Version: 20180612
if this key is now presented at the validation terminal, no validation takes place and an
appropriate alarm message can be sent to the control centre.
A possible security gap at the offline access points is therefore limited to the time between
the loss of the medium and reporting to access management.
If an employee is moved to another job in a different part of the system, the associated
access authorisations for this new job are updated immediately for the affected offline access
control terminals during the next validation process.
The key validation concept contributes to maximum operating convenience and maximum
security of the system at the same time, and there is no need for a centrally established
programming process.
1.1.1.2. Allocation of access authorisations according to
groups and/or organisational units
The group authorisation concept rationalises the system and allocation of access
authorisations considerably. To do this, one-time access authorisations are determined for a
certain user group, e.g. for accounting employees. Then, the affected employees are
assigned to this “Accounting” group and therefore automatically receive the authorisation
profile of the “Accounting” group. In this way, new employees can even be given complex
access profiles by assigning them to a group with no effort.
A group can also be a logical summary of access points, e.g. all access points on a certain
floor in a building, such as a hotel corridor. The designation could be “Second floor”. Then,
this group can be allocated to the relevant cleaning team employees who receive the access
authorisations they require to work on the floors.
Groups can be freely defined and set up, but are often already present as an organisational
unit of the company (such as “Accounting”, “Development” etc.) and can be directly
accepted for access control. The access authorisations are immediately assigned when a
new employee joins the organisational unit.
Allocation of access authorisations is simplified enormously by using group authorisation
assignment. At the same time, the system becomes comprehensible and easy to display, so
that even security-related evaluations are possible, unlike the situation when countless
individual access rights are allocated.
1.1.1.3. Allocation of rights using role models
The establishment and allocation of role-based access authorisation to employees is another
powerful function of the Dialock PROFESSIONAL, software which strongly rationalises the
organisation of the access control:
The bigger an organisation is, the more comprehensive the property and the greater the
number of persons, and the more difficult it is to ensure that data storage is consistent
throughout the organisation. The restructuring that is taking place all the time, particularly in
large, dynamically expanding companies, and project-related, time-limited team structuring
therefore require higher-order, functional authorisation control.
In this case, role-based concepts are then taken as a basis for the allocation of
authorisations. When doing this, authorisations are no longer assigned directly to each
individual person, but to a role, i.e. a task or a process. The employees can then have one
or more of the defined roles assigned to them.