Skip to main content

GLOSSARY

Terms, phrases, definitions and concepts used by Door Cloud.

Written by Doc
Updated over 4 months ago

Essential terms

  • User - Any Door Cloud user including badge holders, app users and admins.

  • Badge - Identity token, RFID card or fob.

  • Door - Any kind of door or barrier controlled by the system.

  • Access Profile - A combination of individual doors. Used for granting access rights to users.

  • Incident - Manually created event requiring attention, security or system related.

  • Alarm - Automatically generated security event, may require operator attention.

  • Client - End-user organization, a Door Cloud customer.

  • Partner - Door Cloud partner organisation providing Door Cloud based services to Door Cloud clients.

Access Log

Access Log is a chronological list of past access events. Access events are normally collected in real time from access controllers. If a controller is not online, its access log will be kept locally until it comes back online. Access controllers can be set to log only a certain type of access events, for example, only rejected access attempts. Normally all access events are logged.

Access Profile

Access Profile is a set of access rights with a name, for example, “Warehouse employees”. It is defined as a set of doors which the user may access and can be assembled from several door groups and several individual doors.

Access Profile also carries access schedules for limiting the access to certain times.

The same access profile is normally used for multiple users. See Access Rights.

Access Rights

Access rights are set of rights defining which users can access which doors and when. They are always given by assigning Access Profiles to users.

Access rights cannot be given to users directly for individual doors or door groups. Even in cases where some individual user has very simple and permanent access rights, or some unique access rights, they have to be defined first by creating an access profile. This restriction helps organizing complex access rights structures and improves security management long-term.

Access rights can be varied through time in controlled way, by giving Users access profiles with limited validity (date from-to).

Administrator

Administrator or Admin or Operator. Users with administration or operation permissions. Admins would normally involve in system configuration, rights management and support. Operators would normally involve in day-to-day operation. These two roles are not distinguished by the system and may overlap depending on the system setup.

Alarm

Alarms are security events requiring attention. They can be triggered directly by signals via Inputs (hardware alarms, for example, forced door open alarm), or indirectly by using a certain information (software alarms, for example, blacklisted card use). They may be programmed to automatically trigger an Output. Regarding alarm severity, they can be closed automatically or may require human attention in order to get closed.

Alarm Log

Alarm log is a chronological list of closed alarms.

Area

The area provides a spatial/geographic structure of the Client’s access control system. It is a free-form, multi-level entity with a name, for example, “Building C”. Once the Areas are defined for a Client they can be applied to Controllers and then subsequently to attached Doors, Inputs, Outputs, Readers and Alarms. Areas are used for management of admin permissions (Roles), and provide a grouping and filtering for several views.

Audit Log

Audit Log contains the list of all administrator/operator actions. It is both security and privacy feature enhancing the system integrity and personal data protection.

Badge

Badge or ID Card is automatic identification token with associated access rights. It normally belongs to a user. Users may have several badges, one badge, or no badge at all (see Readerless Access).

Calendar

Calendars are used in association with Access Schedules. Door Cloud may have multiple calendars.

Card Reader

See Reader.

Client

Clients are end-user organizations, Door Cloud customers. Clients are supported by Door Cloud Partners.

Command Log

Command log is the list of all commands communicated to the controller network (see Controller here bellow).

Controller

Controllers (also called Panels) are intelligent access control devices. They are connected to Door Cloud via internet. They hold local copy of access control credentials and autonomously perform access control. Currently supported controllers are:

  • Zone Spot – intelligent four door controller with built-in I/O.

  • Zone Wing – intelligent multi-door access control hub with external I/O.

Door

Door is the central element of access control. Technically, it is defined by an Output which controls a lock, plus a set of accompanying Readers and door sensor Inputs.

All IO Ports used for a door always belong to the same controller which in turn always belongs to the same Client and the same Area.

For the purpose of remote management, Doors can be associated with Locations.

