Glossary

A

Access Control System

The software platform (for example, Salto Space) used to control which users are able to access which doors.

Access level

A defined group of users with the same access permissions. For example, all staff in a department or all managerial staff.

Access point

Represents either one smart electronic locking device or a collection of devices capable of granting or denying access to a secured area, such as a room, office or apartment. An access point may also serve to lock/unlock secured containers like cabinets, drawers or lockers. In the real world, it can take on different forms. For example, a door equipped with an electronic escutcheon or a cylinder, a controller with an electric strike, or a padlock. An access point could also represent a turnstile or a car park barrier.

An access point frequently represents one single physical electronic lock. However, an access point could also be made up of more than one device. For example, it could be composed of an electronic lock and a contact sensor or a controller and a reader with a keypad.

The term access point in Salto software products should not be confused with the generic term wireless access point, which is a networking hardware device that allows other WiFi devices to connect to a wired network.

Access point group

A specified collection of access points that are grouped together to make them easier to manage.

For example, an access point group could be all the doors on the first floor of an installation, or all the lockers in the gym area, or all the doors in the financial services department.

Access point timed period

Defines the time interval in which an access point operates in a specified working mode. For example, timed office mode or automatic opening mode.

Access right

Represents a materialized view or snapshot of access permissions. Access rights simplify the management of access permissions for large sets of users with similar access profiles. For example, all staff in a department or all managerial staff. An access right can be associated with multiple access points.

Access right schedule

When creating access rights, you can set access points to be available on certain days at certain hours for any user who has that access right assigned to them. In one step, a selection of users can get the same schedule for the same set of access points.

Activity

Activity details different types of events that are taking place within an installation. For example, a user with a management role can see when an access point was created or whether an electronic lock has been unlocked. Activity is composed of two broad types of events - system events and device events.

Admin interface

A superset of menu options and screens within Space. This refers specifically to the various options and quick-access tiles that are displayed to an operator with admin rights.

Advanced Encryption Standard (AES)

AES is a symmetric encryption algorithm that is widely used across the globe to secure data. It operates on fixed-size blocks of data and supports key sizes of 128, 192, and 256 bits.

AMOK lock

A type of lock that allows you to perform manual lockdowns for offline doors in emergency situations. These are commonly used in university installations, for example.

Antipassback

A security mechanism that prevents a person from using a key to enter an area a second time without first exiting (so that the card cannot be passed back to a second person who wants to enter).

App key

A type of digital key that resides within the Salto Nebula and Homelok mobile apps. App keys allow you to use your Bluetooth-capable iPhone or Android phone as your key by opening the app and presenting your device to an electronic lock.

Apple Wallet key

Apple Wallet keys are digital keys that reside in the Apple Wallet on your iPhone and Apple Watch. By using near-field communication (NFC) to communicate with electronic locks, the same technology used by contactless key fobs or keycards, they offer a fast and reliable digital key experience on Apple devices.

Application identifier (AID)

A number code that defines and determines a specific application, thus distinguishing it from others within a multi-application card.

Application master key (AMK)

Refers to the code that prevents access to data in a specific application within a multi-application card in order to protect this data.

Audit trail

A chronological list of events for each access point showing a date and time stamp for each event. It shows events for the previous seven days by default, but you can see earlier events by defining the specific date range in the Date/Time filter.

Authorization list

A list of authorization numbers for zones, outputs, and associated devices in a hotel for which guest access is optional. You must create an authorization list if you are using PMS software with the Salto software.

B

Biometrics

Measurements taken of facial characteristics and features that form a unique identifier for a user. Biometric authentication is used as a form of identification and access control. The term expands simply to biological measurements and while it is extracted from pictures of a person, it cannot be used to recreate a picture.

BLUEnet

A Salto wireless technology used for network communication of access control devices where real-time control is required. BLUEnet leverages Bluetooth Low Energy technology to ensure that battery-powered smart locks collect and send information to and from the software.

Bluetooth Low Energy

This technology is used in Salto Bluetooth Low Energy readers to read data from Salto apps. Bluetooth Low Energy connections are established when a digital key is presented to an electronic lock, for example.

Building automation system (BAS)

A smart system of hardware and software that connects the systems in a building, such as access control, HVAC (heating, venting and air conditioning), lighting, security, etc., to communicate on a single platform.

C

Card key

Refers to a physical key such as a fob, wristband or keycard. Card keys can be encoded using an online access point.

