HikCentral Access Control Web Client User Manual
HikCentral Access Control Web Client User Manual
0 Web Client
User Manual
HikCentral Access Control V2.3.0 Web Client User Manual
Legal Information
LEGAL DISCLAIMER
● TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, THIS DOCUMENT AND THE
PRODUCT DESCRIBED, WITH ITS HARDWARE, SOFTWARE AND FIRMWARE, ARE PROVIDED "AS
IS" AND "WITH ALL FAULTS AND ERRORS". HIKVISION MAKES NO WARRANTIES, EXPRESS OR
IMPLIED, INCLUDING WITHOUT LIMITATION, MERCHANTABILITY, SATISFACTORY QUALITY, OR
FITNESS FOR A PARTICULAR PURPOSE. THE USE OF THE PRODUCT BY YOU IS AT YOUR OWN RISK.
IN NO EVENT WILL HIKVISION BE LIABLE TO YOU FOR ANY SPECIAL, CONSEQUENTIAL,
INCIDENTAL, OR INDIRECT DAMAGES, INCLUDING, AMONG OTHERS, DAMAGES FOR LOSS OF
BUSINESS PROFITS, BUSINESS INTERRUPTION, OR LOSS OF DATA, CORRUPTION OF SYSTEMS, OR
LOSS OF DOCUMENTATION, WHETHER BASED ON BREACH OF CONTRACT, TORT (INCLUDING
NEGLIGENCE), PRODUCT LIABILITY, OR OTHERWISE, IN CONNECTION WITH THE USE OF THE
i
HikCentral Access Control V2.3.0 Web Client User Manual
PRODUCT, EVEN IF HIKVISION HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES OR
LOSS.
● YOU ACKNOWLEDGE THAT THE NATURE OF THE INTERNET PROVIDES FOR INHERENT SECURITY
RISKS, AND HIKVISION SHALL NOT TAKE ANY RESPONSIBILITIES FOR ABNORMAL OPERATION,
PRIVACY LEAKAGE OR OTHER DAMAGES RESULTING FROM CYBER-ATTACK, HACKER ATTACK,
VIRUS INFECTION, OR OTHER INTERNET SECURITY RISKS; HOWEVER, HIKVISION WILL PROVIDE
TIMELY TECHNICAL SUPPORT IF REQUIRED.
● YOU AGREE TO USE THIS PRODUCT IN COMPLIANCE WITH ALL APPLICABLE LAWS, AND YOU ARE
SOLELY RESPONSIBLE FOR ENSURING THAT YOUR USE CONFORMS TO THE APPLICABLE LAW.
ESPECIALLY, YOU ARE RESPONSIBLE, FOR USING THIS PRODUCT IN A MANNER THAT DOES NOT
INFRINGE ON THE RIGHTS OF THIRD PARTIES, INCLUDING WITHOUT LIMITATION, RIGHTS OF
PUBLICITY, INTELLECTUAL PROPERTY RIGHTS, OR DATA PROTECTION AND OTHER PRIVACY
RIGHTS. YOU SHALL NOT USE THIS PRODUCT FOR ANY PROHIBITED END-USES, INCLUDING THE
DEVELOPMENT OR PRODUCTION OF WEAPONS OF MASS DESTRUCTION, THE DEVELOPMENT OR
PRODUCTION OF CHEMICAL OR BIOLOGICAL WEAPONS, ANY ACTIVITIES IN THE CONTEXT
RELATED TO ANY NUCLEAR EXPLOSIVE OR UNSAFE NUCLEAR FUEL-CYCLE, OR IN SUPPORT OF
HUMAN RIGHTS ABUSES.
● IN THE EVENT OF ANY CONFLICTS BETWEEN THIS DOCUMENT AND THE APPLICABLE LAW, THE
LATTER PREVAILS.
ii
HikCentral Access Control V2.3.0 Web Client User Manual
Contents
Chapter 1 About This Document ................................................................................................. 1
1.1 Introduction ........................................................................................................................... 1
1.2 Recommended Running Environment ................................................................................... 2
1.3 Symbol Conventions .............................................................................................................. 2
Chapter 2 Login .......................................................................................................................... 3
2.1 First Time Login ...................................................................................................................... 3
2.1.1 Login for First Time for Admin User .............................................................................. 3
2.1.2 First Time Login for Normal User .................................................................................. 4
2.2 Login via Web Client (Administrator) ..................................................................................... 5
2.3 Login via Web Client (Employee) ........................................................................................... 6
2.4 Change Password for Reset User ........................................................................................... 7
2.5 Forgot Password ..................................................................................................................... 8
Chapter 3 Download Mobile Client ........................................................................................... 10
Chapter 4 Web Control ............................................................................................................. 11
Chapter 5 Home Page Overview ............................................................................................... 12
Chapter 6 Getting Started ......................................................................................................... 16
Chapter 7 Role and User Management ..................................................................................... 17
7.1 Add Role ............................................................................................................................... 17
7.2 Add Normal User ................................................................................................................. 22
7.3 Import Domain Users ........................................................................................................... 24
7.4 Change Password of Current User ....................................................................................... 26
7.5 Configure Permission Schedule ............................................................................................ 28
Chapter 8 System Security Settings ........................................................................................... 29
8.1 Set Basic Security Parameters .............................................................................................. 29
8.2 Configure Security Questions ............................................................................................... 30
Chapter 9 Device and Server Management ............................................................................... 31
iii
HikCentral Access Control V2.3.0 Web Client User Manual
iv
HikCentral Access Control V2.3.0 Web Client User Manual
v
HikCentral Access Control V2.3.0 Web Client User Manual
vi
HikCentral Access Control V2.3.0 Web Client User Manual
vii
HikCentral Access Control V2.3.0 Web Client User Manual
viii
HikCentral Access Control V2.3.0 Web Client User Manual
ix
HikCentral Access Control V2.3.0 Web Client User Manual
x
HikCentral Access Control V2.3.0 Web Client User Manual
xi
HikCentral Access Control V2.3.0 Web Client User Manual
xii
HikCentral Access Control V2.3.0 Web Client User Manual
xiii
HikCentral Access Control V2.3.0 Web Client User Manual
1.1 Introduction
The platform is developed for the management of security system and features flexibility,
scalability high reliability, and powerful functions.
The platform provides features including information sharing, convenient connection, and multi-
service cooperation. It is capable of adding devices for management, access control, time and
attendance, alarm linkage, and so on.
The complete platform contains the following components. You can install the components
according to actual needs.
Component Introduction
System Management ● Provides the unified authentication service for connecting with the
Service (SYS) clients and servers.
● Provides the management for the users, roles, permissions, devices,
and services.
● Provides the configuration APIs for monitoring and management
modules.
Built-in Streaming Provides forwarding and distributing the audio and video data of live
Service view.
The following table shows the provided clients for accessing or managing the platform.
Client Introduction
Web Client Web Client is a B/S client for managing system. It provides multiple functionalities,
including device management, area management, event configuration, user
management, and so on.
Mobile Client Mobile Client is the software designed for getting access to the platform via Wi-Fi,
4G, and 5 G networks with mobile device. It fulfills the functions of the devices
connected to the platform.
1
HikCentral Access Control V2.3.0 Web Client User Manual
Symbol Description
Indicates a hazardous situation which, if not avoided, will or could
Danger result in death or serious injury.
2
HikCentral Access Control V2.3.0 Web Client User Manual
Chapter 2 Login
You can access and configure the platform via web browser directly, without installing any client
software on your computer.
Note
● The Web Client transmits data via the HTTPS, using our self-developed HTTPS certificate, which
is not issued by the Certificate Authority. So that a risk prompt will show when you opening the
Web Client. To avoid the prompt, you can apply for a certificate from the Certificate Authority.
● The login session of the Web Client will expire and a prompt with countdown will appear after
the configured time period in which there is no action.
Note
● You should set the transfer protocol before accessing the SYS. For details, refer to Set
Transport Protocol .
● You should set the SYS's IP address before accessing the SYS via WAN. For details, refer to Set
WAN Access .
2. Enter a password and confirm the password for the admin user in the pop-up Create Password
window, and click Next.
3
HikCentral Access Control V2.3.0 Web Client User Manual
Note
The password strength can be checked by the system and should meet the system requirements.
The default minimum password strength should be Medium.
Caution
The password strength of the device can be automatically checked. We highly recommend you
change the password of your own choosing (using a minimum of 8 characters, including at least
three kinds of following categories: upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you change
your password regularly, especially in the high security system, changing the password monthly
or weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
service provider and/or end-user.
3. Select a method for password reset verification.
- Email: Click Email → Next and set the email address for receiving the password reset
verification code.
- Security Question: Click Security Question → Next , select three different security questions
from the drop-down lists, and enter your answers accordingly.
Note
If you forget the password of your account, you can reset the password by verifying your email
address or answering the security questions. Refer to Forgot Password for details.
4. Click OK.
The home page of the Web Client will show if the admin password is created successfully.
Note
You should configure the SYS's IP address in WAN Access of System Configuration before
accessing the SYS via WAN. For details, refer to Set WAN Access .
2. Enter the user name and password.
4
HikCentral Access Control V2.3.0 Web Client User Manual
Note
Contact the administrator for the user name and initial password.
3. Click Log In and the Change Password window opens.
4. Set a new password and confirm the password.
Note
The password strength can be checked by the system and should meet the system requirements.
If password strength is lower than the required minimum strength, you will be asked to change
your password.
Caution
The password strength of the device can be checked by the system. We highly recommend you
change the password of your own choosing (using a minimum of 8 characters, including at least
three kinds of following categories: upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you reset your
password regularly, especially in the high security system, resetting the password monthly or
weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
installer and/or end-user.
5. Click OK to change the password.
Result
Web Client home page displays after you successfully logging in.
Note
You should configure the SYS's IP address in WAN Access of System Configuration before
accessing the SYS via WAN. For details, refer to Set WAN Access .
2. Select the Management tab.
3. Enter the user name and password.
4. Click Log In to log in to the system.
5
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● If failed password attempt of current user is detected, you are required to input the
verification code. The failed password attempts from current client, other client, and other
address will all require the verification code.
● The failed password attempt and verification code attempt from current client and other
address will all be accumulated. Your IP address will be locked for a specified period of time
after specific number of failed password or verification code attempts detected.
● The account will be frozen for 30 minutes after 5 failed password attempts. The failed
password attempts from current client and other addresses will all be accumulated.
● The password strength can be checked by the system and should meet the system
requirements. If password strength is lower than the required minimum strength, you will be
asked to change your password.
● If your password is expired, you will be asked to change your password when login.
Result
Web Client home page displays after you successfully logging in to the system.
Note
● Employees are required to change the password upon the first login.
● If employees forget the password, they can reset new password in Forgot Password.
● If the password is expired, employees will be asked to change the password upon login.
Result
Web Client home page displays after employees successfully log in to the system.
6
HikCentral Access Control V2.3.0 Web Client User Manual
Note
You should configure the SYS's IP address in WAN Access of System Configuration before
accessing the SYS via WAN. For details, refer to Set WAN Access .
2. Enter the user name and initial password set by the administrator.
3. Click Log In and a Change Password window opens.
4. Set a new password and confirm the password.
Note
The password strength can be checked by the system and should meet the system requirements.
If password strength is lower than the required minimum strength, you will be asked to change
your password.
Caution
The password strength of the device can be checked by the system. We highly recommend you
change the password of your own choosing (using a minimum of 8 characters, including at least
three kinds of following categories: upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you reset your
password regularly, especially in the high security system, resetting the password monthly or
weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
installer and/or end-user.
5. Click OK.
Result
Web Client home page displays after you successfully changing the password.
7
HikCentral Access Control V2.3.0 Web Client User Manual
Steps
1. On the login page, click Forgot Password.
2. Enter your user name and click Next.
3. Enter the required information on the Reset Password window.
- If you are the admin user whose account is configured with security questions, you can select
and answer the corresponding questions, click Next, and set and confirm your new password.
Figure 2-1 Reset Password for admin User via Security Questions
- If you are the admin user or a normal user whose account is configured with an email address,
you can click Get Verification Code and a verification code will be sent to your email address.
Enter the verification code you received, set a new password, and confirm the password
within 10 minutes.
8
HikCentral Access Control V2.3.0 Web Client User Manual
Note
If no email address is set for your normal user account, you need to contact the admin user to
reset your password.
- If you are a domain user, you need to contact the admin user to reset your password.
Note
The password strength can be checked by the system and should meet the system requirements.
If the password strength is lower than the required minimum strength, you will be asked to
change your password. For setting the minimum password strength, refer to Set Basic Security
Parameters .
Caution
The password strength of the device can be automatically checked. We highly recommend you
change the password of your own choosing (using a minimum of 8 characters, including at least
three kinds of following categories: upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you change
your password regularly, especially in the high security system, changing the password monthly
or weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
service provider and/or end-user.
4. Click OK.
9
HikCentral Access Control V2.3.0 Web Client User Manual
Note
You can also search and download the Mobile Client in the App Store.
Steps
1. In the address bar of the web browser, enter the address of the PC running SYS service and press
Enter key.
Example
If the IP address of PC running SYS is 172.6.21.96, and you should enter http://172.6.21.96 in the
address bar.
Note
You should configure the SYS's IP address in WAN Access of System Configuration before
accessing the SYS via WAN. For details, refer to Set WAN Access .
2. Scan the corresponding QR code with your mobile terminal to download the Mobile Client.
10
HikCentral Access Control V2.3.0 Web Client User Manual
11
HikCentral Access Control V2.3.0 Web Client User Manual
Download Center
You can view all of the downloading tasks and completed tasks on the platform. You can start or
stop downloading task(s), delete downloading and downloaded task(s). Click Custom Download
Location on the top right and select a saving path in the PC, and the files will be automatically
downloaded in the selected file folder.
Common Functions
Quickly find and use frequently-used functions of the System, Access Control, and Attendance
modules.
Quick Function Search
Enter a keyword of a function and go to its page quickly.
Help Center
Access Control
12
HikCentral Access Control V2.3.0 Web Client User Manual
A wizard which guides you through the basic configurations of Access Control. You can also view
the flow chart which introduces the configurations and operations of access control in Flow
Chart of Door Access Control .
Attendance
A wizard which guides you through the management and configurations of Attendance. You can
also view the flow chart which introduces the management of devices, departments, and
persons, basic attendance configuration, attendance rule configuration, and record search and
handling in Flow Chart of Time and Attendance .
Web Client User Manual
A wizard which guides you through the user manual of Web Client.
Maintenance and Management
Back Up and Restore System Data
You can manually back up the data in the system, or configure a schedule to run the backup task
regularly.
When an exception occurs, you can restore the database if you have backed up the database.
For more details, refer to Set System Data Backup and Restore System Data .
Export Configuration Data
You can export and save configuration data to your local PC.
For more details, refer to Export Configuration File .
Download the Web Control
Click Web Control to start downloading the web control, or click to view its details and
download it.
About
Check the version information of the Web Client and the system ID.
Account
Change Password
Change the password of the current user.
For more details, refer to Change Password of Current User .
Logout
Log out of the system and back to the login page.
Quick Configuration
On the top right of Home Page, you can click Expand Quick Configuration to enter the
management and configurations of Access Control or Attendance.
13
HikCentral Access Control V2.3.0 Web Client User Manual
Quick Start
This section displays the quick start of menu items, which have been added to Favorites on the left
of each module.
14
HikCentral Access Control V2.3.0 Web Client User Manual
● You can select the time period (such as today, last week, and last 3 months) and departments to
view the corresponding attendance report.
● You can click to export the attendance report in the format of PDF, PNG, or JPG.
● You can click to refresh to view the real-time status of results.
○ Click to view the alarm details. You can also acknowledge or unlock the alarm.
○ Click , enable the Alarm Ringtone, and select a default ringtone or custom ringtone. You
can also check the Real-Time Pop-Up Box When Alarm Occurs.
● Select Access Control Event tab. You can click Mark All As Read to mark all messages as read.
Pending Task
This section displays the pending task list, including the employees' attendance applications to be
handled. Click Handle to approve/reject/undo the application. Click View All to view more
attendance applications.
Person Credential Status
This section displays the person credential status, including the numbers of configured or not
configured persons, cards, fingerprints, face pictures, and irises.
You can click to refresh to view the real-time status of results.
Overall Work Hours / Overtime
This section displays the overall work hours and overtime statistics in line chart.
● You can select the time period (such as today, last week, and last 3 months) and departments to
15
HikCentral Access Control V2.3.0 Web Client User Manual
16
HikCentral Access Control V2.3.0 Web Client User Manual
Note
The platform has predefined two default roles: Administrator and Operator. You can click the role
name to view details. The two default roles cannot be edited or deleted.
Administrator
Role that has all permissions of the platform.
Operator
Role that has all permissions for accessing resources and operating the Applications on the Web
Client.
17
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● When role expires or the role's permission is invalid after editing the permission schedule,
users assigned with the role will be forced to log out and not able to log in.
● The permission schedule's time zone is consistent with that of the platform.
● By default, the role will be linked with All-day Template after updating the platform.
18
HikCentral Access Control V2.3.0 Web Client User Manual
19
HikCentral Access Control V2.3.0 Web Client User Manual
Note
If you do not check the resources, the resource permission cannot be applied to the role.
User Permission
Assign resource permissions, configuration permissions, and operation permissions to the
role.
20
HikCentral Access Control V2.3.0 Web Client User Manual
Note
The two default roles cannot be edited.
Delete Role Check a role and click Delete to delete the role.
Note
The two default roles cannot be deleted.
Inactivate Role Check a role and click Inactivate to set the role status to Inactive.
Activate Role Check an inactive role and click Activate to set the role status to Active.
Refresh Role Click Refresh All to get the latest status of the roles.
Filter Role Click to expand the filter conditions. Set the conditions and click Filter to
filter the roles according to the set conditions.
21
HikCentral Access Control V2.3.0 Web Client User Manual
Caution
The password strength of the device can be automatically checked. We highly recommend
you change the password of your own choosing (using a minimum of 8 characters, including
at least three kinds of following categories: upper case letters, lower case letters, numbers,
and special characters) in order to increase the security of your product. And we recommend
you change your password regularly, especially in the high security system, changing the
password monthly or weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
service provider and/or end-user.
Expiry Date
The date when the user account becomes invalid.
Email
The system can notify user by sending an email to the email address. The user can also reset
the password via email.
Note
The email address of the admin user can be edited by the user assigned with the role of
administrator.
User Status
Active is selected by default. If you select Inactive, the user account will be inactivated until
you activate it.
4. Configure parameters related to login protection.
Restrict Concurrent Logins
22
HikCentral Access Control V2.3.0 Web Client User Manual
To restrict the number of simultaneous logins for user accounts, switch on Restrict
Concurrent Logins and set the maximum number of concurrent logins.
5. Configure permission settings for the user.
Assign Role
Select the roles that you want to assign to the user.
Note
If you want to add new roles, click Add. See Add Role for details. Click a role on the list and
then View Role Details to view the Basic Information and Permission Settings of the role.
6. Do one of the following to complete adding the user.
- Click Add to add the user and return to the user management page.
- Click Add and Continue to save the settings and continue to add another user.
7. Optional: Perform further operations on the added normal users.
Edit User Click user name to view and edit user settings.
Reset Click user name and click Reset to set a new password for the user. Enter a
Password new password and click Reset.
Note
The admin user can reset the passwords of all the other users (except
domain user). Other users with Security permission (in Configuration and
Control Permission) can reset the passwords of the users without Security
permission. When the normal user's password is reset by admin user,
he/she should change the initial password and set a new password when
logging into HikCentral Access Control via the Web Client.
Delete User Select a users and click Delete to delete the selected user.
Force Logout Select an online user and click Force Logout to log out the online user.
Inactivate/ ● The admin user or user with administrator permission can inactivate or
Activate User activate a user.
● Select an active users and click Inactivate/Activate to inactivate/activate
the user.
Refresh User Click Refresh All to get the latest status of all users.
Filter User Click to set conditions and filter the users.
Unlock Users For users whose account is locked due to too many failed attempts for
login, Administrators can unlock their accounts for login. On the top of user
list, click Unlock for Login, check users, and click Unlock.
23
HikCentral Access Control V2.3.0 Web Client User Manual
24
HikCentral Access Control V2.3.0 Web Client User Manual
Import individual users. Select an organization unit and select one or more domain users in
this organization unit.
Group
Select an organization unit to import all the domain users in this organization unit.
Security Group
Import all the domain users in the security group(s). Select an organization unit and select
one or more security groups in this organization unit.
5. Select domain users from active directory.
6. Select the user status as Active or Inactive.
7. Optional: To limit the maximum IP addresses logged in to the platform using the user account,
switch on Restrict Concurrent Logins and enter the maximum number of concurrent logins.
8. Set the permission level (1-100) for PTZ control in PTZ Control Permission.
Note
The larger the value is, the higher permission level the user has. The user with higher permission
level has the priority to control the PTZ unit.
Example
When two users control the PTZ unit at the same time, the user who has the higher PTZ control
permission level takes control of the PTZ.
9. Select the roles that you want to assign to the domain users.
Note
● If no role has been added, two default roles are selectable: administrator and operator.
Administrator
The role that has all permissions of the HikCentral Access Control.
Operator
The role that has all permissions of the HikCentral Access Control Mobile Client.
● If you want to add new roles, you can click Add. See Add Role for details. Click a role on the
list and then View Role Details to view the Basic Information and Permission Settings of the
role.
10. Complete importing the domain users.
- Click Add to import the domain users and return to the user management page.
- Click Add and Continue to save the settings and continue to import other domain users.
11. Optional: After importing the domain user information to the platform, if the user information
in domain is changed, click Synchronize Domain Users to get the latest information of the users
imported to the platform. If the users are imported by group, it will synchronize the latest user
information from the domain group (including added users, deleted users, edited users, etc., in
the group).
25
HikCentral Access Control V2.3.0 Web Client User Manual
Result
After successfully adding the domain users, the users can log in to the HikCentral Access Control
via the Web Client and Mobile Client with their domain accounts and passwords.
26
HikCentral Access Control V2.3.0 Web Client User Manual
Caution
The password strength of the device can be checked by the system. We highly recommend you
change the password of your own choosing (using a minimum of 8 characters, including at least
three kinds of following categories: upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you reset your
password regularly, especially in the high security system, resetting the password monthly or
weekly can better protect your product.
27
HikCentral Access Control V2.3.0 Web Client User Manual
Proper configuration of all passwords and other security settings is the responsibility of the
installer and/or end-user.
4. Click OK to save the change.
Note
You can set up to 6 separate time periods for each day.
5. Click Add to add the permission schedule template.
6. Optional: Perform further operations for the added templates.
View and Edit Click the template to view and edit its configuration.
Template Details
Note
Default templates cannot be edited.
Note
Default templates cannot be deleted.
What to do next
Set permission schedules for roles to define in which period the permissions for the roles are valid.
For details, refer to Add Role .
28
HikCentral Access Control V2.3.0 Web Client User Manual
29
HikCentral Access Control V2.3.0 Web Client User Manual
Note
Failed login attempts include failed password attempt and failed verification code attempt.
2) Set the lock duration for this IP address. During the lock duration, the login attempt via this IP
address is not allowed.
The number of login attempts is limited.
3. Select the Minimum Password Strength to define the minimum complexity requirements that
the password should meet.
4. Set the maximum password validity period.
1) Switch on Enable Maximum Password Validity Period to force user to change the password
when the password expires.
2) Set the maximum number of days that the password is valid.
Note
After the maximum number of days, you should change the password. You can select the
predefined time length or customize the time length.
3) Set days to remind you at each time you login or in the small hours of each day by sending an
email notification before password expiration.
5. Set minutes after which the Web login will expire if there is no actions during the set minutes.
6. Click Save to save the above settings.
Note
The answer should contain 1 to 128 characters, and cannot contain these special characters: / \ :
*?"<>|
30
HikCentral Access Control V2.3.0 Web Client User Manual
Caution
The password strength of the device can be automatically checked. We highly recommend you
change the password of your own choosing (using a minimum of 8 characters, including at least
three kinds of following categories: upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you change
your password regularly, especially in the high security system, changing the password monthly
or weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
service provider and/or end-user.
7. Click Save to create the password for the device.
31
HikCentral Access Control V2.3.0 Web Client User Manual
Note
If you have not set security questions, the window of setting security questions will pop up, and
you should select the method of resetting password and set the security questions as needed.
An Operation completed. message is displayed when the password is set successfully.
8. Click in the Operation column to change the device's IP address, subnet mask, gateway, and
so on if needed.
Note
For details, refer to Edit Online Device's Network Information .