Most often, the access is controlled only for the entry. In some cases, the exit is also controlled, which then require readers on both sides. Sometimes, the exit and entry would not share the identical set of access rights and need to be treated as two separate door definitions.

IO Ports used for standard door use (one Output, one Reder and one sensor Input) are associated automatically. For other IO configurations IO ports need to be configured manually at Configuration > Controllers.

Door Group

Door Group is a set of doors with a name, for example, “Building F, west wing, all floors”. Normally, doors with common access regime are grouped together for easier management.

Door Mode

Door Mode sets the access regime for a particular door. There are two modes, Normal and Toggle.

  • Normal – the door is controlled according to Access Profiles in the usual way, the door opens for a short time to allow access for one person, then closes.

  • Toggle - the door is controlled according to Access Profiles in a very different way, so that it toggles between unlocking and locking the door. The door stays either open or closed permanently until the next successful access attempt.

Doorphone

Doorphone is a function allowing operator-assisted access control. The operator can receive access request via smartphone app, via a physical door phone device connected to a door lock or any other way. The door can be opened using smartphone app or from the web app at Manage > Doors.

Host

Host is a visitor management term for a Door Cloud user hosting a Visitor.

I/O Device

I/O devices are devices dedicated to relaying input and output signals between the door hardware and the controller, in our case Zone Wing access controller. Currently supported I/O devices are:

  • Zone Door  – smart I/O box

  • Aperio Locks – several types of Aperio wireless locks 

NOTES:

  • Zone Spot controller has internal IO ports and behaves more or less as if it would have one Zone Door IO device built in.

  • Aperio locks are connected to Zone Wing via RS485 communication hub, which is fully transparent for Door Cloud. Door Cloud sees Aperio locks as they would communicate directly with the Zone Wing. 

I/O Port

I/O Ports or simply Ports are physical controller connections of three types:

Inputs - for detecting electric signals, connecting sensors

Outputs - for connecting door locks and other electrically activated devices

Readers - for connecting card readers

Import

Door Cloud allows the user to import data from external sources. Currently, it is possible to import Users, Badges and Calendars. The import is done via simple text tables using generic csv format.

Incident

The incident is an event which is raised manually by the user and may require human response. They can be used for variety of reasons and do not need to be directly related to security. For example, they could be used for technical support or operational workflow, or even as a journal. Incidents releated to alarms can be raised by escalating an alarm.

Input

Input is a major I/O port, usually used for connecting local sensor and control signals such as door open sensor or egress push button. It can be also used for collecting various alarm signals from other devices and systems such as intruder, fire or flood alarms, building management etc.

Key Link

Key Link is a web link that carries access rights for a certain door within a certain time period. As an alternative door control feature, it can be used by anyone with a browser and internet connection to open a particular door. Key links are managed under Manage > Doors where they can be generated, reviewed, edited and cancelled. Key link access events are included in the Access log.

Latch & Release

Access control for a door can be temporarily suspended by either Latching (no access) or Releasing (free access). This can be done manually or programmed with schedules. Both methods override the access rights and require administrative role in order to be set.

Location

Location is used for two purposes. The main purpose is to provide geofencing, a feature for preventing the remote door opening. The other use is for enhancing readerless access so that the door is selected automatically as we are approaching it.

There are 3 types of location definitions: geo, Bluetooth beacon and NFC tag. Geo location has unlimited range, but can prove too coarse for crowded buildings, underground spaces, etc. That is where bluetooth beacons can add precision. The most definite accuracy can be achieved by using NFC tags as they require immediate proximity. With NFC tags door selection is circumvented, so the potential for opening a wrong door is zero.

Any door can have any number of location definitions, yet in most cases, one location definition will suffice. The smartphone app will combine the location data for best results.

Muster Mode

Muster Mode is a safety feature, special mode of operation during emergency. When activated, certain selected readers designated as Muster Stations are used to register users' presence, so that the emergency services can know the users last known location and determine whether the user can be regarded as safe.