Cardholder

A generic term that covers all persons issued with a key. There can be three types of cardholders in Space:

  • Users, who are generally the staff of an organization.

  • Visitors, who are people requiring temporary access to a site for a specified time period, for example, to do site maintenance.

  • And guests, who are given a key to allow access for the duration of their stay at a hotel.

Cardholder timetables

Define the time periods during which a cardholder's key is valid and can be used with a site's access points.

Connection type

Specified when adding a door or room to the system. There are five different connection types (online and offline) for doors in the Salto system.

Controller

Controllers are mains-wired hardware devices that can be used to control access where a standalone lock cannot be fitted. For example, on car park barriers, turnstiles or sliding doors. They allow the management of multiple accesses from a single device. For example, one single controller could control access to both the entrance and exit of a building via a turnstile. Controllers are also often referred to as "control units".

Coordinated Universal Time (UTC)

Coordinated Universal Time (UTC) is the primary time standard by which the world regulates clocks and time. All other time zones are expressed as offsets from UTC. For example, the time zone in London is UTC+0, while the time zone in New York is UTC-5.

D

Danalock Toolbox app

The Danalock Toolbox app is a mobile tool developed to perform manual firmware updates on Danalock devices. It's typically used when a device cannot be updated through the regular Danalock app or to recover a device stuck in DFU mode.

Dashboard

The screen where you can see at a glance an overview of information relating to a Salto installation. For example, you can view the installation's latest activity, as well as the connection status of online devices, or a summary of devices that require firmware updates.

Data-on-card

A term used to describe the saving of access permissions to a key (card) rather than a lock. Changes to a user's access permissions are retrieved from the Salto system and written to a key through the SVN.

Daylight saving time (DST)

Practice of moving clocks forward by one hour in Spring to extend light in the evening, and moving clocks back by one hour in Autumn.

Dbsync

Refers to the tool with which data produced by non-Salto systems is synchronized with the Salto Space system through a CSV file. This tool can be activated manually on demand or automatically according to a predefined day/time scheduling.

Denylist

A record of all canceled keys. Once a key has been canceled, the information is communicated from the system to the SVN readers. As users update their keys and present their keys to the lock, the new denylist information is circulated to all access points.

Destination

Destinations represent secured access points within an installation that can only be accessed by users with appropriate permissions. While the primary use case is elevator control (where presenting a key activates only the buttons for floors the user has access to), destinations can also represent any access-controlled output that requires selective activation based on user credentials. Destinations can integrate with various systems, including third-party elevator controls and other specialized access mechanisms.

Device

Devices are pieces of hardware such as electronic locks, gateways and encoders. They can be any item of hardware used in the Salto system.

It's useful to consider that electronic locks are the “core” types of device in Salto. Other devices such as gateways, encoders or repeaters could be considered more “peripheral” hardware in the access control system.

Device Firmware Update (DFU) mode

DFU mode (Device Firmware Update mode) is a state that prepares a device to receive a new firmware installation. When a Danalock device is in DFU mode, it can be recognized by apps like the Danalock Toolbox or the nRF Device Firmware Update app.

Digital key

Represents a digital credential that users need to present at electronic locks to gain access. Salto digital keys are available in a variety of formats. Some key types are held inside smartphone apps (app keys) and are available on both Android and iOS platforms, allowing users to use their smartphone as a key via an app.

Others, such as Apple Wallet keys, provide a native experience on iOS devices, allowing users a seamless unlocking experience without the need to download an app.

Digital key art

Refers to an image that users see on their mobile devices when they use digital keys to access an installation.

System managers can create digital key art using the colors and themes options available by default, or by uploading their own image.

Disenrollment

The process in which a user's biometric data is deleted from the system. This happens when the user deletes it from the OES or when an operator deletes from the ACS. After this, there is no biometric data remaining and the user will no longer be able to gain access using XS4 Face.

Diversification

The process of creating unique keys for each card or user from a single master key. This enhances security by ensuring that if one user's key is compromised, the keys of other users remain secure. The diversification type setting defines the specific algorithm or method used to generate these unique keys for wallet credentials. For example, using the Salto setting means Salto's proprietary key diversification algorithm will be used.

Door

A door within the Salto system that has controlled access. Doors can be either online or offline.

Door detector

A device that allows you to monitor the status of a door, or other types of access point, i.e., it can detect if a door or a window is open or closed. These devices are usually mounted beside the door and are made up of a sensor which can detect whether the access point is open or closed, regardless of whether the lock itself is locked or unlocked.

