Shopping Cart

No products in the cart.

BS EN IEC 60839-11-33:2021

$215.11

Alarm and electronic security systems – Electronic access control systems. Access control configuration based on Web services

Published By Publication Date Number of Pages
BSI 2021 188
Guaranteed Safe Checkout
Category:

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
2 undefined
5 Annex ZA (normative)Normative references to international publicationswith their corresponding European publications
7 English
CONTENTS
13 FOREWORD
15 INTRODUCTION
16 1 Scope
2 Normative references
17 3 Terms and definitions
20 4 Overview
4.1 General
21 4.2 Namespaces
Figures
Figure 1 – Overview of service dependencies
Tables
Table 1 – Defined namespaces in this document
Table 2 – Referenced namespaces (with prefix)
22 4.3 Error handling
5 Credential service
5.1 General
23 5.2 Service capabilities
5.2.1 General
5.2.2 ServiceCapabilities data structure
Figure 2 – Main data structures in the credential service
24 5.2.3 GetServiceCapabilities command
Table 3 – GetServiceCapabilities command
25 5.3 Credential information
5.3.1 General
5.3.2 Data structures
28 5.3.3 GetCredentialInfoList command
Table 4 – GetCredentialInfo command
29 5.3.4 GetCredentials command
Table 5 – GetCredentialInfoList command
30 5.3.5 GetCredentialList command
Table 6 – GetCredentials command
31 5.3.6 CreateCredential command
Table 7 – GetCredentialList command
32 Table 8 – CreateCredential command
33 5.3.7 SetCredential command
34 Table 9 – SetCredential command
35 5.3.8 ModifyCredential command
36 5.3.9 DeleteCredential command
Table 10 – ModifyCredential command
37 5.3.10 GetCredentialState command
5.3.11 EnableCredential command
Table 11 – DeleteCredential command
Table 12 – GetCredentialState command
38 5.3.12 DisableCredential command
5.3.13 ResetAntipassbackViolation command
Table 13 – EnableCredential command
Table 14 – DisableCredential command
39 5.3.14 GetSupportedFormatTypes command
5.3.15 GetCredentialIdentifiers command
Table 15 – ResetAntipassbackViolation command
Table 16 – GetSupportedFormatTypes command
40 5.3.16 SetCredentialIdentifier command
Table 17 – GetCredentialIdentifiers command
Table 18 – SetCredentialIdentifier command
41 5.3.17 DeleteCredentialIdentifier command
5.3.18 GetCredentialAccessProfiles command
Table 19 – DeleteCredentialIdentifier command
Table 20 – GetCredentialAccessProfiles command
42 5.3.19 SetCredentialAccessProfiles command
5.3.20 DeleteCredentialAccessProfiles command
Table 21 – SetCredentialAccessProfiles command
43 5.4 Notification topics
5.4.1 General
5.4.2 Event overview (informative)
5.4.3 Status changes
Table 22 – DeleteCredentialAccessProfiles command
44 5.4.4 Configuration changes
45 6 Access rules service
6.1 General
Figure 3 – Main data structures in the access rules service
46 6.2 Service capabilities
6.2.1 General
6.2.2 ServiceCapabilities data structure
6.2.3 GetServiceCapabilities command
6.3 Access profile information
6.3.1 General
Table 23 – GetServiceCapabilities command
47 6.3.2 Data structures
6.3.3 GetAccessProfileInfo command
48 6.3.4 GetAccessProfileInfoList command
Table 24 – GetAccessProfileInfo command
49 6.3.5 GetAccessProfiles command
Table 25 – GetAccessProfileInfoList command
50 6.3.6 GetAccessProfileList command
Table 26 – GetAccessProfiles command
51 6.3.7 CreateAccessProfile command
Figure 4 – Multiple schedules per access point
Table 27 – GetAccessProfileList command
52 6.3.8 SetAccessProfile command
Figure 5 – Result of schedule union
Table 28 – CreateAccessProfile command
53 6.3.9 ModifyAccessProfile command
Table 29 – SetAccessProfile command
54 6.3.10 DeleteAccessProfile command
Table 30 – ModifyAccessProfile command
55 6.4 Notification topics
6.4.1 General
6.4.2 Event overview (informative)
6.4.3 Configuration changes
Table 31 – DeleteAccessProfile command
56 7 Authentication behaviour service
7.1 General
7.2 Example
Table 32 – Example of schedule state to security level mapping
57 7.3 Service capabilities
7.3.1 General
7.3.2 ServiceCapabilities data structure
Figure 6 – Authentication behaviour example
58 7.3.3 GetServiceCapabilities command
7.4 Authentication profile information
7.4.1 General
Table 33 – GetServiceCapabilities command
59 7.4.2 Data structures
Figure 7 – Related objects of an authentication profile
60 7.4.3 GetAuthenticationProfileInfo command
61 7.4.4 GetAuthenticationProfileInfoList command
Table 34 – GetAuthenticationProfileInfo command
62 7.4.5 GetAuthenticationProfiles command
Table 35 – GetAuthenticationProfileInfoList command
63 7.4.6 GetAuthenticationProfileList command