Note
The parameters may vary for different device types.
7. Click .
8. Enter the device's password.
9. Click Save.
32
HikCentral Access Control V2.3.0 Web Client User Manual
Note
This function should be supported by the device.
33
HikCentral Access Control V2.3.0 Web Client User Manual
Note
You should install the web control according to the instructions and then the online device
detection function is available.
34
HikCentral Access Control V2.3.0 Web Client User Manual
Note
Make sure you have enabled the ISUP protocol registration to allow the devices to access the
system, otherwise the online devices will not be displayed. On the top, select System. Then,
select Network → Device Access Protocol on the left, and switch on Allow ISUP Registration.
Before adding devices by ISUP 2.6/4.0 protocol to the system, you need to check Allow ISUP of
Earlier Version.
5. Select an active device that you want to add to the platform.
6. Click Add to Device List.
Note
For devices whose device port No. is 8000 and HTTP port No. is 80, the Hikvision Private
Protocol is selected as the access protocol by default. For devices whose device port No. is 0 but
the HTTP port No. is 80, the ISAPI Protocol is selected as the access protocol.
7. Configure the basic information for the device, including access protocol, device address, device
port, device name, user name, and password.
Caution
The password strength of the device can be automatically checked. We highly recommend you
change the password of your own choosing (using a minimum of 8 characters, including at least
three kinds of following categories: upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you change
35
HikCentral Access Control V2.3.0 Web Client User Manual
your password regularly, especially in the high security system, changing the password monthly
or weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
service provider and/or end-user.
Note
The access protocol will not show in the following situations:
● You check more than one device in the Online Device area.
○ You can select Hikvision ISUP Protocol in the Online Device area.
○ You can select Hikvision Private Protocol in the Online Device area, and device port is 0.
Note
● You can create a new area by device name or select an existing area.
● You can import all the access points or specific access point(s) to the area.
● For the video access control terminal of a device, the camera on the terminal will also be
Note
● Not all the device parameters will be restored. Network parameters such as IP address, port
36
HikCentral Access Control V2.3.0 Web Client User Manual
Change Select the added device(s) and click Change Password to change the
Password password for the device(s).
Note
● You can only change the password for online HIKVISION devices
currently.
● If the devices share the same password, you can select multiple devices
to change the password together.
Replace When a device is replaced with another one, and the serial No. of the
Device new device is different from that of the old one, you need to confirm the
replacement on the platform. In the Operation column, click to
replace the old device with the new device on the platform.
Restore Select the added device(s) and click Restore Default Settings to restore
Default the configured device parameters excluding network parameters and
Settings account information.
Note
If you want to restore all the device parameters, you should check
Restore device network parameters and account information, such as
user name and password. in the pop-up window.
Privacy To protect the person's private information including the person's name
Settings and profile picture, you can configure privacy settings for online access
control devices. For details, refer to Privacy Settings .
Set Device's On the device list, select one or multiple devices and click Time Zone to
Time Zone edit their time zones.
Search for Enter key words in the search box and click to search for a specific
Devices device.
37
HikCentral Access Control V2.3.0 Web Client User Manual
Steps
1. On the top, select Device.
2. Select Device and Server → Access Control Device on the left.
3. In the Online Device area, select a network type.
Server Network
All detected online devices on the same local subnet with the SYS server.
Local Network
All detected online devices on the same local subnet with the current Web Client.
4. Select Hikvision Private Protocol and Hikvision ISUP Protocol to filter the detected devices by
protocol types.
Note
Make sure you have enabled the ISUP protocol registration to allow the devices to access the
system, otherwise the online devices will not be displayed. On the top, select System. Then,
select Network → Device Access Protocol on the left, and switch on Allow ISUP Registration.
Before adding devices by ISUP 2.6/4.0 protocol to the system, you need to check Allow ISUP of
Earlier Version.
5. Select the active devices that you want to add to the platform.
6. Click Add to Device List.
Note
For devices whose device port No. is 8000 and HTTP port No. is 80, the Hikvision Private
Protocol is selected as the access protocol by default. For devices whose device port No. is 0 but
the HTTP port No. is 80, the ISAPI Protocol is selected as the access protocol.
7. Set parameters for the devices.
Caution
The password strength of the device can be automatically checked. We highly recommend you
change the password of your own choosing (using a minimum of 8 characters, including at least
three kinds of following categories: upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you change
your password regularly, especially in the high security system, changing the password monthly
or weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
service provider and/or end-user.
8. Optional: Set the time zone for the device.
- Get Device's Time Zone
The time zone of the device will be automatically chosen according to the region of the
device.
- Manually Set Time Zone (The settings will be applied to the device automatically)
38
HikCentral Access Control V2.3.0 Web Client User Manual
You can select a time zone of the device. The settings will be applied to the device
automatically.
9. Optional: Switch on Add Resource to Area to import the resources (including alarm inputs,
alarm outputs, and access points) to an area.
Note
● You can create a new area by device name or select an existing area.
● You can import all the access points or specific access point(s) to the area.
● For the video access control terminal of a device, the camera on the terminal will also be
Note
● Not all the device parameters will be restored. Network parameters such as IP address, port
Note
● You can only change the password for online HIKVISION devices
currently.
● If the devices share the same password, you can select multiple
devices to change the password together.
Privacy You can configure privacy settings for online access control devices. For
Settings details, refer to Privacy Settings .
Restore Select the added device(s) and click Restore Default Settings to restore
Default the configured device parameters excluding network parameters and
Settings account information.
39
HikCentral Access Control V2.3.0 Web Client User Manual
Note
If you want to restore all the device parameters, you should check
Restore device network parameters and account information, such as
user name and password. in the pop-up window.
Set Device's On the device list, select one or multiple devices and click Time Zone to
Time Zone edit their time zones.
Search for Enter key words in the search box and click to search for a specific
Devices device.
Caution
The password strength of the device can be automatically checked. We highly recommend you
change the password of your own choosing (using a minimum of 8 characters, including at least
three kinds of following categories: upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you change
your password regularly, especially in the high security system, changing the password monthly
or weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
service provider and/or end-user.
5. Optional: If you select Hikvision Private Protocol or Hikvision ISAPI Protocol, check Encrypted
Add.
6. Optional: Set the time zone for the device.
40
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● You can create a new area by device name or select an existing area.
● You can import all the access points or specific access point(s) to the area.
● For the video access control terminal of a device, the camera on the terminal will also be
Note
● Not all the device parameters will be restored. Network parameters such as IP address, port
41
HikCentral Access Control V2.3.0 Web Client User Manual
Caution
The password strength of the device can be automatically checked. We highly recommend you
change the password of your own choosing (using a minimum of 8 characters, including at least
three kinds of following categories: upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you change
your password regularly, especially in the high security system, changing the password monthly
or weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
service provider and/or end-user.
5. Optional: If you select Hikvision Private Protocol or Hikvision ISAPI Protocol, check Encrypted
Add.
6. Optional: Set the time zone for the device.
Get Device's Time Zone
The time zone of the device will be automatically chosen according to the region of the
device.
Manually Set Time Zone (The settings will be applied to the device automatically)
You can select a time zone of the device. The settings will be applied to the device
automatically.
7. Optional: Switch on Add Resource to Area to import the resources (including alarm inputs,
alarm outputs, and access points) to an area.
Note
● You can create a new area by device name or select an existing area.
● You can import all the access points or specific access point(s) to the area.
● For the video access control terminal of a device, the camera on the terminal will also be
access point.
8. Click Add to add the device(s) and return to the device management page, or click Add and
Continue to add the device(s) and continue to add other devices.
42
HikCentral Access Control V2.3.0 Web Client User Manual
Note
Make sure you have enabled the ISUP protocol registration, otherwise the protocol will not be
displayed. On the top, select System. Then, select Network → Device Access Protocol on the
left, and switch on Allow ISUP Registration. Before adding devices by ISUP 2.6/4.0 protocol to
the system, you need to check Allow ISUP of Earlier Version.
5. Select Device ID as the adding mode.
6. Enter the required the information.
7. Optional: Switch on Picture Storage to set the storage location for pictures.
- Select pStor and select storage locations for the face picture library and captured pictures.
Note
This configuration only affects the facial recognition device which supports face comparison.
The storage location of captured pictures and face picture libraries cannot be the same.
- Select Local Storage as the storage location, click Configure to enable Local Storage and set
the storage locations for pictures and files as needed.
8. Optional: Set the time zone for the device.
Get Device's Time Zone
The time zone of the device will be automatically chosen according to the region of the
device.
Manually Set Time Zone (The settings will be applied to the device automatically)
You can select a time zone of the device. The settings will be applied to the device
automatically.
9. Optional: Switch on Add Resource to Area to import the resources (including alarm inputs,
alarm outputs, and access points) to an area.
Note
● You can create a new area by device name or select an existing area.
● You can import all the access points or specific access point(s) to the area.
43
HikCentral Access Control V2.3.0 Web Client User Manual
● For the video access control terminal of a device, the camera on the terminal will also be
imported to the corresponding area.
● If you do not import access points to area, you cannot perform further configurations for the
access point.
10. Finish adding the device(s).
- Click Add to add the device(s) and return to the device management page.
- Click Add and Continue to add the device(s) and continue to add other devices.
11. Optional: Perform further operations on the added device(s).
Configure Click in the Operation column to enter the corresponding device
Device configuration page to edit the time parameters, reboot the device,
restore the device, or set other parameters. See Configure Parameters
for Access Control Devices for detailed instructions.
Change Select the added device(s) and click Change Password to change the
Password password for the device(s).
Note
● You can only change the password for online HIKVISION devices
currently.
● If the devices share the same password, you can select multiple devices
to change the password together.
Restore Select the added device(s) and click Restore Default Settings to restore
Default the configured device parameters excluding network parameters and
Settings account information.
Note
If you want to restore all the device parameters, you should check
Restore device network parameters and account information, such as
user name and password. in the pop-up window.
Privacy To protect the person's private information including the person's name
Settings and profile picture, you can configure privacy settings for online access
control devices. For details, refer to Privacy Settings .
Replace When a device is replaced with another one, and the serial No. of the
Device new device is different from that of the old one, you need to confirm the
replacement on the platform. In the Operation column, click to
replace the old device with the new device on the platform.
Set Device's On the device list, select one or multiple devices and click Time Zone to
Time Zone edit their time zones.
Search for Enter one or multiple key words in the search box and click to search
Devices for a specific device.
44
HikCentral Access Control V2.3.0 Web Client User Manual
Note
Make sure you have enabled the ISUP protocol registration, otherwise the protocol will not be
displayed. On the top, select System. Then, select Network → Device Access Protocol on the
left, and switch on Allow ISUP Registration. Before adding devices by ISUP 2.6/4.0 protocol to
the system, you need to check Allow ISUP of Earlier Version.
5. Select Device ID Segment as the adding mode.
6. Enter the required parameters.
7. Optional: Switch on Picture Storage to set the storage location for pictures.
- Select pStor and select storage locations for the face picture library and captured pictures.
Note
This configuration only affects the facial recognition device which supports face comparison.
The storage location of captured pictures and face picture libraries cannot be the same.
- Select Local Storage as the storage location, click Configuration to enable Local Storage and
set the storage locations for pictures and files as needed.
8. Optional: Set the time zone for the device.
Get Device's Time Zone
The time zone of the device will be automatically chosen according to the region of the
device.
Manually Set Time Zone (The settings will be applied to the device automatically)
You can select a time zone of the device. The settings will be applied to the device
automatically.
45
HikCentral Access Control V2.3.0 Web Client User Manual
9. Optional: Switch on Add Resource to Area to import the resources (including alarm inputs,
alarm outputs, and access points) to an area.
Note
● You can create a new area by device name or select an existing area.
● You can import all the access points or specific access point(s) to the area.
● For the video access control terminal of a device, the camera on the terminal will also be
access point.
10. Finish adding the device(s).
- Click Add to add the device(s) and return to the device management page.
- Click Add and Continue to add the device(s) and continue to add other devices.
11. Optional: Perform further operations on the added device(s).
Configure Click in the Operation column to enter the corresponding device
Device configuration page to edit the time parameters, reboot the device,
restore the device, or set other parameters. See Configure Parameters
for Access Control Devices for detailed instructions.
Change Select the added device(s) and click Change Password to change the
Password password for the device(s).
Note
● You can only change the password for online HIKVISION devices
currently.
● If the devices share the same password, you can select multiple devices
to change the password together.
Replace When a device is replaced with another one, and the serial No. of the
Device new device is different from that of the old one, you need to confirm the
replacement on the platform. In the Operation column, click to
replace the old device with the new device on the platform.
Restore Select the added device(s) and click Restore Default Settings to restore
Default the configured device parameters excluding network parameters and
Settings account information.
Note
If you want to restore all the device parameters, you should check
Restore device network parameters and account information, such as
user name and password. in the pop-up window.
46
HikCentral Access Control V2.3.0 Web Client User Manual
Privacy To protect the person's private information including the person's name
Settings and profile picture, you can configure privacy settings for online access
control devices. For details, refer to Privacy Settings .
Set Device's On the device list, select one or multiple devices and click Time Zone to
Time Zone edit their time zones.
Search for Enter one or multiple key words in the search box and click to search
Devices for a specific device.
Note
Make sure you have enabled the ISUP protocol registration, otherwise the protocol will not be
displayed. On the top, select System. Then, select Network → Device Access Protocol on the
left, and switch on Allow ISUP Registration. Before adding devices by ISUP 2.6/4.0 protocol to
the system, you need to check Allow ISUP of Earlier Version.
5. Select Batch Import as the adding mode.
6. Click Download Template and save the predefined spreadsheet (XLSX format) to local disk.
7. Open the spreadsheet and edit the required device information.
8. Click and select the edited spreadsheet.
9. Optional: Switch on Picture Storage to set the storage location for pictures.
- Select pStor and select storage locations for the face picture library and captured pictures.
Note
This configuration only affects the facial recognition device which supports face comparison.
The storage location of captured pictures and face picture libraries cannot be the same.
47
HikCentral Access Control V2.3.0 Web Client User Manual
- Select Local Storage as the storage location, click Configure to enable Local Storage and set
the storage locations for pictures and files as needed.
Setting picture storage location is not required for devices added via Hikvision ISAPI Protocol.
10. Optional: Set the time zone for the device.
Get Device's Time Zone
The time zone of the device will be automatically chosen according to the region of the
device.
Manually Set Time Zone (The settings will be applied to the device automatically)
You can select a time zone of the device. The settings will be applied to the device
automatically.
11. Finish adding the device(s).
- Click Add to add the device(s) and return to the device management page.
- Click Add and Continue to add the device(s) and continue to add other devices.
12. Optional: Perform further operations on the added device(s).
Configure Click in the Operation column to enter the corresponding device
Device configuration page to edit the time parameters, reboot the device,
restore the device, or set other parameters. See Configure Parameters
for Access Control Devices for detailed instructions.
Change Select the added device(s) and click Change Password to change the
Password password for the device(s).
Note
● You can only change the password for online HIKVISION devices
currently.
● If the devices share the same password, you can select multiple devices
to change the password together.
Privacy To protect the person's private information including the person's name
Settings and profile picture, you can configure privacy settings for online access
control devices. For details, refer to Privacy Settings .
Restore Select the added device(s) and click Restore Default Settings to restore
Default the configured device parameters excluding network parameters and
Settings account information.
Note
If you want to restore all the device parameters, you should check
Restore device network parameters and account information, such as
user name and password. in the pop-up window.
Replace When a device is replaced with another one, and the serial No. of the
Device new device is different from that of the old one, you need to confirm the
48
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● Device support required. Parameters vary with different device types and models.
● The supported features and parameters are subject to the applications you installed.
Time
You can view the time zone where the device locates and set the following parameters.
Device Time
Click the Device Time field to customize time for the device.
Sync with Server Time
Synchronize the device time with the server of the platform.
Biometrics
You can enable facial recognition and fingerprint recognition of access control devices if the
devices support biometrics recognition.
Facial Recognition
Set facial recognition function for the device, and select a facial recognition mode.
Single-Person Recognition
49
HikCentral Access Control V2.3.0 Web Client User Manual
Skin-surface Temperature
Set Temperature Measurement to on to enable temperature screening function.
Threshold(℃)
Set the range of normal skin-surface temperature. The detected temperature that is not in this
range is abnormal temperature. The maximum temperature should be higher than the
minimum temperature.
Open Door When Temperature is Abnormal
If it is enabled, the door will open when person's skin-surface temperature is abnormal. By
default, the door will not open for abnormal temperature.
Registration Device
If you enable this function, the information about added persons and credentials (including face
pictures and fingerprints) added on the device will be automatically synchronized to the platform.
Mask Settings
Set Mask Detection to on to enable mask detection function. Once enabled, the device can detect
persons without face masks.
Do Not Open Barrier when No Mask
If it is checked, the barrier will still open for persons without masks.
RS-485
RS-485 Communication Redundancy
You can check RS-485 Communication Redundancy to enable the function if you wire the
RS-485 card to the device redundantly.
Working Mode
Select the working mode, including the card reader, door control unit, and access control host.
Turnstile Parameters
You can configure passing mode for the turnstile linked to the device.
Based on Lane Controller's DIP Mode
The device will follow the lane controller's DIP settings to control the turnstile. The settings on
the main controller will be invalid.
50
HikCentral Access Control V2.3.0 Web Client User Manual
Maintenance
You can reboot a device remotely and restore it to its default settings.
Reboot
Reboot the device.
Restore Default Settings
Restore the device to its default settings. The device needs to be activated after being restored.
Note
● By default, the device disables the custom Wiegand function. If you enable the custom Wiegand
function, all Wiegand ports in the device will use the customized Wiegand protocol.
● You can configure up to 5 custom Wiegand devices.
Switch on Custom Wiegand and configure the Wiegand parameters. You can select a device from
the Copy From drop-down list to copy the settings of another device.
Total Length
Wiegand data length.
Parity Type
Set the valid parity for Wiegand data according to property of the third party card reader. You
can select Nothing, Odd Even Check, or XOR Parity.
If you select Odd Even Check, you can configure the following:
Odd Start, Length
51
HikCentral Access Control V2.3.0 Web Client User Manual
If the odd parity start bit is 1 and the length is 12, then the platform will start odd parity
calculation from bit 1. It will calculate 12 bits. The result will be in bit 0 (Bit 0 is the first bit).
Even Start, Length
If the even parity start bit is 12, and the length is 12, then the platform will start even parity
calculation from bit 12. It will calculate 12 bits. The result will be in the last bit.
If you select XOR Parity, you can configure the following:
XOR Parity Start Bit, Length per Group, Length for Parity
Depending on the table displayed below, the start bit is 0, the length per group is 4, and the
length for parity is 40. It means that the platform will calculate from bit 0, calculate every 4
bit, and calculate 40 bits in total (10 groups in total). The result will be in the last 4 bits (The
result length is the same as the length per group).
Output Rule
Set the output rule.
Card ID Start Bit, Length, and Decimal Digit
If you use the transformation rule, these items are available. Depending on the table
displayed below, the card ID start bit is 0, the length is 32, and the decimal digit is 10. It
represents that from bit 0, there are 32 bits represent the card ID. (The length here is
calculated by bit.) And the decimal digit length is 10 bits.
Site Code Start Bit, Length, and Decimal Digit
If you use the transformation rule, these items are available. For detailed information, see
the explanation of the card ID.
OEM Start Bit, Length, and Decimal Digit
If you use the transformation rule, these items are available. For detailed information, see
the explanation of the card ID.
Manufacturer Code Start Bit, Length, and Decimal Digit
If you use the transformation rule, these items are available. Depending on the table
displayed below, the manufacturer code start bit is 32, length is 8, and decimal digit is 3. It
represents that from bit 32, there are 8 bits are manufacturer code. (The length here is
calculated by bit.) And the decimal length is 3.
Note
Take Wiegand 44 for example, the setting values in the Custom Wiegand are as follows:
52
HikCentral Access Control V2.3.0 Web Client User Manual
Note
Wiegand mode can only be selected when the direction is Output.
Output Format
Whether to output the signal as employee No. or card No.
Note
Output format can only be selected when the direction is output.
Signal Sending Interval
The interval of sending data.
53
HikCentral Access Control V2.3.0 Web Client User Manual
Note
Linked card reader can only be selected when the device supports linking to a card reader.
54
HikCentral Access Control V2.3.0 Web Client User Manual
ON
Arm the zone when the specified event is triggered.
OFF
Disarm the zone when the specified event is triggered.
No Linkage
Disable the linkage action.
Access Point
Unlock
Unlock the door or barrier when the specified event is triggered.
Lock
Lock the door or barrier when the specified event is triggered.
Remain Unlocked
The door or barrier will remain unlocked when the specified event is triggered.
Remain Locked
The door or barrier will remain locked when the specified event is triggered.
No Linkage
Disable the linkage action.
55
HikCentral Access Control V2.3.0 Web Client User Manual
Note
For details about configuring picture storage settings, see Edit Door .
Picture Size
Select a picture size from the drop-down list for the captured pictures saved to the storage
location.
Picture Quality
Select a picture quality from the drop-down list for the captured pictures saved to the
storage location.
Capture Times
Select the capture times from the drop-down list for the devices to capture face pictures for
the times selected.
Note
Make sure the selected device is online.
56
HikCentral Access Control V2.3.0 Web Client User Manual
57
HikCentral Access Control V2.3.0 Web Client User Manual
● Indoor Station: The indoor station is an intelligent terminal which can provide two-way audio,
network transmission, data storage, remote unlocking, etc. It is mainly applied in the
community.
● Door Station: The door station can send call to indoor station (residents) and main station. It is
remotely, send call to residents and respond to residents' call. It is mainly applied in large
community.
On the top navigation bar, click → Add Video Intercom Device to quickly add devices.
58
HikCentral Access Control V2.3.0 Web Client User Manual
Steps
1. On the top, select Device.
2. Select Device and Server → Video Intercom Device on the left.
3. In the Online Device area, select a network type.
Server Network
As the default selection, the detected online devices on the same local subnet with the SYS
server will be listed in the Online Device area.
Local Network
The detected online devices on the same local subnet with the current Web Client will be
listed in the Online Device area.
4. In the Online Device area, select the active device to be added.
5. Click in the Online Device area to enter the Add Video Intercom Device page.
59
HikCentral Access Control V2.3.0 Web Client User Manual
Caution
The password strength of the device can be automatically checked. We highly recommend you
change the password of your own choosing (using a minimum of 8 characters, including at least
60
HikCentral Access Control V2.3.0 Web Client User Manual
three kinds of following categories: upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you change
your password regularly, especially in the high security system, changing the password monthly
or weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
service provider and/or end-user.
7. Optional: Set the time zone for the device.
- Click Manually Set Time Zone, and click to select a time zone from the drop-down list.
Note
You can click View to view the details of the current time zone.
- Click Get Device's Time Zone to get the device's time zone.
8. Optional: Switch Add Resource to Area to on to import the resources of the added devices to an
area.
Note
● You can import all the alarm inputs or the specified alarm input to the corresponding area.
● You can create a new area by the device name or select an existing area.
● If you do not import resources to area, you cannot perform further operations for the alarm
inputs.
9. Optional: Check Restore Default Settings to restore configured device parameters to default
settings.
Note
● Not all the device parameters will be restored. Network parameters such as IP address, port
Note
● You can only change the password for online HIKVISION devices
currently.
● If the devices have the same password, you can select multiple
devices to change the password for them at the same time.
61
HikCentral Access Control V2.3.0 Web Client User Manual
Restore Default Select the added device(s), and click to restore the configured
Settings device parameters.
Note
If you want to restore all the device parameters, you can check
Restore device network parameters and account information, such
as user name and password. in the pop-up window.
Set Device's Time In the device list, select one or multiple devices and click Time Zone
Zone to edit their time zones.
Search for Devices Enter one or more key words in the search box and click to
search for a specific device.
62
HikCentral Access Control V2.3.0 Web Client User Manual
63
HikCentral Access Control V2.3.0 Web Client User Manual
Create a descriptive name for the device. For example, you can use an alias that can show the
location or feature of the device.
Password
The password required to access the account.
Caution
The password strength of the device can be automatically checked. We highly recommend
you change the password of your own choosing (using a minimum of 8 characters, including
at least three kinds of following categories: upper case letters, lower case letters, numbers,
and special characters) in order to increase the security of your product. And we recommend
you change your password regularly, especially in the high security system, changing the
password monthly or weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
service provider and/or end-user.
6. Optional: Set the time zone for the device.
- Click Get Device's Time Zone to get the device's time zone.
