Posts Tagged ‘ Access Control Software ’

How to Set Up a DX Series Access Control Pin Pad System With and Without Pin Codes!

Written By:
Tuesday, September 8th, 2015


We have been receiving calls in tech support regarding the different ways to use a DX Series Access Control Pin Pad with an access control system.  Some people are interested in pin pad only, while some may want to only use a fob.  Others may want the extra security of requiring both a pin pad entry and a fob to access through a door.  This article will show you how to set up the software for all three options and provide you with a greater understanding of how the software works.  Wiring will not be discussed here, so please refer to other articles for that information.

For Maximum security, FOB + pin code will do the job

You swipe your card, and then enter your pin code to open a door.  This is the most secure way to set up your software since all personnel will need both to advance.  Maybe you are setting up the software for a company and want to require all employees to have both criteria met in order to enter the building.  To set up your first user, you must advance to Basic Config > Personnel and click the Auto Add button.


Then choose your door, and in my case is door 1 or m003-1.  On the next screen, you need to select your department and then swipe.  If you do not have departments set up, then you can skip that part.  I created two departments to separate Management and Staff, but you can segregate personnel by any company or organization hierarchy for sorting and control purposes.


Once you are on the User screen, add a pin there.  I used 1234 for testing, and have my Activate and Deactivate range to make sure my user will be active.  We are not quite done with this user, because you still have to make sure that the swipe and pin are both required to advance.


Advance to Access Control > Password Management and then make sure the Swipe + Keypad boxes are all checked to make sure both are required.  Click OK, and now you are ready to upload your changes to the board.


If you are new to the software, click Basic Operate > Select All > Upload so that you can upload all the changes for your doors.  In my case, this is a 2 door board, so I select both doors and then I always keep Basic Configuration and Access Privilege checked when I hit the OK button.  Now I have one user that requires the Swipe and the Keypad to enter the door.  The biggest advantage to requiring a pin with the fob is in case the fob is lost or stolen.  You may not want someone to gain access prior to the account being deactivated.

FOB only setup

The fob only setup is easy since you have to create your personnel the same way as above.  You must advance to Basic Config > Personnel and click the Auto Add button like you did before, but keep the pin code section blank.   Then you have to advance to Access Control > Password Management and then make sure the Swipe + Keypad boxes are all unchecked to make sure both are not required.  Click OK, and now you are ready to upload your changes to the board.  This is the same setup if you have a swipe only reader, and should be very easy and fast for setting up many users.  While it does not have the extra layer of security that the pin code can add, many feel the possession of the fob is enough of a security measure.

Pin code only setup

Let’s say you do not want to deal with fobs at all, and just want to use a pin code.  This is also very easy to set up in the sense that the pin code will be placed in the spot where the card number usually goes.


To set up your first user, you must advance to Basic Config > Personnel and click the Add button.  Create a user name like Joe Code Only and use code 12345 for example.  This same person can also have a fob that can be created as a separate personnel entry if you wish.  One person can have multiple entries if you want to manage people in that manner.  The fob only created user will have to hit the ESC key, and then enter their code of 12345 as an example, and then click the ENT key.  The board really does not know the difference between a swipe and a code, so it just needs the number to allow access.  This means that if someone knew their electronic fob number, they could enter that using the keypad and enter the building.  While the pin code only option may not be the most secure, it may be needed in certain situations or to be used as a second option for people.

In Summary

While you may choose to use a pin code only setup for certain users, you still have options to limit the time of day when they can access the building.  For example, a cleaning crew may only need access late at night in a one hour window for example, so you can choose to limit the pin code only user to that time frame.  There are so many control opportunities when you account for the time management options, that you will likely choose to create multiple personnel entries for some people.  The fob only option is the most common setup, especially since we sell swipe only readers.  It is still a best practice to use both the fob and the pin pad for the added security with a reader that has both data entry options.  Hopefully, you also have a security camera system from to supplement your access control system.  This would give you the highest level of security adding high quality video recordings to your security infrastructure.  Call our sales department today at 866-573-8878 option 2 for a quote on an entire security set up featuring access control and video surveillance.


