Adding S5 Locks

This section describes how to add S5 locks to iLOQ Locking System.

Note:

You do not necessarily need the actual physical locks to add locks in iLOQ Locking System. You can define the locks and associate them with the physical locks at a later phase.

Note:

When you connect a lock in the factory state, iLOQ Manager will notice if there is a firmware update available on the server. If this is the case, iLOQ Manager will automatically fetch and update the firmware to the lock.

Proceed as follows.

  1. Select Basic data > Browse locks.

  2. Select Add lock.
    The Add lock wizard is opened.
  3. Select Add lock.
  4. Define the lock settings as follows:
    • PlacementPlacement refers to the location of the lock on the floor plan. If you are adding several locks at a time, set the first placement in a way that it ends with a number, such as A1. In this way, the system adds consecutive placement numbers as follows:

      • A1
      • A2
      • A3
      • ...
    • Approach directionApproach direction refers to the direction where the lock will be opened from, if the door is equipped with double side lock.

    • Locking targetLocking target provides a more detailed description or name of the room or premises, where the lock will lead to.

      If you are adding several locks at a time, set the first locking target in a way that it ends with a number, such as Apartment A1. In this way, the system adds consecutive locking targets as follows:

      • Apartment A1
      • Apartment A2
      • Apartment A3
      • ...
    • Lock cylinderLock cylinder refers to the lock cylinder type. Select the type from the drop-down list, or enter the type manually.

    • Zone — Select the zone for the lock.

    • Lock type — Select S5 or S5 DIN.

      The S5 lock can be:

      • C5S oval lock cylinder or cam lock cylinder,
      • H5S padlocks or
      • F5S key safe lock cylinders

      that can be opened with a K5S electro-mechanical key.

    • Clock installed — Select Clock installed if there is a clock circuit in the lock. If the selected Lock cylinder contains a clock, Clock installed will be automatically selected.

      Note:

      In conjunction with initial programming, always connect the RTC unit to the connection cable on the lock. After this, do not disconnect the RTC unit from the connection cable.

      If you have disconnected the RTC unit from the connection cable, you must restart the RTC unit. You can do this by inserting a programming key, connected to the programming cable, to the keyway of the lock cylinder. Always carry out this procedure after disconnecting the RTC unit.

    • Lock collects audit trail — Select whether the lock collects audit trail or not.

    • Allow API access rights — Check Allow API access rights to allow Application Programming Interface (API) access rights for the lock. When enabled, in addition to standard access rights, the lock reads API access rights assigned for the key. See Access Rights.

  5. Click Next.
  6. Enter additional information as necessary.

    The fields are:

    • Door typeDoor type refers to the type of door where the lock will be mounted on.
    • EscutcheonEscutcheon refers to the shield plate that surrounds the keyhole on the door.
    • Lock modelLock model refers to the model of the lock case.
    • Cylinder extensionCylinder extension refers to the extension that will be added to the new lock.
    • Door thickness (mm)Door thickness indicates the thickness of the door where the lock will be mounted on.
    • Lock frame depth (mm)Depth of lock body (mm) indicates the depth of the lock case.
    • Opening directionOpening direction indicates the door opening direction.
    • Label — The lock label.
    • Note — Free text field for notes on the lock.
    • Other equipmentOther equipment refers to other equipment related to the lock or the door.
    • Conditional access — This check box indicates whether the lock is connected to a device that controls conditional access.
    • Description of the conditional access — A description of the conditional access. You can, for example, describe the device that is controlling the conditional access.
  7. Click Next.
  8. Optional: Select the estate for the lock.
  9. Click Next.
  10. Select the access rights for the lock.

    The default access right will be automatically added for the lock.

    1. Select the desired access right in the list on the left.
    2. You can manage the selection of access right with the key buttons as follows:
      • — Click the Arrows right button to move all items to the list.
      • — Click the Arrow right button to move the selected item(s) to the list.
      • — Click the Arrow left button to remove the selected item(s) from the list.
      • — Click the Arrows left button to remove all items from the list.
  11. Click Next.
  12. Optional: Select the time profiles:
    • Not time limited — If you select this option, the lock ignores all time profiles on keys. In other words, the keys function 24/7 even if they do have a time profile.

    • Apply all time profiles on a key — If you select this option, the lock applies all time profiles on keys.

    • Apply selected time profiles — If you select this option, the lock only applies the selected time profiles on keys. If the selected time profiles do not match with the key time profiles, the key functions all the time.

      You can manage the selection of time profiles with the arrow buttons as follows:

      • — Click the Arrows right button to move all items to the list.
      • — Click the Arrow right button to move the selected item(s) to the list.
      • — Click the Arrow left button to remove the selected item(s) from the list.
      • — Click the Arrows left button to remove all items from the list.

      You can view the content of a fixed time profile on the area to the right, by selecting the profile with your mouse. Editable time profile content is not shown, as it may be key-specifically modified.

    Regardless of your selection, the lock always applies the key validity start and end dates and times.

  13. Click Next.
  14. Select if you want to create an individual access right or not.

    For more information, see Access Rights.

  15. Click Next.
  16. Select the number of locks to create.
  17. Click Next.
  18. Select how to proceed.

    The options are:

    • Leave locks in planning state — Select Leave locks in planning state if you want to leave the lock in the planning state, and continue planning the locking system without, for example, programming any physical locks.

    • Order locks — Select Order locks if you know that the lock definitions are final, but you want to program the lock later.

      For more information, see Ordering Locks.

    • Order and program locks — Select Order and program locks:
      • If you know that the lock definitions are final, and you want to program the lock at once.
      • For locks that have not yet been installed on the premises.

      For more information, see Programming Locks.

    • Order and transfer to Programming key — Select Order and transfer to Programming key if you are deploying a mounted lock, and you want to program it by disconnecting the Programming key from the computer, and taking it to the lock to be deployed. You can only do this for one lock at a time.

  19. Click Next.
  20. A summary window is displayed.
  21. Follow the wizard to end the procedure.