logo
Language
deutschenglishfrançaisnederlandsitalianodansksvensk
  • Home
  • General safety instructions
    • Product-specific safety instructions
      • Meaning of the text formatting
        • Intended use
          • General
            • Information on data protection
              • IT basic protection
                • What protection requirements do the data processed in the system have?
                  • What IT infrastructure requirements are recommended?
                  • Encryption
                    • Is the data in System 3060 encrypted?
                      • What data is encrypted?
                        • Are the transmission paths via radio, for example, also encrypted?
                        • Working in compliance with data protection regulations (GDPR)
                          • What personal data is stored in the software?
                            • For what purpose is personal data stored in the software?
                              • How long is personal data stored in the software?
                                • Can the right to read access lists be additionally secured?
                                  • Is personal data in the software protected against access by third parties?
                                    • Can the stored data be made available as a copy?
                                      • Can personal data be deleted from the software?
                                    • Range of functions for AXM Lite
                                      • System requirements
                                        • Release notes
                                          • Version 1.0.2205.2402
                                            • Version 1.0.2306.1402
                                              • Version 1.0.2401.0501
                                                • Version 1.0.2402.2701
                                                  • Version 1.0.2502.0602
                                                    • Version 2.0.25213.0001
                                                    • Installation
                                                      • Run AXM as the administrator (recommended)
                                                        • Updating AXM
                                                        • First steps after a new installation
                                                          • Best practice: setting up the locking system
                                                            • Best practice: Database protection
                                                            • Registration
                                                              • The AXM’s structure
                                                                • Sorting and filtering
                                                                  • Installation wizards
                                                                    • Multiple options, same result
                                                                      • Global search
                                                                        • Working with AXM more effectively
                                                                          • Tab operation
                                                                            • Hotkeys
                                                                              • Creating additional objects
                                                                            • Organisational structure
                                                                              • Creating access levels
                                                                                • Creating a schedule
                                                                                  • Create time group
                                                                                    • Deleting a time group
                                                                                      • Deleting schedules
                                                                                        • Creating a time switchover
                                                                                          • Creating and editing public holidays
                                                                                            • Creating and editing public holiday lists
                                                                                              • Creating a location
                                                                                                • Creating a building and assigning it to a location
                                                                                                  • Creating a hashtag
                                                                                                  • Persons and identification media
                                                                                                    • Creating an identification medium
                                                                                                      • Creating transponders and cards
                                                                                                        • Creating PIN code keypads
                                                                                                          • Creating special identification media
                                                                                                            • Import identification media
                                                                                                            • Duplicating an identification medium (including authorisations and settings)
                                                                                                              • Deleting an identification medium
                                                                                                                • Deleting a card/transponder
                                                                                                                  • Deleting individual identification media in the matrix
                                                                                                                    • Deleting multiple identification media using the tab
                                                                                                                    • Deleting a PIN (PIN code keypad AX)
                                                                                                                    • Allowing an identification medium to open twice as long
                                                                                                                      • Muting all locking devices for an identification medium
                                                                                                                        • Muting all locking devices for a transponder or a card
                                                                                                                        • Allow accesses to be recorded by identification media (physical access list)
                                                                                                                          • Restricting identification medium authorisations to specific times (time group)
                                                                                                                            • Activating or deactivating identification medium once at specific times (activation and expiry date)
                                                                                                                              • Handling defective identification media
                                                                                                                                • Repairing/resynchronising
                                                                                                                                  • Repairing a card/transponder (resynchronising)
                                                                                                                                    • Repairing a PIN code keypad (resynchronising)
                                                                                                                                    • Resetting and replacing
                                                                                                                                      • Resetting and replacing a card/transponder
                                                                                                                                        • Resetting and replacing a PIN code keypad
                                                                                                                                        • Delete and replace
                                                                                                                                          • Deleting and replacing a card/transponder
                                                                                                                                            • Deleting and replacing a PIN code keypad
                                                                                                                                            • Take out of use and leave in project
                                                                                                                                              • Take card/transponder out of use and leave in project
                                                                                                                                                • Taking a PIN code keypad out of use and leaving it in project
                                                                                                                                                • Taking out of use and deleting from the project
                                                                                                                                                  • Taking a card/transponder out of use and deleting it from project
                                                                                                                                                    • Taking a PIN code keypad out of use and deleting it from project
                                                                                                                                                  • Duplicating forgotten identification medium temporarily
