Integration overview for the Key Systems Security Asset Manager plugin - Key Systems Security Asset Manager 3.0.0

Key Systems Security Asset Manager Plugin Guide 3.0.0

Applies to
Key Systems Security Asset Manager 3.0.0
Last updated
2024-03-01
Content type
Guides > Plugin and extension guides
Language
English
Product
Key Systems Security Asset Manager
Version
3.0

You can integrate the Key Systems Security Asset Manager into Security Center using the Key Systems Security Asset Manager plugin by following a sequence of steps.

The following table lists the tasks required for the integration with Security Center, and how to verify that the integration was successful.
Step Task Where to find more information
Understand prerequisites and key issues before deploying
1 Learn what you can do using the plugin.
2 Before installing the plugin, read the release notes to learn about the known issues and limitations.
3 Learn about the different components and how they connect.
4 Ensure that the server where the plugin is installed meets the recommended system requirements and is running a compatible version of Security Center.
Prepare Security Center
5 In Security Center, create a georeferenced map. Maps can enhance your situation awareness as you represent and control your security devices directly on maps.
6 Verify that the Security Center license has a valid certificate for the plugin. Go to the Config Tool homepage, click About > Certificates, and confirm that Key Systems Security Asset Manager is in the list.
Deploy the plugin
7 On a Security Center server, download the plugin and install it.
8 Grant users the privileges that they need to use the plugin.
  • Required privileges.
  • Administrators need the Add roles, Delete roles, and Plugins privileges.
  • Security Desk operators do not need special privileges to use this plugin.
9 In Config Tool, create the Key Systems Security Asset Manager plugin role.
10 Schedule regular cleaning and backing up of the plugin database.
11 Enable failover on the plugin role.
12 Connect the plugin to the proxy.
NOTE:
  • If the plugin and the cabinet are deployed on the same closed network, connect to a local proxy.
  • If the plugin and the cabinet are not deployed on the same closed network, connect to a remote proxy.
13 Add your Key Systems cabinets.
14 Create your asset groups.
15 Assign access rules to your assets.
16 Assign cameras to your cabinets.
17 Monitor cabinets, assets, and events from the Security Desk Monitoring task.