How to Configure TechPro Security DX Access Control Software

Written By:
Wednesday, May 13th, 2015

Access control is one of the topics we have seen that has the most questions when it comes to giving access to certain users. Many customers call us for help building and configuring there DX Access Control Software, and in this article I will go over some of the most important aspects of how to install, configure, and upload the database information to the access control board.

Things you will need are:

Computer Running Windows 7. 8.1 or Windows Server 2008 x32 or x64 bit version.

Software Download: Free Access Control Software

Access control Cards (Fobs or Cards): DX Series Credit Card Size 125KHz Access Control Cards or DX Series 125KHz Access Control Key FOB (Blue)

USB Card /Fob Registration Reader (Not Necessary but makes things easier) DX Series USB Card / Key Fob Registration Reader

Installation Process

Download the software and proceed with the installation. After the software is installed, click on the newly created icon named access control.

A login window will appear. The default username is abc and 123 for the password.

Access Control Login1

After logging into the software the following interface will appear:

MAin Interface

At this point you will need to have the Access Control board connected to a switch with a static IP address configured. It is required to use the Web Configuration Tool. Steps are covered here .

Click on “Controllers” button, then click on search to find the controller(s) in the network. The next page will display one or many controllers in the network:

Search Interface

If multiple boards are found, then you can click on “Configure” to change there IP address, subnet and gateway. NOTE: We strongly recommend to leave the default port to 60000. Do not attempt to change this port to something different because it will not work with the software and it will not be able to upload any settings to the access control board. Notice that the serial number on the board and the MAC address is also displaying in this window. When done, click “Add Found To System”.

Double click on the serial number of the board and the following window will appear:


From here you can add a note to identify the location of the board. Click on the “Zone” button to determine the name of the Door Zones to where each of the readers are installed. In this Demo I will be using Techpro Security.

NOTE: In order to rename the Door Names you will need to double click the serial number of the board under the controllers page or click Next to access the extended features of the board. 

Next, click on “Building Room” button to add your departments. This will help you out a lot to determine access rights and privileges of your employees.

Building Room

The next step will be creating your users that will be allowed access or denied access. Click on the “Personnel” button to add users. In here you will  be able to add one or multiple cards at one time if using the Usb Reader for DX series Access Control. Click on Add to add one user at the time. Notice that each employee will have a unique User ID that is required. Type the Name and last Name of the person that will hold the Card. Type the last 8 digits of the card, starting with the first 3 digits before the (,). If the first digits starts with (Zero 0) then you will not need to type it. Also you do not need to type the (,) when entering the number. Select the building room where that user belongs to. You can add a picture if you like or provide more information using the “Others” tab.

USB ReaderAdd Users

Access Privilege is the section where you will assign which users have access to what doors. From the users “Building Room” dropdown, select your group(s). You can add one user at the time or you can add all of them at once by holding down the Shift key on your keyboard. Click on the double arrow button to add all the users or the single arrow to add only the selected users. From the doors “Zones” dropdown, select the door(s) that you want the select room group to have access to. Click on the double arrow button to add all the doors or the single arrow to add only the selected doors. Click on “Allow And Upload” to push the information to the Access Control Board.


Basic Operate – in this section you can see some of the features of the board such as monitor, time adjust, real time monitoring logs, etc. You can also get more features if you enable the extended features. Click on “Tools”, “Extended Functions” and type the following password (5678). Click OK and select the options  (Activate Time Profile) and (Remote Open Door). Other features can be enabled in the extended functions page, but I will recommend to review the manual to know exactly what these features can do.


Time Profile is one of the most important features that needs to be configured properly. It is recommended to enable this feature in the Extended Functions to make sure your employees have only the appropriate access to areas in your facility, and they are restricted to enter those areas after hours. Click on the time profile button and click new. Notice that the software will assigned a time profile ID that you can’t change. Type a description that will reference who will be under this time profile. For example if you have work shift, I will create one that reflect the work period of that shift. If your business has 3 shifts (Equally to 24 Period) then I will call it Shift Period 1 and add the days of the week and Time that the shift will operate. Use the time segment section to set the interval for that shift period. Create new Time Profile shifts  for every other Time period your company might use.

