BS EN IEC 60839-11-33:2021
$215.11
Alarm and electronic security systems – Electronic access control systems. Access control configuration based on Web services
Published By | Publication Date | Number of Pages |
BSI | 2021 | 188 |
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
5 | Annex ZA (normative)Normative references to international publicationswith their corresponding European publications |
7 | English CONTENTS |
13 | FOREWORD |
15 | INTRODUCTION |
16 | 1 Scope 2 Normative references |
17 | 3 Terms and definitions |
20 | 4 Overview 4.1 General |
21 | 4.2 Namespaces Figures Figure 1 – Overview of service dependencies Tables Table 1 – Defined namespaces in this document Table 2 – Referenced namespaces (with prefix) |
22 | 4.3 Error handling 5 Credential service 5.1 General |
23 | 5.2 Service capabilities 5.2.1 General 5.2.2 ServiceCapabilities data structure Figure 2 – Main data structures in the credential service |
24 | 5.2.3 GetServiceCapabilities command Table 3 – GetServiceCapabilities command |
25 | 5.3 Credential information 5.3.1 General 5.3.2 Data structures |
28 | 5.3.3 GetCredentialInfoList command Table 4 – GetCredentialInfo command |
29 | 5.3.4 GetCredentials command Table 5 – GetCredentialInfoList command |
30 | 5.3.5 GetCredentialList command Table 6 – GetCredentials command |
31 | 5.3.6 CreateCredential command Table 7 – GetCredentialList command |
32 | Table 8 – CreateCredential command |
33 | 5.3.7 SetCredential command |
34 | Table 9 – SetCredential command |
35 | 5.3.8 ModifyCredential command |
36 | 5.3.9 DeleteCredential command Table 10 – ModifyCredential command |
37 | 5.3.10 GetCredentialState command 5.3.11 EnableCredential command Table 11 – DeleteCredential command Table 12 – GetCredentialState command |
38 | 5.3.12 DisableCredential command 5.3.13 ResetAntipassbackViolation command Table 13 – EnableCredential command Table 14 – DisableCredential command |
39 | 5.3.14 GetSupportedFormatTypes command 5.3.15 GetCredentialIdentifiers command Table 15 – ResetAntipassbackViolation command Table 16 – GetSupportedFormatTypes command |
40 | 5.3.16 SetCredentialIdentifier command Table 17 – GetCredentialIdentifiers command Table 18 – SetCredentialIdentifier command |
41 | 5.3.17 DeleteCredentialIdentifier command 5.3.18 GetCredentialAccessProfiles command Table 19 – DeleteCredentialIdentifier command Table 20 – GetCredentialAccessProfiles command |
42 | 5.3.19 SetCredentialAccessProfiles command 5.3.20 DeleteCredentialAccessProfiles command Table 21 – SetCredentialAccessProfiles command |
43 | 5.4 Notification topics 5.4.1 General 5.4.2 Event overview (informative) 5.4.3 Status changes Table 22 – DeleteCredentialAccessProfiles command |
44 | 5.4.4 Configuration changes |
45 | 6 Access rules service 6.1 General Figure 3 – Main data structures in the access rules service |
46 | 6.2 Service capabilities 6.2.1 General 6.2.2 ServiceCapabilities data structure 6.2.3 GetServiceCapabilities command 6.3 Access profile information 6.3.1 General Table 23 – GetServiceCapabilities command |
47 | 6.3.2 Data structures 6.3.3 GetAccessProfileInfo command |
48 | 6.3.4 GetAccessProfileInfoList command Table 24 – GetAccessProfileInfo command |
49 | 6.3.5 GetAccessProfiles command Table 25 – GetAccessProfileInfoList command |
50 | 6.3.6 GetAccessProfileList command Table 26 – GetAccessProfiles command |
51 | 6.3.7 CreateAccessProfile command Figure 4 – Multiple schedules per access point Table 27 – GetAccessProfileList command |
52 | 6.3.8 SetAccessProfile command Figure 5 – Result of schedule union Table 28 – CreateAccessProfile command |
53 | 6.3.9 ModifyAccessProfile command Table 29 – SetAccessProfile command |
54 | 6.3.10 DeleteAccessProfile command Table 30 – ModifyAccessProfile command |
55 | 6.4 Notification topics 6.4.1 General 6.4.2 Event overview (informative) 6.4.3 Configuration changes Table 31 – DeleteAccessProfile command |
56 | 7 Authentication behaviour service 7.1 General 7.2 Example Table 32 – Example of schedule state to security level mapping |
57 | 7.3 Service capabilities 7.3.1 General 7.3.2 ServiceCapabilities data structure Figure 6 – Authentication behaviour example |
58 | 7.3.3 GetServiceCapabilities command 7.4 Authentication profile information 7.4.1 General Table 33 – GetServiceCapabilities command |
59 | 7.4.2 Data structures Figure 7 – Related objects of an authentication profile |
60 | 7.4.3 GetAuthenticationProfileInfo command |
61 | 7.4.4 GetAuthenticationProfileInfoList command Table 34 – GetAuthenticationProfileInfo command |
62 | 7.4.5 GetAuthenticationProfiles command Table 35 – GetAuthenticationProfileInfoList command |
63 | 7.4.6 GetAuthenticationProfileList command Table 36 – GetAuthenticationProfiles command |
