Table of contents
Table of contents..............................................................................................................................................2
Security guide...................................................................................................................................................4
KeySafe Lock datasheet...................................................................................................................................5
Properties..................................................................................................................................................6
Options......................................................................................................................................................6
Operation..........................................................................................................................................................7
Rights for removing keys...........................................................................................................................7
Key identification........................................................................................................................................7
Multi-level security...................................................................................................................................... 8
Authorization check...................................................................................................................................8
Sabotage protection..................................................................................................................................8
Alarm functions (options): .........................................................................................................................8
Power outage mode..................................................................................................................................9
User interface/Cabinet software.....................................................................................................................10
User levels...............................................................................................................................................10
User rights...............................................................................................................................................10
Functions of the KeySafe Cabinet Software (KCS) for key users..................................................................10
Select Language .......................................................................................................................................11
Login ..........................................................................................................................................................11
Login using card......................................................................................................................................11
Login using PIN code..............................................................................................................................11
Login with combination of card and PIN code.........................................................................................12
Login with fingerprint...............................................................................................................................12
Login with combination of fingerprint and PIN-code ...............................................................................12
Key handling..............................................................................................................................................13
Key map..................................................................................................................................................13
Picking up keys .......................................................................................................................................14
Returning keys ........................................................................................................................................14
Keys in wrong key positions....................................................................................................................15
Find a key (Where are my keys?)............................................................................................................15
Finding subkeys ......................................................................................................................................16
Vehicle search...........................................................................................................................................16
Functions of the KeySafe Cabinet Software (KCS) for Admin users .............................................................18
Key cards with admin rights....................................................................................................................18
Edit users...................................................................................................................................................18
Add new user ..........................................................................................................................................18
Modify a user...........................................................................................................................................19
Delete a user...........................................................................................................................................19
Edit key rights ...........................................................................................................................................20
Edit keys..................................................................................................................................................20
Replacing RFID key holders ...................................................................................................................20
Assign keys to / revoke key rights from users.........................................................................................21
Time settings.............................................................................................................................................21
Event logs..................................................................................................................................................22