Time Profile


How to Install Access Control Software Standard Server Version from IDTECK

Written By:
Wednesday, September 3rd, 2014

Access control is the ability to allow or restrict access to a place or to have the ability to deny or allow the use of a resource. The idea behind this is to control certain users and resources at a specific place so there is full control of how, when and where the resource is utilized.

Access control can be done manually or completely automatic, but how would you keep track of who, when, and how the resource was accessed? The short answer to that is Access Control Software.

Many access control devices are network capable, which means that they can be accessible over a web browser or through a software via TCP/IP. These devices can also have a Web Service Interface that can show you basic information such as logs, alarm events, etc. Most of these devices that have that capability are very limited on the things you can configure.

Every access control is different in the way they might require a specific set of settings to successfully connect with the main software. In this demonstration I will be showing you how to configure the Standard Version of IDTECK’s Access Control Software.

This software will require 2 sets of programs and setups. One is the server communication and the access control software itself. It is necessary to install SQL for the database of the software so it will be easy to export any database with settings later on. SQL Express comes with the Standard version for free so there is no need to acquire a greater version, unless there is a necessity to have advance settings on SQL. Other than that it should be straight forward.

NOTE: To make sure the installation runs smooth make sure that the following requirements are met:

1.- Windows 7 x32 or x64 bit
2.- At least 10GB of Space on your Hard Drive
3.- Make sure no other SQL Instance is running on your PC
4.- Minimum of 4GB of Ram and a Dual Core Processor with at least 2.00 Ghz.

Software installation

Download the Server version of the software from here:

Double click on the icon and proceed to install the software. Follow the prompt and install all of the necessary updates until you get to the section where you will need to named the Instance. See picture below

IDteck SQL Instance

After naming the instance of your SQL installation you have to make sure you remember the password because this will be required to configure the communication server. Click Next and the SQL process will begin by decompressing the files and preparing the installation process. When done, the following window will appear:

Customer Info

Type a name and a company name to continue the installation. Select all of the features on the list and click Next.

Database Selection

On this section make sure the database server is typed as shown in the picture above. Select SQL server authentication and use the following default username and password (sa) and (1234). Note: If you change the password then you will need to type that info under the password field. Click Next to begin the installation process:

SQL Finish Installation

Click Next to begin the installation. Check the following picture summary to make sure you have all of the SQL features that will be installed.

SQL Copying Files

When the installation is completed, the following 2 icons will appear on your desktop. These icons are essential to the software and a few more adjustments need to be made before we fire up the communication server.

Idteck Comunication and server

The next step is to make sure we have the software executed with administrative rights. To do this, right click on each icon and click on the compatibility tab, then select the “Run this program as an administrator”.

Run As

Double click on the IDTECK communication Server to begin configuring its settings:

Server Settings

After the software launches, click on server setup and the following settings will show as the picture above. Click on the Server IP and make sure that the IP is your computer name\IDTECK. The Database name will be STARWATCH_STD. Username is “sa” and password is “1234”. Authentication should be DB Authentication.

Note: if you change this (username and password) when installing the software then you will need to input the right information. Click OK when done and the result should be as show in the picture below:


Double click on IDTECK STANDARD Server Icon and input the username and password. The default username and password is admin.

Software login

After all this the software will open up and will display the following interface. From here we can prepare the software to communicate with the device you are trying to manage.

IDteck Software Interface

Note: This software is free with a limit of users and doors that can be run without a license. A pop-pop will show after the software is launched:



Notice that because the software doesn’t have a device configured in it, the software will display certain errors. See picture below for reference.

No Comunication

To add a device go to “Device Setting Wizard” to configure the Default Site settings. Click the checkbox labeled “Whether to use” and click on the “Site Setting” button. A site settings box will display for you to type the communication server  IP address. The IP address will be the one your computer have. You can find out what IP address your PC have by going to command prompt and execute the ipconfig command.


