4.2 Users

User List

The user list shows all users added to 2N® Access Commander. You can filter users by companies or just find a user by its name, e-mail or phone number. 

The following bulk actions can be used:

  • Add user to group
  • Bulk delete user
  • Set access time restrictions

Add user to 2N® Access Commander

  1. Select the Users card. 
  2. Select Users – Create (Add button).
  3. Complete mandatory data: the new user’s Name and Company and press Create.  
  4. Create login data (optional). Create Login / Password.

Once added, the administrator is redirected to the user card and can be added to Groups and configured (CardsPhone numbersSwitch codes...).

Use the user detail to set all user, user access and phone number parameters. 


1. Account Settings

  • Name – enter the user name for 2N® Access Commander and the 2N IP intercom.
  • User number – use the number for external system administration. 
  • E-mail – enter the address to which 2N® Access Commander user account information shall be sent.
  • Login – set the user login name.
  • Generate new password – send an e-mail to the user (provided the user e-mail address and login are completed) with a newly generated password. The user shall change this password upon its first login to 2N® Access Commander.
  • Set one time password – set a one-time password just for the first login. Change the password after the first login.
  • In company – display the company assignment.
  • In group – display the group assignment. The user may be assigned to more groups than one within a company, 
  • Attendance Monitoring – make sure that the access card, Bluetooth authorisation or fingerprint are set for the user to enable Attendance Monitoring.
  • Account enabled – if the account is disabled, the user has no 2N® Access Commander login rights, no notifications are sent to the user, the user access to devices is deactivated and the user phone number cannot be called. Once the account  reactivated, all the user actions are available to the full extent. 

2. Authorisation

  • Set the authorisation level assigned to the user. Four options are available; refer to User Types and Rights. User rights can be combined. 

3. Accesses

  • Allowed zones – display the zones to which the user has access via the access rule. 
  • Access restriction – set the access rule validity. You can set from, to or both. 
  • Card – enable manual setting or automatic reading of the user card number.
  • Read from reader – start reading from a reader.
  • Virtual Card ID – set the user virtual access card ID. 

 

  1. 13.56 MHz + 125 kHz USB RFID card reader (9137421E) – install the card reader driver. Download from 2N® Access Commander or www.2n.cz.
  • Phone – refer to 4.2.1 Bluetooth for Bluetooth settings.
  • Biometry – display the finger selecting window for fingerprint enrollment. Each user can enroll up to 2 fingerprints. Use an external fingerprint reader for enrollment. Make sure that the 2N®USB Driver is installed. Download it from 2N® Access Commander or www.2n.cz. An uploaded user fingerprint can be used for the following actions:
    • Open door 
    • Silent Alarm. Only if Open door is active.
    • Automation F1 – the FingerEntered event is generated in Automation. F1 helps identify the fingerprint in Automation.
    • Automation F2 – the FingerEntered event is generated in Automation. F2 helps identify the fingerprint in Automation.

Note

Fingerprint loading procedure:

  1. Select a finger and click it.
  2. The Fingerprint loading window is displayed.
  3. Put the selected finger on the reader (repeat 3 times upon request).
  4. You will be informed that your fingerprint has been scanned successfully after the third scanning.
  5. Click Create to complete the process. 
  • User codes – set the switch codes and user PINs.
    • Switch codes – set your own switch activation codes (door lock, e.g.). The switch code opens the door lock via a keypad like the DTMF code.

    • PIN code – set the user's personal numerical access code. The code must include two characters at least.

Note

  • In case the Silent alarm is on, the codes must be every other digit in a sequence. For example: if the access code is 0000, then the silent alarm code is 0001. Make sure that the code length is the same, i.e. the silent alarm code is 0000 for the access code 9999 and so on. 

4. Phone Numbers

  • Create phone number – set the following parameters:
    • The phone number sequence specifies which number is to be dialled first. If the first number is unavailable, the second, third... number is dialled and so on.
    • Enter the station phone number to which the call shall be routed.
    • Time profile for phone number restrictions.
    • IP Eye address – used by 2N® IP Eye for displaying a camera image window; useful for video phone users without displays. 
    • Group call means a simultaneous call to the next phone number; when the call is answered via one phone, the other phone will stop ringing.

  • Deputy at absence – select the user from the list to be directed calls at in case the original user is unavailable.
  • Virtual number – set a number to be used for user calling via the numeric keypad. The number can have two to four digits. Virtual numbers are not associated with the user's own phone numbers. They can be part of another numbering plan, which is independent of phone numbers and can thus hide user phone numbers.

5. Attendance

Attendance data are displayed in the user detail. 


6. Access Logs

Filtered access logs. This tab shows you all the passages and keypad clicks on all the devices that are added to 2N® Access Commander.

7. System Logs

The system logs include changes on the displayed user only.