Dynamic Host Configuration Protocol (DHCP)

A network protocol that configures and automatically assigns IP addresses to network devices to communicate on an IP network.

E

Electronic lock

A physical electronic locking device such as an electronic escutcheon or a cylinder. It differs from an access point in that an electronic lock could be a particular model of a device such as a Neo cylinder, an XS4 escutcheon or a Salto motorized lock, for example.

An electronic lock is a single device, whereas an access point could be made up of several devices. For example, an access point could be composed of an electronic lock plus a contact sensor or a controller and a reader with a keypad.

In general, a key (physical or digital) must be presented for an electronic lock to grant access. As with all Salto hardware devices, electronic locks use end-to-end encryption to transfer information to and from the software.

Encoder

A hardware device used to read and encode physical keys like wristbands, fobs and keycards with access permission data.

Enrollment

The process in which a user provides a picture of their face for recognition at an access point. This is an opt-in process in which the user provides their explicit consent and they can revoke their enrollment at any time.

ESD

An energy saving device (ESD) is a peripheral device mounted on the wall at an access point. It's used to activate the electrical devices in a room or area, like lights or air conditioning. The electrical devices only work if a valid Salto key is inserted into the ESD. These are commonly used in hotels but can also be used in non-hotel sites.

Event

Describes an individual moment of activity which takes place within an installation. It can relate to specific access points and electronic locks. For example, an event could be the creation of an access point, the deletion of an access point, or indicate when an electronic lock was unlocked and by which user.

Ext ID

An optional field within the information screen of Space components, such as access points, displaying a unique identifier for them. It is automatically generated by the system but can be amended if required.

F

Face authentication

A biometric authentication method that uses facial recognition to verify a user's identity for the purposes of access control.

Firmware

A software program or set of instructions programmed directly onto a hardware device like an electronic lock or a gateway. Firmware provides the necessary instructions for how the device communicates with the rest of the system.

Free assignment zone

An area where users are free to choose any locker. They do not have preassigned individual lockers.

Function

A category of permissions within a Salto location that can be associated with users, for example, a maintenance function for electricians.

G

GAT Net locker

A term used in the Space interface to denote an online smart locker fitted with a Gantner GAT NET.Lock. GAT NET.Locks are electronic, alarm-secured cabinet locks that can be unlocked using various types of keys. They are managed by GAT Net controllers like the GAT NET.Controller 7020.

Gateway

A device intended to be used with access points where online connectivity is needed. Gateways connect to electronic locks enabling offline access points to become connected. This allows functionality such as auto-assigning fobs, keycards and wristbands as well as the monitoring of activity within an installation. A gateway acts as a bridge transferring information using end-to-end encryption to and from the devices behind it to the software.

Guest

A person who is given a key to allow access for the duration of their stay at a hotel.

Guest profile

A system entry for guests that is automatically generated when a room or suite is created.

H

Hardware Secure Element (HSE)

The Hardware Secure Element refers to a specialized security chip included in certain Salto lock models that provides enhanced cryptographic security. This chip securely stores encryption keys and sensitive credentials, processes cryptographic operations in a tamper-resistant environment, provides stronger protection against physical and digital attacks and enables more advanced security features and protocols.

Holiday

You can use the holiday option to define national or regional holidays on an installation calendar.

Hotel interface

A subset of the overall Space interface. It contains menu options, quick-access tiles, and screens specific to hotel sites. These options are related to guest activities such as check-in and check-out, and cancellation of guest keys.

I

Installation

An installation represents any entity (company, office, building, hotel, etc.) that uses Salto software. As such, it represents a collection of all the access control elements (such as access points, access rights, users, etc.) that comprise the access control system.

Installer

A person who physically installs and configures Salto hardware devices in situ.

Intercom adaptor

A device that can be connected to an existing intercom system close to the telephone handset, without affecting its proper functioning. Its main purpose is to convert the intercom system to become part of the access control system, allowing users to unlock the main entrance door of their apartment building via their phones, for example.

K

Key

A physical carrier that controls access to an area, building, and/or installation asset (for example, a cupboard or locker). Physical keys come in a wide variety of formats, including wristbands, fobs and keycards.

Key rotation

Used in third party wallet key integrations, key rotation is a process of replacing security tokens to limit the impact of vulnerability if credentials become compromised. Effective rotation involves generating and updating new security tokens followed by a brief transition period where both old and new security tokens are accepted to prevent service disruption. Once the transition is considered finished, the old security tokens are automatically revoked.