Site Settings



At this point you will need to follow the steps to build your database for your access control and configure the connections between the software and your access control equipment.

For more information about this software play the video below to see a quick video demonstration of the operations and configurations of this software.


Access Control Demystified

Written By:
Tuesday, July 8th, 2014

If you’ve never worked with or around an access control system, it may seem like a complex convoluted nightmare of wiring, circuit boards, card readers, and rather confusing software.  In the text to follow, I’ll explain and attempt to remove the mysticism that stands between you and access control wizardry.

One of the most important concepts to understand is that there are 4 basic components in play at every door: inputs, the controller, outputs, and the software.

An input lets the controller know that an event has occurred. For example, someone swiped a card, someone opened the door, someone left the door open, someone on the inside requested to exit, etc… Think of these as the eyes and ears of the system.

Then there’s the controller. Based on how you’ve configured your controller, it will take all the inputs related to a door and determine how to react. Keep in mind, the logic for how to react is usually software configurable. For example, when someone swipes a badge, it determines if it should unlock the door or keep it locked. Think of this as the brains of the system.

All that input and logic is practically nothing without the outputs from the controller. This is typically a relay that either turns a device on, or off. For example, mag-locks, door strikes, alarms, buzzers, lights, etc. The limit to what a controller can use for an output with today’s technology is really limited only by your imagination. Think of these as the hands, feet, and mouth of the system.

Lastly, there’s the software. This comes in many different forms. However, it is extremely important for you to master this component of the system. The software tells the controller how it should react to the various inputs. It also allows you to configure various options. I’ll go into this more later. In the meantime, think of this as the subconscious mind of the system that tells the controller how to react.

Access Control Inputs:

So you have a door you want to control, and you’re wondering what types of input you may want. There are a few obvious choices that come to mind rather quickly. Let’s start with those:

Basic Card Readers:

2 1 4 3

These come in a wide variety of colors, shapes, sizes, and even vandal proofing. However, there are other differences that you will find far more important than aesthetics.  For example, it is extremely important that you pair your reader with the appropriate card types.  For example in the four pictures above, the 2 brands of readers do not support each other’s cards. Furthermore, within each manufacturer you may find cards that work with certain models of readers and not with others. To make your life easier there are hybrid readers capable of reading multiple types. These are usually a bit more costly and only needed if you somehow ended up with an odd mixture of card types. For the most part, I encourage you to stick with 1 type of card and matching reader throughout your entire organization.

There’s also the protocol with which the reader speaks to the controller. Just like when you engage someone in conversation, it’s generally best if you speak a common language. Just like languages, some readers and controllers can speak in multiple. Among the most common communication protocols (languages) that readers can speak you will find Wiegand with varying “bits”.

While I could bore you to death with exactly how the Wiegand protocol works, I’ll cut to the chase and tell you that the most important factors are that both the reader and the controller are configured to the same EXACT protocol. It is also exceptionally important that they be wired appropriately.

Most readers will have between 6 to 8 wires coming out of them. There are some industry standards for color codes, but ALWAYS consult the manufacturer for proper wiring. Red is usually Positive, but if it’s not you could end up with unanticipated results (and that funny smell of burnt capacitors.) The wires you will typically find are:

DC Voltage Positive +, DC Voltage Negative – (also referred to as ground), D0 or Data 0, D1 or Data 1, Beep or Buzzer, LED control

As I mentioned, these will vary depending on the model of reader. Some may be present, others may not. You may even find additional options.

Advanced Card and Bio-metric Readers:

5 4 3 2 1

These readers take things a little further than “do you have the right card?” In secure environments you may want to authenticate a person based on something beyond the physical card. For example, do you have the card AND do you know a pin code. You may also have a situation where you need to give access to someone without ever meeting them to give them a physical card. Perhaps you want to allow their cell phone to be their key or just a combination of numbers. Maybe you need extra security and you want an access card to be present, a finger print to be matched, AND a code to be given. The possible combinations are limitless. These advanced readers require a little more effort to configure and enroll your users. However, in the right situations they are definitely worth the extra effort. These typically have the same inputs and outputs as normal readers but they use special programming to configure the additional features.