Organization Units

Organizational Units (or just Units) provide organizational structure of a Client. It is a free-form, multi-level entity with a name, for example, “Interns with clearance”. Units are defined for a Client so that the Users can be divided into Units. Units provide a grouping and filtering for User lists.

Output

An Output is a major I/O port, usually used for driving electric door locks. It can be also used for triggering other devices such as an alarm horn or surveillance camera.

The Output is the key component of the door definition since its default use is for controlling the door lock.

Panel

Partner

Door Cloud is offered through Partners, each of them providing the service to a number of their customers called Clients. Partners normally cover a certain territory where they offer the installation, support, and possibly also some level of operation assistance. Door Cloud provides partners with necessary functions for the administration of their clients.

Permissions

Authorizations for system administration or operation are called permissions. Should not be confused with Access Rights. See Roles.

Port

See I/O Port.

Reader

Card reader, or a biometric reader emulating a card reader. Both Zone Spot and Zone Door reader ports support several most popular Wiegand and Data Clock connection standards. In addition to that, one OSDP "Level 1" reader (low security) can be connected via Zone Door RS485 port. Also, two high-security OSDP readers (full spec) can be connected via Zone Spot RS485 port.

NOTE: Door Cloud smartphone app does not require readers to open doors. See Readerless Access.

Readerless Access

Readerless Access is the most unique feature of Door Cloud. Using the Door Cloud smartphone app it is possible to open doors without using any Readers. Instead of using readers, the access request is communicated via internet to Door Cloud and further to a particular door controller eliminating the need for a reader or badges.

It is worth noting that readerless mode doubles the number of doors that can be controlled from a Zone Spot or Zone Door. In both cases all four outputs can be used for controlling four independent doors!

Roles

Roles are bundled Permissions for easier management. Standard roles are:

  • Partner Admin - User with permission to create and manage multiple clients. Normally, Parter Admin is employed by the Door Cloud partner organisation.

  • Client Admin - User with full control within a specific specific end-user organisation. Client Admin may be employed either by the partner or the end-user organisation.

  • Limited Admin - User with permission to manage only certain aspects or certain organisational Units or certain Areas of the client system.

  • Basic User - User with permission to view his own access log and raise incidents. Basic user is normally an employee of the end-user organisation.

  • Mobile User - User with permission to use the mobile app. Client and Partner Admins may also have this permission.

There are also other, more specialised roles in the system. Custom-designed roles can also be added.

Schedule

Schedules are used to put a time frame on several access rules:

Unit

User

Door Cloud user is anyone who can be identified by the system. This includes users without the user account, identified only via their badge (card, tag). Users who need to login into the system such as mobile app users, need the user account. The account is also required to provide system admins with managerial Permissions.

Visitor

Visitor is a distinct kind of User with temporary access rights. Visitors are identified by the system in order to track and record their visits. During the visit, visitors are paired with Hosts, which are regular Door Cloud users with permanent access rights.

Zone Door

Zone Door is a smart I/O box for connecting local door paraphernalia such as readers, locks and sensors to Zone Wing controller. One Zone Door can control up to four doors remotely, two of which can be controlled also with card readers. Up to 32 Zone Door boxes can be daisy-chained together and controlled by a single Zone Wing controller.

Zone Spot

Zone Spot is a compact access controller for up to four doors, two of which can be controlled also with card readers. We can think of it more or less as one Zone Door and one Zone Wing combined into a single device. Zone Spot holds access rights and other data necessary for the offline operation and can operate autonomously in case of server connection failure.

Zone Wing

Zone Wing is intelligent access controller for multiple doors. It does not have built-in I/O. Instead, it provides connection for up to 32 Zone Door I/O boxes and can control up to 64 doors. Zone Wing holds access rights and other data necessary for the offline operation and can operate autonomously in case of server connection failure.

Did this answer your question?