Keyholder

A generic term that covers all persons issued with a key. Keyholders can be assigned physical or digital keys which they can use to unlock doors. Users with management roles, i.e. people who have permissions to manage other users, can also be issued with keys.

L

Lockdown area

A defined area where all access points can be either locked or unlocked in an emergency situation. For example, if an intruder accesses your building you can lock all the associated access points so they cannot proceed any further.

M

A passwordless sign-in means that instead of having to remember a single, long-lived password, every time you sign a new, unique secret code is generated for you. Each time you subsequently need to sign in, Nebula sends you an email with a magic link. By clicking on the magic link you are automatically taken into the application without having to enter a password.

N

Near-field communication

Near-field communication (NFC) is a set of communication protocols for communication between two electronic devices. For example, the Apple Wallet key solution uses NFC to communicate between smartphones and electronic locks.

Node

A network connection point device that is physically connected to a gateway using an RS485 cable, which establishes communication between the nodes and the gateway. Nodes allow the distance between a gateway and an electronic lock to be increased and forward communication signals between them. Some nodes are embedded in controllers (CUs), such as CU4200 nodes; others are external nodes, like BLUEnet nodes.

nRF Device Firmware Update app

The nRF Device Firmware Update app is a mobile tool developed by Nordic Semiconductor for updating the firmware of Bluetooth devices. To perform an update, you'll need a compatible firmware file in .zip format. The app connects to the device over Bluetooth and guides you through the update process step by step.

O

Office

A type of opening mode which, when applied, allows an electronic lock to be left unlocked upon a user unlocking it for the first time.

Opening mode

A type of behavior that can be applied to a specific access point or collection of access points. Opening modes can either be applied 24/7 to the access point or they can be scheduled. Opening mode schedules allow you to make a number of different opening modes switch automatically and vary across specific time periods that you define. A time period represents the days and hours in which an opening mode is valid.

Opening time

Defines how long an access point stays open after it is unlocked. Essentially, it defines how long the door handle remains active. Note that the access point locks as soon as the handle on the door is released, even if the time value is not reached. The default opening time is six seconds.

Operator

A person who operates and manages the Salto Space software application.

There are two types of Salto Space operators: admin operator and non-admin or standard operator.

An admin operator has administration rights and is generally responsible for higher administrative functionality, such as software installation and configuration tasks.

A non-admin or standard operator refers to day-to-day users of the Salto Space application involved in routine access tasks, such as assigning and deleting of keys, check-in and check-out, etc.

Other day

Other days may be installation-specific holidays or installation shutdown days which you can define on a calendar.

Output

A type of electrical permission or authorization used to activate relays for controllers or energy saving devices (ESDs). For example, you can control elevator access to specific floors by creating outputs. If a controller is connected to a relay extension board, you can use outputs to specify that only a designated user can activate one or multiple relays in an elevator. If you enable Floor 1 and Floor 3 in their access permissions, the user can only access those specific floors and not Floor 2. Similarly, you can control the energy usage in a room or a floor by creating an output. For example, if you enable an ESD for Room 101, only an authorized key will allow the electrical devices in that room to be switched on.

Over the air (OTA)

Over the air (OTA). Refers to the distribution of data, such as software or firmware updates for devices, wirelessly.

Owner

A user role with full permissions to manage the system. Similar to a system or property manager, but a user with this role can also delete and transfer installations. This is the most powerful role that exists, and there can only be one user with the role of owner in an installation at any given time.

P

Partition

Items within the system that are grouped together for ease of management, thus forming sub-groupings within an installation. Partitions allow admin operators to separate a Salto network into different 'parts' that are then individually managed by other operators. A common use case for a partition might be an office located within a larger office building that contains multiple office spaces rented by different companies.

Passcode

A numeric code that can be assigned to a user, like a key, to allow the user to gain access via locks that are equipped with keypads.

Portable programming device (PPD)

A portable electronic device that is connected to the operator's local PC through either a USB or COM port and allows data to be transferred between the operator's PC and the locks. Data is downloaded from the PC to the PPD, and the PPD is used to perform tasks such as lock initialization, door identification, configuration details and emergency openings. In the process, the PPD retrieves information, such as battery status, from the locks. This information is communicated to the system when the PPD is connected to the operator's PC.

Property manager

Refers to a user with admin permissions who can manage all aspects of the Salto Homelok system. This is the second most powerful role after that of the owner.