- Click Manually Set Time Zone, and click to select a time zone from the drop-down list.
Note
You can click View to view the details of the current time zone.
7. Optional: Switch Add Resource to Area to on to import the resources of the added devices to an
area.
Note
● You can import all the alarm inputs or the specified alarm input to the corresponding area.
● You can create a new area by the device name or select an existing area.
● If you do not import resources to area, you cannot perform further operations for the alarm
inputs.
8. Optional: Check Restore Default Settings to restore all the parameters of the device configured
on the system to default settings.
9. Finish adding the device.
- Click Add to add the device and back to the video intercom device list page.
- Click Add and Continue to save the settings and continue to add the next device.
10. Optional: Perform the following operation(s) after adding the devices.
Remote Click to set the remote configurations of the corresponding
Configurations device. For details, refer to Configure Device Parameters .
Change Password Select the added device(s) and click to change the password for
the device(s).
64
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● You can only change the password for online HIKVISION devices
currently.
● If the devices have the same password, you can select multiple
devices to change the password for them at the same time.
Restore Default Select the added device(s) and click Restore Default Settings to
Settings restore the configured device parameters excluding network
parameters and account information.
Note
If you want to restore all the device parameters, you should check
Restore device network parameters and account information, such
as user name and password. in the pop-up window.
Set Device's Time In the device list, select one or multiple devices and click Time Zone
Zone to edit their time zones.
Search for Devices Enter one or more key words in the search box and click to search
for a specific device.
65
HikCentral Access Control V2.3.0 Web Client User Manual
Note
You can click View to view the details of the current time zone.
9. Finish adding the devices.
- Click Add to add the video intercom devices in a batch, and back to the video intercom device
list page.
- Click Add and Continue to save the settings and continue to add other video intercom
devices.
10. Optional: Perform the following operation(s) after adding the devices.
Remote Click to set the remote configurations of the corresponding
Configurations device.
Note
For detailed operation steps for the remote configuration, see the
user manual of the device.
Change Password Select the added device(s) and click to change the password for
the device(s).
Note
● You can only change the password for online HIKVISION devices
currently.
● If the devices have the same password, you can select multiple
devices to change the password for them at the same time.
Restore Default Select the added device(s) and click Restore Default Settings to
Settings restore the configured device parameters excluding network
parameters and account information.
Note
If you want to restore all the device parameters, you should check
Restore device network parameters and account information, such
as user name and password. in the pop-up window.
Set Device's Time In the device list, select one or multiple devices and click Time Zone
Zone to edit their time zones.
Search for Devices Enter one or more key words in the search box and click to search
for a specific device.
66
HikCentral Access Control V2.3.0 Web Client User Manual
Note
If the NTP server is not configured, a prompt message will appear on the top of the page. You
can click Configure to set the time synchronization.
5. Select pStor.
6. Enter the network parameters.
Address
The pStor server's IP address in LAN that can communicate with SYS.
ANR Function
You can check this field to enable the ANR function. This function is enabled default. If the
network is disconnected between the pStor and the encoding device, data can be stored on
the pStor automatically.
Control Port
The control port No. of the pStor server. If it is not changed, use the default value.
Network Port
The network port No. of the pStor server. If it is not changed, use the default value.
Signaling Gateway Port
The signaling gateway port No. of the pStor server. If it is not changed, use the default value.
7. Optional: Check ANR Function or not.
Note
This function is enabled default. If the network is disconnected between the pStor and the
encoding device, data can be stored on the pStor automatically.
8. Enter the user's access secret key and secret key of the pStor server for downloading pictures.
67
HikCentral Access Control V2.3.0 Web Client User Manual
Note
You can download these two keys on the pStor server's Web Client page.
9. Optional: Switch on Enable Picture Storage for storing pictures in this pStor.
Note
You should set picture downloading port No..
10. Enter the name, user name, and password of the pStor server.
Caution
The password strength of the device can be automatically checked. We highly recommend you
change the password of your own choosing (using a minimum of 8 characters, including at least
three kinds of following categories: upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you change
your password regularly, especially in the high security system, changing the password monthly
or weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
service provider and/or end-user.
11. Finish adding the server.
- Click Add to add the server and back to the server list page.
- Click Add and Continue to save the settings and continue to add other servers.
12. Optional: Perform the following operations after adding the server.
Edit Server Click Name field of the server and you can edit the information of the
server and view its storage information.
Delete Server Select the server(s) from the list, and click Delete to remove the
selected server(s).
Configure Click in the Operation column to enter the login page of the pStor
Server server. You can log in and configure the pStor server.
Search for Enter keyword(s) in the search box in the top right corner to search for
Server the target server(s).
● Card Reader
68
HikCentral Access Control V2.3.0 Web Client User Manual
● Indoor Station
● Door Station
Note
Upgrading the card reader linked to the door station is not supported.
● Main Station
Via Hik-Connect
The following devices are supported to be upgraded the firmwares via Hik-Connect:
● Indoor Station
● Door Station
Note
Upgrading the card reader linked to the door station is not supported.
● Main Station
69
HikCentral Access Control V2.3.0 Web Client User Manual
Note
This field is not required if Hik-Partner Pro Protocol is selected as the device access protocol.
6. In Simultaneous Upgrade field, set the maximum number of devices for simultaneous upgrade.
Example
If you set the value to 5, up to 5 devices can be selected for batch upgrade.
7. Click Next.
8. Install the required web plug-in.
Note
If you select Local PC as the upgrade method, you should install the required web plug-in if the
prompt pops up.
The upgradable devices will be displayed.
9. Select device(s) and click Next to enter the upgrade schedule page.
10. Select an upgrade schedule to upgrade the selected device(s).
- Select Upgrade Now from the Upgrade Schedule drop-down list to start upgrade.
- Select Custom from the Upgrade Schedule drop-down list and then customize a time period
to upgrade the selected device(s).
11. Click OK to save the firmware upgrade settings.
The upgrade task list will be open.
12. Optional: In the top right corner of firmware upgrade page, click Upgrade Tasks to view the
task details and control the task status.
70
HikCentral Access Control V2.3.0 Web Client User Manual
Caution
The password strength of the device can be automatically checked. We highly recommend
you change the password of your own choosing (using a minimum of 8 characters, including
at least three kinds of following categories: upper case letters, lower case letters, numbers,
and special characters) in order to increase the security of your product. And we recommend
you change your password regularly, especially in the high security system, changing the
password monthly or weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
service provider and/or end-user.
Path
If you saved FTP firmware upgrade package in a non-root directory, enter the root directory
name. If you saved FTP firmware upgrade package in a root directory, keep the field empty.
5. Click Next.
6. Select an upgrade package from the local PC and then click Next.
The upgradable device list will be displayed.
7. Optional: Filter devices by device type, device firmware version, or device model.
8. Select a device type and select a device from the device list.
9. Optional: If you select Dock Station as the device type, you need to select an upgrade object
from the drop-down list.
10. Select Upgrade Now or Custom as the upgrading schedule.
11. Click OK to save the firmware upgrade settings.
The upgrade task list will be displayed.
12. Optional: In the upper-right corner of firmware upgrade page, click Upgrade Tasks to view the
task details and control the task status.
13. Optional: In the upgrade task list, click in the Operation column to delete the upgrade task.
71
HikCentral Access Control V2.3.0 Web Client User Manual
72
HikCentral Access Control V2.3.0 Web Client User Manual
Note
For the following operations about resetting the password, contact the
technical support.
Reset by Email Export the QR code and sent it to the email displayed. You will receive the
verification code in 5 minutes. Enter the code, new password, and confirm
password.
Reset by Enter the answer to the security question, new password, and confirm
Security password.
Question
Note
If you have not set security questions, the window of setting security
questions will pop up, and you should set the security questions as needed.
73
HikCentral Access Control V2.3.0 Web Client User Manual
Caution
The password strength of the device can be automatically checked. We highly recommend you
change the password of your own choosing (using a minimum of 8 characters, including at least
three kinds of following categories: upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you change
your password regularly, especially in the high security system, changing the password monthly
or weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the
service provider and/or end-user.
5. Click Save to save the change.
Note
Contact our technical support to obtain a security code.
What to do next
You must change this default password to better protect against security risks, such as the
unauthorized access by others to the product that may prevent the product from functioning
properly and/or lead to other undesirable consequences.
74
HikCentral Access Control V2.3.0 Web Client User Manual
Caution
The password strength of the device can be automatically checked. We highly recommend you
change the password of your own choosing (using a minimum of 8 characters, including at least
three kinds of following categories: upper case letters, lower case letters, numbers, and special
characters) in order to increase the security of your product. And we recommend you change your
password regularly, especially in the high security system, changing the password monthly or
weekly can better protect your product.
Proper configuration of all passwords and other security settings is the responsibility of the service
provider and/or end-user.
75
HikCentral Access Control V2.3.0 Web Client User Manual
76
HikCentral Access Control V2.3.0 Web Client User Manual
7. Click Add.
8. Optional: After adding the area, you can do one or more of the following:
Edit Area Hover the cursor on a specific area and click → Edit to edit the area.
Delete Area Select an area and click or hover the cursor on an area and click →
Delete to delete the selected area. You can also press Ctrl on your keyboard,
select multiple areas, and then click to delete areas in a batch.
Note
After deleting the area, the resources in the area will be removed from the
area.
Search Area Enter a keyword in the search field of the area list panel to search for the
area.
Move Area Drag the added area to another parent area as the sub area.
Stick on Top Hover the cursor on a specific area and click → Stick on Top → to stick the
area to the top.
Note
The order of the parent area will not be changed.
Remove Hover the cursor on a specific area and click → Remove from Top to
from Top restore the area order to the default (name order).
Note
One door can only belong to one area. You cannot add one door to multiple areas.
1. On the top, select Device.
77
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● You can click Add in the Area field to add new areas.
● If you have not selected area in previous step, selecting area in this step will be required.
9. Click Add.
The added door(s) will be displayed in the list.
10. Optional: After adding the doors, you can do one or more of the following.
Synchronize Door Select the doors and click to synchronize the doors' names
Name from the device in a batch.
Note
You can only synchronize the door name of online HIKVISION
device.
Apply Door Name Select the doors and click to apply the doors' names to the
device in a batch.
Move to Other Area Select the doors and click . Then select the target area to
move the selected doors to and click Move.
Set Geographic Click to enter Map Settings page and drag the door to the
Location map. See Add Hot Spot on Map for details.
Display Doors of Sub Check Include Sub-area to display the doors in sub areas.
Areas
Filter by Device Type Click and check the device type in the drop-down list to filter
the doors.
Search for Doors Enter the keywords in the Search field to search for doors.
78
HikCentral Access Control V2.3.0 Web Client User Manual
Steps
Note
One alarm input can only belong to one area. You cannot add an alarm input to multiple areas.
1. On the top, select Device.
2. Click Area on the left.
3. Optional: Select an area for adding alarm inputs to.
4. Select the Alarm Input tab.
5. Click to enter the Add Alarm Input page.
6. Select the device type.
7. Select the alarm inputs to add.
8. Optional: Select the area.
Note
● You can click Add in the Area field to add new areas.
● If you have not selected area in previous step, selecting area in this step will be required.
9. Click Add.
10. Optional: After adding the alarm inputs, you can do one or more of the followings.
Delete Alarm Input Select the alarm input(s) and click Delete.
Move to Other Area Select the alarm input(s) and click . Then select the target
area to move the selected alarm inputs to and click Move.
Add Alarm Input to Click to enter Map Settings page and drag the alarm input to
Map the map. See Add Hot Spot on Map for details.
Display Alarm Inputs Check Include Sub-Area to display the alarm inputs of sub areas.
of Sub Areas
Filter Alarm Inputs by Select the device type(s) to be displayed in the list from the
Device Type drop-down list to the left of the search box.
Search for Alarm Enter the keywords in the Search field to search for alarm inputs.
Inputs
79
HikCentral Access Control V2.3.0 Web Client User Manual
Note
One alarm output can only belong to one area. You cannot add an alarm output to multiple areas.
1. On the top, select Device.
2. Click Area on the left.
3. Optional: Select an area for adding alarm outputs to.
4. Select the Alarm Output tab.
5. Click to enter the Add Alarm Output page.
6. Select the device type.
7. Select the alarm outputs to add.
8. Optional: Select the area.
Note
● You can click Add in the Area field to add new areas.
● If you have not selected area in previous step, selecting area in this step will be required.
9. Click Add.
10. Optional: After adding the alarm outputs, you can do one or more of the followings.
Delete Alarm Output Select the alarm output(s) and click Delete.
Move to Other Area Select the alarm outputs and click . Then select the target
area to move the selected alarm outputs to and click Move.
Set Geographic Click Set Geographic Location to enter the Map Settings
Location page and drag the alarm output to the map. See Add Hot Spot
on Map for details.
Display Alarm Outputs Check Include Sub-Area to display the alarm outputs of sub
of Sub Areas areas.
Search for Alarm Enter the keywords in the Search field to search for alarm
Outputs outputs.
80
HikCentral Access Control V2.3.0 Web Client User Manual
Note
If you change the name, you can click in the door list page to apply the new name to the
device.
Door Contact
The door contact's connection mode.
Exit Button Type
The exit button connection mode.
Lock Door when Door Closed
If it is enabled, the door will be locked once the door magnetic is closed. If there is no door
magnetic, the door will be locked after the extended open duration ends.
Note
This function should be supported by the device.
Open Duration
The time interval between the door is unlocked and locked again.
Extended Open Duration
The time interval between the door is unlocked and locked again for the person whose
extended access function is enabled.
Door Open Timeout Alarm
After enabled, if the door has been configured with the event or alarm, when the door
contact open duration has reached the limit, the event or alarm will be uploaded to the
system.
Duress Code
If you enter this code on the card reader keypad, the Mobile Client will receive a duress
event. It should be different from the super password and dismiss code.
81
HikCentral Access Control V2.3.0 Web Client User Manual
Super Password
If you enter this password on the card reader keypad, you are exempted from all the
remaining locked (Credential Failed), anti-passback, and first card authorization restrictions. It
should be different from the duress code and dismiss code.
Dismiss Code
If you enter this code on the card reader keypad, the buzzer's beeping will be stopped. It
should be different from the duress code and supper password.
5. Optional: Switch on Picture Storage and select a storage location from the drop-down list.
Note
If an error occurs during picture storage configuration, appears on the right of the door
name.
6. Optional: On the Card Reader panel, switch on Card Reader 1 or Card Reader 2 and set the card
reader related parameters.
Min. Card Swipe Interval
After it is enabled, you cannot swipe the same card again within the minimum card swiping
interval.
Reset Entry on Keypad After(s)
Set the maximum time interval of pressing two keys on the keypad. If timed out, the first
entry will be reset.
Failed Card Attempts Alarm
After it is enabled, if the door is configured with event or alarm, when the number of
excessive failed card swiping attempts has reached the limit, the event or alarm will be
uploaded to the system.
Tampering Detection
After it is enabled, if the door is configured with device tampered event or alarm, when the
device body or panel is taken apart, the alarm will be triggered and sent to the system.
OK LED Polarity
Only supported when the device is connected via Wiegand interface. The polarity for OK core
wire connection on the card reader mainboard.
Error LED Polarity
Only supported when the device is connected via Wiegand interface. The polarity for ERR
core wire connection on the card reader mainboard.
Face 1:N Matching Threshold
Set the threshold when authenticating via 1:N matching mode. The larger the value, the
smaller the false accept rate. The maximum value is 100.
Face Recognition Interval
The time interval between continuous face recognition twice when authenticating.
82
HikCentral Access Control V2.3.0 Web Client User Manual
Face Anti-spoofing
If it is enabled, the device can recognize the live face. Also, you can check Protect Sensitivity
of Face Anti-Proofing, and set the face anti-spoofing security level.
Face Recognition Application Mode
Select Indoor or Others according to actual environment.
Note
The parameters displayed vary according to the different models of the access control devices.
For details about the parameters, refer to the user manual of the device.
7. Optional: For a turnstile or an access controller of certain types, switch on Face Recognition
Terminal and add face recognition terminals to link with the selected turnstile.
1) Click Add to enter the Add Face Recognition Terminal page.
2) Select IP Address, Online Devices, or Device ID as the adding mode, and set the required
parameters, which may vary according to different terminals.
3) Click Add to link the terminal to the turnstile or access controller.
4) Optional: Click in the Operation column to configure parameters for the terminal. For
details, refer to Configure Parameters for Access Control Devices .
8. Optional: Click Copy To in the upper right corner to apply the current settings of the door to
other door(s).
9. Click Save.
83
HikCentral Access Control V2.3.0 Web Client User Manual
84
HikCentral Access Control V2.3.0 Web Client User Manual
85
HikCentral Access Control V2.3.0 Web Client User Manual
Note
The root department cannot be deleted.
Delete All Click beside at the top of the department list to delete all added
Departments departments.
86
HikCentral Access Control V2.3.0 Web Client User Manual
Note
Once a person is added to the platform, the ID rule will be not configurable, so we recommended
that you should ensure the ID rule at the very beginning.
1. In the Person module, select Basic Configuration → Person ID Rule on the left.
2. Set the total length.
3. Select the ID generation mode.
4. Click Save.
● Automatic Update: The QR code will be refreshed once it has reached its pre-set expiration time.
● Update Upon App Re-entry: The QR code will be refreshed when the user re-enters the
application.
87
HikCentral Access Control V2.3.0 Web Client User Manual
person's department and occupation. When an additional information item is added, it will be
displayed as an configuration option on the Basic Information tab of the Add Person page.
The following figure shows the custom private information items (marked in red rectangles) on the
Add Person page. See Add a Single Person for details about how to add a person.
Steps
Note
● You can customize up to 20 private information items and 20 public information items.
● The system administrator can define whether a user has the permission to view the custom
private information when setting permissions for a user (see Add Role ). For information
security, the system administrator needs to make sure the custom private information is only
viewable to specific users.
88
HikCentral Access Control V2.3.0 Web Client User Manual
Note
You cannot delete the additional information item linked with person
information in the domain.
89
HikCentral Access Control V2.3.0 Web Client User Manual
Add a Position
You can manually add a position to the platform by entering the position name and specifying its
upper-level position.
Steps
1. On the top navigation bar, select Person.
2. Select Position Management on the left.
3. Click above the left position tree to open the Add Position pane.
4. Enter the name of the position.
5. From the drop-down list, select the upper-level position to which the position to be added is
subordinate.
Note
If you select <None>, the position has no upper-level position.
6. Optional: Click to select the persons that have been assigned to this position.
7. Click Add.
8. Optional: Perform the following operations.
Edit Position ● Select the position from the tree on the left and click at the top to edit
its information.
● Click in the Operation column of a position to edit its information.
Delete ● Select a position from the tree on the left and click at the top to delete
Position(s) the selected position.
● Click in the Operation column of a position to delete it.
● Select one or multiple positions on the right pane and click Delete at the
top to delete the selected position(s).
● To delete all positions, click → Delete All either above the left tree or on
the top of the right pane.
Search for Enter the position name in the search box above the left tree to search in all
Position added positions, and in the search box on the top right to search under the
selected upper-level position. Supports fuzzy search.
90
HikCentral Access Control V2.3.0 Web Client User Manual
Import Positions
You can import multiple positions at once by entering the names of the positions and their
corresponding upper-level positions in a predefined template.
Steps
1. On the top navigation bar, select Person.
2. Select Position Management on the left.
3. Click above the left position tree to open the Batch Import Positions pane.
4. Click Download Template to download the template to the local PC.
5. Open the downloaded template file and fill in the required information, including the names of
the positions and their upper-level positions.
6. Click to select the edited template file from the local PC.
7. Optional: Check Auto Replace Duplicated Position to allow the platform to automatically
replace existing positions if the file to be imported contains positions that are already added to
the platform.
Note
If it is not checked and the file contains positions that are already added to the platform, the
import may fail.
8. Click Import.
9. Optional: Perform the following operations.
Edit Position ● Select the position from the tree on the left and click at the top to edit
its information.
● Click in the Operation column of a position to edit its information.
Delete ● Select a position from the tree on the left and click at the top to delete
Position(s) the selected position.
● Click in the Operation column of a position to delete it.
● Select one or multiple positions on the right pane and click Delete at the
top to delete the selected position(s).
● To delete all positions, click → Delete All either above the left tree or on
the top of the right pane.
Search for Enter the position name in the search box above the left tree to search in all
Position added positions, and in the search box on the top right to search under the
selected upper-level position. Supports fuzzy search.
91
HikCentral Access Control V2.3.0 Web Client User Manual
enrollment stations. In addition, you can batch add profile pictures for persons, and import domain
persons.
On the left, select Person Management → Person .
You can perform the following operations for adding persons.
1. Click Add to add a single person. For details, refer to Add a Single Person .
2. Click Import and select a mode to import persons in a batch.
- Batch import persons by template. For details, refer to Batch Add Persons by Template
- Import users in the AD (Active Directory) domain to the platform as persons. For details, refer
to Import Domain Persons .
- Import person pictures. For details, refer to Import Profile Pictures .
- Import persons information to the platform from devices, including access control devices,
video intercom devices, or enrollment station. For details, refer to Import Persons from
Access Control Devices or Video Intercom Devices or Import Persons from Enrollment
Station .
Note
You can also click on the top navigation bar, and select Add Person or Import Person From
Device to quickly add person(s) to the platform. If you select Add Person, you can set a person's
basic information and card No. See Add a Single Person . For details about importing persons
from device, see Import Persons from Access Control Devices or Video Intercom Devices .
92
HikCentral Access Control V2.3.0 Web Client User Manual
Note
When editing the person's effective period, if
you have issued temporary card(s) to the
person, make sure the expiry date(s) of the
person's temporary card(s) are within the
effective period.
93
HikCentral Access Control V2.3.0 Web Client User Manual
Note
Before using this function, you should activate
this function first by going to System →
Security → Export Profile Pictures page and
checking the Export Profile Pictures.
94
HikCentral Access Control V2.3.0 Web Client User Manual
Note
The access levels of these persons cannot be
restored once they are cleared.
Note
Before adding persons to the platform, you should confirm and set the person ID rule. As once a
person is added, the ID rule cannot be edited any more. For more about the ID rule settings, refer
to Set Person ID Rule .
1. On the Person page, select a department from the department list on the left.
All persons in the selected department will be displayed on the right. You can check Show Sub
Department to display the persons in sub departments (if any).
2. Click Add above the person list to enter the Add Person page.
3. Set the person's basic information, such as ID, department, first name, and last name.
ID (Required)
95
HikCentral Access Control V2.3.0 Web Client User Manual
Hover the cursor onto , and you can select from three modes to add a picture.
From Device
This mode is suitable for non-face-to-face scenario when the person and the system
administrator are on different locations.
Note
● For access control devices, only specific models of face recognition terminals are
supported.
● For video intercom devices, door stations and outer door stations are supported.
● For enrollment stations, you need to set related parameters, including access mode,
access protocol, device address, port, user name, password, face anti-spoofing, and
security level.
Upload Picture
Click Upload Picture to select a picture from your PC. On top of the Upload Picture
window, click Detect Now and select a device type and device to detect the face picture
quality.
Note
● It is recommended that the face in the picture be in the full-face view directly facing the
camera, without a hat or head covering.
● You can drag the picture to change its position or zoom in/out before cutting it.
Note
If you add a smart terminal to the platform, the smart terminal will automatically create
models for the profile picture.
Effective Period (Required)
Set the effective period for the person in applications such as access control application, to
determine the period when the person can access the specified access points with
credentials.
Click Extend Effective Period to show a drop-down list and select 1 Month / 3 Months / 6
Months / 1 Year to quickly extend the effective period based on the configured end time. For
example, if the period is from 2021/10/23 13:30:00 to 2022/01/20 14:10:00 and the
extended time is selected as 1 Month, the end time of effective period will change to
2022/02/20 14:10:00.
Date of Employment
You can set the start date of employment for the person.
96
HikCentral Access Control V2.3.0 Web Client User Manual
Note
The extended access and super user functions cannot be enabled concurrently.
Device Administrator
Determine if the person has the administrator permission of access control devices.
If the check-box is checked, when you synchronize person information from access control
devices, the administrator permission for the person will be retained.
Open Door via Bluetooth on Mobile Client
Check the box to open enable opening door via bluetooth on the Mobile Client.
PIN Code
If you have enabled the function of automatically generating PIN for persons (See
Automatically Generate PIN for Persons ), the platform will generate a PIN automatically. You
can click Auto Generate PIN to generate a new PIN. In most cases, the PIN code cannot be
used as a credential alone: it must be used after card when accessing; It can be used alone
only when Authenticate via PIN Code is enabled on the platform and the authentication
mode of the card readers is also set to Authenticate via PIN Code.
