Getting started
Installation
Initial precautions
Before installing your device, make sure it will be installed in a location that meets the recommendations in the storage conditions section. To ensure the proper functioning of your iDFace, the following precautions must be taken:
- Install in a place without direct sunlight exposure. The lighting factor should be considered for better image capture quality.
- Avoid placing metallic objects near the back of the device to prevent interference with the proximity card reader's range. If this is not possible to avoid, use insulating spacers.
- Before fixing the device, ensure that all connection cables have been correctly routed to the device.
- Mount the top part of the iDFace wall bracket at 1.35m from the ground for pedestrian access or 1.20m for vehicle recognition.
Ensure that a 12VDC power supply with a minimum current capacity of 2A is available for connection to the supplied power cable. The power supply should preferably be dedicated exclusively to the iDFace.
When connecting the power supply to the mains, confirm that it is stabilized and regulated, and that there are no devices nearby that could cause interference or noise, such as electric motors.
Also, ensure that all necessary cables for installation (ethernet cable, power cables, and cables from the lock) are passed before fixing the device to the wall.
Installation of the device is simple and must follow the diagram below:
Fixing the device
To install the device, follow these steps:
1) For increased installation security, place the External Activation Module (EAM) in a secure area (inside the installation).
2) Use the following template to drill the 3 mounting holes for the iDFace and insert the wall plugs.
3) Connect the EAM to a +12V power source and to the lock being controlled using the cables provided.
4) Pass a 4-wire cable connecting the EAM to the iDFace. For distances greater than 5m, use thicker cables and twisted pairs for the data signals. If you choose to use a Cat 5 cable to connect the EAM to the iDFace, use 3 pairs for power and 1 pair for data signals. In this case, the distance should not exceed 25m. Remember to use the same pair for signals A and B.
5) Connect the supplied connection harness to the 4-wire cable from the previous step.
6) Remove the iDFace wall bracket.
7) Screw the wall bracket onto the anchors.
8) Remove the sealing cover on the back and connect the iDFace to the 4-wire cable.
9) Reposition and secure the cover and rubber seal strip.
Attention: The cover and rubber seal strip are essential to ensure IP65 protection. Make sure to position and secure them properly on the back of the product.
10) Place the iDFace on its wall bracket and secure it with the screw provided with the connection cables.
Connection pins
On your iDFace controller, there is a connector input on the back of the device in addition to the network connector input (Ethernet).
The External Activation Module (EAM) has 6 other connectors that will be used to connect locks, REX buttons, sensors, and readers as explained below.
Power pins
The External Activation Module should be connected to the iDFace and to a +12V/2A power supply for proper operation.
For more details on power supply, refer to the power supply section
EAM - 4-pin connector (iDFace connection)
EAM - 5-pin connector (Wiegand in/out)
External card readers should be connected to the WIN0 and WIN1 inputs, which are Wiegand type. If there is a control panel, you can connect the Wiegand WOUT0 and WOUT1 outputs so that the user ID identified on the iDFace is transferred to the controller.
EAM - 6-pin connector (door/relay control)
The REX button and door sensor inputs are configurable as NO or NC and should be connected to "dry contacts" (switches, relays, etc.) between GND and the respective pin.
These connectors allow the connection of locks and REX buttons.
Power supply
It is recommended to use a 12V/2A power source exclusively for powering the iDFace. However, it is possible to use the device's power supply to power other devices, such as locks. In this case, make sure that the current supply capacity of the source is greater than the sum of the currents consumed by the devices connected to it.
Connectivity
The iDFace can be connected to the network via a simple 10/100Mbps Ethernet cable, using the TCP/IP protocol. For the device to work correctly on the network and to access the web manager, it is necessary to correctly configure the IP address, subnet mask, and gateway of the device.
The configuration of all parameters of your new iDFace can be done through the LCD display (Graphical User Interface – GUI) and/or through a standard web browser (as long as the iDFace is connected to an Ethernet network and has this interface). To configure, for example, the IP address, subnet mask, and gateway via the touchscreen, follow the steps: [MENU] -> [SETTINGS] -> [NETWORK]. Update the information as you wish and connect the device to the network.
The device also has a Wiegand input and output, both native, which can be configured to work with the Wiegand 26 protocol (default).
Locks, sensors, and REX buttons
Electromagnetic lock
The electromagnetic lock, or Magnetic Lock in English, consists of a coil (fixed part) and a metal piece (attachment) that is attached to the door (moving part). As long as current flows through the electromagnet, the fixed part will attract the movable part. When the distance between these two parts is small, that is, when the door is closed and the docking is overlaid on the fixed part, the attraction force between the parts can exceed 1000kgf.
Thus, the electromagnetic lock is typically connected to the NC contact of the activation relay, as it is usually expected that current flows through the electromagnet, and if the door is to be opened, the relay should open and stop the current flow.
Pin-solenoid lock
The pin-solenoid lock, also known as a solenoid, consists of a fixed part that has a movable pin connected to a solenoid.
The lock usually comes with a metal plate that should be attached to the door (moving part). The pin of the fixed part enters the metal plate, preventing the door from opening.
In this guide, the pin-solenoid lock will be represented by:
The terminals indicated in gray may not be present on all locks. If there is a power input (+12V or +24V), it is essential to connect it to a source before operating the lock.
Electromechanical Lock
The electromechanical lock or strike consists of a bolt connected to a solenoid through a simple mechanism. After opening the door, the mechanism returns to the initial state allowing the door to close.
Thus, the electromechanical lock normally has two contacts connected directly to the solenoid. By passing a current through the lock, the door will be unlocked.
In this guide, the electromechanical lock will be represented by:
Confirm the lock's operating voltage before connecting it to the iDFace! Many electromechanical locks operate at 110V/220V and therefore require a different connection.
Operating modes
The iDFace can be used in two different modes: standalone mode (Standalone) and online mode (Pro).
In standalone mode, all registration and identification operations are performed by the device itself. This solution is ideal when the access control solution needs to manage only one or two doors and the number of users is relatively small.
For situations where there is a need to control more than two doors, or where there are many users to be registered in the system, it is recommended to use the integrated solution. In this operating mode, one or more iDFace devices can be controlled by the iDSecure software from Control iD. The user enrollment and identification operations are processed on the server, and the device is limited to sending identification attempts to the server and receiving signals to open the door. The connection between the device and the server is made via TCP/IP. The server and the device only need to be connected to the same network, and the device must be listed on the server.
See below how the device behaves in each operation mode:
Operation Mode | Identification | Authorization | Information Sent During Access Attempt |
---|---|---|---|
Standalone | On the terminal | On the terminal | - |
Pro | On the terminal | On the server | User identifier number |
Contingency | On the terminal | On the terminal | - |