Safran MorphoAccess SIGMA Series Instruction Manual

MorphoAccess® SIGMA Series –Administration Guide
Warning
2014_0000002196-09
MORPHO DOCUMENT –REPRODUCTION AND DISCLOSURE FORBIDDEN
2
May 2016
WARNING
COPYRIGHT© 2016 All rights reserved.
Information in this document is subject to change without notice and do not represent a
commitment on the part of MorphoAccess® SIGMA Series. No part of this document may be
reproduced or transmitted in any form or by any means, electronic or mechanical, including
photocopying or recording, for any purpose without the express written permission of
MorphoAccess® SIGMA Series.
This legend is applicable to all pages of this document.
This manual makes reference to names and products that are trademarks of their respective
owners.

MorphoAccess® SIGMA Series –Administration Guide
Revision History
2014_0000002196-09
MORPHO DOCUMENT –REPRODUCTION AND DISCLOSURE FORBIDDEN
3
May 2016
Revision History
The table below contains the history of changes made to the present document.
Version
Date
Description
01
November 2013
First version
02
May 2014
Updated
- Terminal Rear View Diagram
- USB port with a Wi-Fi™ adapter
- Default Communication Parameter
- Recommendations / SD card
03
June 2015
Page #111, 112, 112, 164, 165, 165, 295, 306 are updated.
04
June 2015
Updated
- Web Server
- Smart Card Enrollment
- Photo Taking
- LCD Configurations
05
August 2015
Updated
- Configure ELITE Mode
- User Enrollment in Database for User PIN
06
December 2015
Updated
- First Boot Assistance At Next Boot Configuration
- Note added for Job Code
- Sensor Log Configuration
- MiFare Plus Parameter Added
07
April 2016
Updated for Learning Phase. Multiple JIRA tickets are corrected.
08
April 2016
Add list of supported templates and Contactless cards (Page 32 & 371).
09
May 2016
Spelling correction.

MorphoAccess® SIGMA Series –Administration Guide
Table of Contents
2014_0000002196-09
MORPHO DOCUMENT –REPRODUCTION AND DISCLOSURE FORBIDDEN
4
May 2016
Table of Contents
WARNING ............................................................................................................................2
REVISION HISTORY ...............................................................................................................3
SECTION 1 : INTRODUCTION ...............................................................................................23
MorphoAccess® SIGMA Series Terminal...........................................................................24
Scope of the document ...................................................................................................25
Safety Instructions ..........................................................................................................27
Wiring Recommendations ................................................................................................... 27
Europe information ............................................................................................................. 28
USA information .................................................................................................................. 28
About Biometrics ............................................................................................................29
About fingerprint biometrics ............................................................................................... 29
Acquisition principles ......................................................................................................30
Areas of interest .................................................................................................................. 30
Ergonomics .......................................................................................................................... 30
Recommended fingers......................................................................................................... 31
Enrolment process ............................................................................................................... 31
Template supported ............................................................................................................ 32
SECTION 2 : DESCRIPTION OF TERMINAL.............................................................................33
Interfaces Description .....................................................................................................34
Introduction ......................................................................................................................... 34
Power Supply Interface........................................................................................................ 37
Administration Interface ..................................................................................................... 37
Access Control System Synoptic .......................................................................................... 39
USB port usage ...............................................................................................................40
Plugging a USB Mass storage key ....................................................................................... 40
Plugging a USB Wi-Fi™ or 3G adapter................................................................................. 41
Connecting a Computer through USB.................................................................................. 42
SECTION 3 : CONNECTING THE TERMINAL TO A PC..............................................................43
General ..........................................................................................................................44
Why would one connect the terminal to a PC? ................................................................... 44
Connection methods............................................................................................................ 44
Network parameter initialization ........................................................................................ 45
Point to Point Ethernet Connection .................................................................................46

MorphoAccess® SIGMA Series –Administration Guide
Table of Contents
2014_0000002196-09
MORPHO DOCUMENT –REPRODUCTION AND DISCLOSURE FORBIDDEN
5
May 2016
Connection through only one Ethernet switch .................................................................47
Connection through a LAN ..............................................................................................48
Description........................................................................................................................... 48
LAN with DNS Server............................................................................................................ 48
LAN without DNS Server ...................................................................................................... 49
Static IP address (DHCP disabled)........................................................................................ 49
Dynamic IP address (DHCP enabled) ................................................................................... 49
Wi-Fi™ Network configuration ........................................................................................50
Requirements....................................................................................................................... 50
Configuration....................................................................................................................... 50
Troubleshooting................................................................................................................... 50
SECTION 4 : TERMINAL CONFIGURATION AND ADMINISTRATION .......................................51
Understanding MorphoAccess® Configuration.................................................................52
Presentation ........................................................................................................................ 52
Modifying the value of a parameter ................................................................................... 52
Notation............................................................................................................................... 53
Configuring a Networked MorphoAccess®.......................................................................54
Introduction ......................................................................................................................... 54
Network factory settings ..................................................................................................... 55
Date/Time settings .............................................................................................................. 55
SSL Securing ......................................................................................................................... 55
Network Wi-Fi™ configuration ............................................................................................ 56
MorphoAccess® Terminal Database Management ..........................................................57
General ................................................................................................................................ 57
Adding a user to the database ............................................................................................ 57
Removing a user from the database ................................................................................... 57
Database Size ...................................................................................................................... 57
MorphoAccess® Terminal License Management ..............................................................59
User licenses ........................................................................................................................ 59
Logs licenses ........................................................................................................................ 60
Communication licenses ...................................................................................................... 61
Access Control license.......................................................................................................... 61
Time and Attendance (T&A) license .................................................................................... 62
Getting a license for a MorphoAccess® SIGMA Series terminal.......................................... 63
Checking licenses installed in the terminal with license manager application ................... 63
Installing a new license........................................................................................................ 66

