Deploying your access control system - Security Center 5.7

Security Center Administrator Guide 5.7

Applies to
Security Center 5.7
Last updated
Content type
Guides > Administrator guides
English (United States)
Security Center

To integrate a variety of access control capabilities and provide end-to-end IP connectivity, you can deploy your access control system once the pre-configuration steps are completed.

What you should know

A Security Center system can be deployed with access control only (Synergis™ alone), or access control with video integration (Synergis™ with Omnicast™). It does not matter whether the video or the access control system is set up first.
NOTE: Unless otherwise specified, you can perform the following steps in any order.


  1. Use the Admin account on Config Tool to connect to your system.
  2. Create a partition for each independent group of entities.
    By defining the partitions first, you will not have to move entities around after you have created them.
  3. To organize the entities in your system (areas, doors, and so on), configure the area view.
  4. Configure the system-wide settings for access control.
  5. Configure the Access Manager roles.
  6. Define custom fields for your system entities.
  7. Discover and enroll access control units.

    The Access Manager role needs to detect the door controllers over the IP network.

  8. Configure the newly enrolled access control units and the interface modules that are attached to them.
  9. Create doors and configure the wiring of the readers, sensors, locks, and so on to the access control units.
  10. Create elevators and configure the wiring of the cabin reader and floor buttons to the access control units.
  11. Create schedules, such as open and closed hours, holidays, and so on.
  12. Create access rules and link the rules to doors and schedules.
  13. Transform the areas in the area view into secured areas with access rules, perimeter doors, and advanced access control behaviors.
  14. Create cardholder groups and create cardholders, and then link them to the access rules.
  15. Create badge templates.
  16. Create credentials.
  17. Create user groups and create users.
  18. Create alarms.
  19. Create threat levels.

After you finish

Test your configuration.