Note
● The PIN code should contain 4 to 8 characters.
● For details about enabling Authenticate via PIN Code on the platform, see Add
Departments .
97
HikCentral Access Control V2.3.0 Web Client User Manual
a. Click Assign.
b. Select one or more access levels for the person.
c. Click Assign to add the person to the selected access level(s).
Note
You can click to view information on access points and access schedules.
6. Optional: Click Schedule tab, view and edit the schedule of the person in the table.
Allow Check-In/Out via Mobile Client
Switch on it to allow the person to check in/out via the Mobile Client.
Leave Rule
Select a leave rule for the person.
Schedule Overview
View the schedule of the person. You can click Set Schedule to set a schedule for the person.
7. Optional: On the Resident Information page, set resident information to link the person with
the indoor station and floor and room number.
Note
● Make sure you have added indoor stations to the platform.
● When you select an indoor station, the room number of the indoor station will be filled in
station.
8. Optional: Enter the person's skin-surface temperature and select the corresponding
temperature status.
For example, if a person's skin-surface temperature is 37 °C, then you can select her/his
temperature status as normal.
9. Optional: In Additional Information area, enter additional information to be applied.
Note
Make sure you have set the additional information. See Customize Additional Information for
details.
10. Click Add, or click Add and Continue to finish adding the person and continue to add other
persons.
The person will be displayed in the person list and you can view the details.
98
HikCentral Access Control V2.3.0 Web Client User Manual
Manage Credentials
When adding a person, you can add the required credential information for the person. The
supported credentials include normal cards, faces, fingerprints, and irises. These credentials can be
used for the access authentication in applications such as access control .
Steps
1. On the top, select Person.
2. Select Person Management → Person on the left.
3. On the adding or editing person page, click Credential Management under the profile picture to
open the Add Credential pane.
4.
In the Card area, click , and then manually enter the card No. or swipe the card on devices
(enrollment station, card enrollment station, or card reader) to add normal cards.
Note
● For manually entering, digits, letters, and the combination of digits and letters can be entered.
● For swiping cards, you can read card information via the enrollment station, card enrollment
station, or card reader. For details, see Batch Issue Cards to Persons .
The QR code of card is only displayed when you set the QR code mode to static QR code. See Set
QR Code Mode .
A QR code will be generated automatically after adding a card and the icon will appear in the
top right corner of the card area when you enter the Add Credential page from the editing
person page. You can click to view and scan the QR code or click Download to download the
QR code picture to the local storage for further operations.
99
HikCentral Access Control V2.3.0 Web Client User Manual
100
HikCentral Access Control V2.3.0 Web Client User Manual
101
HikCentral Access Control V2.3.0 Web Client User Manual
10. Optional: Check Auto Replace Card No. to replace the card No. automatically if it already exists
in the platform.
11. Click Import to start importing.
Note
● The importing process cannot be stopped once started.
● You can batch issue cards to the persons by importing the template with card No.
information.
The importing progress shows and you can check the results.
Note
You can export the person information that failed to be imported, and try again after editing.
102
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● If the profile picture/email in the domain is linked to the profile picture/email in the platform,
the persons' profile picture/email will be imported to the platform from the domain as well.
You can view the profile picture/email on the person details page but you cannot edit it.
● If the profile picture/email in the domain is NOT linked to the profile picture/email in the
platform, you can take a picture or upload a picture as the person's profile picture and enter
the email address.
Note
If the ID in the name of the profile picture is duplicate with the person's ID that already exists in
the platform, the former will replace the latter. If the ID in the name of the profile picture doesn't
exist in the platform, or the name of the profile picture only contains the person name, the
platform will create a new person.
1. Name the profile pictures according to the person name or person ID.
Note
● The naming rule of picture is: Person Name, Person ID, or Person Name ID. The person name
should contain the first name and the last name, separated by a plus sign.
The naming rule for profile pictures: First Name+Last Name_ID. At least one of first name and
last name is required, and the ID is optional. For example, Kate+Smith_123.jpg; Kate_123.jpg;
Smith_123.jpg.
● Dimension recommendation for each picture: 295×412.
2. Optional: If you access the platform via the Web Client running on the SYS, move these pictures
into one folder and then compress the folder in ZIP format.
Note
The ZIP file should be smaller than 4 GB, or the uploading will fail.
3. On the top, select Person.
4. Select Person Management → Person on the left.
5. Click → Import Profile Picture .
103
HikCentral Access Control V2.3.0 Web Client User Manual
Note
You can hold CTRL key and select multiple ZIP files. Each ZIP file should be no larger than 4 GB.
7. Select a department from Department.
8. Optional: Switch on Check Face Quality by Device and then select a device type and a device for
verifying the face quality.
9. Click Import to start importing.
The importing progress shows and you can check the results.
10. Optional: After importing profile pictures, click Export Failure Details to export an Excel file to
the local PC and view the failure details.
11.3.5 Import Persons from Access Control Devices or Video Intercom Devices
If the added access control devices and video intercom devices have been configured with person
information, you can get the person information from these devices and import it to the platform.
The person information that can be imported includes person names, profile pictures, credentials
(PIN codes, cards, and fingerprints), effective periods, person roles, etc.
Steps
1. On the top, select Person.
2. Select Person Management → Person on the left.
3. Click → Import Person Information from Device .
4. Select Access Control Device or Video Intercom Device as the device type.
5. Select one or more devices from the device list.
Note
You can enter a key word (fuzzy search supported) in the search box to search the target
device(s) quickly.
6. Select the importing mode.
All
Import all the persons stored in the selected devices.
Specified Employee No.
Specify the employee No. of up to five persons and import the persons to the platform.
7. Select a department to which the persons will be imported.
8. Optional: Check Replace Profile Picture to replace the existed person profile pictures with the
new ones from the devices.
9. Click Import to start importing.
104
HikCentral Access Control V2.3.0 Web Client User Manual
Note
When importing, the platform will compare person information on the device with person
information in the platform based on the person name. If the person name exists on the device
but does not exist in the platform, the platform will create a new person. If a person name exists
on both sides, the corresponding person information in the platform will be replaced by the one
on the device.
10. If the following window pops up, select a method to import the person information.
Note
If not, skip this step.
Import by Name
The person information directly linked to the access control devices will be imported.
Note
This method is usually used for the access control devices with facial recognition capability.
Import by Card
The person information linked to the cards of the access control devices will be imported
105
HikCentral Access Control V2.3.0 Web Client User Manual
Note
This method is usually used for the access control devices which link person information via
cards.
106
HikCentral Access Control V2.3.0 Web Client User Manual
If the persons are not added to the platform, download the template from the enrollment
station and then edit the template and apply it to the enrollment station for enrolling the
persons' credentials.
Import from Person List
If the persons have been added to the platform, select the department to apply the
persons to the enrollment station for enrolling the persons' credentials.
Copy Back Person and Credential Information
When the persons' credentials are enrolled, select the department to which the person and
credential information will be imported to.
7. Click Import to start importing.
Note
You should set self-registration parameters beforehand. See Set Self-Registration Parameters for
details.
107
HikCentral Access Control V2.3.0 Web Client User Manual
108
HikCentral Access Control V2.3.0 Web Client User Manual
when the uploaded profile is qualified can the person register successfully. Otherwise, the person's
information cannot be uploaded to the platform.
Note
To use this function properly, make sure you have added an access control device or video
intercom device to the platform beforehand.
Note
● You can select a picture from your phone album, or take a photo by phone.
● After uploading a profile, profile quality checking will automatically start. If the profile is not
qualified, you will be notified. Only when the uploaded profile is qualified can you register
successfully. Otherwise, your personal information cannot be uploaded to the platform. See
Set Self-Registration Parameters for details about setting Face Quality Verification function.
3. Set your personal information, including name, ID, email, phone number, etc.
4. Enter the verification code.
5. Tap Save.
● If Review Self-Registered Persons function is enabled, wait for the review. If you are
approved, you will be added to the platform. See Review Self-Registered Person Information
about how to review.
● If Review Self-Registered Persons function is disabled, the person information will be
109
HikCentral Access Control V2.3.0 Web Client User Manual
them all.
Reject Self- If there is something wrong or missing with the self-registered person
Registered Person information, reject the person and tell the person to register again with
Information right information.
● Select a registered person, and click to reject the person.
● Check multiple registered persons, and click Reject to reject them in a
batch.
Delete Self- ● Select a registered person, and click to delete the person from the
Registered Person Persons to be Reviewed list.
Information ● Check multiple registered persons, and click Delete to delete them all
from the Persons to be Reviewed list.
Self-Registration Click Self-Registration Settings, jumping to enter the Self-Registration
Settings Settings page to set self-registration parameters.
Note
For details, refer to Set Self-Registration Parameters .
Note
Approved persons will be added to the target department; rejected persons will not be added to
the target department, but they will stay in the Persons to be Reviewed list.
110
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● Up to 5 cards can be issued to one person.
● You cannot issue cards to persons who have temporary cards.
Note
For details about setting the card issuing mode and parameters, refer to Set Card Issuing
Parameters .
6. Issue one card to one person according to the issuing mode you select.
- If you set the issuing mode to Card Enrollment Station, place the card on the card enrollment
station. The card number will be read automatically and the card will be issued to the first
person in the list.
- If you set the issuing mode to Enrollment Station, place the card on the enrollment station.
The card number will be read automatically and the card will be issued to the first person in
the list.
- If you set the issuing mode to Enter Manually, enter the card number manually in the Card
Number field. Press Enter key on the keyboard to issue the card to the person.
Note
You can check Auto Increment Card Number and enter a start card number to issue cards
with incremental numbers to the selected persons in the list.
7. Click Start to start issuing cards.
8. Repeat step 5 to issue the cards to the persons in the list in sequence.
Note
You cannot change the card issuing mode once you issue one card to one person.
9. Click Save.
111
HikCentral Access Control V2.3.0 Web Client User Manual
112
HikCentral Access Control V2.3.0 Web Client User Manual
Figure 11-9 Card Issuing Settings Window Opened when Batch Issuing Cards to Persons
4. Select an issuing mode and set the related parameters.
Card Enrollment Station
Connect a card enrollment station to the PC on which the Web Client runs. You can place the
card on the card enrollment station to get the card No.
If you select this mode, you should set the card format and card encryption function.
Card No. Type
If the card type is Wiegand card, select Wiegand. If not, select Normal.
Reading Frequency
113
HikCentral Access Control V2.3.0 Web Client User Manual
If your card supports dual frequency (both IC and ID), select Dual. If not, select Single.
Note
If you select Dual, you cannot set card encryption for the card.
Card Encryption
If you set Normal as the card No. type, you can enable the card encryption function and
select section(s) to be encrypted for security purpose. After enabled, you should enable
the card encryption in the access control device's configuration page to make card
encryption effective.
Audio
Turn on or turn off the audio.
Enrollment Station
You can enroll the card number remotely via the enrollment station and copy back to the
platform.
If you select this mode, you should set the required parameters below.
Access Mode
The access mode of the enrollment station. Click Network or USB from the dropdown list.
Access Protocol
The access protocol of the enrollment station. By default, the access protocol is SDK.
Device Address
The IP address of the enrollment station.
Device Port
The port number of the enrollment station.
User Name
The user name used to log in to the enrollment station.
Password
The password used to log in to the enrollment station.
Card Format
If the card is Wiegand card, select Wiegand. If not, select Normal.
RF Card Type
Select the needed card type(s), including EM card, M1 card, etc.
Note
When selecting M1 Card, you can switch on Card Encryption and select section(s) if
needed.
Card Reader
114
HikCentral Access Control V2.3.0 Web Client User Manual
Select one card reader of one access control device added to the platform. You can swipe the
card on the card reader to get the card number.
Note
● One card reader can be selected for issuing cards by only one user at the same time.
● If you set a third-party card reader to read the card number, you should set the custom
Wiegand protocol for the device to configure the communication rule first.
Enter Manually
Note
This parameter is not available on the card issuing settings window opened when managing
credentials and filtering persons in the person list.
If you select this mode, you need to manually enter the card number. You can check Auto
Increment Card Number to enter a start card number to issue cards with incremental
numbers to the selected persons in the list
5. Click Save (for Credential Management) or Start (for Batch Issue Cards to Persons).
Steps
1. On the top, select Person.
2. Select Person Management → Person on the left.
3. Optional: Set conditions to search for the target persons.
4. Select the persons for whom you need to print cards.
5. Click to open the Print Card window.
115
HikCentral Access Control V2.3.0 Web Client User Manual
116
HikCentral Access Control V2.3.0 Web Client User Manual
Note
You need to delete all the temporary cards before you can cancel the card loss report.
The card's access level will be active and the original biometric credentials will be linked to this
card again.
9. Optional: Select the persons in the person list, move the cursor onto on the top, and then
click Report Loss on the top to batch report loss of multiple cards.
117
HikCentral Access Control V2.3.0 Web Client User Manual
9. Set the expiry date to define the time when the temporary card becomes invalid.
Note
The expiry date of the temporary card should be within the effective period of the person (card
owner). In other words, the expiry date cannot be later than the effective period. For details
about setting or editing the person's effective period, see Add a Single Person .
10. Click Save.
Note
You can delete the temporary card for the person. Once the temporary card is deleted, the
inactive cards of the person will restore to the active status, and their previously linked person
information will also restore.
11. Perform the following operation(s) if needed.
Edit the Temporary Card Move the cursor onto the temporary card, and then click
to edit the temporary card.
Delete the Temporary Move the cursor onto the temporary card, and then click .
Card
118
HikCentral Access Control V2.3.0 Web Client User Manual
Steps
1. Select Person Management → Resigned on the left.
2. Click Add to open the Add Resigned Person pane.
3. Click to select one or multiple persons from the departments.
Note
● You can enter specific person name, department, or person ID click Search to filter the person
information.
● You can check Include Sub Department for displaying the person in sub departments.
● You can check Select All Persons to select all matched persons.
Note
You can click Add Departure Type, enter the departure type and click Add to customize the
type. For details, see Manage Resignation Types .
5. Optional: Specify the departure reason.
6. Click OK.
Note
You can also adjust the person's status as resigned in Person Management module. See details in
Add a Single Person and Batch Add Persons by Template .
For persons to be resigned, their permissions of access, and credentials such as the card,
fingerprint, face picture, iris data will be deleted at the day of resignation.
7. Perform the following operations.
Operation Description
Edit Resigned Select a person and click in the Operation column to edit the
Person resignation information.
Filter Resigned Click to expand the conditions, set the filter conditions and click
Person Filter for filtering the resigned persons.
Export Resigned Click Export to export the resigned person information in the current
Person page according to the filter conditions.
Delete Resigned Select one or multiple persons and click Delete to delete them.
Person
Set Column Width Click to select Complete Display of Each Column Title/Incomplete
Display of Each Column Title to set the column title width.
119
HikCentral Access Control V2.3.0 Web Client User Manual
Custom Column Click and select the needed column items to display. You can also
Item click Reset to reset to the default column items.
● After the reinstatement, the resigned persons need to upload their credentials, such as face
picture, fingerprint, and iris data. Their access levels will be accordance to that of their
departments.
type.
●
Click in the Operation column to edit the added departure type.
● Click or Delete to delete the selected departure type(s).
Note
● The default types (dismiss, departure, redeployment, and suspension with pay) cannot be
deleted or edited.
● Up to 100 departure types can be added.
120
HikCentral Access Control V2.3.0 Web Client User Manual
121
HikCentral Access Control V2.3.0 Web Client User Manual
122
HikCentral Access Control V2.3.0 Web Client User Manual
Procedure Description
Add Departments and Persons Add person information and set person's credentials (such as
PIN, card, and fingerprint). For details, refer to Person
Management .
Set Access Schedules The access schedule defines when the person can access the
access point with credentials. For details, refer to Set Access
Schedule Template .
Add Access Levels An access level is a group of doors. After assigning access level,
the assigned objects can get access to these doors during the
authorized time period. For details, refer to Manage Access
Level .
Assign Access Levels to Persons You need to assign access levels to persons, so that the
assignees can access the access points in the access levels. You
can assign an access level to multiple persons or assign multiple
access levels to a person or a department. For details, refer to
Manually Assign Access Level .
Control Door Status You can manually change the door status to locked, unlocked,
remaining locked, or remaining unlocked. Refer to Door Control
for details.
Advanced Functions Refer to Configure Free Access and Access Forbidden Rules ,
Configure First Person In , Configure Multi-Factor
Authentication Rule , Configure Multi-Door Interlocking ,
Configure Area Anti-Passback Rules , Add a Batch Locking and
Unlocking Group , Add a Final Authentication Counting Group ,
Configure Authentication Mode , Apply Advertisement to
Access Control Devices , and Add Audio Broadcast for details.
Data and Record Search Refer to Search for Person Authentication Records and Search
for Device Logs for details.
123
HikCentral Access Control V2.3.0 Web Client User Manual
1 On the top, you can click the cards to display all persons, persons with
invalid access levels, persons with valid access levels, or persons not
assigned with access levels if needed.
2 Filter persons by different conditions such as person name, ID, access
level.
3 For persons whose access levels failed to be applied, persons with
invalid access levels, or persons not assigned with access levels, you
can apply access levels for them. You can select access points before
applying.
4 If a person's access level failed to be applied, "Invalid" will show in the
Access Level Status column. You can click to view the details.
5 Click to edit a persons access levels. You can add or delete access
levels.
6 Click a person name to view the person information.
124
HikCentral Access Control V2.3.0 Web Client User Manual
Note
All default and custom access schedules are shown in the Access Schedule drop-down list. You
can click New Access Schedule Template to customize a schedule. Or you can predefine access
schedule templates. For details, refer to .
8. Click Add to add the access level and return to the access level management page.
125
HikCentral Access Control V2.3.0 Web Client User Manual
126
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● If the access level is not created before, a new access level will be automatically created and
displayed on the page of access level overview in the Access Control module.
● If you click New Access Schedule Template when selecting the access schedule, the created
access schedule template will be displayed on the Access Schedule Template page.
● Make sure you have added persons to the system. For details, refer to .
127
HikCentral Access Control V2.3.0 Web Client User Manual
Note
For the first time assignment, click Add at the center of the page to enter the assignment page.
3. Click on the access level that you want to assign to persons.
4. On the assignee pane, click Assign To to show person list.
5. Select the persons whom you want to assign the access level to and click Add.
Note
If you check Select All, all persons who matched the search conditions you set will be selected.
The access level settings will be applied to devices automatically.
Assign by Person
You can assign access levels to persons, so that the assignees can have the access to the access
points in the access levels.
Before You Start
● Make sure you have added persons to the system. For details, refer to Person Management .
● Make sure you have added access levels to the system. For details, refer to Add Access Level .
Follow the steps to assign one or more access levels to specific persons.
Steps
1. Select Assign Access Level on the left.
2. Click Assign by Person on the top.
3. Check persons in the list, and click Assign Access Level to open the Assign Access Level pane.
4. Optional: In the Assign Access Level pane, click to add persons.
5. In the Access Level list, check the access levels that you want to assign to the selected persons.
6. Click Assign.
The access level settings will be applied to devices automatically.
What to do next
Test your access control configurations and devices before putting them into use. For details, refer
to Access Control Test .
Assign by Department
You can assign access levels to departments, so that the persons in the department can have the
access to the access points in the access levels.
Before You Start
● Make sure you have added persons to the system. For details, refer to Person Management .
● Make sure you have added access levels to the system. For details, refer to Add Access Level .
Follow the steps to assign one or more access levels to specific departments.
128
HikCentral Access Control V2.3.0 Web Client User Manual
Steps
1. Select Assign Access Level on the left.
2. Optional: For the first time assignment, click Assign Now in the center of the page to open the
Batch Assign Access Level to Departments page, and then see the second choice in 3 .
3. Do one of the following to assign access levels to departments.
- Assign access levels to each department one by one.
a. In the department list, click a department.
b. Click Assign Access Level on the top.
c. In the Assign Access Level pane, select the access levels you want to assign to the selected
department.
d. Click Assign.
- Assign access levels to multiple departments at a time.
a. Click Batch Assign on the upper left.
b. In the department list, select the departments where you want to assign access levels.
Note
Sub-departments are excluded from selection by default. To include all sub-departments of
each department, check Select Sub-Departments.
c. In access level list, select the access levels you want to assign to the departments.
d. Click Save.
The access level settings will be applied to devices automatically.
What to do next
Test your access control configurations and devices before putting them into use. For details, refer
to Access Control Test .
● Make sure you have added access levels to the platform. For details, refer to Add Access Level .
Steps
1. Select Assign Access Level on the left.
129
HikCentral Access Control V2.3.0 Web Client User Manual
Note
For the first time assignment, click Assign Access Level at the center of the page to enter the
assignment page.
3. Optional: Add access groups.
1) Click at the top of the access group list to open the Manage Access Group pane, and then
click Add to enter the Add Access Group page.
Note
If no access group is added to the access group list, click Add Access Group in the access
group list to enter the Add Access Group page.
2) In the Group Name field, enter the name of the access group.
3) In the Group Member area, click Add to open the person list, select the person(s) to be added
to the access group.
Note
If you check Select All, all persons who matched the search conditions you set will be
selected.
4) Click Add to add the selected person(s) to the access group.
5) Click Add at the bottom.
4. Check access group(s) to assign access levels to.
5. Click Assign Access Level on the top.
6. In the Assign Access Level page, select the access level(s) to be assigned to.
7. Click Assign.
The access level settings will be applied to devices automatically.
What to do next
Test your access control configurations and devices before putting them into use. For details, refer
to Access Control Test .
130
HikCentral Access Control V2.3.0 Web Client User Manual
- Apply at Fixed Time: Apply the changed access level settings and the settings that failed to be
applied last time to devices at a specific time (System Management Server time) on a daily
basis. You can select a time in the Auto-Apply At drop-down list.
- Apply Every Certain Hours: Apply the changed access level settings and the settings that
failed to be applied last time to devices immediately and every certain hours afterward. You
can select an interval in the Time Interval drop-down list.
4. Click Save.
cursor on , and select Unassign All Access levels or Unassign Specified Access Levels.
Note
For the latter one, if you selected multiple persons, only the common access levels shared by the
selected persons can be unassigned.
● On the Assign by Department / Assign by Access Group page, check access level(s) and click
Unassign, or hover the cursor on and select Unassign All.
Note
● Once cleared, the previous access level settings of the persons cannot be restored. You need to
re-assign access levels for them again when needed.
● After the access level settings of the selected persons are cleared , these persons will be
removed from the related access groups.
● After the access levels are unassigned, the changes will be automatically applied to devices, and
the access level settings of the persons will be deleted from the devices.
131
HikCentral Access Control V2.3.0 Web Client User Manual
Steps
1. On the top, select Access Control → Basic Configuration .
2. Click Access Schedule Template on the left.
3. Click to create a blank template.
4. Configure the template in the template information panel on the right.
Name
Create a name for the template.
Copy from
Optionally, you can select to copy the settings from existing templates.
5. In the Weekly Schedule Template box, set a schedule pattern for each day.
1) Click Authorize and select or draw in the box to define the authorized time periods. After
drawing, you can enter a time or adjust the time by clicking the arrows in the box popped up.
2) Optional: Click Erase and select or draw on the authorized time periods to clear the selection.
Note
You can set up to 8 separate time periods for each day.
6. Optional: Set a holiday schedule if you want different schedules for specific days.
Note
Holiday schedule has a higher priority than weekly schedule.
1) Click Add Holiday.
2) Select existing holiday templates, or click Add New to create a new holiday template (see Set
Holiday for details).
3) Click Add.
4) Set a schedule pattern for holidays.
7. Click Add to save the template.
8. Optional: Perform further operations on added templates.
View and Edit Template Details Click a template item to view and edit its configurations.
Delete Template Click a template item and click to delete it.
What to do next
Set access schedule for access level to define in which time period persons are authorized to
access the access points in the access level. For details, refer to Add Access Level .
132
HikCentral Access Control V2.3.0 Web Client User Manual
except for maintenance and high-level admins. This function can also block out teachers,
custodians, students, etc.
Note
Only the users with Administrator or Operator role can control all access points in a batch.
● Make sure you have grouped doors that need to be batch locked or unlocked.
● Only the users with Administrator or Operator role can control all doors in a batch.
133
HikCentral Access Control V2.3.0 Web Client User Manual
Note
Make sure you have groups doors into a batch locking and unlocking group. See details in Add a
Batch Locking and Unlocking Group .
