Adding S50 Locks

This section describes how to add S50 locks to iLOQ Locking System.

Note:

You do not necessarily need the actual physical locks to add locks in iLOQ Locking System. You can define the locks and associate them with the physical locks at a later phase.

Proceed as follows.

  1. Select Basic data > Browse locks.

  2. Select Add lock.
    The Add lock wizard is opened.
  3. Select Add lock.
  4. Define the lock settings as follows:
    • PlacementPlacement refers to the location of the lock on the floor plan. If you are adding several locks at a time, set the first placement in a way that it ends with a number, such as A1. In this way, the system adds consecutive placement numbers as follows:

      • A1
      • A2
      • A3
      • ...
    • Approach directionApproach direction refers to the direction where the lock will be opened from, if the door is equipped with double side lock.

    • Locking targetLocking target provides a more detailed description or name of the room or premises, where the lock will lead to.

      If you are adding several locks at a time, set the first locking target in a way that it ends with a number, such as Apartment A1. In this way, the system adds consecutive locking targets as follows:

      • Apartment A1
      • Apartment A2
      • Apartment A3
      • ...
    • Lock cylinderLock cylinder refers to the lock cylinder type. Select the type from the drop-down list, or enter the type manually.

    • Zone — Select the zone for the lock.

    • Lock type — Select S50.

      The S50 locks can be:

      • C50S oval lock cylinders
      • D50S DIN lock cylinders
      • F50S key safe lock cylinders
      • G50S can lock cylinders
      • H50S padlocks

      that can be opened with an S50 Phone key or S50 Key fob.

    • Lock collects audit trail — Select whether the lock collects audit trail or not.

    • Allow API access rights — Check Allow API access rights to allow Application Programming Interface (API) access rights for the lock. When enabled, in addition to standard access rights, the lock reads API access rights assigned for the key. See Access Rights.

    • Online authentication required — Check the Online authentication required, if you want to create a high-security lock that requires server authentication each time the lock is opened.

      Note:

      Online authentication lengthens the lock opening time.

      If you have allowed API access rights, and checked the Online authentication required, select also one or both of the options below:

      • For API access rights — If you check this check box, the lock requires online authentication from a key that has an API access right. If you do not check this check box, the lock can opened without online authentication, by a key that has an API access right.

      • For standard access rights — If you check this check box, the lock requires online authentication from a key that has a standard access right. If you do not check this check box, the lock can opened without online authentication, by a key that has a standard access right.

  5. Click Next.
  6. Enter additional information as necessary.

    The fields are:

    • Door typeDoor type refers to the type of door where the lock will be mounted on.
    • EscutcheonEscutcheon refers to the shield plate that surrounds the keyhole on the door.
    • Lock modelLock model refers to the model of the lock case.
    • Cylinder extensionCylinder extension refers to the extension that will be added to the new lock.
    • Door thickness (mm)Door thickness indicates the thickness of the door where the lock will be mounted on.
    • Lock frame depth (mm)Depth of lock body (mm) indicates the depth of the lock case.
    • Opening directionOpening direction indicates the door opening direction.
    • Label — The lock label.
    • Note — Free text field for notes on the lock.
    • Other equipmentOther equipment refers to other equipment related to the lock or the door.
  7. Click Next.
  8. Optional: Select the estate for the lock.
  9. Click Next.
  10. Select the access rights for the lock.

    The default access right will be automatically added for the lock.

    1. Select the desired access right in the list on the left.
    2. You can manage the selection of access right with the key buttons as follows:
      • — Click the Arrows right button to move all items to the list.
      • — Click the Arrow right button to move the selected item(s) to the list.
      • — Click the Arrow left button to remove the selected item(s) from the list.
      • — Click the Arrows left button to remove all items from the list.
  11. Click Next.
  12. Optional: Select the time profiles:
    • Not time limited — If you select this option, the lock ignores all time profiles on keys. In other words, the keys function 24/7 even if they do have a time profile.

    • Apply all time profiles on a key — If you select this option, the lock applies all time profiles on keys.

    • Apply selected time profiles — If you select this option, the lock only applies the selected time profiles on keys. If the selected time profiles do not match with the key time profiles, the key functions all the time.

      You can manage the selection of time profiles with the arrow buttons as follows:

      • — Click the Arrows right button to move all items to the list.
      • — Click the Arrow right button to move the selected item(s) to the list.
      • — Click the Arrow left button to remove the selected item(s) from the list.
      • — Click the Arrows left button to remove all items from the list.

      You can view the content of a fixed time profile on the area to the right, by selecting the profile with your mouse. Editable time profile content is not shown, as it may be key-specifically modified.

    Regardless of your selection, the lock always applies the key validity start and end dates and times.

  13. Click Next.
  14. Select if you want to create an individual access right or not.

    For more information, see Access Rights.

  15. Click Next.
  16. Select the number of locks to create.
  17. Click Next.
  18. Select the programming phones for the lock.

    These are phones that can transfer programming changes, such as access rights, time profiles or changes to lock settings, to the lock.

    The options are:

    • All phones that have access to the lock — All phones that have access to the lock can transfer programming changes to the lock.

    • Selected phones — Only selected phones can transfer programming changes to the lock. If you select this option, select the phones from the opened list.

  19. Click Next.
  20. Select how to proceed.

    The options are:

    • Leave locks in planning state — Select Leave locks in planning state if you want to leave the lock in the planning state, and continue planning the locking system without, for example, programming any physical locks.

    • Order locks — Select Order locks if you know that the lock definitions are final, but you want to program the lock later.

      For more information, see Ordering Locks.

    • Order and program locks — Select Order and program locks:
      • If you know that the lock definitions are final, and you want to program the lock at once.
      • For locks that have not yet been installed on the premises.

      For more information, see Programming Locks.

  21. Click Next.
  22. A summary window is displayed.
  23. Follow the wizard to end the procedure.