MorphoAccess® SIGMA Series –Administration Guide
Table of Contents
2014_0000002196-09
MORPHO DOCUMENT –REPRODUCTION AND DISCLOSURE FORBIDDEN
6
May 2016
Terminal Firmware Upgrade ...........................................................................................67
How to get last version of firmware.................................................................................... 67
How to upgrade the firmware............................................................................................. 67
Firmware upgrade using a USB Mass Storage Key ............................................................. 67
Firmware upgrade tool for expert users.............................................................................. 67
MorphoAccess® SIGMA Series Modes..............................................................................69
MorphoAccess® 500 or J Series legacy mode ...................................................................... 69
L-1 Bioscrypt 4G Series legacy mode ................................................................................... 69
MorphoAccess® SIGMA Series native mode........................................................................ 70
SECTION 5 : FIRST BOOT ASSISTANT ...................................................................................71
Assistant Initialization ....................................................................................................72
Date & Time Configuration .............................................................................................73
Trigger Event ..................................................................................................................77
Language Configuration .................................................................................................78
Show/Hide Language Icon ..............................................................................................80
Ethernet Interface Settings .............................................................................................81
Wi-Fi™ Configuration......................................................................................................83
Protocol Configuration....................................................................................................89
Password Configuration..................................................................................................91
First Boot Assistance At Next Boot Configuration ............................................................93
Recover Corrupted Components ......................................................................................94
SECTION 6 : ADMINISTRATION MENU.................................................................................95
Access to Administration Menu.......................................................................................96
User Menu......................................................................................................................98
User Enrollment in Database............................................................................................... 99
User Enrolment in Card...................................................................................................... 114
User Enrolment in Card & Database ................................................................................. 116
Update User Information................................................................................................... 118
Authenticate User.............................................................................................................. 121
Delete User ........................................................................................................................ 123
Card Manager.................................................................................................................... 126
Multimedia menu .........................................................................................................157
Audio Settings.................................................................................................................... 158
Video Settings.................................................................................................................... 161
Images Settings ................................................................................................................. 164
System Menu................................................................................................................167
Terminal Configurations .................................................................................................... 168

MorphoAccess® SIGMA Series –Administration Guide
Table of Contents
2014_0000002196-09
MORPHO DOCUMENT –REPRODUCTION AND DISCLOSURE FORBIDDEN
7
May 2016
Transaction Log ................................................................................................................. 189
Miscellaneous Settings ...................................................................................................... 194
Web Server ........................................................................................................................ 197
Error Log Configuration ..................................................................................................... 197
Sensor Log Configuration .................................................................................................. 200
Communication menu...................................................................................................202
Security recommendation ................................................................................................. 203
Ethernet Network Configuration ....................................................................................... 203
Wi-Fi™ Network Configuration.......................................................................................... 206
Configure Hostname.......................................................................................................... 212
Serial Parameters .............................................................................................................. 213
Security Menu ..............................................................................................................216
Biometric Security Settings................................................................................................ 217
Anti-Tamper Switch For Terminal Security ........................................................................ 231
Network & Communication Security Settings ................................................................... 235
Additional User Verification Settings................................................................................. 249
Change LCD Password ....................................................................................................... 252
Additional User Control Settings ....................................................................................... 254
USB Menu.....................................................................................................................260
Format USB Mass Storage device...................................................................................... 261
Initialize USB Mass Storage device.................................................................................... 263
Import Data into Terminal................................................................................................. 265
Export Data in USB Mass Storage Device.......................................................................... 271
Information Menu ........................................................................................................280
View Device Details ........................................................................................................... 281
View Firmware Information .............................................................................................. 283
View Sensor Revision Information ..................................................................................... 284
View Communication Parameters..................................................................................... 285
View Memory Status ......................................................................................................... 289
View User Status................................................................................................................ 290
View Transaction Log Status ............................................................................................. 291
Reboot Terminal Menu .................................................................................................292
SECTION 7 : VIDEOPHONE FACILITY ..................................................................................294
Introduction to Videophone ..........................................................................................295
Configure Video Phone Server .......................................................................................296
Viewing Video Phone Server Details..............................................................................299