134
HikCentral Access Control V2.3.0 Web Client User Manual
Note
For details about setting the door's open duration, see Edit Door .
Lock
When the door is unlocked, if you lock the door, it will be closed and locked. The person who
has the access permission can access the door with credentials.
Select a door and click Lock to lock a door or click Select all to lock all doors.
Click Lock → Lock Doors in Batch Locking and Unlocking Group to lock doors in the batch
locking and unlocking group you have added.
Remain Unlocked
Doors will be unlocked. All persons can access the door with no credentials required. This
function is used when an emergency happens and all people are required to leave as quickly as
possible, such as in a fire escape.
Select a door and click Remain Unlocked and the door will remain unlocked. Click Select all and
all the doors will remain unlocked.
Click Remain Unlocked → Remain Doors Unlocked in Batch Locking and Unlocking Group
and the doors in the batch locking and unlocking group you have added will remain unlocked.
Remain Locked
Door will be closed and locked. No person, except for the users with super access permission,
can access the door even with authorized credentials. This function is applicable for situations
such as preventing unwanted persons in the building from getting away.
Select a door and click Remain Locked and the door will remain locked. Click Select all and all
the doors will remain locked.
Click Remain Locked → Remain Doors Locked in Batch Locking and Unlocking Group and the
doors in the batch locking and unlocking group you have added will remain locked.
135
HikCentral Access Control V2.3.0 Web Client User Manual
136
HikCentral Access Control V2.3.0 Web Client User Manual
c. (Optional) Switch on Specified Time Range and set the start time and end time to import
records generated in the specified time period.
Note
- If the device has uploaded records to the system before, switching on Specified Time
Range is not required and records during the past 7 days of the selected device(s) will be
imported by default if no time range is specified.
- If the device has never uploaded any record to the system before, you must switch on
Specified Time Range for importing records from the selected device(s).
d. Click OK to start importing.
A window will pop up to display the importing progress and the failure details.
Note
You can also click on the top navigation bar, and select Import Access Control Event From
Device to import events quickly to the platform.
- Import from the file which is exported from the device.
a. Click Import Event → Import from File to enter the Import from File page.
b. Click to select the file to be imported.
Note
Only the encrypted file can be imported.
c. Enter the password in the Password field.
d. Click OK.
2. In the Time drop-down list, select the time during which the records are generated.
3. Select a site from the Site drop-down list.
4. Optional: In the Access Point area, click , select the area on the left list, and select door(s) or
select all on the right list.
5. Optional: In the Event Type area, click to select the event type(s).
6. In the Authentication Result drop-down list, select an access result type to quickly filter access
granted records or access denied records.
7. Set the searching mode.
- a. Select Person as the searching mode.
b. Select Select Person or Fuzzy Matching as the searching mode.
Select Person
Click to select the person(s)
Fuzzy Matching
Enter a keyword to search for persons whose name contains the keyword.
c. Click Add to select the person(s), or enter the keywords of the person's name for fuzzy
matching.
- a. Select Card No. as the search mode.
b. Enter the card number.
137
HikCentral Access Control V2.3.0 Web Client User Manual
138
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● The password is required for security.
● You can view the downloading progress in the Download Center when exporting the data.
Note
● The password is required for security.
● You can view the downloading progress in the Download Center when exporting the data.
139
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● The password is required for security.
● Up to 100,000 records can be exported each time.
● You can view the downloading progress in the Download Center when exporting the data.
140
HikCentral Access Control V2.3.0 Web Client User Manual
Note
This function should be supported by the device.
1. On the top, select Access Control → Access Control Application → Free Access & Access
Forbidden .
2. Click Add to enter the Add Free Access and Access Forbidden Rule page.
3. Enter the rule name.
4. Select an access point from the following area list.
5. Select free access schedule or access forbidden schedule.
Figure 12-7 Add Free Access and Access Forbidden Rule Page
141
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● You can click Add to add a custom access schedule or holiday schedule. See Set Access
Note
This function should be supported by the device.
1. Select Access Control Application → First Person In on the left.
2. Click Add to enter the Add First Person In Rules page.
Note
For the first time configuration, click Configure Now in the center of the page to enter the Add
First Person In Rule page.
3. Enter the rule name.
4. Select a door from the resource list.
5. Set Rule of Opening Door.
6. Set the consecutive authentication times and the interval of consecutive authentication.
7. Optional: Enable First Person Authentication Time to set a time when the rule takes effect and a
fixed time period requiring first person authentication.
8. In the First Person area, click Add to select first person(s).
142
HikCentral Access Control V2.3.0 Web Client User Manual
Note
If you check Select All, all persons who matched the search conditions you set will be selected.
9. Click Add to add the rule.
Note
This function should be supported by the device.
1. On the top, select Access Control → Access Control Application → Multi-Factor
Authentication .
2. Click Add.
3. Enter the rule name.
4. Select a door from the following area list.
5. Set the access mode of the door.
Unlock After Access Granted
The door will be unlocked automatically after the persons swiping their cards (or other type
of credentials) on the card readers of the door and the access is granted.
Remotely Unlock After Granted
After the persons swiping their cards (or other type of credentials) on the card readers of the
door and the access is granted, a window will pop up. The operator should confirm to unlock
the door remotely and then the door will be unlocked successfully.
Enter Super Password After Granted
143
HikCentral Access Control V2.3.0 Web Client User Manual
After the persons swiping their cards (or other type of credentials) on the card readers of the
door and the access is granted, they should enter the super password on the card reader.
After that, the door will be unlocked successfully.
6. Set the access schedule to define in which time period, the persons are authorized to access the
door.
Note
The default and customized access schedules are displayed in the drop-down list. You can click
Add to customize a new schedule. For details, refer to Set Access Schedule Template .
144
HikCentral Access Control V2.3.0 Web Client User Manual
Note
When adding groups, if you check Select All Persons, all persons who matched the search
conditions you set will be selected.
Card Swiping Order
Click ↑ or ↓ in the Operation column to set the authentication order of different access
groups.
Number of Persons for Authentications
Define how many persons should authenticate on the card reader.
For example, if you set 3 for access group Security Guard and 1 for access group Bank
Manager, it means three security guards should swipe cards on the card reader (or other
access mode), and one bank manager should swipe card on the card reader (or other access
mode) for this multi-factor authentication.
Note
This value should be no larger than the number of persons in the access group.
9. Click Add.
Note
When adding groups, if you check Select All Persons, all persons who matched the search
conditions you set will be selected.
7. Click Add.
145
HikCentral Access Control V2.3.0 Web Client User Manual
Steps
1. On the top, select Access Control → Access Control Application → Multi-Factor
Authentication .
2. Click User to Receive Remote Door Open Request on the top.
3. Click Add to open the User to Receive Remote Door Open Request pane.
4. Select users from the list.
Note
If you check All, all persons will be selected.
5. Click Add.
146
HikCentral Access Control V2.3.0 Web Client User Manual
147
HikCentral Access Control V2.3.0 Web Client User Manual
card reader and the subsequent ones. It will authenticate the anti-passback according to the
entrance and exit information stored in the card reader.
Steps
1. On the top, select Access Control → Access Control Application → Anti-Passback → Route Anti-
Passback .
2. Click Add to enter the Add Route Anti-Passback page.
3. Create a name for the route anti-passback rule in the Name field.
4. Set the card reader order in the Card Reader Order area.
1) Click Add, select a card reader in the list, and click Add to add a card reader.
2) Hover the cursor on the added card reader and click to add another card reader.
Note
You can repeat this step to add card readers according to a specific sequence as needed.
3) Optional: Click the card reader and click Change Card Reader to select another card reader to
replace it.
4) Optional: Click the card reader and click Delete to delete the card reader and its subsequent
card reader(s).
5. Optional: Switch on First Card Reader and select a card reader from the drop-down list to set it
as the first card reader.
Note
If you violate the route anti-passback rule, you should swipe the card again from the first card
reader.
6. Optional: Switch on Forgive Anti-Passback to set a fixed time so that the platform can forgive
the anti-passback violations automatically everyday.
Anti-Passback Violation
When a person attempts to use a card out of the route anti-passback rule's sequence, the
access will be denied. This is called "Anti-Passback Violation". When an anti-passback violation
occurs, no entry is allowed unless the anti-passback violation event is forgiven.
7. Optional: Switch on Non Anti-Passback Period to set a fixed time during which persons can
access the area without following the rule.
8. Click Add.
9. Optional: Perform the following operations after adding the route anti-passback rule.
View Card Click in the Operation column to view the card reader order of the rule.
Reader Order
Edit Anti- Click the rule name to edit the anti-passback rule settings.
Passback Rule You can edit the name of the rule, add, change, or delete card readers in
the order, change the first card reader, or change the settings of forgiving
anti-passback violation regularly.
Set/Cancel When a person attempts to use a card out of the route anti-passback rule's
Forgiving Anti- sequence, the access will be denied. This is called "Anti-Passback
148
HikCentral Access Control V2.3.0 Web Client User Manual
Note
For the first time configuration, click Configure Now in the center of the page to enter the Add
First Person In Rule page.
3. Create a name for the group.
4. In the Access Point area, select the access points and click to add them to the group.
5. Click Save.
149
HikCentral Access Control V2.3.0 Web Client User Manual
Steps
1. On the left, select Final Authentication Counting Group.
2. Click Add.
3. Create a name for the group.
4. Click Add and select doors from the area list.
5. Set the entering or exiting direction of the card readers of the selected access points.
6. Click Save.
Note
This function should be supported by the device.
1. On the top, select Access Control → Access Control Application → Authentication Mode .
2. Select the Card Reader Authentication Mode tab.
3. Select an area from the area list.
4. Click a door name on the right.
5. Select the Card Reader Authentication Mode Settings.
Batch
Set the same reader authentication mode for all the readers of a door.
Single
If you want to set different reader authentication modes for different readers, select this
mode.
6. Select the Card Reader Authentication Mode.
150
HikCentral Access Control V2.3.0 Web Client User Manual
Note
The person's private authentication mode has higher priority than the existing authentication
mode of the device.
1. On the top, select Access Control → Access Control Application → Authentication Mode .
2. Select the Private Authentication Mode tab.
3. Select a department from the left list.
All persons in the department will be listed on the right panel.
4. Click in the Operation column to open the Authentication Device pane.
5. Click Add, check the device(s) from the list, and select the authentication mode from the drop-
down list for the selected device(s).
6. Click OK to add the device(s) for authentication for the person.
7. Optional: Perform one of the following operations to edit the authentication mode(s) for the
device(s).
- Select an authentication mode from the Authentication Mode drop-down list to configure the
authentication mode for each device.
- Click Batch Configuration, select an authentication mode from the drop-down list, and click
Save to configure the same authentication mode for all added devices.
8. Optional: In the Private Authentication Mode page, click in the Operation column, select the
person(s), and click OK to copy the person's private authentication mode settings to another
person or other persons.
151
HikCentral Access Control V2.3.0 Web Client User Manual
Result
The number of devices added for each person is displayed in the Device for Authentication column.
You can click beside the number to view names and authentication modes of all devices.
Note
● The material type (picture, video, or text) should be supported by devices.
● You can check two types of advertisement materials at the same. For example, you can check
both picture and video at the same time, excluding text.
● You can up to 8 videos and pictures, or 3 texts at one time.
- a.
Click Picture → to add picture(s) for an advertisement.
b. Set the duration for pictures switching interval.
c. Set the time period to play the added picture(s).
Note
Up to 2 time periods are allowed. You can click Add to add the time period if needed.
- a.
Click Video → to add a video for an advertisement.
b. Set the duration for videos switching interval.
c. Set the time period to play the added video.
a.
Click Text → to add a text for an advertisement.
b. Set the advertisement texts, including uploading the background picture, setting the text
title/font size/color, and selecting the layout style.
c. Set the time period to play the added texts.
152
HikCentral Access Control V2.3.0 Web Client User Manual
153
HikCentral Access Control V2.3.0 Web Client User Manual
Note
For the two types of authentication result, 4 time periods in total can be added.
1) Optional: Enable Broadcast Address to select the broadcast address type.
2) Set the broadcast time and content.
● Click Add to add new broadcast time and content.
● Click to create a copy and set the time and content based on the existing one.
5. In the Particular Broadcast area, click Add to add particular broadcasts.
Note
For the two types of authentication result, 4 time periods in total can be added.
1) Select the particular day type.
2) Select the holidays(s) or select the specified day(s).
Note
● On the days without particular broadcasts, daily broadcasts will be played. If the specified
days overlap the holidays, the broadcasts for specified days will be played.
● Click Add to add new holidays. For details, refer to Set Holiday .
● Click to create a copy and set the time and content based on the existing one.
5) Click Save.
6. Click Add.
The settings will be applied to the selected device(s).
7. Optional: After applying, perform the following operations as needed.
View Device Details Click the device name to view the broadcast details of the device. You
can also edit the broadcast settings to apply for another time.
View Broadcast Click to view broadcast details.
Details
Copy Broadcast In the operation column, click to select the device(s) to copy to.
Settings to Other Click Copy and the settings will be applied to the selected device(s).
Devices
Apply Failed ● At the top of the broadcast list page, click Details to view failure
Broadcast to Device details or click Apply Again.
● In the Operation column, click to apply again.
154
HikCentral Access Control V2.3.0 Web Client User Manual
Delete Broadcast of Check the device(s) and click Delete to delete the broadcast(s) of the
Device selected device(s). You can also click → Delete All to delete the
broadcasts of all devices.
155
HikCentral Access Control V2.3.0 Web Client User Manual
156
HikCentral Access Control V2.3.0 Web Client User Manual
Note
Only the status of the devices which have been configured with access levels are shown.
157
HikCentral Access Control V2.3.0 Web Client User Manual
Restore Default Restore the settings on the devices to the default value.
Settings
Apply Apply person information and credential settings to these devices again.
Refresh Refresh the list to get the latest device status.
158
HikCentral Access Control V2.3.0 Web Client User Manual
Note
When selecting persons, if you check Select All Persons, all persons will be selected.
159
HikCentral Access Control V2.3.0 Web Client User Manual
Note
The access points which are not added to any access levels will not be checked.
Note
If you switch off an event type, the Web Client and Mobile Client will no longer receive real-time
event records of the event. However, you can still search for the device/access records via the
160
HikCentral Access Control V2.3.0 Web Client User Manual
Web Client. For details, see Search for Person Authentication Records and Search for Device
Logs .
5. Click Save to save the settings.
What to do next
View the real-time event records of the device and access events that you subscribe to. For details,
see View Real-Time Access Event .
161
HikCentral Access Control V2.3.0 Web Client User Manual
In the Offline Unlocking area, select the validity of offline unlocking. When the time of phone
remaining offline exceeded the configured validity period, persons cannot unlock door by
bluetooth.
162
HikCentral Access Control V2.3.0 Web Client User Manual
163
HikCentral Access Control V2.3.0 Web Client User Manual
Note
You can click to on the right to browse through all steps.
164
HikCentral Access Control V2.3.0 Web Client User Manual
165
HikCentral Access Control V2.3.0 Web Client User Manual
● Manage Attendance Application: Manage applications for employees and admins. For more
details, refer to Application Management for Employee and Application Management for
Admin .
● Attendance Record, Attendance Handling: Search and correct attendance records, apply for
leave, get devices' attendance records, manually calculate attendance results, etc. For more
details, refer to View Attendance Records .
● Attendance Report: Export attendance report to local PC or send it via email regularly. For more
details, refer to Manage Attendance Reports .
166
HikCentral Access Control V2.3.0 Web Client User Manual
Note
You can click on the top left to filter persons by additional information.
5. Perform the following operations.
Edit an Attendance Click and then edit the group name or click to add persons
Group to the group.
Add Persons to an Click an added group to show persons on the right. Then click
Attendance Group Assign To to add persons to the group.
Remove Persons from Click an added group to show persons on the right. Then check
an Attendance Group persons and click Unassign to remove the selected persons from
the group. Or click → Unassign All to remove all persons from
the group.
167
HikCentral Access Control V2.3.0 Web Client User Manual
168
HikCentral Access Control V2.3.0 Web Client User Manual
4. Optional: Check Get Historical Data Stored in Devices to synchronize the historical data
generated by attendance check points to existing data. This will cause a recalculation of
attendance results.
5. Click Specify to start customizing attendance check points.
6. Click Add.
7. Select the type of the attendance check point.
Check-In & Out
The attendance records of check-in or check-out on the attendance check point are both
valid.
Check-In Only
The attendance records of swiping card or face recognition on the attendance check point will
be only calculated as check-in. Persons cannot check out on this check point.
Check-Out Only
The attendance records of swiping card or face recognition on the attendance check point will
be only calculated as check-out. Persons cannot check in on this check point.
8. Select the resource type (e.g., door) from the drop-down list.
169
HikCentral Access Control V2.3.0 Web Client User Manual
170
HikCentral Access Control V2.3.0 Web Client User Manual
Note
If the attendance check point is deleted, the attendance records on this
attendance check point will be deleted as well, and it will affect the
persons' attendance results for the days on which the attendance data
haven't been calculated.
Note
Not available when in Manual mode, because manual selection of attendance status is always
required.
Custom Name of Working
Customize the status name for check-in and check-out.
Custom Break Name
Customize the status name for the start and end of a break.
171
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● Not available when in Manual mode. Because manual selection of attendance status is
5. Click Save to save the settings and apply the settings to the attendance check points you added.
Note
● You can view the applying result on the Apply Custom Status window.
● See details about adding attendance check points in Specify Attendance Check Points .
● You can switch on Enable T&A Status on Device when configuring break timetables,
timetables, or shifts to record the T&A status on devices, which will be used in attendance
results calculation.
172
HikCentral Access Control V2.3.0 Web Client User Manual
173
HikCentral Access Control V2.3.0 Web Client User Manual
Set Column Width Click to select Complete Display of Each Column Title/
Incomplete Display of Each Column Title to set the column title
width.
Custom Column Click and select the needed column items to display. You can
Item also click Reset to reset to the default column items.
174
HikCentral Access Control V2.3.0 Web Client User Manual
Round the number of pay code up, e.g., to make 0.5 go up, so 6.5 rounds up to 7.
Round to Nearest
Round decimal numbers to nearest integers either by rounding up or rounding down based
on the tenths places, e.g., 6.5 rounds to 7 and 6.4 rounds to 6.
Round Down
Round the number of pay code down, e.g., to make 0.5 go down, so 6.5 rounds down to 6.
Display Format
Time format of the fixed code, including HH:MM, DD, HH, and MM.
Min. Value
The minimum value of the fixed code. Select from 1 and 0.5.
Color
Used for making differences among fixed codes.
175
HikCentral Access Control V2.3.0 Web Client User Manual
176
HikCentral Access Control V2.3.0 Web Client User Manual
177
HikCentral Access Control V2.3.0 Web Client User Manual
178
HikCentral Access Control V2.3.0 Web Client User Manual
179
HikCentral Access Control V2.3.0 Web Client User Manual
180
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● If a break timetable in the timetable is not enabled with T&A Status on Device, it will be
enabled if you enable this function for the timetable.
If a break timetable in the timetable is already enabled with T&A Status on Device, this setting
will not change even if you disable the function for the timetable.
● To configure the rule of T&A status on device, see Customize Attendance Status on Device for
details.
181
HikCentral Access Control V2.3.0 Web Client User Manual
182
HikCentral Access Control V2.3.0 Web Client User Manual
Note
You can set overtime rules to count the extra hours before scheduled start work time as
overtime. See details in Configure Overtime Parameters .
● Late, if the employee checks in between 9:01 and 9:59.
● Absent, if the employee checks in after 10:00 or does not check in.
Switch on Absent If Check-In Late and set a tolerant threshold in Late for. When the employee's
check-in time minus scheduled start work time is longer than the Late for value, the employee's
attendance status on that day will be marked as Absent.
Set Absence Rule for Check-Out
Switch on Check-Out Required. Once this function is disabled, employees will not be required to
check out.
In No Check-Out, Mark as, specify an attendance status when a person does not check out or fails
to check out within the valid check-out period. If you select Early Leave, you need to set a fixed
late duration.
For example, if the scheduled end work time is 18:00 and valid check-out period is 17:00-21:00
(defined in Timetable - Attendance), and Early for is set to 60 minutes, the attendance status of an
employee will be:
● Absent, if the employee checks out before 17:00 or does not check out.
● Early Leave, if the employee checks out between 17:01 and 17:59.
Note
You can set overtime rules to count the extra hours after scheduled end work time as overtime.
See details in Configure Overtime Parameters .
Switch on Absent If Check-Out Early and set a tolerant threshold in Early for. When the scheduled
end work time minus employee's check-out time is longer than the Early for value, the employee's
attendance status on that day will be marked as Absent.
183
HikCentral Access Control V2.3.0 Web Client User Manual
Note
For details of adding a holiday, see Add a Holiday .
5. In Holidays Requiring Attendance area, select a holiday that requires attendance. You can click
Add to add a holiday.
Add a Holiday
You can add the holiday to define the special days that can adopt a different schedule or access
schedule. You can set a regular holiday or an irregular holiday according to the actual scene.
Steps
1. On the top, select Attendance.
2. Select Basic Configuration → Holiday Settings on the left. You can also access the Holiday
Settings page in System on the top.
3. Click Add to add a holiday.
Regular Holiday
The regular holiday is suitable for the holiday that has a fixed date. For example, Christmas is
on December 25th of every year.
You can set the Start Time and the number of daysfor the holiday, and choose whether to
Repeat Annually in the system.
Irregular Holiday
The irregular holiday is suitable for the holiday that is calculated by the day in a specific week,
and the specified date might be different every year. For example, Mother's Day is on the
second Sunday of each May.
For the Start Time, you can set the start day of the holiday. For example, select May, Second,
and Sunday for Mother's Day. Then, you can set the number of days for the holiday, and
choose whether to Repeat Annually in the system.
Note
For department rules and attendance group rules, you need to click Add on the Department Rule
or Group Rule page, and then check departments or attendance groups.
Select the Attendance Calculation tab. In the Leave Settings area, you can choose to mark leave as
Normal, Leave, or Absent. The leave status will be displayed in the attendance results.
184
HikCentral Access Control V2.3.0 Web Client User Manual
work hours;
● Overtime duration is 61 if a person works for 61 minutes longer than the required
work hours.
By Time Points
Overtime duration is calculated according to the extra work hours earlier than the start-
work time or later than end-work time in one day.
You can enable Count Early Check-In as OT and Count Late Check-Out as OT to set the
overtime duration calculation mode respectively.
185
HikCentral Access Control V2.3.0 Web Client User Manual
186
HikCentral Access Control V2.3.0 Web Client User Manual
187
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● To add a new holiday, click Add Holiday.
7. Optional: Switch on Calculate Overtime in the Overtime Not in Valid Attendance Check Period
area to count the extra work time outside the valid check-in/out period as valid overtime. And
then select an overtime level from the drop-down list.
8. For global rules, click Save; for department rules, click Add on the top right.
188
HikCentral Access Control V2.3.0 Web Client User Manual
Note
For department rules and attendance group rules, you need to click Add on the Department Rule
or Group Rule page, and then check departments or attendance groups.
Switch on Customize Authentication Mode, and select card, fingerprint, iris, or/and face as the
authentication mode.
Note
This function requires device capability.
189
HikCentral Access Control V2.3.0 Web Client User Manual
190
HikCentral Access Control V2.3.0 Web Client User Manual
Calculated by
First In & Last Out: Only count and calculate the duration of the first and last check-in/out
records during the start/end time of the break.
Each Check-In/Out: Count each check-in/out record during the start/end time of the break
and calculate the total duration. You need to set a minimum interval in Min. Interval to
filter out repeated check-in/outs.
Enable T&A Status on Device
Check to record the T&A status on the attendance check devices.
Uncheck to discard the T&A status on the devices and only record the person information
and check-in/out time.
Note
To configure the rule of T&A status on device, see Customize Attendance Status on Device
for details.
5. Click Add to finish adding the timetable, or click Add and Continue to finish adding the timetable
and add a new break timetable.
6. Optional: Perform further operations after adding the break timetable.
Edit Break Timetable Click on the name of a break timetable to edit it.
Delete Break Select the break timetables you want to delete and click Delete to
Timetable delete them.
What to do next
Use the break timetable to set the break time in a timetable. See Add Timetable for Normal Shift
or Add Timetable for Flexible Shift .
191
HikCentral Access Control V2.3.0 Web Client User Manual
Note
It is allowed to set the valid check-in period crossing days, therefore the time period can be
more than 24 hours. For example, you can set the start time to 08:00:00 on the previous
day, set the end time to 10:00:00 on the current day.
