Access Control: Difference between revisions

From Luminys WIKI
No edit summary
No edit summary
Line 20: Line 20:
*[[Access_Control/Device_and_User_Management | Device and User Management]]
*[[Access_Control/Device_and_User_Management | Device and User Management]]
*[[Access_Control/Time_Plan_and_Permission_Settings | Time Plan and Permission Settings]]
*[[Access_Control/Time_Plan_and_Permission_Settings | Time Plan and Permission Settings]]
*[[test10 | Door Parameter Settings]]
*[[test10 | Bluetooth Functions]]
*[[test10 | Bluetooth Functions]]
*[[test10 | Advanced Functions]]
*[[test10 | Advanced Functions]]
Line 28: Line 27:
*[[Access_Control/USB Card Issuer - WebUI| Using a USB Card Issuer via WebUI]]
*[[Access_Control/USB Card Issuer - WebUI| Using a USB Card Issuer via WebUI]]
*[[Access_Control/PIN Unlocking - WebUI| Setting Up PIN Unlocking via WebUI]]
*[[Access_Control/PIN Unlocking - WebUI| Setting Up PIN Unlocking via WebUI]]
*[[Access_Control/Door Parameters - WebUI | Modifying Door Parameters via WebUI]]
*[[Access_Control/Time Templates - WebUI| Creating Time Templates via WebUI]]


=====LumiViewer Configuration=====
=====LumiViewer Configuration=====
*[[Access_Control/USB Card Issuer - LumiViewer | Using a USB Card Issuer via LumiViewer]]
*[[Access_Control/USB Card Issuer - LumiViewer | Using a USB Card Issuer via LumiViewer]]
*[[Access_Control/PIN Unlocking - LumiViewer | Setting Up PIN Unlocking via LumiViewer]]
*[[Access_Control/PIN Unlocking - LumiViewer | Setting Up PIN Unlocking via LumiViewer]]
*[[Access_Control/Door Parameters - LumiViewer | Modifying Door Parameters via LumiViewer]]
*[[Access_Control/Time Templates - LumiViewer | Creating Time Templates via LumiViewer]]


|-|
|-|

Revision as of 11:10, 3 September 2025

Access Control Instructions

Models Description
Luminys Access Control: Secure, Scalable, and Smart Solutions for Modern Facilities. Manage up to 30 doors with the powerful C-2PA Web Access Controller and advanced card readers. Luminys access solutions provide centralized control, real-time monitoring, and flexible credentialing to fit any security environment.