MorphoAccess® SIGMA Series –Administration Guide
Table of Contents
2014_0000002196-09
MORPHO DOCUMENT –REPRODUCTION AND DISCLOSURE FORBIDDEN
8
May 2016
Delete Video Phone Server............................................................................................300
How User can make Video Call......................................................................................302
SECTION 8 : TERMINAL CONFIGURATION THROUGH WEBSERVER .....................................304
Introduction to Webserver ............................................................................................305
Security recommendation ................................................................................................. 306
Tamper Setting for Terminal Security................................................................................ 307
General Purpose Input Output Configuration ................................................................... 309
Single Door Access Control Settings .................................................................................. 310
Time and Attendance Mode Configuration....................................................................... 312
Transaction Log Settings ................................................................................................... 317
Biometric Security Settings................................................................................................ 319
Communication Settings.................................................................................................... 320
Controller Feedback........................................................................................................... 325
Date and Time Settings ..................................................................................................... 328
Wiegand Parameters Settings........................................................................................... 330
User Control Configurations .............................................................................................. 333
Threat Level Configuration ................................................................................................ 337
Event Configurations ......................................................................................................... 339
Define Access Schedule...................................................................................................... 340
Define Holiday Schedule .................................................................................................... 347
Door Open Schedule Configuration ................................................................................... 351
Complete Configuration (Advanced users only) ................................................................ 352
Reset Factory Settings ....................................................................................................... 353
SECTION 9 : ACCESS CONTROL ..........................................................................................355
Access control presentation ..........................................................................................356
Typical architecture of an access control system .............................................................. 356
Typical access control process ........................................................................................... 357
Preliminary: adding a biometric template in local database ..........................................358
MorphoAccess® terminal operating modes ...................................................................359
Standalone mode or Slave mode....................................................................................... 359
Standalone mode: Identification and/or Authentication .................................................. 359
Access Control Process in Identification Mode.................................................................. 360
Access Control Process in Authentication Mode ............................................................... 361
Access Control Process for VIP Users................................................................................. 362
Access Control Result ....................................................................................................363
Information for the User.................................................................................................... 363

MorphoAccess® SIGMA Series –Administration Guide
Table of Contents
2014_0000002196-09
MORPHO DOCUMENT –REPRODUCTION AND DISCLOSURE FORBIDDEN
9
May 2016
Information for the Administrator..................................................................................... 363
Integration in an Access Control System ........................................................................... 363
Access Granted .................................................................................................................. 364
Access Denied .................................................................................................................... 364
SECTION 10 : ACCESS CONTROL BY IDENTIFICATION .........................................................365
Identification Mode Description ....................................................................................366
Identification Process ........................................................................................................ 366
Access Control by Identification ........................................................................................ 366
Result of the access control request.................................................................................. 366
User’s Data required in the terminal................................................................................. 366
Identification Modes (database extension licenses) ......................................................... 367
Compatibility with Access Control Systems....................................................................... 367
User Interface .................................................................................................................... 368
SECTION 11 : ACCESS CONTROL BY AUTHENTICATION.......................................................369
Authentication Process .................................................................................................370
Introduction ....................................................................................................................... 370
Authentication process...................................................................................................... 370
Access control by authentication ...................................................................................... 370
Contactless Smart Card ..................................................................................................... 371
List of contactless cards validated..................................................................................... 371
Authentication Process Options ........................................................................................ 373
Manual bypass of biometric control.................................................................................. 373
Automatic bypass of biometric control ............................................................................. 375
Result of access control check ........................................................................................... 375
Compatibility with Access Control Systems....................................................................... 375
Selection of user’s contactless card type (MIFARE® and/or DESFire®).............................. 376
Biometric check, biometric data on user's card ..............................................................378
Description......................................................................................................................... 378
User’s data required in the terminal ................................................................................. 378
User’s data required on the user’s card ............................................................................ 378
Activation key .................................................................................................................... 378
User Interface .................................................................................................................... 379
PIN verification - PIN stored on card..............................................................................380
Description......................................................................................................................... 380
User’s data required in the terminal ................................................................................. 380
User’s data required on the user’s card ............................................................................ 380

MorphoAccess® SIGMA Series –Administration Guide
Table of Contents
2014_0000002196-09
MORPHO DOCUMENT –REPRODUCTION AND DISCLOSURE FORBIDDEN
10
May 2016
Activation key .................................................................................................................... 380
User Interface .................................................................................................................... 381
BIOPIN verification - BIOPIN stored on card...................................................................382
Description......................................................................................................................... 382
User’s data required in the terminal ................................................................................. 382
User’s data required on the user’s card ............................................................................ 382
Activation key .................................................................................................................... 382
User Interface .................................................................................................................... 383
Biometric check and biometric data in local database ...................................................384
Description......................................................................................................................... 384
User’s data required in the terminal ................................................................................. 384
User’s data required on the user’s card ............................................................................ 384
Activation key .................................................................................................................... 385
User interface .................................................................................................................... 385
Authentication with local database: User ID entered from keyboard .............................386
Description......................................................................................................................... 386
Activation key .................................................................................................................... 386
Authentication with local database: ID input from Wiegand or Clock & Data.................387
Description......................................................................................................................... 387
Activation key .................................................................................................................... 387
Wiegand Frame Configuration .......................................................................................... 389
Wiegand frame example (26 bits)..................................................................................... 390
No biometric check, no User ID check ............................................................................391
Description......................................................................................................................... 391
User’s data required in the terminal ................................................................................. 391
User’s data required on the user’s card ............................................................................ 391
Activation key .................................................................................................................... 392
User Interface .................................................................................................................... 392
No biometric check, User Identifier in the database.......................................................393
Description......................................................................................................................... 393
User’s data required in the terminal ................................................................................. 393
User’s data required on the user’s card ............................................................................ 393
Activation key .................................................................................................................... 394
User Interface .................................................................................................................... 395
Authentication process specified by User's card.............................................................396
Description......................................................................................................................... 396