Request to Exit devices:

8 7 6

So you’ve got all that fancy reader stuff in place to keep unwanted individuals out. However, you need a way to allow those who have entered the building to exit.  Some controllers will allow you to place a second reader on the inside of the door to allow egress. However, in all but the most secure environments, you will find that fire codes require you to allow simple and quick egress. Most installations will require a “Push to Exit” button and a “Request to Exit” PIR/Motion sensor. These devices usually require very limited wiring. Most likely you will need power (commonly 12v DC, but consult the devices manual) and a simple 2-wire connection to the controller. Most commonly the controller expects this circuit to be normally open and will react by opening the door the moment the circuit becomes closed. Many controllers allow you to configure the functionality of this input to be either normally closed or normally open. They may even allow you to specify a delay in reaction time. In addition to the PIR and Push to Exit you can use a wireless relay to toggle door release. You could use almost any device that has a relay to trigger a door event. These devices can be wired directly to the locking mechanism if desired. However, this prevents the controller from logging how the unlocking event was triggered. I only recommend this if you have no need for a record of when someone exited the building.

Door Contacts/Closure Sensors:

10 9

These things are very simple switches that tell the controller if the door is open or closed. This can be useful in certain controllers for triggering an alert or an alarm if a door is left open beyond a specified amount of time. This will discourage people from leaving a door ajar and allowing a potentially unwanted visitor to wander in.

These typically only require a 2-wire connection to the controller and are generally wired as normally closed. If someone tampers with or disconnects the wires from the contact it will consider the door to be open.

Not all contacts are attached to the door in plain sight. Many are built into the locking mechanism. Door strikes often have a relay that senses if the door is latched are not. Mag Locks tend to have a closure sensor that detects when the plate is firmly pulled to the magnet. These make excellent closure sensors.

It should also be noted that you can wire a closure sensor to a buzzer or an LED without the need for a controller. You may need a relay to accomplish your desired result, but the only limit is your creativity.

Access Control Outputs:

So you’ve got all these fancy entry/exit devices in places to tell the controller what’s going on. Now it’s time to give it the ability to interact with the door.

Electronic Door Strikes:

12 11

Door Strikes are typically used on doors that have a mechanism that allows egress by simply turning a door handle or pushing on a push bar. These are often used in environments where you need the system to “Fail-Secure”. Fail-Secure means that in the event of a power failure the door should remained locked. Some Strikes can be configured to either “Fail-Secure” or “Fail-Safe” but the most common use is in a Fail-Secure environment. Fail-Safe is the opposite of fail secure, in a power failure the door remains unlocked allowing entry/exit to anyone.

Door strikes are typically wired to the Normally Open side of the door controller relay. This means when the door should be locked, no power is sent to the strike. When the door is supposed to be unlocked, power is applied and the latch is released allowing the door to be opened.

Most door strikes only have 2 wires (for power when activated). However, others may contain a closure sensor as mentioned in the Inputs section. This makes the strike both an input and an output device for the controller.


15 14 13

Mag Locks are large electromagnets with a lot of force. They commonly come in 600lb, 1200lb, and 1500lb of pull strength. The amount of force that would be required to pull a door open is not something a normal person can achieve easily. This makes them ideal for a locking mechanism. Although they are usually fail-safe devices as they only have strength when energized with electricity.

Mag-Locks typically only have 2 wires that need to be attached to a Normally Closed relay on the door controller. This means that when the door should be locked, the circuit remains closed and power flows to the mag-lock. When the door should be opened, the circuit is opened blocking the flow of power and releasing the magnet.

Many mag locks will also have closure or bond sensor which can report the door status to the controller. This would make them both an input and output device if used.

LEDs, Buzzers, Sirens, DVRs, NVRs, Alarms, The endless possibilities:

Controller boards can be used to control a wide variety of equipment. Usually this is done through the door relay or through an alarm condition relay. It is important to note that you may need to use an external relay (as in not the one built on to the board) if the voltage of the device your trying to control differs from the other devices the on-board relay is controlling.

