Learning about Programming/Auditing
Programming & Auditing is the Ambiance module where you can perform the data transfers necessary to program locks and devices, and audit locks. The M-Unit (Maintenance Unit) is the hand-held device used to transfer data between the Ambiance workstation and locks. During programming, configuration data is transferred from the Ambiance workstation to the M-Unit to the locks. To audit locks, historical data is transferred from the locks to the M-Unit and then to the Ambiance workstation.
Transferring data from the M-Unit to a workstation requires the Ambiance Client. Download and install the client from the main toolbar in the Programming & Auditing or Device Management module.
![]() |
Prior to locks being programmed for the first time, access points are accessible using the Construction (or Zone) Keys distributed with the software. |
Programming locks
Each lock must be programmed with the respective access definition configured in Ambiance. The process involves selecting the access points that you want to synchronize, transferring configuration data from the Ambiance workstation to the M-Unit , then connecting the M-Unit to each lock for programming.
Ambiance provides a filter feature to make it easy to identify the access points that require synchronization. Although all access points require synchronization for initial site configuration, the filter feature is useful if you program locks in batches, add access points, or make changes to the access configuration for locks.
The following color codes identify the access point types that require synchronization.
Color |
Description |
---|---|
|
Guest Room |
|
Guest Common Area |
|
Suite Common Door |
|
Suite Inner Door |
|
Foyer Door |
|
Meeting Room |
|
Restricted Area |
|
Staff Common Area |
|
Elevator readers |
Access point programming required
Access points must be programmed or reprogrammed after specific tasks in the following modules:
Property Builder
- After adding or modifying the configuration of any of the following access point types:
- Guest Rooms
- Suite Common Door and Inner Doors
- Foyer Doors
- Meeting Rooms
- Restricted Areas
- Guest Common Areas
- Staff Common Areas
- Elevator Reader
- After configuring or modifying elevator floor-to-relay mapping.
Access Management > Auto-Unlatch Schedules
- After editing an Auto-Unlatch schedule.
Access Management > Access Schedules
- After editing an Access schedule.
Access Management > Access Point Groups
- After assigning/unassigning access points from access point groups which are assigned to credentials.
Access Management > Credential Management
- After assigning/unassigning access point groups to/from credentials.
- After assigning/unassigning access points to/from credentials.
Access Management > Access Point Scheduling
- After assigning/unassigning an Auto-Unlatch schedule.
- After assigning/unassigning an Access Schedule.
System Settings > Security
- After modifying Lock Access settings.
- After enabling Enhanced Security Mode.
- After terminating active legacy keys under Enhanced Security Mode.
System Settings > Staff Keys
- After modifying the Maximum number of times Staff Limited Use keys are valid setting.
System Settings > Advanced Settings > RFID Key Types
- After modifying any of the RFID key types settings, all access points must be reprogrammed.
System Settings > Advanced Settings > Enable mobile keys
- After modifying the Project ID in LEGIC settings, all access points that are enabled for mobile keys must be reprogrammed.
System Settings > Online Communication > Rx-Link
- After enabling or disabling this setting, all online access points must be reprogrammed.
Programming devices
The feature to program devices is available when online communication is enabled. The device must first be configured in
A maximum of 240 devices can be programmed simultaneously. Programming devices requires a USB connection. Upon data transfer, the date/time on the M-Unit is synchronized with the server. When the USB connection is present and no devices are selected, the option to synchronize date/time on the M-Unit is available. Without a USB connection, the option to save configuration data is available for some device types.Auditing locks
A lock audit retrieves detailed information about an access point. Audits retrieve access point data (such as the lock model and access point type), lock status data (such as the firmware version or time zone), and all activity for the lock. Audit data from both methods is stored in the Ambiance database and available when generating Access Point Audit Reports.
Depending on the purpose, the following methods are available for lock audits:
-
Audit Key—The Audit Key is a Special Function System Key that can be presented to a lock then read in Ambiance.
-
M-Unit —The M-Unit procedure transfers audit data to the M-Unit. Another step is required to transfer the interrogation files to Ambiance for viewing. The M-Unit procedure is the option to choose to store and track historical data about access point activity.
Auditing online access points
When online communication is enabled in System Settings, online access points can be audited directly in Ambiance.
Ambiance 2.12
Copyright © dormakaba 2024. All rights reserved.
AmbianceTM Software Terms of Use FNL10-02-2023 / Third-party licenses