Valid Check-Out Period
If the employee does not check out during the valid check-out period, the check-out will
not be recorded and the attendance status will be absent or early leave depending on the
absence settings.
Note
It is allowed to set the valid check-out period crossing days, therefore the time period can
be more than 24 hours. For example, you can set the start time to 18:00:00 on the previous
day, set the end time to 19:00:00 on the current day.
Min. Work Hours
Employees' work duration in one day must be longer than minimum work hours.
Otherwise, the attendance status will be absent.
Flexible Mode
Allow Late/Early Leave
The employees are allowed to arrive late or leave early for a specific period of time. For
this mode, you need to set the allowable time for late and early leave. If an employee
checks in/out within the period after the start-work time or before the end-work time,
the attendance status will be Normal. For example, if the start-work time is set to
09:00:00, and the late allowable duration is 30 minutes, and the employee checks in at
09:15:00, the attendance status will be Normal.
Flexible Period
Flexible period allows employees to extend their start-work time and end-work time.
For this mode, you need to set the flexible duration, which defines the extended
duration for both start-work time and end-work time. If the total late and early leave
time is within the flexible duration, the attendance status will be Normal. For example,
if the scheduled work time is set to 09:00:00 to 18:00:00, and the flexible duration is 30
minutes, and the employee checks in at 09:15:00, and checks out at 18:15:00, the
attendance status will be Normal.
4. In Break Period, set the following parameters.
192
HikCentral Access Control V2.3.0 Web Client User Manual
Break Time
Click Add to select one or multiple break timetables. For adding timetables, see Add Break
Timetables .
Exclude Break Duration from Work Hours
Enable the function and set the break duration which will not be counted into work hours.
5. In Attendance Calculation, set the following parameters.
Note
The attendance calculation rule has higher priority than the department and global rules.
Set Calculation Rule
Switch on to set the calculation method of work duration.
Calculated by
First In & Last Out: Only count and calculate the duration of the first and last check-in/out
records within the valid check-in/out period.
Each Check-In/Out: Count each check-in/out record within the valid check-in/out period
and calculate the total duration. You need to set a minimum interval in Min. Interval to
filter out repeated check-in/out records.
Enable T&A Status on Device
Check to record the T&A status on the attendance check devices.
Uncheck to discard the T&A status on the devices and only record the person information
and check-in/out time.
Note
● If a break timetable in the timetable is not enabled with T&A Status on Device, it will be
enabled if you enable this function for the timetable.
If a break timetable in the timetable is already enabled with T&A Status on Device, this
setting will not change even if you disable the function for the timetable.
● To configure the rule of T&A status on device, see Customize Attendance Status on
Device for details.
Note
See details about setting a general absence rule in Define Absence . You can also refer to this
topic for explanations for the parameters in the absence rule.
6. In Overtime, switch on Count Timetable as Overtime, and set the following parameters.
193
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● The overtime timetable has higher priority than the department and global rules.
● See details about setting an overtime timetable in Configure Overtime Parameters . You can
Note
You can drag the time line to the left or right.
8. Click Add to save the timetable, or click Add and Continue to continue adding another
timetable.
What to do next
Use the timetables to define the work schedule on each day in a shift. For more details, refer to
Add Shift .
194
HikCentral Access Control V2.3.0 Web Client User Manual
If the actual check-in time is later than this time, the attendance status will be marked as
Late.
4. In Break Period, click Add to select the break timetables to define the break time in the
timetable.
Note
● You can click Add to create a new break timetable. See details in Add Break Timetables .
● Enable Exclude Break Duration from Work Hours and set the break duration which will not be
Note
The attendance calculation rule has higher priority than the department and global rules.
Calculation Rule
Calculated by
First In & Last Out: Only count and calculate the duration of the first and last check-in/out
records within the valid check-in/out period.
Each Check-In/Out: Count each check-in/out record within the valid check-in/out period
and calculate the total duration. You need to set a minimum interval in Min. Interval to
filter out repeated check-in/out records.
Enable T&A Status on Device
Check to record the T&A status on the attendance check devices.
Uncheck to discard the T&A status on the devices and only record the person information
and check-in/out time.
Note
● If a break timetable in the timetable is not enabled with T&A Status on Device, it will be
enabled if you enable this function for the timetable.
If a break timetable in the timetable is already enabled with T&A Status on Device, this
setting will not change even if you disable the function for the timetable.
● To configure the rule of T&A status on device, see Customize Attendance Status on
Device for details.
195
HikCentral Access Control V2.3.0 Web Client User Manual
Note
See details about setting a general absence rule in Define Absence . You can also refer to this
topic for explanations for the parameters in the absence rule.
6. In Overtime, switch on Count Timetable as Overtime, and set the following parameters.
Note
● The overtime timetable has higher priority than the department and global rules.
● See details about setting a overtime timetables in Configure Overtime Parameters . You can
Note
You can drag the timeline to the left or right.
8. Click Add to save the timetable, or click Add and Continue to continue adding another
timetable.
What to do next
Use the timetables to define the work schedule on each day in a shift. For more details, refer to
Add Shift .
196
HikCentral Access Control V2.3.0 Web Client User Manual
Week
The shift will repeat every 1 to 52 weeks based on your selection.
Day
The shift will repeat every 1 to 31 days based on your selection.
Month
The shift will repeat every 1 to 12 months based on your selection.
6. Select a timetable and click on the table below to apply the timetable on each day.
Note
You can use up to 8 different timetables in one shift.
7. Switch on Configure Attendance During Holidays, and select the holidays. On holidays, the shift
will not be effective.
8. Click Add to finish adding the shift.
What to do next
Assign shift to persons or departments. See details in Assign Schedule to Person or Assign
Schedule to Department .
197
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● You can check Include Sub-Department to display the persons of sub-departments.
● You can enter keywords to search for specific departments / attendance groups.
On the left, you can view the schedule information about every person in the department /
attendance group.
Click the person name to enter the detailed schedule of this person for each day in one month,
such as effective period, schedule name, and so on.
You can perform the following operations.
● Select Month/Week to view the schedule by month or week.
● Click Set Schedule to edit the schedule. For details, see Assign Schedule to Department and
related to them.
198
HikCentral Access Control V2.3.0 Web Client User Manual
Note
You can click Add to add another shift if needed. For operation details, refer to Add Shift .
4. Optional: Click to select attendance check points linked with the schedule.
199
HikCentral Access Control V2.3.0 Web Client User Manual
Note
Only authentications at the linked attendance check points will be counted.
5. Optional: Switch on Configure Check In/Out Not Required, check one of the following
parameters if needed.
Check-In Not Required
Persons in the person group(s) in this schedule do not need to check in when they arrive.
Check-Out Not Required
Persons in the person group(s) in this schedule do not need to check out when they leave.
Effective for Overtime
The overtime of the persons in the person group(s) in this schedule will be recorded.
6. Click Add to save the schedule, or click Add and Continue to continue adding another schedule.
Note
You can click Add Attendance Group to add a new one.
4. Set schedule parameters.
Effective Period
The shift is effective within the period you set.
Shift
Select a shift to be assigned.
Note
● click View to preview the schedule.
● Click Add to add another shift if needed. For operation details, refer to Add Shift .
200
HikCentral Access Control V2.3.0 Web Client User Manual
Note
Only authentications at the linked attendance check points will be counted.
6. Click Add to save the schedule, or click Add and Continue to continue adding another schedule.
201
HikCentral Access Control V2.3.0 Web Client User Manual
Note
The person schedule has the higher priority than department schedule.
1. On the top left, select Schedule → Person Schedule .
2. Click Add Schedule to enter the Add Schedule page.
3. On the Add Schedule pane, click to select person(s) you want to assign schedule to,
4. Set required parameters.
Effective Period
Within the period you set, the shift is effective.
Shift
Select a shift to be assigned, and you can click View to preview the schedule.
Note
You can click Add to add another shift if needed. For operation details, refer to Add Shift .
5. Optional: Click to select attendance check points linked with the schedule.
Note
Only authentications at the linked attendance check points will be counted.
6. Optional: Switch on Configure Check In/Out Not Required, check one of the following
parameters if needed.
Check-In Not Required
Persons in the person group(s) in this schedule do not need to check in when they arrive.
Check-Out Not Required
Persons in the person group(s) in this schedule do not need to check out when they leave.
Effective for Overtime
The overtime of the persons in the person group(s) in this schedule will be recorded.
7. Click Add to save the schedule, or click Add and Continue to continue adding another schedule.
8. Optional: Perform the following operations.
Edit Schedule Select a person in the list and click to edit the person's schedule.
Filter Schedule Click and set filter conditions such as person name, and then click Filter
to filter the target schedule.
Delete Select one or multiple schedules in the list and click Delete Schedule to
Schedule delete the schedules. Also, you can click Delete All to delete all of the
schedules.
202
HikCentral Access Control V2.3.0 Web Client User Manual
Note
The temporary schedule has the higher priority than other schedules.
1. On the top left, select Schedule → Temporary Schedule .
2. Click Add to enter Add Temporary Schedule page.
3. In Select Person area, click and select the needed persons.
4. In Select Timetable(s) area, select the needed timetable.
Note
You can also click to add timetable if needed. For details, refer to Add Timetable for Normal
Shift or Add Timetable for Flexible Shift .
5. Above the calendar, select the year and month.
6. In the calendar area, click one or multiple dates, then the selected timetable will be added to
the selected date(s).
7. Optional: In the specific date of the calendar, click and select whether to perform the
following operations.
Clear Shifts
Click to clear all schedules of the selected date.
Restore to Initial Schedule
Click to cancel the adding and restore to the initial schedule.
Specify Attendance Check Points
Click to select specific devices as the attendance check points. By default, all devices are
attendance check points.
8. Click Finish on the top right.
203
HikCentral Access Control V2.3.0 Web Client User Manual
Note
HikCentral Access Control can calculate the attendance data automatically at a fixed time point (4
o'clock by default) every day. You can edit the time point in Attendance → Attendance Calculation
→ Auto Calculation .
1. On the top, select Attendance.
2. Select Attendance Calculation on the left, and then select Manual Calculation on the right.
3. Set the start time and end time for attendance calculation.
4. Select target person(s) for attendance calculation.
- All Persons: Calculate all persons' attendance records.
- Specified Attendance Group(s): Select one or multiple attendance groups for calculation.
- Specific Person(s): Click to select one or multiple persons for calculation.
5. Click Calculate.
Note
It can only calculate the attendance data recorded within three months.
204
HikCentral Access Control V2.3.0 Web Client User Manual
position / personal applications. When configuring approval flows, you can specify application
departments, applicants, reviewers, and persons to be notified of the review results via configuring
approval roles. Applications from specified departments / attendance groups / positions / persons
need to be reviewed according to the configured approval flow.
205
HikCentral Access Control V2.3.0 Web Client User Manual
Note
If Department is selected, you can check Include Sub Department to display persons of sub-
departments.
2) Select a department or an attendance group to display the linked person(s) on the right.
3) Check the person(s) select the person(s) to assign the approval role to.
Note
You can check Select All at the top of the right, or enter keywords to search for persons, or
click to filter persons by the position or additional information. For details about
customizing additional information items, refer to Customize Additional Information .
6. Click Add to finish adding the approval role.
7. Optional: Perform the following operations as needed.
Edit Approval Select an approval role in the list and click to edit it.
Role
Delete Approval ● Select one or multiple approval roles in the list and click Delete to
Role delete the approval roles. Also, you can click Delete All to delete all
approval roles.
● Select an approval role from the list, and click to delete it.
Assign Approval Select an approval role in the list, and click Assign To on the right pane to
Role to More select persons to assign the approval role to.
Persons
Unassign Select an approval role in the list, and select the person(s) on the right
Approval Role pane, and click Unassign to unassign the approval role for the selected
person(s). Also, you can click Unassign All to unassign the approval role for
all persons.
● Make sure you have added roles of the approval flow. For details about adding roles, refer to
206
HikCentral Access Control V2.3.0 Web Client User Manual
2) Set the start time and end time of the validity time period.
3) Select the application type (leave, check in&out correction, overtime, and check in&out via
Mobile Client).
4) Optional: Switch off Enable Approval Flow to disable the approval flow.
Note
The approval flow is enabled by default.
Note
If the reviewers are from the different department, you need to select All Departments.
3) Optional: Select the approval role(s) to be notified of the review results in the current node.
4) Optional: Select the department(s) of the approval role(s) to be notified.
Note
If the person(s) to be notified are from the different department, you need to select All
Departments.
5) Click Add.
207
HikCentral Access Control V2.3.0 Web Client User Manual
Note
You can repeat this step to add more reviewers and persons to be notified for the approval flow.
5. Click Finish.
The approval flow will be added to the approval flow list.
6. Optional: Perform the following operations as needed.
Edit Approval In the approval flow list, click the name of the approval flow to edit it.
Flow ● Click Reviewer to edit the reviewer's approval role and the role to be
● Make sure you have added roles of the application flow. See Add an Approval Role .
Steps
1. On the Approval Flow page, move the cursor on Add, and click Attendance Group Approval
Flow.
2. On the left, set the basic information of the approval flow.
Content Type
Select what employees can apply for.
Note
The flow is enabled by default.
3. Click Add Attendance Group to select the attendance group(s).
4. Click to add the reviewer(s) for the application flow.
1) Select the approval role of the reviewer(s).
208
HikCentral Access Control V2.3.0 Web Client User Manual
2) Select the department range from which the applications can be reviewed by the selected
approval role(s).
Note
If the reviewers are from different departments, you need to select All Departments.
Note
If the person(s) to be notified are from different departments, you need to select All
Departments.
5) Click Add.
Note
You can repeat this step to add more reviewers and roles to be notified for the application flow.
5. Click Finish on the top right.
6. Optional: Perform the following operations as needed.
Edit Application In the application flow list, click the name of the application flow to edit
Flow it.
● Click Reviewer or Attendance Group to edit the reviewer's approval
209
HikCentral Access Control V2.3.0 Web Client User Manual
● Make sure you have added roles of the approval flow. For details about adding roles, refer to
Note
The approval flow is enabled by default.
210
HikCentral Access Control V2.3.0 Web Client User Manual
Note
If you check Select All Persons, all persons who matched the search conditions you set will be
selected.
4. Click to add the reviewer(s) for the approval flow.
1) Select the approval role of the reviewer(s).
2) Select the department(s) of the selected role(s) allowed to review applications.
Note
If the reviewers are from the different department, you need to select All Departments.
3) Optional: Select the approval role(s) to be notified of the review results in the current node.
4) Optional: Select the department(s) of the approval role(s) to be notified.
Note
If the person(s) to be notified are from the different department, you need to select All
Departments.
5) Click Add.
Note
You can repeat this step to add more reviewers and persons to be notified for the approval flow.
5. Click Finish.
The approval flow will be added to the approval flow list.
6. Optional: Perform the following operations as needed.
Edit Approval In the approval flow list, click the name of the approval flow to edit it.
Flow ● Click Reviewer to edit the reviewer's approval role and the role to be
● Make sure you have added roles of the approval flow. See Add an Approval Role .
211
HikCentral Access Control V2.3.0 Web Client User Manual
Steps
1. On the Approval Flow page, move the cursor on Add, and click Position Approval Flow.
2. On the left, set the basic information of the approval flow.
Content Type
Select what employees can apply for the approval flow.
Note
The flow is enabled by default.
3. Click Add Position to select the position(s).
4. Click to add the reviewer(s) for the approval flow.
1) Select the approval role of the reviewer(s).
2) Select the department range from which the applications can be reviewed by the selected
approval role(s).
Note
If the reviewers are from different departments, you need to select All Departments.
Note
If the person(s) to be notified are from different departments, you need to select All
Departments.
212
HikCentral Access Control V2.3.0 Web Client User Manual
5) Click Add.
Note
You can repeat this step to add more reviewers and roles to be notified for the approval flow.
5. Click Finish on the top right.
6. Optional: Perform the following operations as needed.
Edit approval In the approval flow list, click the name of the approval flow to edit it.
flow ● Click Reviewer or Attendance Group to edit the reviewer's approval role
213
HikCentral Access Control V2.3.0 Web Client User Manual
214
HikCentral Access Control V2.3.0 Web Client User Manual
215
HikCentral Access Control V2.3.0 Web Client User Manual
Note
Log in to the platform via self-service.
1. Select Review → Leave / Check In&Out Correction / Overtime / Check-In/Out via Mobile
Client on the left.
2. Select the Pending or Handled tab.
3. You can perform the following operations in the Operation column after checking applications.
- Click to approve the employee's attendance application.
- Click to reject the employee's attendance application.
216
HikCentral Access Control V2.3.0 Web Client User Manual
217
HikCentral Access Control V2.3.0 Web Client User Manual
Note
Log in to the platform via self-service.
1. Select Report on the left.
2. Select the menu item as needed to view the records or report details.
3. You can perform the following operations in the Operation column for application review.
- Click Export to export the records or reports in the file format of Excel, PDF, or CSV..
- On the top-right corner, click to select the type of self-adaptive column width (complete or
incomplete display of each column title).
- On the top-right corner, click to select the items for custom display in the column.
218
HikCentral Access Control V2.3.0 Web Client User Manual
219
HikCentral Access Control V2.3.0 Web Client User Manual
220
HikCentral Access Control V2.3.0 Web Client User Manual
5. In the pop-up window, click Download Template and edit the related information in the
downloaded template.
6. Click and import the template with the corrected attendance records.
7. Click Import.
What to do next
You can review or undo the imported applications. For details, refer to Review or Undo
Applications .
Exporting Allowed
After enabled, the layout can be exported in the report.
221
HikCentral Access Control V2.3.0 Web Client User Manual
Sharing Allowed
After enabled, the layout will be shared among accounts.
Fixed Date
After enabled, you can set a specific time period for attendance data displayed the layout.
Only attendance data generated during this time period will be displayed in the layout.
● Click Load Layout to display the report in a layout shared by other users. You can search for a
layout before loading it. For layout saved by yourself, you can edit or delete them.
● Click to display each column title completely/incompletely.
Note
For devices that are not added to the platform, you need to make sure that the devices are
supported by the platform. See HikCentral Access Control Compatibility List for reference.
Many attendance check devices have the ability to export a file that contains persons' transactions.
You can import the file to the platform so that the transactions can be managed on the platform.
Note
● To export the data file on an attendance check device, please refer to the user manual of the
device.
● Usually, you need to enter the back-stage management page of the device to export the event
file to a connected external storage device via USB port, and then transfer the event file to the
PC where the platform runs.
222
HikCentral Access Control V2.3.0 Web Client User Manual
Note
Hover over your cursor on the uploaded logo picture, and you can click Delete Logo to delete
the picture.
Format of Date and Time
The formats of date and time may vary for the persons in different countries or regions. You can
set the date format and time format according to the actual needs.
Note
For the weekly/monthly report, you can also click on the top navigation bar, and then click Total
Time Card / Weekly Details / Monthly Details to quickly go to the pages.
223
HikCentral Access Control V2.3.0 Web Client User Manual
224
HikCentral Access Control V2.3.0 Web Client User Manual
Under these four types of reports, you can select a report as needed.
For some kinds of reports, you can perform the following operations as needed.
● Click Export to export the report in Excel, PDF, or CSV format. You can also select the calculating
● Click and select the desired time range to filter the attendance report by time range.
● Click and select the order to sort the attendance report.
● Click to customize column items.
● After customizing column items, click Save Layout to save the current layout for later use.
Exporting Allowed
After enabled, the layout can be exported in the report.
Sharing Allowed
After enabled, the layout will be shared among accounts.
Fixed Date
After enabled, you can set a specific time period for attendance data displayed in the layout.
Only attendance data generated during this time period will be displayed in the layout.
● Click Load Layout to display the layouts saved by you and the layouts shared by other users.
After loading layouts, you can search for a specific layout, and edit or delete the layouts you
saved.
● Click to display each column title completely/incompletely.
225
HikCentral Access Control V2.3.0 Web Client User Manual
Steps
Note
The report is an Excel file.
1. On the top, select Attendance.
2. Select Basic Configuration → Report Settings → Scheduled Report on the left.
3. Click Add (for first time) or click .
4. Create a descriptive name for the report.
5. Select a type, format, and language for the scheduled report.
Note
You can select TXT as the format if the report type is Time Card.
6. In Statistics Department, check the department(s) / attendance group(s) of which the persons'
attendance data will be delivered in this report.
Note
● For Department Attendance / Overtime Summary, you can only select departments. For
Group Attendance / Overtime Summary, you can only select attendance groups.
● You can check Include Sub-Department to display the persons of sub-departments.
● You can click and filter persons by status (all, employed, or resigned).
7. Optional: For reports excluding Attendance/Overtime Summary and Attendance/Overtime
Summary, click Select Extra Person, and click to include individual persons whose attendance
data will be delivered in this report.
Note
● You can check Include Sub-Department to display the persons of sub-departments.
● You can click and select person status (all, employed, resigned), or enable Additional
Information and enter the keyword in the text field to search for matched persons.
● You can check Select All to select all persons.
8. Set the statistical cycle to By Day, By Week, or By Month and set the report time range and
sending time.
Daily Report
Daily report shows data on a daily basis. The platform will send one report at the sending
time every day. The report contains data recorded on the day prior to the current day.
For example, if you set the sending time to 20:00, the system will send a report at 20:00 every
day, containing the persons' attendance results between 00:00 and 24:00 prior to the current
day.
Weekly/Monthly Report
226
HikCentral Access Control V2.3.0 Web Client User Manual
The platform will send one report at the sending time every week or every month. The report
contains the persons' attendance results of the recent one/two weeks or current/last month
of the sending date.
For example, for weekly report, if you set the sending time to 6:00 on Monday, the platform
will send a report at 6:00 in the morning on every Monday, containing persons' attendance
results of the last week or recent two weeks based on your selection.
Note
● Daily or weekly report is not available when you set report type to monthly or weekly report.
● To ensure the accuracy of the report, you are recommended to set the sending time at least
one hour later than the auto-calculation time of the attendance results. By default, the
platform will calculate the attendance results of the previous day at 4 A.M. every day. You can
change the auto calculation time in General Rule. See details in Set Auto-Calculation Time of
Attendance Results .
9. Optional: Click to set the effective period for the report.
10. Optional: Select and enable the way of sending the report from Send Report via Email, Upload
to SFTP, and Save to Local Storage.
Note
To set up the SFTP or local storage, click > SFTP Settings or Configure Local Storage.
11. Optional: Select the email template from the drop-down list to define the recipient information
and email format.
Note
You can click Add to add a new email template. For setting the email template, refer to Email
Settings .
12. Click Add to save the report schedule.
The report will be generated and sent to the recipient at the specified sending time.
227
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● Selected data items will show in Selected Fields.
● You can drag the items in Selected Fields to set the order of the items.
8. Optional: Click Preview to view the report to make sure the format and content are correct.
9. Click Add to save the custom report, or click Add and Continue to add another one.
10. Optional: Perform further operations.
Edit Report Select a report and click to edit it.
Delete Report Select a report and click to delete it, or click → Delete All to
delete all reports.
Export Report Click Export and specify the departments, target persons, time range,
and report format to export the report to the PC.
Send Report You can set a schedule to send the report regularly. See details in Send
Regularly Attendance Report Regularly .
Note
If you select Department, you can check Include Sub-Department to display the persons of sub-
departments. You can also click to filter persons by status (all, employed, or resigned).
6. Optional: Click Select Extra Persons, and click to include individual persons whose attendance
data will be delivered in this report.
Note
● You can check Include Sub-Department to display the persons of sub-departments.
● You can click and select person status (all, employed, or resigned), or enable Additional
Information and enter the keyword in the text field to search for matched persons.
● You can check Select All to select all persons.
7. Specify the time period by selecting the predefined time period, or clicking Custom to customize
the start and end date.
8. Specify the report format.
228
HikCentral Access Control V2.3.0 Web Client User Manual
Note
If you select PDF, you can customize the paper size and direction of printing.
9. Click Export to export the custom report to the local PC.
229
HikCentral Access Control V2.3.0 Web Client User Manual
230
HikCentral Access Control V2.3.0 Web Client User Manual
231
HikCentral Access Control V2.3.0 Web Client User Manual
remotely. For more details, refer to Manage Video Intercom Device and Configure Device
Parameters .
● Group Resources into Areas: After adding the devices to the system, you need to group the
devices' resources (such as doors) into different areas according to the resources' locations. For
details, refer to Area Management .
● Manage Person: Add departments and persons to the system, and set credential information.
● Basic Settings: Add call recipients, add call schedule templates, add receiving schedule template,
and configure call parameters.
