:: Manuals Home   :: Contact us   :: SG1 Website   :: Site Map  
F.A.Q
| AttendanceNET | DeveloperNET | KeyNET | ProjectNET | WorkNET

Sections

   
Table of Contents    
Access & Restrictions    
Your Desktop    
     
PEOPLE Module    

 

   

KEY ISSUE Module

 
   

LOCKSHOP Module

   
   Key Operations    
   Display Inventory    
   Modify Key Definition    
   Add/Remove Hooks    
   Add/Remove Location    
   Add/Remove Masters    
   Add/Cut NEW Key    
   Billing & Cost Centers    
   Bulk Transfer    

   Recall a KeyID

   

Masterkey Systems

   
   2 Step Progression    
   1 Step Progression    
   SFIC A2    
   SFIC A3    
   SFIC A4    
   Assa    

   Medeco

   

   Custom Developed

   
     
System Manager    
   People Configuration    
   Lockshop Config    
   Key Machine Config    
     

Features

   
Authorizations    
eKeyRequest    
   Request Methods    
   WEB Forms    
eKeyOrder    
ePhotoID    
eSignature    
iKeyID    
Keyrings    
Multiple Key Issue Sites    
     

F.A.Q.

   
     

Other aspects of the LOCKSHOP module are listed and linked in the left hand column.

 

This page contains answers to common questions handled by our support staff, along with some tips and tricks that we have found useful and presented here as questions.


How do I ... ?

get started? Answer: before starting, you should have some training.  Contact YOUR Systems Manager to obtain the proper privileges and training.

 

access the manual?  Answer: Just below the banner you will see a number of links listed horizontally.  The first link is "Main Menu", the second is "My Preferences" and the third is "System Manual".  Single click on the "System Manual" link and the program will take you to our website where the manual is stored.  The manual is constantly being refined, modified and enhanced to provide information in a manner consistent with the content of the program and newly added features.

 

get my USERS logged in. Answer: when the program firs starts, it prompts for USER ID and Password.  The USER ID is always the entire email address of the user (i.e. jdoeks@mail.ukb.edu)  The Password is chosen by the user or assigned by the Systems Administrator.  The password may be changed at anytime by the user.  Additionally, the Systems Manager may send you your password from the PEOPLE portion of the program.

 

move around within the program. Answer: by single clicking on links within the program.  Because you are in a web-accessed database, SINGLE CLICKS are used...instead of double-clicking.

 

add a person to the Personnel Group. Answer: Adding individuals to a group is typically a Systems Managers function.  Start by clicking on the People link in the main menu bar.  Search for the person from the search screen (the last four individuals you accessed will also be shown in a submenu bar for more rapid information recovery).  Click on the person you want to work with.  Now click on the Access Group link; and you will be able to add or delete access from this screen.

 

issue a key.  Answer: start by clicking on the Key Issue item in the left hand column of this page.

 

setup another Key Issue location Answer: Start by clicking on the Multiple Key Issue item in the left hand column of this page.  NOTE: each site is licensed independently, you may need to purchase additional licenses.

 

create a NEW key.  Answer: Start by clicking on the Lockshop item in the left hand column of this page.  You may create individual keys, or create entire masterkey systems from the Lockshop section of the program.

 

delete a key.  Answer: Keys (or more precisely, a Key ID or Blindcode) may not be deleted from your system once they are entered.  If you have made a typo, simply edit the information and correct your error.

 

create a NEW Masterkey System.  Answer: Start by clicking on the KeyNET link in the main menu bar of the browser.  You may create entire masterkey systems from the KeyNET sub menu bar by clicking on the MK Create link. (Batch Generation) section of the program.  Follow the field information provided to create the type of masterkey system you need.

 

find out to whom a key is issued?  Answer: Start by clicking on the KeyNET link in the main menu bar.  Search for the blindcode or KeyID that is stamped on the key, and click search.  Click on the blue blindcode that shown on your screen.  Now, click on inventory, and a list of all keys created under this blindcode or KeyID will be displayed.  The person to whom the key is issued will be listed on the same line with the sequence number or the issue number.

 

find out who has keys issued by Department?  Answer:  Start by going to Key Search.  Select the area called “Find Keys by Location”.  Set the records to display to “ALL”.  Select the Department you want the display for from the drop-down menu.  Select TRACE.

 

use the email in KeyNET?  Answer: Simply click on a "Notify" or individual email link and KeyNET will initialized an email via your default email program in your browser.  The initialization is made to the "default email" program which is associated with the browser on accessing computer.  There is no email system in KeyNET.  Most viruses and worms are obtained through email programs so that is not available from the KeyNET proprietary server.  Instead, KeyNET will initialize an email from inside the program. 

 

Back to Top

 

Where can I find ... ?

 

an example of a Key Control Policy?  There are many Key Control policies posted on the internet.   Spectrum Group recommends caution and due diligence when creating a Key Control Policy.  For your convenience we have posted a copy of a Key Control Policy we found on the internet.  It is simple, straight forward and easy to follow.  Spectrum Group makes no recommendations as to its applicability, completeness, accuracy or thoroughness.  But, we do provide it as a good starting point or boiler plate for developing you own Key Control Policy.  Click here to view the Graduate Centers Key Control Policy.

 

Back to Top


 

Why doesn't ... ?

 

Back to Top

 


 

Who is ... ?

 

Back to Top

 


 

What is ...

 

Back to Top

 


Copyright ⓒ 1996-2006 The Spectrum Group. All rights reserved