, or enter the type manually.

    • Zone — Select the zone for the lock.

    • Lock type — Select Online.

      The online lock can be:

      • N501 4G door module, or
      • N502 door module, N507 I/O card and a C5S lock cylinder connected to an N500 network module

      that can be opened with a K5S electro-mechanical key and S50 Key fob.

      If the lock type is Online, the options below are automatically selected.

    • Clock installed — Select Clock installed if there is a clock circuit in the lock. If the selected Lock cylinder contains a clock, Clock installed will be automatically selected.

      Note:

      In conjunction with initial programming, always connect the RTC unit to the connection cable on the lock. After this, do not disconnect the RTC unit from the connection cable.

      If you have disconnected the RTC unit from the connection cable, you must restart the RTC unit. You can do this by inserting a programming key, connected to the programming cable, to the keyway of the lock cylinder. Always carry out this procedure after disconnecting the RTC unit.

    • Save lock audit trails automatically — Select whether or not the system automatically receives audit trail events from the lock. If you want to use automatic reception of audit trails, also enable the Lock collects audit trail option.

    • Lock collects audit trail — Select whether the lock collects audit trail or not.

    • Allow API access rights — Check Allow API access rights to allow Application Programming Interface (API) access rights for the lock. When enabled, in addition to standard access rights, the lock reads API access rights assigned for the key. See Access Rights.

  5. Click Next.
  6. Define the relay settings.
  7. Click Next.
  8. Enter additional information as necessary.

    The fields are:

    • Door typeDoor type refers to the type of door where the lock will be mounted on.
    • EscutcheonEscutcheon refers to the shield plate that surrounds the keyhole on the door.
    • Lock modelLock model refers to the model of the lock case.
    • Cylinder extensionCylinder extension refers to the extension that will be added to the new lock.
    • Door thickness (mm)Door thickness indicates the thickness of the door where the lock will be mounted on.
    • Lock frame depth (mm)Depth of lock body (mm) indicates the depth of the lock case.
    • Opening directionOpening direction indicates the door opening direction.
    • Label — The lock label.
    • Note — Free text field for notes on the lock.
    • Other equipmentOther equipment refers to other equipment related to the lock or the door.
    • Conditional access — This check box indicates whether the lock is connected to a device that controls conditional access.
    • Description of the conditional access — A description of the conditional access. You can, for example, describe the device that is controlling the conditional access.
  9. Click Next.
  10. Optional: Select the estate for the lock.
  11. Click Next.
  12. Select the access rights for the lock.

    The default access right will be automatically added for the lock.

    1. Select the desired access right in the list on the left.
    2. You can manage the selection of access right with the key buttons as follows:
      • — Click the Arrows right button to move all items to the list.
      • — Click the Arrow right button to move the selected item(s) to the list.
      • — Click the Arrow left button to remove the selected item(s) from the list.
      • — Click the Arrows left button to remove all items from the list.
  13. Click Next.
  14. Optional: Select the time profiles:
    • Not time limited — If you select this option, the lock ignores all time profiles on keys. In other words, the keys function 24/7 even if they do have a time profile.

    • Apply all time profiles on a key — If you select this option, the lock applies all time profiles on keys.

    • Apply selected time profiles — If you select this option, the lock only applies the selected time profiles on keys. If the selected time profiles do not match with the key time profiles, the key functions all the time.

      You can manage the selection of time profiles with the arrow buttons as follows:

      • — Click the Arrows right button to move all items to the list.
      • — Click the Arrow right button to move the selected item(s) to the list.
      • — Click the Arrow left button to remove the selected item(s) from the list.
      • — Click the Arrows left button to remove all items from the list.

      You can view the content of a fixed time profile on the area to the right, by selecting the profile with your mouse. Editable time profile content is not shown, as it may be key-specifically modified.

    Regardless of your selection, the lock always applies the key validity start and end dates and times.

  15. Click Next.
  16. Select if you want to create an individual access right or not.

    For more information, see Access Rights.

  17. Click Next.
  18. Select how to proceed.

    The options are:

    • Leave locks in planning state — Select Leave locks in planning state if you want to leave the lock in the planning state, and continue planning the locking system without, for example, programming any physical locks.

    • Order locks — Select Order locks if you know that the lock definitions are final, but you want to program the lock later.

      For more information, see Ordering Locks.

    • Order and transfer to programming key — Select Order and transfer to programming key if you are deploying a mounted lock, and you want to program it by disconnecting the Programming Key from the computer, and taking it to the lock to be deployed. You can only do this for one lock at a time.

  19. Click Next.
  20. A summary window is displayed.
  21. Follow the wizard to end the procedure.