A property manager can create, view, modify and delete other users. They can assign access and keys (digital and physical keys) to other users. They can modify access and doors (create, edit and delete). They can create, edit and delete calendars and opening modes.

They have the ability to assign the property manager and unit manager role to other users.

R

Reader

An electronic device often mounted on a wall beside a door or other type of access point like a car park barrier that is often connected directly to a controller. Readers, also known as 'wall readers', are used to control access to an installation's access points. Users present their keys to the reader to gain access in the same way as they would do with a physical electronic lock. Some readers also have keypads.

Repeater

A network connection point device that is associated to a node or another repeater, and allows the distance between a gateway and an electronic lock to be increased. Based on Salto BLUEnet wireless communication, the Salto BLUEnet repeater does not need to be wired.

Role

A role represents a collection of permissions which can be granted to users. A permission could be, for example, getting a list of access points, deleting another user. The following four pre-defined roles exist in Nebula - System manager, User manager, Access right manager, Device Manager.

Roll-call area

A list of how many and which users are in a specified area at a particular time. For example, you can use a roll call to generate a report after a fire alarm goes off. This way, it is possible to check whether all the users in the area have been safely evacuated.

ROM code

A read-only memory code of a user's physical key (fob, keycard, etc.). The format can vary depending on the card technology. For example, the Salto ROM code is a 7-byte code that's specific to each card. Each byte is expressed as a double hexadecimal character so the total ROM code will be 14 ASCII characters (called ROM14).

S

Salto Homelok app

The Salto Homelok app, or just Homelok app, is a mobile application which is available on both iOS and Android devices. You can use the app as a key and also to manage users and access.

Salto Homelok web

Salto Homelok web, or just Homelok web, refers to the web application which is accessible via an internet browser. The application is part of the Salto Homelok access control platform.

Salto Nebula

Salto Nebula, or just Nebula, refers to the cloud-based access control platform. This includes the web application (Nebula web) as well as the mobile app available on both iOS and Android devices (Nebula app).

Salto Nebula app

The Salto Nebula app, or just Nebula app, is a mobile application which is available on both iOS and Android devices. You can use the app as a key and if you're an installer you can use it to configure devices too.

Salto Nebula web

Salto Nebula web, or just Nebula web, refers to the web application which is accessible via an internet browser. The application is part of the Salto Nebula cloud-based access control platform.

Salto Virtual Network

The Salto Virtual Network (SVN) uses access control technology that was developed to solve standalone access control problems. Access control data is put on an encrypted radio frequency identification (RFID) card, rather than a standalone lock. Cards can then be updated anywhere in the building by using an SVN reader. The SVN removes the need to hardwire every door. If the online connection is interrupted, the battery-powered locks can continue to work offline.

Salto Virtual Network Flex (SVN-Flex)

Based on Salto's BLUEnet wireless communications technology and SVN core technology, the SVN-Flex functionality extends and increases the number of updating points to any access point in the system.

Special day

Special days may be installation-specific holidays or installation shutdown days which you can define on a calendar.

Staging table

Refers to the tool with which Space entities are synchronized between an Identity Management (IDM) system and the Salto Space system by means of a database staging table. The data source (i.e., the IDM system) places its data in this intermediary table and the data consumer (i.e., the Space system) pulls data from it and transfers that data to its own database.

System manager

Refers to a user with admin permissions who can manage all aspects of the Salto Nebula system. This is the second most powerful role after that of the owner.

A system manager can create, view, modify and delete other users. They can assign access rights and keys (digital and physical keys) to other users. They can modify access rights and access points (create, edit and delete). They can create, edit and delete calendars and opening modes.

They have the ability to assign the system manager role to other users and they have access to the devices section of the system. This means that they can also configure and manage devices using the Nebula app.

T

Terminal Capabilities Identifier (TCI)

A random three-byte-long value used in integrations with Apple Pay technology. Specifically, it establishes a reader relation to a particular Apple Wallet pass type.

Toggle

A type of opening mode which, when applied, allows an electronic lock to be left unlocked by any authorized user who presents a valid key. The next authorized key presented then locks the electronic lock. This continues switching (toggling) on presentation of each valid key.

Track

User physical keys, like cards or fobs, have three tracks or areas in which you can encode data. You can enable these tracks to store information from specific Space fields, such as room names or key expiration dates. When you select an 'Enables track x' checkbox on user keys, the track can be used to write additional data on user keys.

Two-factor authentication

A safety measure that provides an extra layer of protection to online identification. In Salto software products this means that, in addition to your username and password, the system may also ask you for a code when logging in. This code can be sent to your mobile phone through an authentication application like Google Authenticator. Only admin operators can enable or disable this feature.

