How the Medeco XT plugin works with Security Center - Medeco XT 3.1

Medeco XT Intelligent Key Plugin Guide 3.1.0

Applies to
Medeco XT 3.1
Last updated
2023-10-23
Content type
Guides > Plugin and extension guides
Language
English
Product
Medeco XT
Version
3.1

A Medeco XT integration in Security Center is comprised of several components installed on different computers over an IP network.

Components of Medeco XT integration

Architecture diagram for Medeco XT integration
Medeco XT Plugin
The Medeco XT plugin is installed on a Security Center server and runs as a plugin role.
Config Tool
The Medeco XT plugin is also installed on a Config Tool workstation. The Security Center administrator uses Config Tool to create and configure the plugin role.
Security Desk
The Medeco XT plugin is installed on all Security Desk workstations.
Medeco XT door lock cylinders, padlocks, and intelligent keys
Cylinders are offline units, which are powered by intelligent keys when being accessed. They store audit trails and blocklists.
Intelligent keys are battery powered. They store access rules, schedules, and audit trails. A key can be configured to upload blocklists when it is inserted in a cylinder. For detailed product descriptions and related documentation, see https://www.medeco.com/en/technology/ecylinder/medeco-xt1/.
Medeco key programming station
A programming station is a workstation that runs the Medeco XT Key Programmer software. The programming station configures electronic keys. In Security Center, this device is represented by the programming station entity. When a key is inserted in the Medeco XT programming station, the station downloads access rules and schedules to the key; and uploads audit trail events to Security Center.

Work flow

  1. Install offline electronic cylinders in openings.
  2. Issue access rights and schedules to credentials from Security Desk.
  3. Program the Medeco XT keys by inserting them in the key programming workstation. This downloads audit trails and uploads the latest access rights.
  4. Investigate events using reports and manage blocklisted keys in Security Desk.