MorphoAccess® SIGMA Series –Administration Guide
Table of Contents
2014_0000002196-09
MORPHO DOCUMENT –REPRODUCTION AND DISCLOSURE FORBIDDEN
11
May 2016
User’s data required in the terminal ................................................................................. 396
User’s data required on the user’s card ............................................................................ 396
Activation key .................................................................................................................... 397
User Interface .................................................................................................................... 397
Allowed format for User's identifier ..............................................................................399
TLV structured data ........................................................................................................... 399
Binary Data........................................................................................................................ 401
SECTION 12 : MULTIFACTOR ACCESS CONTROL MODE ......................................................404
Multi-factor Mode ........................................................................................................405
Description......................................................................................................................... 405
User Interface .................................................................................................................... 405
User’s data required in the terminal ................................................................................. 405
User’s data required on the user’s card ............................................................................ 405
Activation keys................................................................................................................... 406
SECTION 13 : TIME AND ATTENDANCE MODE ...................................................................407
Time and Attendance Synoptic......................................................................................408
Normal Mode..................................................................................................................... 408
Extended Mode.................................................................................................................. 410
T&A Mode Mandatory or Optional Scenarios ................................................................... 412
T&A - Mandatory Mode Work Flow Diagram ................................................................... 413
T&A - Non Mandatory Mode Work Flow Diagram............................................................ 414
Note on Terminal Clock Deviation ..................................................................................... 415
SECTION 14 : PROXY MODE ..............................................................................................416
Presentation of Proxy (or slave) mode...........................................................................417
Process............................................................................................................................... 417
Local signals....................................................................................................................... 418
Proxy mode use sample..................................................................................................... 419
Proxy mode activation....................................................................................................... 419
SECTION 15 : POLLING MODE ...........................................................................................420
Presentation of Polling mode ........................................................................................421
Process............................................................................................................................... 421
Polling mode activation..................................................................................................... 422
SECTION 16 : MESSAGES SENDING....................................................................................423
Principle .......................................................................................................................424
Events ..........................................................................................................................425
Sending Interfaces ........................................................................................................426

MorphoAccess® SIGMA Series –Administration Guide
Table of Contents
2014_0000002196-09
MORPHO DOCUMENT –REPRODUCTION AND DISCLOSURE FORBIDDEN
12
May 2016
SECTION 17 : COMPATIBILITY WITH AN ACCESS CONTROL SYSTEM ...................................427
Internal Relay activation on Access Granted result ........................................................428
Description......................................................................................................................... 428
Activation key .................................................................................................................... 429
Configuration key .............................................................................................................. 429
External activation of the internal relay ........................................................................430
Description......................................................................................................................... 430
Activation key .................................................................................................................... 431
Configuration key .............................................................................................................. 431
Access Request Result Log File ......................................................................................432
Description......................................................................................................................... 432
Log File management ........................................................................................................ 432
Log File size........................................................................................................................ 432
Activation key .................................................................................................................... 433
Sending an Access Control Result Message....................................................................434
Presentation ...................................................................................................................... 434
Ports and protocols............................................................................................................ 434
Serial Port (Output only).................................................................................................... 435
Ethernet port ..................................................................................................................... 437
Wi-Fi™ Channel.................................................................................................................. 437
Note about Terminal Clock Deviation................................................................................ 438
SECTION 18 : TERMINAL USER INTERFACE.........................................................................439
Audio Man Machine Interface.......................................................................................440
Audible signal .................................................................................................................... 440
Terminal States.................................................................................................................. 441
Access Request Result........................................................................................................ 446
Enrolment .......................................................................................................................... 447
SECTION 19 : COMPATIBILITY ACCESSORIES, SOFTWARE LICENSES AND SOFTWARE
APPLICATIONS..................................................................................................................450
Compatible Accessories & Software Licenses .................................................................451
Compatible software applications.................................................................................452
SECTION 20 : RECOMMENDATIONS ..................................................................................453
Warning .......................................................................................................................454
General precautions .......................................................................................................... 454
Areas containing combustibles.......................................................................................... 454
Specific precautions for terminals fitted with a contactless smartcard reader ................ 454

MorphoAccess® SIGMA Series –Administration Guide
Table of Contents
2014_0000002196-09
MORPHO DOCUMENT –REPRODUCTION AND DISCLOSURE FORBIDDEN
13
May 2016
SD card............................................................................................................................... 455
Ethernet connection .......................................................................................................... 455
Date / Time synchronization ............................................................................................. 455
Cleaning precautions ......................................................................................................... 455
Recommended Conditions for Face Detection .................................................................. 456
ANNEX 1 : FINGER PLACEMENT RECOMMENDATION .......................................................457
ANNEX 2 : COMPARISON OF AUTHENTICATION MODE WITH CONTACTLESS CARD ...........464
ANNEX 3 : BIBLIOGRAPHY ...............................................................................................467
ANNEX 4 : GLOSSARY, ACRONYMS AND ABBREVIATION ..................................................472
ANNEX 5 : SUPPORT ........................................................................................................476

