Language selection:
Skip to main navigation Skip to main content Skip to page footer

Access control server room

Didactum's 500 and 500-DC series IT monitoring systems can also be used for access control in technical, network, IT, and server rooms.

Add a key to the Didactum monitoring system:

Before adding a key to your Didactum IT monitoring system, please ensure that the Didactum key reader or RFID card reader is already connected!

Then, please log in to your Didactum IP monitoring system via a web browser and go to the "Access Control" menu item.

Import a key database:

To import a user database with stored keys into the Didactum IP alarm system, please click on the bar icon and then on the "+" icon.

Next, click on "Select File" and choose the user database stored in SQLite format, including the electronic keys stored therein.

Manually importing an electronic key into the Didactum access control system:

Enter the username and the code of the electronic key or RFID ID card. You will usually find the key on the RFID ID card or the electronic key itself.

IMPORTANT:

The number sequence on the ID card must be entered in reverse order when entering it manually.

Example:

The key "00-00-00-DC-39-C6" is printed on the Didactum RFID ID card.

In the Didactum monitoring system, the key must then be entered manually as follows: "C6-39-DC-00-00-00"

If, contrary to expectations, the key is not on the ID card or the electronic key, you must hold the card or electronic key against the reader connected to the Didactum monitoring system.

To do this, click on the "bar" icon again and then on the Event Log menu. Since the electronic key has not yet been registered in the system, you will find a message in the event log containing the key.

Please copy the key by clicking and paste it manually. Then click "Save" to permanently save the user and their key in the system.

Management of electronic keys

To edit or delete existing electronic keys, simply click on the user list in the "Access Control" menu.

The Didactum monitoring system will then provide you with the necessary options.

If required, you can also export the key database. This file can then be used for backup purposes or for access control by other Didactum IT monitoring systems within your company.

To do this, simply go to "Preferences," select the "Access Control" menu item, and click on "Download user database" or "Upload user database."

Export of the entire key database of the Didactum IP monitoring system

If you want to back up the entire key database, please go to the "bar" icon and click on the "+" icon to back up the entire key database in SQLite format.

This website uses cookies

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Cookie Policy.

Essential cookies enable basic functions and are necessary for the website to function properly.
Statistics cookies collect information anonymously. This information helps us to understand how our visitors use our website.
Marketing cookies are used by third parties or publishers to display personalized advertisements. They do this by tracking visitors across websites.