While it may seem complicated, it’s very simple. A relay is a switch that is controlled by another device. If you apply power to a relay, it switches from its “Normal” state to its “Abnormal state”. If you wire a device to “Normally Closed” then it will allow electricity to flow to the device until power is applied to the relay at which point it will stop the flow of electricity to the Normally Closed side. Conversely, if you attach a device to the “Normally Open” side of a relay it will prevent the flow of electricity to the device until power is applied to the relay, at which point it will allow the flow of electricity to the device.

With that being said, you can wire almost anything to a relay. Some common uses you will see include LED’s and Buzzers to alert that a door is open, an input on a DVR/NVR to trigger the taking of a snapshot or video of an event, connection to an alarm system to warn of after-hours door openings, etc… again, the possibilities are limited only by your imagination and willingness to wire in the devices you want.


It is also worth mentioning that many controllers support connectivity to a network. They can use this for outputs. Such as sending an e-mail when a door is left open or when a disabled card attempts to gain entry. Consult the manufacturer of the controller to determine what your options are.

Access Control Boards:

These come in a massive variety of functionality. Once you’ve settled on the manufacturer you like, it’s time to determine what your requirements are.  Most commonly this will be determined by the number of doors you need to control and the end users expectations of functionality.

While I could show you a lot of different examples, for the purposes of this document we’re going to look at a single door controller and briefly examine its functionality.

DX Series Single Door Controller:


Starting at the top left is a connector for a reader. You may notice, there are 2 of these. As I mentioned previously, you can control egress in certain situations by placing a reader inside the door. This controller allows for 2 readers at a door. This is not a requirement, 1 reader is sufficient per door in most cases. The pins on this board for the reader are as follows:

+12 = Positive (+) 12V DC

GND = Ground or Negative (-) 12V DC

D1 = Data 1 (One of the two connections that Wiegand uses to communicate)

D0 = Data 0 (The other connection Wiegand uses to communicate)

LED = Controls the LED on a reader to let people know they were granted access. This can also be tied to the beeper or buzzer in a reader to give an audible sound or both to provide audio and visual indication.

The second reader connection is the same as the first. So I’ll skip the second 5 pin connector.

The 2-pin connector facing up is intended for 12V DC power for the board

The 2-pin connector facing to the right near the top  is for the door contact or door closure sensor.

The 3-pin connector is a relay for controlling the outputs at the door. Remember, unless otherwise told by the manufacturer, you should wire mag locks to the N/C or Normally Closed side of the relay and Strikes go to the N/O or Normally Opened side of the relay. The common goes back to whatever polarity of power is needed to activate the device.

And the bottom right facing connector is for your push to exit/request to exit devices. You can tie multiple devices into this allowing the door to be released in a variety of ways.

This board also contains an RJ-45 jack (difficult to see from this angle, but it is the silver box looking component near the center of the board. In this instance the RJ-45 is for connecting the controller to a network for programming. It should be noted that there are some controllers on the market that use RJ-45 connectors for low voltage and not just data communication, you should always consult the manual before connecting one of these boards to a switch or other networking equipment.

Access Control Software:

Software is an area that I will only briefly discuss because this is probably the most diverse area of an access control system. Some controllers use built in software on a web interface, some require a computer running a commercial piece of software, and still others require Enterprise class software with large scalable database support. Make sure you understand the needs of your users, the capabilities of the software, and the requirements of the software before purchasing a controller. Software prices range from free to extremely expensive. So make sure you factor this into your design.

At its core, the software is usually merely a method for telling the board what users get access to which doors and at what times. This can come in the form of adding a card or setting a pin.

Depending on the controller, the software may also provide additional features such as setting egress delays, or specifying alerts via e-mail, or even changing the way inputs/outputs work. Keep in mind this will vary between manufacturers, controllers, and software options.

More advanced software can provide additional functionality such as time and attendance reporting and integration with CCTV or alarm systems. Consult your manufacturer for an accurate list of features and functionality.

The End:

While there are additional aspects and details that can be involved in access control, We have covered the basics of an access control system and the interactions of the various components.