● Manage Device: Set location information for video intercom devices and apply the settings to
devices.
● Video Intercom Application: Add call schedules and apply them to devices, link resources
(person, and doorbell) to indoor stations.
● Configure Event / Alarm: Configure event and alarm for video intercom resources.
● Manage Notice: Add notices and apply them to indoor stations.
● Apply Advertisements to Door Stations: Apply pictures or video to door stations as
advertisements.
● Manage Call: Call indoor stations and view recents.
Note
The parameters may vary with different models of devices.
Time
You can view the time zone where the device locates and set the following parameters.
Device Time
Click Device Time field to customize time for the device.
Sync with Server Time
232
HikCentral Access Control V2.3.0 Web Client User Manual
Synchronize the device time with that of the SYS server of the system.
Note
This should be supported by the device.
Card Swiping
For outer door station and door station which supports M1 encryption, you can enable M1
Encryption and select the sector. Only the card with the same encrypted sector can be granted by
swiping the card on the card reader.
Maintenance
You can reboot a device remotely, and restore it to its default settings.
Reboot
Reboot the device.
Restore Default
Restore the device to its default settings. The device should be activated after restoring.
More
For more configurations, you can click Configure to go to Remote Configuration page of the device.
233
HikCentral Access Control V2.3.0 Web Client User Manual
Operations How To
Draw Task Time Click a grid or drag the cursor on the time line
to draw a time period during which the task
is activated.
Set Precise Time Move the cursor to a drawn period, and then
adjust the period in the pop-up dialog shown
as .
6) Optional: Select Add Holiday to select an existing holiday template, or select Add to add a
new template.
Note
If you configure a template for a management center, the Room cannot be selected.
5. Click Add to save the schedule.
6. Select Apply Settings to apply call schedules to devices.
7. Optional: To add call templates to devices in a batch, select Batch Import Call Schedule →
Download Template , fill in the template, upload the template, and select Import.
Note
For the picture advertisement, you can add up to six pictures. For the video advertisement, you
can add up to three videos.
- a.
Click Picture → to add picture(s) for an advertisement.
b. Set the Picture Switching Interval.
c. Set the time period to play the added picture(s).
Note
Click Add to add the time period if needed.
234
HikCentral Access Control V2.3.0 Web Client User Manual
- a.
Click Video → to add a video for an advertisement.
b. Set the time period to play the added video.
Note
Click Add to add the time period if needed.
5. The playing schedules set for the picture(s) and the video in the advertisement will be displayed
by different color blocks.
6. Click Apply.
Note
The location information of the indoor station is the same as that of the doorbell.
235
HikCentral Access Control V2.3.0 Web Client User Manual
Note
Up to 10 persons can be linked to an indoor station and the person cannot be linked to multiple
indoor stations.
4. Click Add to select persons to be linked to the indoor station.
5. Click Add.
236
HikCentral Access Control V2.3.0 Web Client User Manual
Note
Up to 6 JPG pictures can be added, and each picture should be no larger than 512 KB.
c. Enter the content of the notice.
d. Select indoor stations to receive the notice.
4. Select Preview to preview the notice.
5. Select Apply to apply the notice to indoor stations.
6. (Optional) Select the Apply Notice tab.
- Select one or more notices, and select Copy and Apply to apply notices to indoor stations.
- If you want to edit the notice content, select to copy the current notice and edit the notice
as needed. Select Apply to apply the notice to indoor stations.
Note
Up to 6 pictures can be added, and each picture should be no larger than 512 KB. The picture
format should be JPG.
6. Enter the content of the notice.
7. Select indoor stations to receive the notice.
8. Click Preview to preview the notice.
9. Click Apply to apply the notice to indoor stations.
10. Optional: Perform the following operations.
Delete Notice Check one or more notices and click Delete.
Export Notice Check one or more notices and click Export to export notice information
to the Excel/CVS file.
Filter Notices In the upper-right corner, click to set filter conditions and click Filter.
View Notice Click to view the basic information (title, notice type, etc.) and
Details application status.
237
HikCentral Access Control V2.3.0 Web Client User Manual
Note
On the Application Status page, you can also apply or search for notices.
Note
Make sure you have added and applied a notice to indoor stations.
On the top, select Video Intercom. Then, select Apply Data to Indoor Station → Manage Notice
on the left.
Select the Apply Notice tab.
The followings are two methods for copying and applying the notice(s).
1. If notice information needs no change, check one or more notices, and click Copy and Apply.
The checked notice(s) will be copied and applied to indoor stations directly.
2. If notice information needs change, click to copy the current notice and edit the notice as
needed. Click Apply to apply the notice to indoor stations.
238
HikCentral Access Control V2.3.0 Web Client User Manual
239
HikCentral Access Control V2.3.0 Web Client User Manual
door station call failure or emergencies, you can also directly call indoor stations from the
platform.
Operations Description
Set Task Time Click a grid or drag the cursor on the time line
to draw a time period during which the task
is activated.
Set Precise Time Move the cursor to a drawn period, and then
adjust the period in the pop-up dialog shown
as .
5) Optional: Select Add Holiday to select an existing holiday template, or click Add to add a new
template.
4. Select Add to save the template.
Answer Call
If someone calls the platform, the added recipients can receive and answer the call.
240
HikCentral Access Control V2.3.0 Web Client User Manual
Steps
1. Select Basic Configuration → General to set the following parameters: Ringtone, Max. Speaking
Duration with Door Stations, and Max. Speaking Duration with Access Control Devices.
2. Answer the incoming call. For details, see the following picture.
241
HikCentral Access Control V2.3.0 Web Client User Manual
Parameter Description
Max. Speaking Duration with Indoor Enter the maximum duration during
Stations which you can speak with the device.
Note
● For Local Storage, make sure you have enabled local storage and added the local resource
pool.
● For pStor, make sure you have added pStor as the recording server.
242
HikCentral Access Control V2.3.0 Web Client User Manual
Note
The mask detection function will show when the mask related function is turned on in the System
→ Normal → User Preference page.
Note
You can enter a key word (supports fuzzy search) in the search box to quickly search for the
target device(s).
3) Click Add.
243
HikCentral Access Control V2.3.0 Web Client User Manual
Note
For details, refer to Configure Temperature Screening Parameters .
Note
● The temperature screening threshold should be smaller than alarm threshold.
● For temperature screening points which are access control points, you should configure their
temperature screening parameters on the device parameters configuration page.
244
HikCentral Access Control V2.3.0 Web Client User Manual
On the top, select Temperature. Select Skin-Surface Temperature on the left. Select a temperature
screening point group on the left. Red number indicates the number of skin-surface temperature
screening points. Black number indicates the total number of devices in a temperature screening
point group.
In the Picture area, the latest captured picture is displayed on the left. When new pictures are
captured and displayed here, old captured pictures will be displayed on the right as thumbnails
with faces, screening point name, person name, similarity, temperature, wearing mask or not, and
detecting time.
Persons with different features will be marked by different colors. Orange means the captured
person is not wearing a mask, but skin-surface temperature is normal; red means the captured
person's skin-surface temperature is abnormal; green means the captured person's skin-surface
temperature is normal and the person is wearing a mask. Click More to jump to the History page to
view more captured pictures.
245
HikCentral Access Control V2.3.0 Web Client User Manual
Note
represents that the person wears a mask, and represents that the
person doesn't wear a mask.
Edit/Register You can edit or register person information based on the different icons.
Person ● : The person is registered. For the registered person, click Edit to edit
Information the person information.
● : The person is unregistered. For the unregistered person, click
Register to enter person's registration information. For details, refer to
Register Person Information .
Export Click Export to export temperature screening data including temperature
screening point, temperature screening point group, temperature status,
etc., in excel file.
15.4 Registration
To manage the people who have been screened skin-surface temperature conveniently, you can
register for them by entering their personal information. After registration, you can view and filter
the registered persons' information.
246
HikCentral Access Control V2.3.0 Web Client User Manual
247
HikCentral Access Control V2.3.0 Web Client User Manual
Note
You can custom the information displayed on this page according to your needs. See Customize
Registration Template for details.
5. Click OK to finish the registration.
Registered persons' information will be displayed on Registration page for a centralized
management. See View Registered Person Information for details.
Note
Up to 5 additional items can be added.
1. On the top, select Temperature.
2. Select Registration on the left.
3. Click Registration Template to enter the Registration Template page.
4. Click Add.
5. Create a name for the additional item.
Note
Up to 32 characters are allowed for the name.
6. Select the format type as general text, number, date or single selection for the additional item.
Example
For example, if you select general text, you need to enter words for this item when registering
person information.
7. Click Add.
8. Optional: Perform one or more of the following operations.
Edit Name Click to edit the name.
Delete Click to delete the additional item.
248
HikCentral Access Control V2.3.0 Web Client User Manual
You can view person name, ID, phone, skin-surface temperature, wearing mask or not, registering
time and other information in the list.
Click in the Operation column to edit person information as desired.
Click Export on the upper left corner of the page to export and view detailed registered person
information in excel file.
Temperature Status
Temperature Status gives you the total number of persons whose skin-surface temperatures are
screened and the number of persons with abnormal temperature.
249
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● A report can contain up to 10,000 records in total.
● The report will be an Excel file.
250
HikCentral Access Control V2.3.0 Web Client User Manual
Note
If the analysis type is set to Department, you may also select the way you would like to export
the report content from By Department and By Person.
5. Select a statistical cycle from By Day, By Week, and By Month, and set the statistical period and
report sending time accordingly.
By Day
The daily report shows data on a daily basis. The platform will send one report at the set
sending time on the specified day(s) with analysis results of the previous day.
251
HikCentral Access Control V2.3.0 Web Client User Manual
For example, if you set the sending time as 20:00 and select all days of a week, the platform
will send a report at 20:00 every day, containing the analysis results of the day before the
current day between 00:00 and 24:00.
By Week or By Month
Compared with the daily report, the weekly/monthly report can be less time consuming,
since they are not to be generated every day. The platform will send one report on the set
day/date at the specified sending time every week/month with analysis results of the last
7/14 days or the current/last month respectively.
For example, for the weekly report, if you set the sending time as 6:00 on Monday and the
statistical period as the last 7 days, the platform will send a report at 6:00 every Monday
morning, containing the analysis results between last Monday and Sunday.
Note
If the analysis type is set to Temperature Screening Point, you may also set how the report will
present the analysis results generated in the specified time period below the statistical cycle
options. You can choose from Calculate by Hour and Calculate by Day accordingly.
6. Optional: Set an effective period (start time and end time) for the scheduled report.
7. Optional: Set the advanced parameters.
Send Report via Email
Select an email template from the drop-down list to define the recipient information and
email format (subject and content), so that the report can be sent to the recipient(s) regularly
via email.
Note
● You can select an existing email template or click Add to add a new one.
Upload to SFTP
Configure SFTP settings including the SFTP address, port No., user name, password, and the
saving path for the report to be uploaded to the SFTP server regularly.
Note
You can also click → SFTP Settings at the top of the left pane to configure the
corresponding parameters.
Save to Local Storage
Configure a saving path for the report to be saved to the local storage regularly.
Note
You can also click → Configure Local Storage at the top of the left pane to configure the
saving path.
8. Click Add to finish setting the scheduled report rule.
252
HikCentral Access Control V2.3.0 Web Client User Manual
Note
You can check Select Sub-Groups to simultaneously select/deselect the sub department(s) of
the department that you have selected/deselected.
4. Select a report type from Daily Report, Weekly Report, Monthly Report, and Annual Report, or
a report with custom time interval.
5. In the Time field, select a predefined time period or customize a time period accordingly.
6. Click Generate Report.
The statistics of the selected item(s) will be displayed.
7. Optional: Perform the following operations if required.
Show/Hide Certain Data Click the legend to show or hide the screening results of the
corresponding statistical object, such as certain temperature
screening point or certain department.
View Abnormal In the top left corner of the chart, select Abnormal Temperature
Temperature or No or No Mask from the first drop-down list to display the statistics of
Mask Statistics people with abnormal temperature or those not wearing any face
masks respectively.
Switch Between Line Click / to switch between line chart and histogram.
Chart and Histogram
253
HikCentral Access Control V2.3.0 Web Client User Manual
Note
For reports of department(s), you may also choose the export content from By Department
and By Person.
3) Select the format of the exported file from Excel, CSV, and PDF.
4) Click Export.
254
HikCentral Access Control V2.3.0 Web Client User Manual
255
HikCentral Access Control V2.3.0 Web Client User Manual
Note
The scale of a map is the ratio of a distance on the map to the corresponding distance on the
ground. The client can calculate two locations' distance on the map according to the distance on
the ground. An accurate map scale is essential for defining a radar's detection area. Perform this
step if you plan to add a radar to the map.
1) Click Edit Scale on the top right of the map.
2) Click two locations on the map to form a line.
3) Enter the real distance between the two points in the Actual Length field.
4) Click OK to finish setting the map scale.
7. Optional: Hover the mouse over the added e-map area to perform the following operations.
Edit Picture Click and change a picture.
Edit Map Name Click and set a custom name for the map.
Unlink Map Click to remove the map or cancel the linkage between the map and area.
For the hot regions, hot spots, combined alarms, you can set different icons for them to recognize
them quickly on the map.
Steps
1. Click Icon Settings to set the customized icons.
1) Select a device type to enter the icon settings page.
256
HikCentral Access Control V2.3.0 Web Client User Manual
2) Set the icon size, including width (px) and height (px).
3) Click Add to select a picture file from the local PC.
Note
The icon picture format can only be PNG, JPG, or JPEG.
4) Optional: Click to constrain the aspect ratio.
5) Click Save.
Note
You can customize door icons for the five status, namely general, door open, door closed, remain
open, remain closed, and unknown.
Result
You can view the GIS map on Map Monitoring page and perform the following operations in the
map area.
Filter Click and select the object type you want to show on the map.
Full Screen Click to show the map in full-screen mode.
Zoom In/Out Scroll the mouse wheel or click / to zoom in or zoom out the map.
Adjust Map Area Click-and-drag the map to adjust the map area for view.
View Resource Hover over a resource, and you can view its latitude and longitude on the
Latitude and GIS map.
Longitude (For GIS
Map)
257
HikCentral Access Control V2.3.0 Web Client User Manual
258
HikCentral Access Control V2.3.0 Web Client User Manual
Delete Hot Region Click the hot region icon on the map and click Delete on the appearing
dialog to delete the hot region.
259
HikCentral Access Control V2.3.0 Web Client User Manual
Note
Before adding resource groups to a map, make sure that at least one map has been added .
Currently, the following resource groups can be added on the map for further operations:
Anti-Passback Group
After adding the anti-passback group on the map, when an anti-passback alarm is triggered by
the doors in the group, the client will notify the user by highlighting the region on the map and
you can view the real-time alarms triggered in the region in the Monitoring module on the
Mobile Client.
For details about how to add an anti-passback group on the map, refer to Configure Area Anti-
Passback Rules .
Multi-Door Interlocking Group
After adding the multi-door interlocking group on the map, when multi-door interlocking alarm
is triggered by the doors in the group, the client will notify the user by highlighting the region on
the map and you can view the real-time alarms triggered in the region in the Monitoring
module on the Mobile Client.
For details about how to add a multi-door interlocking group on the map, refer to Configure
Multi-Door Interlocking
Final Authentication Counting Group
After adding the entry &exit counting group on the map, you can view the real-time number of
people entered, exited the region, or stayed in the region in the Monitoring module on the
Mobile Client. Meanwhile, when an alarm is triggered in the region (such as people amount
more/less than threshold), the client will notify the user by highlighting the region on the map.
For details about how to add an entry &exit counting group on the map, refer to Add a Final
Authentication Counting Group .
Batch Locking and Unlocking Group
This function is mainly applicable for emergent situation. For example, the school's security
personnel can lock down the doors in this group by quick operation on the Mobile Client, so
that the school closes and no one can get into the school except for maintenance and high level
admins. This function would block out teachers, custodians, students, etc.
For details about adding doors that need to be batch locked or unlocked, refer to Add a Batch
Locking and Unlocking Group .
260
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● When an alarm occurs from a camera in the area, the geographic area will blink in the color
configured in the event and alarm module.
● A resource within the area will be highlighted to indicate that it has been successfully associated
with the area. Resources can be dragged in and out so that you can add or remove resources to
the region.
261
HikCentral Access Control V2.3.0 Web Client User Manual
262
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● If there is an alarm triggered on the hot spot, the hot spot icon will turn into red alarm mode
. Click the red icon, and you can view the detailed alarm information.
5. Operate in the dialog.
Arm or You can arm or disarm the hot spots via the arming control function. After
Disarm Hot arming the device, the current Mobile Client can receive the triggered alarm
Spot information from the hot spot.
Click a hot spot to open the dialog which displays its related functions. In the
dialog, click Arm/Disarm to arm/disarm the hot spot.
View History When an alarm is triggered, it will be recorded in the system. You can check
Alarm the history log related to an alarm, including the alarm source details, alarm
category, alarm triggered time, etc.
Click a hot spot to open the dialog which displays its related functions. In the
dialog, click to enter the event and alarm search page. Then you can search
history alarms of the hot spot.
Broadcast You can broadcast via hot spot through real-time speaking or playing the
via Hot Spot saved audio files.
Note
Make sure you have added broadcast resources on the map.
a. On the map, click the broadcast resource to view details such as Status,
Area, and Remark.
b. Click Broadcast to select the broadcast mode.
c. Select Speak or Play Audio File as the broadcast mode.
Note
Speak: Speak in real-time, and the audio will be recorded and uploaded to
the server.
Play Audio File: Play the files saved in the server. You can search or select a
desired audio file to play. You can click Download to download a selected
audio file, and the broadcast will be more fluent.
d. Click Start.
- If you select Speaking, the broadcast will start immediately.
- If you select Play Audio File, it will start downloading the audio file from
the cloud if you choose a cloud file, or to play the audio file immediately
if it is a local file.
263
HikCentral Access Control V2.3.0 Web Client User Manual
264
HikCentral Access Control V2.3.0 Web Client User Manual
Note
If you enter an area map from a particular map, the full path of the hot region map will be
displayed in the upper-left corner. Each time you click Back, it only returns to the previous level
of the map.
Note
● When multiple geographic regions overlap, you can select the geographic region from the list
first and then click the menu.
● Batch operation is not supported when there are more than 100 resources in a geographic area.
Block All Alarms Click Ignore All to block all alarms in the area.
Broadcast Click Broadcast, and all IP speakers in the area will start to
broadcast and the device icon status will change.
Audio Alarm Control Click Audio Alarm Control to start audible alarms.
Strobe Light Alarm Control Click Strobe Light Alarm Control to start sound and light alarm of
all devices in the area with the feature.
265
HikCentral Access Control V2.3.0 Web Client User Manual
266
HikCentral Access Control V2.3.0 Web Client User Manual
Note
This parameter is used in the intelligent analysis report generation, etc.
Temperature Unit
Set the temperature unit according to the custom of the actual scene.
Note
This parameter is used in the temperature analysis report generation, etc.
Display Mask Related Functions
Set whether to display mask related functions. Check the box to display the functions about
masks on Web Client and Mobile Client. Otherwise these functions will be hidden.
267
HikCentral Access Control V2.3.0 Web Client User Manual
Note
This parameter is mainly used in temperature screening module.
Calendar Type
Set the calendar type as Gregorian Calendar, Thai Calendar and Nepali Calendar according to
the custom of the actual scene.
268
HikCentral Access Control V2.3.0 Web Client User Manual
Note
If you check Repeat Annually, the specified date of this holiday will be generated
automatically according to the current year of SYS.
For example, Mother's Day in 2019 and 2020 is on May 12th, 2019, and on May 10th, 2020.
The system will automatically set these two days as holidays for Mother's Day if you have
checked Repeat Annually.
4. Click Add.
Note
Make sure that the printers are installed on the same network with SYS.
Select Printer Settings on the left navigation bar to enter the Printer Settings page.
Click Add to select the printer(s) detected by the platform.
Note
After setting a printer for the platform, you can link the printer when configuring alarm/event
whose source type is alarm input.
You can click in the Operation column to delete a printer or click Delete All to delete all added
printers.
269
HikCentral Access Control V2.3.0 Web Client User Manual
Insert Picture Click Insert Picture to select a picture for the template.
Insert Click Insert Background Picture to select a background picture for the
Background template.
Picture
Insert Text Click Insert Text to set the text for the template.
Customize Check the attribute(s) for the content of the template. You can also click
Contents Additional Information to customize the attributes for the template.
Configure Text ● Select a text box and set the font type, font size, font color, and bold
Settings front for the text in the box.
● Select one or multiple text boxes and click , , or in the Text
Alignment field to adjust the alignment of the text in the box.
● Select multiple pictures or text boxes and click , , or in the
Content Alignment to adjust these elements.
● Right-click a picture (except the background picture) or text box to show
a drop-down menu and click Stick on Top, Stick at Bottom, Move Up, or
Move Down to adjust the layer of the picture or text box displayed on
the template.
● Right-click a picture (except the background picture) or text box to show
a drop-down menu and click Delete to remove the picture or text box.
6. Optional: Refer to the previous step to set the back style of the template.
7. Click Add to add the template and go back to the card template list page.
The added card template will be listed on the Card Template page.
8. Optional: Perform the following operation(s).
View Template Click in the Operation column to view the template details.
Edit Template Click in the Operation column to edit template details.
Note
The predefined card templates cannot be edited.
Delete Click in the Operation column of a template or click Delete All at the top
Templates to delete the template or delete all added templates.
Note
The predefined card templates cannot be deleted.
270
HikCentral Access Control V2.3.0 Web Client User Manual
On the left navigation bar of the System page, select Network to display the network settings
menu.
Note
If the local NTP server has been configured, click Detect Local NTP to fill in the NTP server
address and port No. automatically.
4. Enter the interval of the automatic time synchronization.
5. Optional: Click Test to test the communication between resources and the NTP server.
6. Optional: Switch on Configure WAN Mapping and enter the IP address and port No. for WAN
mapping.
Note
If the NTP service is locally deployed, you can configure WAN mapping to synchronize the time
for devices on the WAN. Otherwise, enabling mapping is not required.
7. Click Save.
Note
After Allow ISUP Registration is switched on, you can check Allow ISUP of Earlier Version to allow
devices to access the platform via ISUP of version 2.6 or 4.0.
271
HikCentral Access Control V2.3.0 Web Client User Manual
Note
For setting the generic event, refer to Add Generic Event .
6. Set ISUP alarm receiving ports for receiving alarms from ISUP devices.
7. Set other ports, such as streaming ports, registration ports, and storage ports.
8. Click Save.
272
HikCentral Access Control V2.3.0 Web Client User Manual
If you have configured hot spare for the SYS, you should manually enter the IP address.
3. Click Save.
Note
This configuration is available only when the Web Client is running on SYS.
1. Select Storage on SYS Server on the left navigation bar.
The disks of SYS are displayed with current free space and total capacity.
2. Switch on Enable Local Storage.
3. Configure the related parameters for storing pictures.
1) Select the disk to store the imported pictures.
Note
The disk should have at least 1.25 GB of free space for picture storage.
2) Optional: Switch on Set Quota for Pictures and set the storage quota for the pictures.
4. Click Add to add a resource pool for storing files.
1) Enter the name of the resource pool.
2) Select a disk to store the files.
Note
The disk should have at least 9 GB of free space for file storage.
3) Optional: Switch on Restrict Quota for Pictures and set the storage quota for the files.
4) Check Overwrite When Storage Space is Insufficient, and the newly imported files will
overwrite the existing files when the disk space is insufficient.
5) Click Add.
6) Optional: Click Delete or in the Operation column to delete a resource pool.
7) Optional: Click a resource pool name to edit related settings.
5. Click Save.
273
HikCentral Access Control V2.3.0 Web Client User Manual
274
HikCentral Access Control V2.3.0 Web Client User Manual
275
HikCentral Access Control V2.3.0 Web Client User Manual
Note
For users of Google email, you should log in to your Google account, enable the 2-step
verification function, generate the APP password, and enter here.
3. Click Email Test to test whether the email settings work or not.
The corresponding attention message box will pop up.
4. Click Save.
276
HikCentral Access Control V2.3.0 Web Client User Manual
Note
You can enter multiple recipients and separate them by ";".
Subject
Enter the email subject as desired. You can also click buttons below to add the related
information to the subject.
277
HikCentral Access Control V2.3.0 Web Client User Manual
Email Content
Define report contents to be sent. In the Email Content field, check the content type(s) (i.e.,
Report Classification, Report Name, Statistical Object, Statistical Period, and Number of
Statistics) to add the related information to the content and enter more detailed contents in
the text box to complete the design of report contents.