Table 36 – GetAuthenticationProfiles command
64 7.4.7 CreateAuthenticationProfile command
Table 37 – GetAuthenticationProfileList command
65 7.4.8 SetAuthenticationProfile command
Table 38 – CreateAuthenticationProfile command
66 7.4.9 ModifyAuthenticationProfile command
Table 39 – SetAuthenticationProfile command
67 7.4.10 DeleteAuthenticationProfile command
Table 40 – ModifyAuthenticationProfile command
68 7.5 Security level information
7.5.1 General
Figure 8 – Related objects of a security level
Table 41 – DeleteAuthenticationProfile command
69 7.5.2 Data structures
70 Figure 9 – Security level examples
71 7.5.3 GetSecurityLevelInfo command
7.5.4 GetSecurityLevelInfoList command
Table 42 – GetSecurityLevelInfo command
72 7.5.5 GetSecurityLevels command
Table 43 – GetSecurityLevelInfoList command
73 7.5.6 GetSecurityLevelList command
Table 44 – GetSecurityLevels command
74 7.5.7 CreateSecurityLevel command
Table 45 – GetSecurityLevelList command
75 7.5.8 SetSecurityLevel command
Table 46 – CreateSecurityLevel command
76 7.5.9 ModifySecurityLevel command
Table 47 – SetSecurityLevel command
77 7.5.10 DeleteSecurityLevel command
Table 48 – ModifySecurityLevel command
Table 49 – DeleteSecurityLevel command
78 7.6 Notification topics
7.6.1 General
7.6.2 Event overview (informative)
7.6.3 Configuration changes
79 8 Schedule service
8.1 General
Figure 10 – Main data structures in the schedule service
81 8.2 Recurrence
8.2.1 General
8.2.2 Weekly recurrence
Figure 11 – Recurrence support matrix
82 8.2.3 Extended recurrence
8.2.4 Standard schedule recurrence
8.2.5 Special day recurrence
Figure 12 – Recurring events with an exception
83 8.3 Service capabilities
8.3.1 General
8.3.2 ServiceCapabilities data structure
Figure 13 – Recurring events with a special day
84 8.3.3 GetServiceCapabilities command
8.4 Schedule information
8.4.1 General
8.4.2 Data structures
Table 50 – GetServiceCapabilities command
86 Figure 14 – SpecialDaysSchedule example
Figure 15 – Example of special day with time part
87 8.4.3 GetScheduleInfo command
88 8.4.4 GetScheduleInfoList command
Table 51 – GetScheduleInfo command
89 8.4.5 GetSchedules command
Table 52 – GetScheduleInfoList command
90 8.4.6 GetScheduleList command
Table 53 – GetSchedules command
91 8.4.7 CreateSchedule command
Table 54 – GetScheduleList command
92 8.4.8 SetSchedule command
Table 55 – CreateSchedule command
93 8.4.9 ModifySchedule command
Table 56 – SetSchedule command
94 8.4.10 DeleteSchedule command
Table 57 – ModifySchedule command
Table 58 – DeleteSchedule command
95 8.5 Special day group information
8.5.1 General
8.5.2 Data structures
8.5.3 GetSpecialDayGroupInfo command
96 8.5.4 GetSpecialDayGroupInfoList command
Table 59 – GetSpecialDayGroupInfo command
97 8.5.5 GetSpecialDayGroups command
Table 60 – GetSpecialDayGroupInfoList command
98 8.5.6 GetSpecialDayGroupList command
Table 61 – GetSpecialDayGroups command
99 8.5.7 CreateSpecialDayGroup command
Table 62 – GetSpecialDayGroupList command
100 8.5.8 SetSpecialDayGroup command
Table 63 – CreateSpecialDayGroup command
101 8.5.9 ModifySpecialDayGroup command
Table 64 – SetSpecialDayGroup command
102 8.5.10 DeleteSpecialDayGroup command
8.6 Schedule status
8.6.1 ScheduleState data structure
Table 65 – ModifySpecialDayGroup command
Table 66 – DeleteSpecialDayGroup command
103 8.6.2 GetScheduleState command
Figure 16 – Schedule states
104 8.7 Notification topics
8.7.1 General
8.7.2 Event overview (informative)
8.7.3 Status changes
Table 67 – GetScheduleState command
105 8.7.4 Configuration changes
106 8.8 Examples
8.8.1 General
8.8.2 Access 24 × 7 for admin staff
8.8.3 Access on Monday and Wednesday from 06:00 to 20:00 for cleaning staff
8.8.4 Access from Friday 18:00 to 07:00 for maintenance staff
107 8.8.5 Access on weekdays from 08:00 to 17:00 for employees
108 8.8.6 Access from January 15, 2014, to January 14, 2015, from 09:00 to 18:00
8.8.7 Special days example 1
109 8.8.8 Special days example 2
111 8.8.9 Special days example 3
112 Annex A (normative)Access control interface XML schemata
A.1 Credential service WSDL
132 A.2 Access rules service WSDL
142 A.3 Authentication behaviour service WSDL
160 A.4 Schedule service WSDL
179 Annex B (informative)Mapping of mandatory functions in IEC 60839-11-1
180 Table B.1 – Access point interface requirements
181 Table B.2 – Indication and annunciation requirements
184 Table B.3 – Recognition requirements
185 Table B.4 – Duress signalling requirements
186 Table B.5 – Overriding requirements
Table B.6 – System self protection requirements
187 Bibliography
BS EN IEC 60839-11-33:2021
$215.11