収納 北欧 アルダー 引出し 扉付き 北欧 アンティーク アンティーク調 送料

Edge Metrics Data Center User Manual
Introduction
EMDC is an Internet based, Facility Access Control Solution for small to medium size
businesses, property management firms, schools, religious facilities, neighborhood
associations, condos, timeshares, and high end residence.
Edge Metrics™ consists of two major services:
Device Service. The device service manages all communications between the HID EDGE™ IP
devices and the Edge Metrics™ database server.


The devices initiate all sessions with the database server so no firewall or router
modifications are necessary; in other words all communications are outbound,
eliminating any local facility security concerns.
The database server checks the device via 32 bit authentication to ensure it is a
registered Edge Metrics™ device before communications begin.
Silverlight Web Service. Edge Metrics™ uses the Microsoft® Silverlight™ Framework for all
communications between the user and the Edge Metrics™ Application Server. All web service
communications are encrypted with Secure Socket Layer (SSL) security encryption. On initial
connection, the application will automatically download the Microsoft™ Silverlight Framework
and place a shortcut on your desktop. From this point on the application runs in "out of browser"
mode, giving you all of the advantages of a desktop application without any desktop software to
install or maintain.
Log In


Username must be an active email account
Password must contain one letter, one
number and be at least 6 digits long
Following the sign up process,, you will receive confirmation of your username in one email and
an automatically generated password in a second email.


If you forget your password, click [Forgot Password] in the dialog box and the system will
generate an email with your password.
If you want to change your password click [Change Password] and you will receive an
email confirming that you have changed your password.
Middleware Associates ©2011 all rights reserved

Check [Remember Me] if you want the application to remember your Username.
Note: if your Username (email address) is no longer active or you need to change your
username to another email address please contact [email protected]
Home Page
The home page is a dashboard giving the user quick access to any part of the application,
including remote control of all doors across all facilities, configuration management, access
management and system management.
From the home page any door can be quickly unlocked, locked or granted access. Furthermore,
all doors can be quickly "Locked Down" at the click of a button form emergency purposes.
Locking down all doors suspends all access rights, not allowing anybody in the building.
Middleware Associates ©2011 all rights reserved
Configuration Management
Facility. A facility is any physical or logical area or building with its own local area network and a
gateway to the Internet. Examples include branch offices, buildings that are on a campus but
have their own Internet gateway. A facility can have an unlimited number of HID EDGE™
devices connected to its network.
Holidays. Edge Metrics defines holidays as all U.S. national holidays. Holidays can be included
or excluded from a schedule.
Schedules. Schedules are used for two purposes:
1. To set up access groups (schedule + door group = access group)
2. To unlock a door for a recurring preset time e.g. Monday through Friday 9:00 am to 5:00
pm. This type of schedule is often used to unlock the front door to the reception area.
Door Groups. One or more doors from the same facility. Grouping doors together allows for an
unlimited number of access rights combinations.
Access Groups. Access rights that are assigned to a credential such as a badge or keyfob. An
access group represents "where" and "when" a person can enter. Up to [8] access groups can
be assigned to a credential. Since an access group can consist of an unlimited number of door
groups + schedule combinations, there are no realistic limitations on access rights.
Credentials. A credential is either a physical badge or keyfob that contains an embedded
antenna and microchip. With the Edge Metrics™ application, credentials are read only, meaning
that the application never writes information back to the card. The reader reads a binary
sequence of bits from the card and passes this data onto the controller which makes the access
decision based on its local database. Credentials have no batteries. They are charged by an
electro-magnetic field that radiates around the reader. Credentials are typically classified as
either 125KHZ Proximity or 13.56 MHz iCLASS, Mifare or other smart card technology.
Edge Metrics™ GUI shows a credentials icon but this functionality is only available to
application administrators who approve the new customer registration process that requests the
credential bit format and facility code. This information is then uploaded to the server
datacenter.
Rules. Rules represent physical or logical actions based on time or events such as alarms, or
particular badge reads. At present Edge Metrics™ single rule is to schedule a door to be
unlocked during a pre-defined, recurring period of time, such as Monday through Friday 9:00
am to 5:00 pm. Future rules will include logical actions based event such as [send email to
[email address] if badge [12345] enters front door, and physical actions based on alarms such
as IF [door held open] alarm = TRUE, THEN trigger auxiliary relay (to sound a local sounder or
alarm).
Middleware Associates ©2011 all rights reserved
Access Management
Add a Person. The form used for adding any person who will be assigned a credential and
access to doors in the one or more facilities of an organization.
Find a Person. A form used to quickly find a person in the database so that an administrator can
edit or delete the person record
The green text represents a person with administrative permissions, either local or global.
Deleting a person with administrative purposes must be considered with caution. Once an
administrator is deleted, that person can no longer have access to the application to administer
the system.
Middleware Associates ©2011 all rights reserved
Manage Access. To manage access of a pre-existing user.
To find a user the administrator can
enter either the credential number
or the user's name and then hit
[Find]. This will show the user's
present access rights, status,
access type, user pin (if any) and
credential expiration date.
The administrator can then make
the needed changes and hit [Upload
to Readers] which will immediately
upload the configuration to all
respective devices.
Note that each person can have up to two credentials assigned where each credential can
have up to [8] access groups assigned. Therefore when searching for a person, you may find [2]
credentials to choose from.
System Management
Permissions. There are two type of permissions; global and local. A global administrator has the
right to administer all facilities of the company or organization. A local administrator has the right
to administer only records associates to the single facility.
Only a global administrator has the right to
setup a local administrator. If a global
administrator wants to set up a single person
to manage more than one facility but not have
global administrative rights, then the global
administrator must setup a separate local
administrator record for each facility.
There is no limit to the number of global and
local administrators.
Only a global administrator can setup another
global administrator.
Middleware Associates ©2011 all rights reserved
Hardware Status. The hardware status form offers real time status of all registered devices. If a
device is offline, any changes the administrator makes through the GUI cannot be uploaded to
the device. Therefore if a device is not acting as defined it may be because it is offline and
cannot receive the latest changes/updates. There are two main reasons for having a device
offline; [1] no power to the device; [2] local Internet connectivity is down. Other possibilities
include the the local area network configuration. A device must have a clear path to the LAN's
Internet gateway.
Even if a device is offline it will continue to function normally, granting access and running
schedules as it was defined to do before it went offline. This is all possible because the HID
EDGE™ device holds a local database and therefore all access decision are made locally at the
door and do not require online access to the Edge Metrics™ Data Center.
Re-synch Device. This action uploads all configuration files to the device, ensuring all changes
have been uploaded. Note that changes are dynamically uploaded to the device every time the
administrator make an addition, modification or deletion of a record and hits save.
This action should only be used if the device is not functioning properly and is online.
Add Device. Click [Add Device] to add a new device. You will need to input the device MAC
address which can be found on a white sticker on the bottom of the plastic enclosure.
Database Backup/Restore. The Edge Metrics™ data center manages all backups and restores
and therefore this icon link is disabled. The icon is placed on the GUI and available only to very
large end users who may consider purchasing and managing their own servers for this
application.
Middleware Associates ©2011 all rights reserved