Note
If you add the time period to the email subject or add the statistical period to the email
content, and the email application (such as Outlook) and the platform are in different time
zones, the displayed period may have some deviations.
4. Finish adding the email template.
- Click Add to add the template and go back to the email template list page.
- Click Add and Continue to add the template and continue to add other templates.
The email template will be displayed in the email template list.
5. Optional: After adding email templates, perform the operations such as editing, deleting, and
searching for templates.
278
HikCentral Access Control V2.3.0 Web Client User Manual
Figure 17-4 Add Email Template for Event and Alarm Linkage
3. Enter the required parameters.
Recipients
Click Add User and select the person's email as the recipient, which is configured when
adding the person.
Click Add Email and enter the recipient(s) email address to send the email to.
Note
You can enter multiple recipients and separate them by ";".
Subject
279
HikCentral Access Control V2.3.0 Web Client User Manual
Enter the email subject as desired. You can also click the button in the lower part of the
window to add the related information to the subject.
Email Content
Define the event or alarm information to be sent. You can also click buttons below the Email
Content parameter to add the related information to the content.
Note
If you add the event time to the email subject or content, and the email application (such as
Outlook) and the platform are in different time zones, the displayed event time may have
some deviations.
4. Optional: Check Attach Captured Picture to send email with image attachment.
5. Select a content language to define the language of the sent content.
6. Finish adding the email template.
- Click Add to add the template and go back to the email template list page.
- Click Add and Continue to add the template and continue to add other templates.
The email template will be displayed on the email template list.
7. Optional: After adding email templates, perform the operations such as editing, deleting, and
searching for templates.
Note
For HTTPS, only the TLS 1.2 and later versions are supported. The browser must support and has
enabled the TLS 1.2 or later version. You are recommended to use the browser supporting TLS
1.3.
3. Optional: If HTTPS is selected, perform the following steps to set the certificate.
280
HikCentral Access Control V2.3.0 Web Client User Manual
1) Select Platform Provided Certificate, or select New Certificate and click to select a new
certificate file from your local PC.
2) Optional: Click Add → → Confirm to add a upper-level certificate as needed.
Note
You can select the added certificate(s) and click Delete to delete them, or click in the
Operation column of a certificate to download the certificate.
4. Click Save.
● The SYS will restart automatically after the transport protocol is changed.
● All logged-in users will be forced to log out during the restarting, which takes about one
Note
Setting database password is only available when you access the Web Client on SYS locally.
Note
Here it only controls the permission of exporting profile pictures. For the entry of exporting, you
can go to the Person module.
281
HikCentral Access Control V2.3.0 Web Client User Manual
Note
The gateway should be deployed on the same network with SYS.
Select OpenAPI Gateway on the left navigation bar, switch on Open API, and set the IP address and
management port of the gateway, or select partner users to define resource and operation
permissions in the integration.
(Optional) Click Test to test the service availability of the gateway.
Click Save.
282
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● Setting the direction is only available for card readers. For other devices, Null will be displayed
283
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● Setting the direction is only available for card readers. For other devices, Null will be displayed
Note
● You need to log in to the Web Client running on the SYS server to configure related
settings of local storage.
● You need to set Saving Path, which is the path where the CSV file or TXT file is saved.
SFTP Storage
You can access the SFTP server as the storage location for saving the dumped file by
setting the SFTP address, port, user name, and password. And you can enter the path to
save the dumped file in the folder on the SFTP server or leave it empty to save the file in
the root directory.
Note
The third-party system should be installed in the SFTP server to read the dumped file.
284
HikCentral Access Control V2.3.0 Web Client User Manual
Content
The display items and data in the dumped file.
Person Group
The group of persons. You can select and search for departments in the list.
Min. Length of Person ID
For some scenarios, the person IDs need to be dumped as a certain fixed length.
You can switch it on and set the value of Length. If the length of the person ID is shorter than
the value, zero(s) will be added before the ID to make it equal to the value. If the length is
longer than the value, the person IDs will be dumped according to the actual length.
Designated Length of Card No.
For some scenarios, the card numbers need to be dumped as a certain fixed length.
You can switch it on and set the value of Length. If the length of the card number is shorter
than the value, zero(s) will be added before the card number to make it equal to the value. If
the length is longer than the value, the card number will be dumped according to the actual
length.
Content Written Format
For each HikCentral Access Control field, you can configure the written format of dumping
card swiping records.
Generate Table Header
When the card swiping records are dumped from the system to the local PC, the column
names will be included in the dumped file and used as the table header.
File Format
Two formats are supported, including CSV and TXT.
Dump Frequency
The frequency for dumping card swiping records.
Dump Time
The time when dumping card swiping records is started.
9. Click Add.
The added rules will be listed in the Dump Rule area.
Note
You can click in the Operation column to delete the rule or click Delete All to delete all added
rules.
10. Click Save.
285
HikCentral Access Control V2.3.0 Web Client User Manual
Generate Logs
1. Check the service log type(s).
2. Specify the start and end time of the time period in which the logs are to be generated.
3. Click Generate to start generating a log file.
When completes, a zip file name will appear at the bottom of the Maintenance Data section and
you can click to download the log file to the local PC.
Debug Logs
1. Click Download Template to download the template of log configuration file to the local PC.
2. Fill in the template with required information locally.
3. Click to upload the configured template to the platform and click Start Debugging.
A 24-hour countdown will automatically start.
Note
When the countdown finishes, the on-going debugging will be canceled automatically. You can
click Extend Debugging to extend the debugging duration.
4. (Optional) Click Close Debugging to stop the debugging.
286
HikCentral Access Control V2.3.0 Web Client User Manual
287
HikCentral Access Control V2.3.0 Web Client User Manual
288
HikCentral Access Control V2.3.0 Web Client User Manual
289
HikCentral Access Control V2.3.0 Web Client User Manual
290
HikCentral Access Control V2.3.0 Web Client User Manual
3. Click Add Combined Alarm to open the Add Combined Alarm pane.
291
HikCentral Access Control V2.3.0 Web Client User Manual
Description
Describe the combined alarm according to your requirements.
Ignore Repetitive Events/Alarms
Once it is enabled, the platform will ignore the combined alarm recurred within the
configured time period.
5. Click Save to enter the configuration page.
6. Configure a receiving schedule for the combined alarm.
1) Click on the configuration page to open the Select Schedule Template pane.
2) Select a schedule template as All-Day Template, Weekday Template, Weekend Template, or a
custom template.
Note
For how to customize a schedule template, refer to Configure Receiving Schedule Template .
3) Click Save.
A Receiving Schedule card will appear on the page.
292
HikCentral Access Control V2.3.0 Web Client User Manual
Note
If Automatically Receive Alarm is enabled for some users (refer to Add Normal User for
details), the Alarm Recipients card will be automatically generated after the event source and
type is configured, and these users will be selected as recipients. You can click the generated
card to edit the alarm recipients, but the selected users cannot be unselected.
3) Click Save.
4) Click below the Alarm Recipients card to select a linkage action and set the corresponding
parameters. For details, refer to .
293
HikCentral Access Control V2.3.0 Web Client User Manual
Note
If the card is deleted, the following cards or sub cards (if any) will also be deleted.
11. Click Save in the top right corner of the combined alarm configuration page to add the
combined alarm to the platform.
Note
If the alarm recipients are not configured for this combined alarm, you cannot save the
combined alarm.
12. Optional: Perform the following operations according to your requirements.
Add to Map Click Add to Map to add this alarm to the map. After that, the alarm
will be marked on the map when the alarm is triggered.
Copy Click Copy, and then select the items (such as basic information,
Parameters to actions, receiving schedule, receiving mode), and select the target
Existing Alarm alarm to copy to.
Delete Alarm Click Delete to delete this alarm.
Test Click Test to trigger this alarm manually, and you can check whether
the linkage actions take effect and whether the recipients can receive
the notification.
Enable/Disable Switch on the button beside Status to enable or disable this alarm.
After the alarm is enabled, it can be received by the platform. If you
294
HikCentral Access Control V2.3.0 Web Client User Manual
disable this alarm, you will be required to set the start time and
duration of disabling and the platform cannot receive the alarm in the
duration.
Note
You can also click Import to batch import the events by the template.
295
HikCentral Access Control V2.3.0 Web Client User Manual
5. Optional: Copy the settings from other generic events in the Copy from field.
6. Select TCP, UDP, HTTP, or HTTPS as the transport protocol.
7. Select the match type to define what received data packages can trigger events.
Search by Expression
The received package must contain the text defined by the expression or more. For example,
if you have defined the expression as 'Motion' AND 'Line Crossing', the event can be detected
when the received package contains "Motion", "Intrusion", and "Line Crossing".
Match by Expression
The text in the received package must be exactly the same as that defined by the expression.
Search by Keyword
The received package must contain the keywords.
8. Define the expression for analyzing the received package.
1) Enter the term which should be contained in the expression in the text field.
2) Click Add to add the term to the expression.
3) Click the parenthesis or operator button to add it to the expression.
4) Optional: Click to remove the item at the left of the cursor from the expression.
Note
You can position the cursor inside the expression in order to determine where a new item
should be included or where an item should be removed.
The parenthesis or operator buttons are described in the following:
AND
You specify that the terms on both sides of the AND operator must be included.
For example, if you define the rule as 'Motion' AND 'Line Crossing' AND 'Intrusion', the term
Motion, and Line Crossing as well as the term Intrusion must be all contained in the received
package for the conditions to be met.
Note
In generally, the more terms you combine with AND, the fewer events will be detected.
OR
You specify that any term should be contained.
For example, if you define the rule as 'Motion' OR 'Line Crossing' OR 'Intrusion', any of the
terms (Motion, Line Crossing, or Intrusion) must be contained in the received package for the
conditions to be met.
Note
In generally, the more terms you combine with OR, the more events will be detected.
(
296
HikCentral Access Control V2.3.0 Web Client User Manual
Add the left parenthesis to the rule. Parentheses can be used to ensure that related terms are
processed together as a unit; in other words, they can be used to force a certain processing
order in the analysis.
For example, if you define the rule as ('Motion' OR 'Line Crossing') AND 'Intrusion', the two
terms inside the parentheses will be processed first, then the result will be combined with
the last part of the rule. In other words, the system will first search any packages containing
either of the terms Motion or Line Crossing, then it searches the results to look for the
packages that contain the term Intrusion.
)
Add the right parenthesis to the rule.
9. Click Add to add the event and back to the event list page, or click Add and Continue to add the
event and continue to add a new event.
10. Optional: Perform the following operations after adding the event.
Edit Event Click the name in the Event Name column to edit the corresponding
Settings event settings.
Receive Generic Select the events, click Receive Generic Event to open the settings
Event pane, and check the checkboxes to enable receiving the generic
events via different protocols.
Import/Export Select the events, and click Import/Export.
Events
297
HikCentral Access Control V2.3.0 Web Client User Manual
from the third-party system. The user-defined events can be triggered as an alarm outside the
HikCentral Access Control. For details, contact our technical support.
298
HikCentral Access Control V2.3.0 Web Client User Manual
Steps
Note
Receiving schedule template defines the time when you can receive events or alarms. If the event
schedule differs from the alarm receiving schedule, make sure the time of the event receiving
schedule covers that of the alarm receiving schedule.
1. On the top, select System.
2. Select Event and Alarm → Receiving Schedule Template on the left.
3. Click to enter the Add Receiving Schedule Template page.
299
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● Up to 4 time periods can be set for each day.
● On the schedule time table, you can click to set the specific time period which accurate to
minute.
7. Optional: Click Erase and click on the drawn time period to clear the corresponding time period.
8. Optional: Set a holiday schedule if you want different schedules for specific days.
1) Click Add Holiday.
2) Select existing holiday templates, or click Add to create a new holiday template (see Set
Holiday for details).
3) Click Add.
4) Set the schedule for holidays.
9. Click Add to add the template.
The receiving schedule template will be displayed on the receiving schedule template list.
10. Optional: Perform the following operations after adding the receiving schedule template.
View Click the template name to view its details.
Template
Details
Edit Template Click the name of a custom template to edit template details.
Note
The predefined templates cannot be edited.
300
HikCentral Access Control V2.3.0 Web Client User Manual
Steps
Note
Alarm Priority
Define the importance or urgency of alarms for handling or acknowledgment.
Alarm Category
Used when the user acknowledges the alarm and categories what kind of alarm it is, e,g., false
alarm, or alarm to be verified. You can search for alarms by the alarm category.
Alarm Icon When Alarm Occurs
The platform has predefined some icons of resources for several special alarms.
For example, it predefined the icon for the Door Opened Abnormally alarm. When this alarm is
triggered, the door icon will turn to the icon displayed here to notify users.
301
HikCentral Access Control V2.3.0 Web Client User Manual
302
HikCentral Access Control V2.3.0 Web Client User Manual
Note
These predefined alarm icons cannot be edited and deleted.
6. Optional: Perform the following operation(s) after adding alarm priority and category.
Edit Click to edit the alarm priority and category.
Note
You cannot edit the No. of predefined alarm priorities and categories.
Note
You cannot delete the predefined alarm priorities and categories.
303
HikCentral Access Control V2.3.0 Web Client User Manual
304
HikCentral Access Control V2.3.0 Web Client User Manual
Email Settings .
● Set the email settings such as sender address, SMTP server address and port, etc. For details,
Note
One report can contain up to 10,000 event records in total.
1. On the top, select System.
2. Select Event and Alarm → Scheduled Report on the left.
3. Click Add if there is no scheduled report rule or click above the rule list to enter the Create
Report page.
4. Set the basic information.
Report Name
Create a name for the report.
Format
Select Excel or PDF as the report format and select a language for report contents.
Note
You can skip this step if you want to keep the default settings.
Report Language
Select the report language.
5. In the Report Target field, click Add to select events or alarms to be contained in the report.
Note
Up to 32 events and alarms can be added in one report.
6. Set the report sending rule and time.
Statistical Cycle
By Day
If the statistics cycle is selected as By Day, the report shows data on a daily basis. The
platform will send a report at the sending time on the selected day(s) of the week, which
305
HikCentral Access Control V2.3.0 Web Client User Manual
contains information of the events triggered on the day (24 hours) before the sending
date.
For example, if you select Monday, Tuesday, and Friday in the Send On failed, and set the
sending time as 18:00, the platform will send a report at 18:00 on every Monday, Tuesday,
and Friday, containing details of all the events triggered between 00:00 and 24:00 on every
Sunday, Monday, and Thursday.
By Week
If the statistics cycle is selected as By Week, the report shows data on a weekly basis,
which may be less time-consuming. The platform will send a report at the sending time on
the selected day of the week, which contains information of events and alarms triggered
on the recent 7 days or recent 14 days before the sending date.
For example, if you set the sending time as 6:00 on Monday, the platform will send a
report at 6:00 in the morning on every Monday, containing details of all the events
triggered between last Monday and Sunday.
Report Time
Select the specific report time.
Send On
Select the date of a week for sending the report. You can click Select All to set all dates of a
week.
Send At
Select the time of a day for sending the report.
Effective Period
Set an effective period for the report to improve the data security.
7. Set advanced parameters.
Send Report via Email
If it is enabled, you can select an email template from the drop-down list to define the
recipient information and email format.
Note
You can click Add New to add a new email template. For setting the email template, refer to
Email Settings .
Upload to SETP
If it is enabled, the platform will automatically upload and save reports to the FTP server.
Save to Local Storage
If it is enabled, the platform will automatically upload and save reports to the local storage.
306
HikCentral Access Control V2.3.0 Web Client User Manual
Note
You can click Configure or click → SFTP Settings / Configure Local Storage to log in to the
SFTP server by entering the IP address, port, user name, and password, and set the saving path
on the SFTP server or local storage for reports.
8. Click Save to add the report rule.
307
HikCentral Access Control V2.3.0 Web Client User Manual
Module Description
1 ● Daily Trend: The numbers of events or alarms in the last 7 days or last 30
days are displayed in the vertical bar chart.
● Hourly Trend: The numbers of events or alarms of 24 hours for the last 7
days, the last 30 days, or the custom period are displayed in the line chart.
2 The data of top 5 event types or alarm categories triggered in the current
day, last 7 days or last 30 days are displayed in the horizontal bar chart. You
can click the red number of an item to jump to the Event and Alarm Search
page.
3 The data of the top 5 event or alarm areas in the current day, last 7 days or
last 30 days are displayed in the horizontal bar chart.
You can click Settings in the upper-right corner to customize event types or alarm categories to be
calculated on the overview page.
Note
The information displayed in each area will change according to the report target on the Settings
pane. For example, if you select Alarm on the Settings pane as the report target, the upper area
will only display the number of alarms, the lower-left area will only display the data of top 5 alarm
categories, and the lower-right area will only display the data of top 5 alarm areas.
308
HikCentral Access Control V2.3.0 Web Client User Manual
The events happened and were triggered as alarms. If you select this, you can set conditions
for filtering alarms by marking status, acknowledging status, alarm priority, or alarm category.
4. Switch Area on and then click to select the area of the event or alarm source.
5. Switch Triggered By on and then click to select the triggering events.
Note
● If you select triggering events in the Access Control category, enter the entered/exited
person's name.
● If you select triggering events in the Third-Party Resource Integration category and have
entered the additional information about the alarm on the third-party system, enter the
additional information.
6. Switch Event/Alarm Name on to select the event/alarm name in the drop-down list.
7. Click Search.
The matched event or alarm logs will be listed on the right page.
8. Optional: Click Export and select the format as Excel or PDF to save all searched events and
alarms to the local PC.
Note
When exporting all events and alarms in Excel format, you can check Include Picture
Information to export the related pictures.
309
HikCentral Access Control V2.3.0 Web Client User Manual
Chapter 19 Maintenance
The system provides Service Manager to manage the installed services on the SYS server. You can
check the service's running status, edit the service port, start/stop service via the Service Manager.
The system also provides backup of the database, so that your data can be well protected and
recovered when an exception occurs.
You can also export the system's configuration data and save it to the local PC.
On the top, select System → Maintenance .
310
HikCentral Access Control V2.3.0 Web Client User Manual
Section Description
Click to open the System Management Server window to
view the detailed status, including the current server time, CPU
usage, RAM usage, network status, streaming gateway status,
handling status of protocol request, and picture storage.
Resource Status View the abnormal data of different resources added to the
platform in the graphical way. You can move the cursor over the
chart to display the exception types and the corresponding
numbers of abnormal devices, and then click a type or the
number on the chart to view the real-time status details of
resources.
Refresh Overview Page ● Manually Refresh: Click Refresh in the upper right corner of
Real-Time Overview page to manually refresh the resource
status on the page.
● Auto Refresh: Go to Maintenance → Basic Configuration →
Auto-Check Frequency to set the interval for automatically
refreshing the resource status on the page. See details in Set
Auto-Check Frequency .
Export Overview Page or Click Export in the upper right corner of Real-Time Overview
Exception Data page to export the page in PDF format. Or you can check Export
Exception Data to export the exception data in Excel/CSV
format.
311
HikCentral Access Control V2.3.0 Web Client User Manual
Section Description
312
HikCentral Access Control V2.3.0 Web Client User Manual
CPU/RAM Usage
Drag the to adjust the threshold value of CPU or RAM usage, and then define the duration in the
Notify if Value Exceeds for (s) field.
Example
● If you set the Warning threshold value to 60%, and set 20 in the Notify if Value Exceeds for (s)
field for the CPU usage, you can view the CPU usage reaching to the Waring threshold line in the
status window of SYS on the Health Status Overview page when the CPU usage reaches 60% and
lasts for 20 seconds.
● If you set the Warning threshold value to 60%, set 20 in the Notify if Value Exceeds for (s) field
for the CPU Usage, and set an alarm for CPU Warning, the alarm will be triggered when the CPU
usage reaches 60% and lasts for 20 seconds.
313
HikCentral Access Control V2.3.0 Web Client User Manual
Example
If you set the Warning threshold value to 160 for the number of input channels of Streaming
Media, you can view the number of used input channels reaching to the Waring threshold line in
the status window of SYS on the Health Status Overview page when the number of used input
channels reaches 160.
Note
This parameter affects all Web Clients accessing the current SYS.
314
HikCentral Access Control V2.3.0 Web Client User Manual
Note
You should adjust the check frequency according to the number of devices. The greater the
number of devices, the lower the frequency of health checks. When the frequency set is too high,
you will be prompted and recommended to set a lower frequency.
Common Operations
Operation Description
Filter Resource Status Check the checkbox in the top right of status display page to select
exception types from the drop-down list to filter the resource status.
View Device Status Click the device name to view the status details and basic information of
the device.
Configure Device Click in the Operation column to go to the Area page to configure the
parameters of the specified device.
Filter Device Select the device type(s) from the first drop-down list on the top to filter
the device status by device type.
Export Status Data Click Export to export the status data as CSV or Excel to the local PC.
315
HikCentral Access Control V2.3.0 Web Client User Manual
Operation Description
Refresh Resource Click in the Operation column to refresh the status of the specified
Status resource, or click Refresh to refresh the status of all resources displayed
on the page.
Note
The resource status will be automatically refreshed in a specified interval.
Edit Current Value Click in the Current Value column to edit current value of the device.
Note
Error logs record failures or errors. Information logs refer to other general logs which record
successful or unknown operation results.
3. In the Source area, select user and server to set the source of the logs that you want to search
for.
4. Optional: In the Resource Name area, enter the name of a resource to search the logs of the
resource.
5. In the Time area, select the time range of this search.
Note
You can select Custom Time Interval to set a precise start time and end time.
6. Click Search.
All matched logs are listed with details on the right.
7. Optional: Check all or specific logs, click Export, and then select a file format (i.e., Excel or CSV)
to download the searched logs as a single file to your local PC.
316
HikCentral Access Control V2.3.0 Web Client User Manual
Note
You can select Custom Time Interval to set a precise start time and end time.
6. Click Search.
All matched logs are listed with details on the right.
7. Optional: Click Export, and then select a file format and a report type to download the searched
logs as a single file to your local PC.
317
HikCentral Access Control V2.3.0 Web Client User Manual
Note
The displayed items vary with the service modules you selected for installation.
2. Optional: Perform the following operation(s) after starting the Service Manager.
Stop All Click Stop All to stop all the services.
Restart All Click Restart All to run all the services again.
Stop Specific Select one service and click to stop the service.
Service
Edit Service Click the service name to edit the port of the service.
Note
If the port number of the service is occupied by other service, the port No.
will be shown in red. You should change the port number to other value
before the service can work properly.
Open Service Select one service and click to go to the installation directory of the
Location service.
3. Optional: Click Auto Recover Database Exception to recover database exception caused by
accidents such as power-off and unexpected reboot.
1) Enable Auto Recover Database Exception.
Note
The database service will restart after you enable this function.
2) Click to set the archive path for recovering the database.
Note
● The remaining disk space of the archive path should be twice as the size of database data.
318
HikCentral Access Control V2.3.0 Web Client User Manual
Steps
Note
The backups are stored in the SYS server. You can edit the saving path only on the Web Client
running on the SYS server.
1. In the top right of the Home Page, select Maintenance and Management → Back Up and
Restore System Data .
2. Select the Back Up tab.
3. In Type, select the system data that you want to back up.
4. Set a backup schedule to run backup regularly.
1) In How Often, select the frequency to back up the system data.
2) In Which Day and When, specify which time to back up.
3) In Max. Number of Backups, set the maximum number of backup files. Old backup files will
be automatically deleted.
Note
The value ranges from 1 to 5.
5. Save the settings.
- Click Save to save the backup schedule.
- Click Save and Back Up Now if you need to back up the system data immediately.
Note
System data recovery will restore the system to an earlier state, and thus the data added after
backup date will be lost.
1. In the top right of the Home Page, click Maintenance and Management → Back Up and
Restore System Data .
2. Select the Restore tab.
3. Select a backup file to be restored.
319
HikCentral Access Control V2.3.0 Web Client User Manual
Note
The configuration data file is in CSV format.
320
HikCentral Access Control V2.3.0 Web Client User Manual
Note
● The data that can be imported include the followings.
○ Device: The information about access control devices, video intercom devices. The related
iris).
○ Event: Event types that are both supported by iVMS-4200 / iVMS-4200 AC and HikCentral
Access Control.
○ Access Level: The settings of access levels, holidays, and schedule templates.
● When importing device configurations, if the number of resources exceeds the limit, the
321
HikCentral Access Control V2.3.0 Web Client User Manual
Note
During the import, you can close the details window and normally use the platform.
A progress bar will pop up and display the import progress, import result, and error information
(if failed).
322
UD12347B