64 | 7.4.7 CreateAuthenticationProfile command Table 37 – GetAuthenticationProfileList command |
65 | 7.4.8 SetAuthenticationProfile command Table 38 – CreateAuthenticationProfile command |
66 | 7.4.9 ModifyAuthenticationProfile command Table 39 – SetAuthenticationProfile command |
67 | 7.4.10 DeleteAuthenticationProfile command Table 40 – ModifyAuthenticationProfile command |
68 | 7.5 Security level information 7.5.1 General Figure 8 – Related objects of a security level Table 41 – DeleteAuthenticationProfile command |
69 | 7.5.2 Data structures |
70 | Figure 9 – Security level examples |
71 | 7.5.3 GetSecurityLevelInfo command 7.5.4 GetSecurityLevelInfoList command Table 42 – GetSecurityLevelInfo command |
72 | 7.5.5 GetSecurityLevels command Table 43 – GetSecurityLevelInfoList command |
73 | 7.5.6 GetSecurityLevelList command Table 44 – GetSecurityLevels command |
74 | 7.5.7 CreateSecurityLevel command Table 45 – GetSecurityLevelList command |
75 | 7.5.8 SetSecurityLevel command Table 46 – CreateSecurityLevel command |
76 | 7.5.9 ModifySecurityLevel command Table 47 – SetSecurityLevel command |
77 | 7.5.10 DeleteSecurityLevel command Table 48 – ModifySecurityLevel command Table 49 – DeleteSecurityLevel command |
78 | 7.6 Notification topics 7.6.1 General 7.6.2 Event overview (informative) 7.6.3 Configuration changes |
79 | 8 Schedule service 8.1 General Figure 10 – Main data structures in the schedule service |
81 | 8.2 Recurrence 8.2.1 General 8.2.2 Weekly recurrence Figure 11 – Recurrence support matrix |
82 | 8.2.3 Extended recurrence 8.2.4 Standard schedule recurrence 8.2.5 Special day recurrence Figure 12 – Recurring events with an exception |
83 | 8.3 Service capabilities 8.3.1 General 8.3.2 ServiceCapabilities data structure Figure 13 – Recurring events with a special day |
84 | 8.3.3 GetServiceCapabilities command 8.4 Schedule information 8.4.1 General 8.4.2 Data structures Table 50 – GetServiceCapabilities command |
86 | Figure 14 – SpecialDaysSchedule example Figure 15 – Example of special day with time part |
87 | 8.4.3 GetScheduleInfo command |
88 | 8.4.4 GetScheduleInfoList command Table 51 – GetScheduleInfo command |
89 | 8.4.5 GetSchedules command Table 52 – GetScheduleInfoList command |
90 | 8.4.6 GetScheduleList command Table 53 – GetSchedules command |
91 | 8.4.7 CreateSchedule command Table 54 – GetScheduleList command |
92 | 8.4.8 SetSchedule command Table 55 – CreateSchedule command |
93 | 8.4.9 ModifySchedule command Table 56 – SetSchedule command |
94 | 8.4.10 DeleteSchedule command Table 57 – ModifySchedule command Table 58 – DeleteSchedule command |
95 | 8.5 Special day group information 8.5.1 General 8.5.2 Data structures 8.5.3 GetSpecialDayGroupInfo command |
96 | 8.5.4 GetSpecialDayGroupInfoList command Table 59 – GetSpecialDayGroupInfo command |
97 | 8.5.5 GetSpecialDayGroups command Table 60 – GetSpecialDayGroupInfoList command |
98 | 8.5.6 GetSpecialDayGroupList command Table 61 – GetSpecialDayGroups command |
99 | 8.5.7 CreateSpecialDayGroup command Table 62 – GetSpecialDayGroupList command |
100 | 8.5.8 SetSpecialDayGroup command Table 63 – CreateSpecialDayGroup command |
101 | 8.5.9 ModifySpecialDayGroup command Table 64 – SetSpecialDayGroup command |
102 | 8.5.10 DeleteSpecialDayGroup command 8.6 Schedule status 8.6.1 ScheduleState data structure Table 65 – ModifySpecialDayGroup command Table 66 – DeleteSpecialDayGroup command |
103 | 8.6.2 GetScheduleState command Figure 16 – Schedule states |
104 | 8.7 Notification topics 8.7.1 General 8.7.2 Event overview (informative) 8.7.3 Status changes Table 67 – GetScheduleState command |
105 | 8.7.4 Configuration changes |
106 | 8.8 Examples 8.8.1 General 8.8.2 Access 24 × 7 for admin staff 8.8.3 Access on Monday and Wednesday from 06:00 to 20:00 for cleaning staff 8.8.4 Access from Friday 18:00 to 07:00 for maintenance staff |
107 | 8.8.5 Access on weekdays from 08:00 to 17:00 for employees |
108 | 8.8.6 Access from January 15, 2014, to January 14, 2015, from 09:00 to 18:00 8.8.7 Special days example 1 |
109 | 8.8.8 Special days example 2 |
111 | 8.8.9 Special days example 3 |
112 | Annex A (normative)Access control interface XML schemata A.1 Credential service WSDL |
132 | A.2 Access rules service WSDL |
142 | A.3 Authentication behaviour service WSDL |
160 | A.4 Schedule service WSDL |
179 | Annex B (informative)Mapping of mandatory functions in IEC 60839-11-1 |
180 | Table B.1 – Access point interface requirements |
181 | Table B.2 – Indication and annunciation requirements |
184 | Table B.3 – Recognition requirements |
185 | Table B.4 – Duress signalling requirements |
186 | Table B.5 – Overriding requirements Table B.6 – System self protection requirements |
187 | Bibliography |