MorphoAccess® SIGMA Series –Administration Guide
Table of Figures
2014_0000002196-09
MORPHO DOCUMENT –REPRODUCTION AND DISCLOSURE FORBIDDEN
14
May 2016
Table of Figures
Figure 1: Minutiae are classified in two categories i.e. ridge ending and bifurcation.............29
Figure 2: Most Relevant Biometric Data in a Fingerprint.........................................................30
Figure 3: Recommended Fingers for Capture ..........................................................................31
Figure 4: MorphoAccess® SIGMA Series Terminal Front View ................................................35
Figure 5: MorphoAccess® SIGMA Series Terminal Rear View Diagram ...................................38
Figure 6: MorphoAccess® SIGMA Series terminal external USB port ......................................40
Figure 7: MorphoAccess® SIGMA Series terminal USB port with a Wi-Fi™ adapter................41
Figure 8: MorphoAccess® SIGMA Series terminal USB port ....................................................42
Figure 9: Direct Point to Point Ethernet Connection ...............................................................46
Figure 10: Connection through an Ethernet switch............................................................47
Figure 11: Connection through LAN....................................................................................48
Figure 12: Configuration of a MorphoAccess® SIGMA Series terminal by a Host System .54
Figure 13: Date and Time setting of Terminal from Webserver.........................................55
Figure 14: License Manager, adding a MorphoAccess® SIGMA Series terminal ................64
Figure 15: License Manager, entering an IP address for a MorphoAccess® SIGMA Series
terminal ............................................................................................................................64
Figure 16: Licenses installed in a MorphoAccess® SIGMA Series terminal ........................65
Figure 17: Adding a license in a MorphoAccess® SIGMA Series terminal ..........................66
Figure 18: First Boot Assistant Screen displayed on Installation ........................................72
Figure 19: Configuring Current Date...................................................................................73
Figure 20: Configuring Current Time...................................................................................74
Figure 21: Configuring Time Zone .......................................................................................74
Figure 22: List of Predefined Time Zones of World ............................................................75
Figure 23: Custom Time Zone Setting .................................................................................75
Figure 24: Selecting the event(s) that starts access control rights check process .............77
Figure 25: Configure Language ...........................................................................................78
Figure 26: Language selection on main screen...................................................................79
Figure 27: Hide Language Icon............................................................................................80
Figure 28: Ethernet Configuration ......................................................................................81
Figure 29: IP Mode Selection ..............................................................................................82
Figure 30: Selecting available Wi-Fi™ network...................................................................83
Figure 31: Enter Encryption Key..........................................................................................84
Figure 32: Success message is displayed showing Wi-Fi™ network is configured .............84
Figure 33: Connected to Wi-Fi™ network ...........................................................................84
Figure 34: Selecting Other Network to set up Wi-Fi™ network manually..........................85
Figure 35: WLAN Parameter Configuration ........................................................................85
Figure 36: Setting SSID ........................................................................................................86
Figure 37: Selecting Encryption Mode ................................................................................86

MorphoAccess® SIGMA Series –Administration Guide
Table of Figures
2014_0000002196-09
MORPHO DOCUMENT –REPRODUCTION AND DISCLOSURE FORBIDDEN
15
May 2016
Figure 38: Define Encryption Key........................................................................................87
Figure 39: Entering in WLAN –IP Configuration.................................................................87
Figure 40: WLAN –IP Configuration ...................................................................................88
Figure 41: Success message is displayed showing Wi-Fi™ network is configured .............88
Figure 42: Protocol Configuration.......................................................................................89
Figure 43: Resetting Device Password ................................................................................91
Figure 44: Entering New Password .....................................................................................92
Figure 45: Verifying New Password ....................................................................................92
Figure 46: First Boot Configuration Storage Type...............................................................93
Figure 47: Protected Data Corrupted Error ........................................................................94
Figure 48: Corrupted Components .....................................................................................94
Figure 49: Logging in Device ...............................................................................................96
Figure 50: Entering Password .............................................................................................97
Figure 51: Administrator Menu...........................................................................................97
Figure 52: User Management Menu...................................................................................98
Figure 53: Entering User Identifier......................................................................................99
Figure 54: Adding user information ..................................................................................100
Figure 55: Enter First Name of User..................................................................................100
Figure 56: Enrolling Finger Index ......................................................................................101
Figure 57: Select first finger to capture ............................................................................101
Figure 58: Biometric data capture ....................................................................................102
Figure 59: Set Duress Finger as ON ...................................................................................102
Figure 60: Assigning Access Rights....................................................................................103
Figure 61: Enter User PIN..................................................................................................104
Figure 62: Setting Job Code...............................................................................................104
Figure 63: Setting Job Code in user profile .......................................................................105
Figure 64: Assigning Access Schedule ...............................................................................105
Figure 65: Enrolment Information Screen –Configuring parameters ..............................107
Figure 66: Configuring Dynamic Message for User...........................................................108
Figure 67: Setting duration for dynamic message ............................................................108
Figure 68: Configuring Dynamic Message for User...........................................................108
Figure 69: Configuring Door Open Time Out ....................................................................109
Figure 70: Enrolment Information Screen ........................................................................109
Figure 71: Defining User Rule............................................................................................110
Figure 72: Defining User Rule –Trigger Source ................................................................110
Figure 73: Defining User Rule –Record Reference Source...............................................111
Figure 74: Defining User Rule –Control Mode .................................................................112
Figure 75: Defining User Rule............................................................................................112
Figure 76: Select Card Data Format ..................................................................................114
Figure 77: Enrollment Finger Index in Card ......................................................................115
Figure 78: Select Card Data Format ..................................................................................116
Figure 79: Selecting Search Criteria ..................................................................................118