U

UID

Unique identifier or serial number of a physical key (fob, keycard, etc.) which is used when assigning these types of keys. It is usually composed of a 14-digit hexadecimal code.

Unit

A unit is a sub-grouping within an installation. A common use case for a unit might be an apartment which is located within an apartment block. It can also often be considered a "rentable space". For example, an office located within a larger office building that contains multiple office spaces rented by different companies.

Unit manager

A user with management permissions at the unit level. The unit manager role allows granular administration of units, like apartments, within an installation (for example, an apartment building).

In general, unit managers have permissions to create users, give them access and assign keys at the unit level. However, there are two levels of unit manager: those who have permissions to create other unit managers and those who do not have permissions to create other unit managers.

Neither of these unit manager types have permissions to manage at the installation level.

User

Can refer to both a holder of keys and a user with permissions to manage other users within Nebula. Users with permission to manage other users are assigned a role. All users are eligible to access rights and may be assigned a key.

V

Visitor

Refers to a holder of keys or cardholder who requires temporary access to a Salto Space installation, such as an engineer doing site maintenance work for a few hours. The engineer can be given access to particular areas of the site for a specified time period. When the time period expires, they can no longer access the Salto Space installation.

W

WalletHub

WalletHub is a Salto service that enables Apple Wallet-based mobile credentials to be used in Salto access control solutions like Homelok, KS and Space via JustIN Mobile. WalletHub sits between Apple Pay and the different Salto access control solutions and can also be used by third-party integrators.

Wiegand code

Used by external applications, such as time and attendance softwares, to identify individual users. You can configure the Wiegand code in Space 'General options'. Wiegand is a wiring standard and protocol commonly used to connect a card swipe mechanism to the rest of an access control system.

X

XS4 Face

The complete Salto XS4 Face system including Devices, Servers, XS4 Face Connect, the Console and the Enrollment Service.

XS4 Face Camera

Connected to the XS4 Face Control Unit (XS4 Face CU) via the supplied blue CAT6a SSTP LSOH 3m cable and located at the entry point. The XS4 Face C contains a camera for acquiring images, a distance sensor for triggering a request when a person is detected and an LED indicator to provide user feedback.

XS4 Face Connect

A set of hosted services that provide the infrastructure to support the deployment and maintenance of XS4 Face Servers. Connect is based within Microsoft Azure and maintained by Salto. XS4 Face Connect is regionalised, so that personal data does not leave the region in which the site is based. No biometric or personal information is stored within, or passed through, XS4 Face Connect. The XS4 Face Server consists of hardware supplied by the customer and software supplied by Salto. It is the responsibility of the customer to maintain it and keep the data backed-up.

XS4 Face Console

A management application for installing, monitoring, operating and decommissioning XS4 Face sites and servers. The Console is accessible on mobile and desktop computers via a web browser. The last 4 versions of Chrome, Firefox, Edge, Safari, Android Browser, and iOS Browser are supported. The Console is multi-language, the current language button on the left menu. Support languages are English, French, German, Dutch, Spanish and Arabic.

XS4 Face Control Unit

Located in a secure void within the area being secured. The XS4 Face CU is based upon an ARM64 microcontroller with custom firmware.

XS4 Face Device

The combination of XS4 Face C, XS4 Face CU, and the supplied cable that connects them.

XS4 Face Enrollment Service

Allows users to upload a picture of themselves that will be used for facial recognition. Users are invited to use the enrollment service when their details are entered into the Access Control System.

XS4 Face Server

The core responsibility of the XS4 Face Server is to identify which user is attempting to access a door, and pass that identification on to the Access Control Server. In support of this, it receives information on users from the Access Control Server and Enrollment Service. It has no user interface; it is commissioned and managed via the XS4 Face Console.

XS4 Face Site

A licensed instance of the XS4 Face software on an XS4 Face Server for a particular location.

Z

Zone

A specified group of access points that are grouped together to make them easier to manage in the system. For example, a zone could be the doors on the first floor, all the locker doors in the gym area, or all the doors in the financial services area.

Contents

Salto Systems, S. L. uses third-party data storage and retrieval devices in order to allow secure browsing and gain a better understanding of how users interact with the website in order to improve our services. You can accept all cookies by clicking the "Accept cookies" button or reject their use by clicking the "Reject cookies" button. For more information, visit our Cookies Policy