Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Create an AccessByCardEnable string registry key and set 1 as its value (for details, see Registry keys reference guide, for more information about working with the registry, see Working with Windows OS registry).
  2. Install ACFA PSIM (see ACFA PSIM Installation Guide).

    Note
    titleAttention!

    The following is an example of configuring the interaction between the Monitoring PSIM and the Apollo integration module, which is part of the ACFA PSIM software package. The configuration guide for the Apollo integration module is available in the documentation for ACFA PSIM. Instead of the Apollo integration module, you can use any other integration module that supports user entry into the controller.


  3. Configure the Apollo integration module.

  4. In the System Settings dialog box, go to the Programming tab (1).

  5. To transfer the user data from the Server of Control side to the Agent of Control side, it is necessary to create script №1 in the object tree on the basis of the Scripts object (2) by copying the contents of an example of this script (see Sample script for configuring the interaction between the Monitoring PSIM and the Apollo integration module).
  6. To monitor the object status on the Server Of Control side, it is necessary to configure the alarm group (see Configuring alarms for Monitoring PSIM the object state on the Agent of Control side). As a result of this configuration, the script №2 will be created.

    Note
    titleAttention!

    If an integration module other than Apollo is used, it is necessary to modify the script examples for the corresponding integration module.


    Info
    titleNote

    For more information on creating scripts, see Programming Guide (JScript) The Script object. Programming using the JScript language.


  7. Click Apply (3).

Configuring the special mode of Monitoring PSIM operation with ACFA PSIM on the Agent of Control side is complete.

...

As a result, when the access to an object is received, the access card number and the full name of the user who gained the access is displayed in the Event log as an additional information (see Event log).

Image Modified