MorphoAccess® SIGMA Series –Administration Guide
Table of Figures
2014_0000002196-09
MORPHO DOCUMENT –REPRODUCTION AND DISCLOSURE FORBIDDEN
16
May 2016
Figure 80: Entering first digits of the searched User ID ....................................................118
Figure 81: Selecting User ID ..............................................................................................119
Figure 82: Enrolment Information screen is displayed for editing ...................................119
Figure 83: Authenticate User ............................................................................................121
Figure 84: Entering User ID for authentication.................................................................121
Figure 85: Deleting User....................................................................................................123
Figure 86: Searching User ID .............................................................................................123
Figure 87: Deleting User ID ...............................................................................................124
Figure 88: A confirmation message pop up for delete .....................................................124
Figure 89: Select Delete action .........................................................................................125
Figure 90: Confirm All User Deletion ................................................................................125
Figure 91: Accessing Card Manager ..................................................................................126
Figure 92: Renewal of User Card.......................................................................................127
Figure 93: Select Card Data Format ..................................................................................128
Figure 94: Select search criteria........................................................................................128
Figure 95: Entering User ID to be searched ......................................................................129
Figure 96: Selecting User ID ..............................................................................................129
Figure 97: A success message is displayed showing user is stored in card ......................130
Figure 98: Encoding Administrator card ...........................................................................131
Figure 99: Select Card Type to be encoded ......................................................................132
Figure 100: Administrator card is encoded.........................................................................132
Figure 101: Encoding Visitor Card.......................................................................................133
Figure 102: User ID for Visitor Card ....................................................................................134
Figure 103: Smartcard Read Profile ....................................................................................135
Figure 104: Smartcard Read Profile_Multi..........................................................................135
Figure 105: Smartcard Read Profile_iClass .........................................................................136
Figure 106: Smartcard Encode Profile ................................................................................137
Figure 107: Smartcard Encode Profile ................................................................................137
Figure 108: Selecting Card Type..........................................................................................139
Figure 109: Generating Site Key..........................................................................................140
Figure 110: Success message is displayed showing site key is generated in the terminal.140
Figure 111: Resetting keys in selected cards ......................................................................141
Figure 112: Setting No. of Start Block .................................................................................144
Figure 113: Keyset configuration ........................................................................................145
Figure 114: Confirming reset key action .............................................................................146
Figure 115: Site Key is reset successfully ............................................................................146
Figure 116: Selecting Enroll User ID Format .......................................................................147
Figure 117: Selecting Enroll User ID Format .......................................................................147
Figure 118: Configuring Application ID and File ID .............................................................150
Figure 119: Set Key Offset for iCLASS® cards ......................................................................151
Figure 120: Set Key Offset...................................................................................................152
Figure 121: Configure Active Pages for iCLASS® cards........................................................153

MorphoAccess® SIGMA Series –Administration Guide
Table of Figures
2014_0000002196-09
MORPHO DOCUMENT –REPRODUCTION AND DISCLOSURE FORBIDDEN
17
May 2016
Figure 122: Enter Active Pages............................................................................................154
Figure 123: Reset card.........................................................................................................155
Figure 124: Success message is displayed showing card is reset successfully ...................156
Figure 125: Multimedia Menu ............................................................................................157
Figure 126: Uploading Audio File in device.........................................................................159
Figure 127: Confirmation Pop-up........................................................................................159
Figure 128: Success message is displayed ..........................................................................160
Figure 129: Uploading Video File in device.........................................................................161
Figure 130: Confirmation Pop-up........................................................................................162
Figure 131: Success message is displayed ..........................................................................162
Figure 132: Uploading Image File in device ........................................................................165
Figure 133: Confirmation Pop-up........................................................................................165
Figure 134: Success message is displayed ..........................................................................166
Figure 135: Image uploaded is displayed as wallpaper ......................................................166
Figure 136: System Menu ...................................................................................................167
Figure 137: Reset Factory Default Settings.........................................................................168
Figure 138: Select Items to reset ........................................................................................168
Figure 139: Confirmation message displayed.....................................................................169
Figure 140: Configuring Time Zone .....................................................................................170
Figure 141: SDC Parameters configuration.........................................................................174
Figure 142: Selecting GPIO State ........................................................................................174
Figure 143: Configuring Parameters in “SDC Mode” ..........................................................175
Figure 144: Selecting TOM State as On...............................................................................176
Figure 145: Setting TOM Duration ......................................................................................177
Figure 146: Enabling Tamper ..............................................................................................178
Figure 147: Tamper Parameters Configuration ..................................................................179
Figure 148: LCD Brightness adjustment..............................................................................180
Figure 149: LCD Brightness adjustment..............................................................................181
Figure 150: Disable Sensor in Idle Mode ............................................................................182
Figure 151: Configuring Idle Screen Status .........................................................................183
Figure 152: Video Play Brightness Control..........................................................................184
Figure 153: Configuring Idle Screen Timeout......................................................................185
Figure 154: Infinite Video Play on idle screen.....................................................................186
Figure 155: Setting Video Play Duration .............................................................................187
Figure 156: Selecting Transaction Logging Mode ...............................................................190
Figure 157: Setting Delete Log Status .................................................................................191
Figure 158: Defining number of logs to be deleted ............................................................192
Figure 159: Deleting Transaction logs.................................................................................193
Figure 160: Terminal Global Volume ..................................................................................194
Figure 161: Set Global Device Volume................................................................................194
Figure 162: Enable AZERTY Keyboard .................................................................................196
Figure 163: AZERTY keypad.................................................................................................196

MorphoAccess® SIGMA Series –Administration Guide
Table of Figures
2014_0000002196-09
MORPHO DOCUMENT –REPRODUCTION AND DISCLOSURE FORBIDDEN
18
May 2016
Figure 164: Web Server.......................................................................................................197
Figure 165: Select Error Log Configuration .........................................................................198
Figure 166: Enable Error Logging ........................................................................................199
Figure 167: Setting Error Log Debug Level..........................................................................199
Figure 168: Communication Menu .....................................................................................202
Figure 169: Selecting Ethernet-Network Configuration .....................................................203
Figure 170: Ethernet Configuration ....................................................................................204
Figure 171: IP Mode Selection ............................................................................................204
Figure 172: Configuring IP Address under Static IP Mode ..................................................205
Figure 173: Selecting available Wi-Fi™ network.................................................................206
Figure 174: Enter Encryption Key........................................................................................207
Figure 175: Success message is displayed showing Wi-Fi™ network is configured ...........207
Figure 176: Connected to Wi-Fi™ network .........................................................................207
Figure 177: Selecting Other Network to set up Wi-Fi™ network manually........................208
Figure 178: WLAN Parameter Configuration ......................................................................208
Figure 179: Setting SSID ......................................................................................................209
Figure 180: Selecting Encryption Mode ..............................................................................209
Figure 181: Define Encryption Key......................................................................................210
Figure 182: Entering in WLAN –IP Configuration...............................................................210
Figure 183: WLAN –IP Configuration .................................................................................211
Figure 184: Success message is displayed showing Wi-Fi™ network is configured ...........211
Figure 185: Configuring Hostname .....................................................................................212
Figure 186: Defining Baud Rate...........................................................................................213
Figure 187: Select Baud Rate ..............................................................................................214
Figure 188: Selecting Communication Type .......................................................................214
Figure 189: Enter Net ID......................................................................................................215
Figure 190: Security Menu ..................................................................................................216
Figure 191: Configuring the events on which authentication/identification is triggered ..217
Figure 192: Set Duress Mode ..............................................................................................219
Figure 193: Setting Biometric Check Mode ........................................................................220
Figure 194: Selecting Biometric Matching Strategy............................................................222
Figure 195: Biometric Time Out..........................................................................................224
Figure 196: Setting PIN Check Mode...................................................................................225
Figure 197: Setting number of PIN Check Attempts ...........................................................226
Figure 198: Setting PIN Check Timeout...............................................................................227
Figure 199: Setting Security Threshold ...............................................................................230
Figure 200: Authorized IP addresses Configuration ...........................................................235
Figure 201: Authorized IP addresses Mode selection.........................................................236
Figure 202: Adding IP for authorization..............................................................................236
Figure 203: Add IP address..................................................................................................237
Figure 204: A success message is displayed showing IP Address is added successfully.....237
Figure 205: Entering IP Range for authorizing ....................................................................238

MorphoAccess® SIGMA Series –Administration Guide
Table of Figures
2014_0000002196-09
MORPHO DOCUMENT –REPRODUCTION AND DISCLOSURE FORBIDDEN
19
May 2016
Figure 206: Viewing authorized IP Addresses.....................................................................239
Figure 207: Viewing IP Address Range................................................................................239
Figure 208: Deleting an IP Address .....................................................................................240
Figure 209: Delete an IP Address Ranges............................................................................241
Figure 210: SSL Configuration .............................................................................................244
Figure 211: Configuring SSL Mode and parameters ...........................................................245
Figure 212: Entering Secure Communication Port .............................................................245
Figure 213: Selecting Communication Port ........................................................................246
Figure 214: Entering Communication Port .........................................................................246
Figure 215: Configuring TCP Channels ................................................................................247
Figure 216: Enabling/Disabling RS422/RS485 Serial Chanel...............................................248
Figure 217: Addition User Verification................................................................................249
Figure 218: Additional User Verification Timeout ..............................................................250
Figure 219: Additional User Verification Timeout ..............................................................251
Figure 220: Resetting Device Password ..............................................................................252
Figure 221: Entering New Password ...................................................................................253
Figure 222: Verifying New Password ..................................................................................253
Figure 223: Additional User Control ...................................................................................254
Figure 224: Enable or Disable Face detection mode ..........................................................255
Figure 225: User Rule Check ...............................................................................................259
Figure 226: USB Menu in MorphoAccess® SIGMA Series Terminal....................................260
Figure 227: Formatting USB Mass Storage device..............................................................261
Figure 228: Confirmation message pop-up.........................................................................261
Figure 229: Success Message of USB Mass Storage device Formatted ..............................262
Figure 230: Initialize USB Mass Storage device ..................................................................263
Figure 231: A confirmation message is displayed...............................................................264
Figure 232: Importing User Database .................................................................................266
Figure 233: Selecting file to be imported in the terminal...................................................266
Figure 234: Confirmation message to import User Database ............................................267
Figure 235: Enter password ................................................................................................267
Figure 236: Success message of user data imported is displayed ......................................268
Figure 237: Importing Language file ...................................................................................269
Figure 238: Selecting Language file to import ....................................................................269
Figure 239: Confirm import action......................................................................................270
Figure 240: A success message is displayed showing language file is imported ................270
Figure 241: Exporting transaction logs into USB Mass Storage Device ..............................272
Figure 242: Selecting a file format for exporting transaction logs .....................................272
Figure 243: A confirmation message pop-up......................................................................273
Figure 244: A success message is displayed showing transaction log is exported .............273
Figure 245: Transaction Log in .CSV Format Sample ..........................................................274
Figure 246: Web Server.................................................................. Erreur ! Signet non défini.
Figure 247: Exporting data into USB Mass Storage Device.................................................276

MorphoAccess® SIGMA Series –Administration Guide
Table of Figures
2014_0000002196-09
MORPHO DOCUMENT –REPRODUCTION AND DISCLOSURE FORBIDDEN
20
May 2016
Figure 248: A confirmation message pop-up......................................................................276
Figure 249: A success message is displayed showing error log is exported .......................277
Figure 250: Exporting data into USB Mass Storage Device.................................................278
Figure 251: A confirmation message pop-up......................................................................278
Figure 252: Enter Passphrase..............................................................................................279
Figure 253: A success message is displayed showing error log is exported .......................279
Figure 254: Information Menu............................................................................................280
Figure 255: View Device Information..................................................................................281
Figure 256: View Device Regulatory Information ...............................................................281
Figure 257: MorphoAccess® SIGMA Series Terminal Firmware Version information........283
Figure 258: Biometric Sensor data......................................................................................284
Figure 259: Selecting communication network ..................................................................285
Figure 260: Viewing information of Ethernet network.......................................................286
Figure 261: Viewing information of GPRS/GSM network...................................................286
Figure 262: Viewing Serial Protocol Configuration .............................................................287
Figure 263: View Hostname of the terminal.......................................................................288
Figure 264: Memory Status of the device is displayed .......................................................289
Figure 265: View User Status ..............................................................................................290
Figure 266: Transaction Log Status is displayed .................................................................291
Figure 267: Reboot Device ..................................................................................................292
Figure 268: Confirmation Message To Return to Home Screen .........................................293
Figure 269: Video Phone Call Flow Diagram sample ..........................................................295
Figure 270: Adding a Server for Video Phone .....................................................................296
Figure 271: Enter Server Name...........................................................................................297
Figure 272: Enter Server IP..................................................................................................297
Figure 273: Entering Server Port.........................................................................................298
Figure 274: Videophone Server is added successfully ........................................................298
Figure 275: Viewing Video Phone Server Parameters ........................................................299
Figure 276: Deleting Video Phone Server ...........................................................................300
Figure 277: Video Server Deleted Success Message...........................................................300
Figure 278: Home Screen when NO VOIP profile is configured..........................................301
Figure 279: Making Video Call ............................................................................................302
Figure 280: Select Server to make Video Call .....................................................................303
Figure 281: Making Video Call ............................................................................................303
Figure 282: Homepage of Web Server................................................................................305
Figure 283: Tamper Settings through Webserver...............................................................307
Figure 284: GPIO Settings through Webserver...................................................................309
Figure 285: SDAC Settings on Webserver ...........................................................................310
Figure 286: Normal Time and Attendance mode ...............................................................313
Figure 287: Extended Time and Attendance mode ............................................................314
Figure 288: User Interface on Terminal ..............................................................................315
Figure 289: Time and Attendance UI in Normal mode .......................................................315
Other manuals for MorphoAccess SIGMA Series
2
This manual suits for next models
8
Table of contents
Popular Marine Equipment manuals by other brands

Quick
Quick DP Series Installation and user manual

Kongsberg
Kongsberg EA640 Quick installation guide

Furuno
Furuno NavNet TZtouch3 Series Installation checklist

Veco
Veco CLIMMA VEGA MK II Installation, use and programming manual

Facnor
Facnor FX+ 900 Installation & use instructions

Lewmar
Lewmar AutoAnchor 560 owner's manual