                                                                                                                                                    • Duplicating a forgotten transponder or card temporarily
                                                                                                                                                    • Blocking lost/stolen identification media permanently
                                                                                                                                                      • Blocking and replacing lost/stolen card/transponder permanently
                                                                                                                                                        • Blocking a lost/stolen PIN code keypad permanently
                                                                                                                                                        • Flag and reset returned identification medium (back to inventory)
                                                                                                                                                          • Flagging and resetting returned card/transponder (back to inventory)
                                                                                                                                                          • Planning and tracking identification medium management tasks
                                                                                                                                                            • Noting the issue date
                                                                                                                                                              • Note card/transponder issue date
                                                                                                                                                              • Planning and logging battery replacement
                                                                                                                                                                • Planning and logging card/transponder battery changes
                                                                                                                                                                  • Planning and logging PIN code keypad battery replacement
                                                                                                                                                                  • Planning and logging return
                                                                                                                                                                    • Planning and logging card/transponder return
                                                                                                                                                                  • Finding the identification medium or locking device again in the matrix
                                                                                                                                                                    • Exporting identification media as a list
                                                                                                                                                                      • Export cards/transponders as a list
                                                                                                                                                                        • Exporting PINs and PIN code keypads as a list
                                                                                                                                                                        • Viewing an identification medium’s serial number and/or TID
                                                                                                                                                                          • Viewing a card’s/transponder’s serial number and TID
                                                                                                                                                                            • Viewing a PIN code keypad’s serial number
                                                                                                                                                                            • Setting the PIN length (PinCode AX)
                                                                                                                                                                              • Changing a PIN (PinCode AX)
                                                                                                                                                                                • Set up a dynamic time window (time budget)
                                                                                                                                                                                • Doors and locking devices
                                                                                                                                                                                  • Creating a locking device
                                                                                                                                                                                    • Importing locking devices
                                                                                                                                                                                    • Duplicating the locking device (including authorisations and settings)
                                                                                                                                                                                      • Delete locking device
                                                                                                                                                                                        • Deleting an individual locking device using the matrix
                                                                                                                                                                                          • Deleting several locking devices using the tab
                                                                                                                                                                                          • Changing locking device type at later stage
                                                                                                                                                                                            • Handling defective locking devices
                                                                                                                                                                                              • Re-synchronise (repair)
                                                                                                                                                                                                • Resetting and replacing
                                                                                                                                                                                                  • Delete and replace
                                                                                                                                                                                                    • Reset
                                                                                                                                                                                                      • Purge (only reset in database/software reset)
                                                                                                                                                                                                      • Assigning locking devices to buildings/locations
                                                                                                                                                                                                        • Limiting authorisations for locking devices to specific times (schedule)
                                                                                                                                                                                                          • Engaging and disengaging locking devices automatically with time switchover
                                                                                                                                                                                                            • Have accesses logged by locking device (access list)
                                                                                                                                                                                                              • Leaving the locking device open for longer, less time or permanently
                                                                                                                                                                                                                • Limit locking device read range (close range mode)
                                                                                                                                                                                                                  • Muting a locking device (for battery warnings and programming)
                                                                                                                                                                                                                    • Ignoring activation and expiry date of identification media
                                                                                                                                                                                                                      • Changing the SmartRelay settings
                                                                                                                                                                                                                        • Using internal and external antenna simultaneously
                                                                                                                                                                                                                          • Invert outputs
                                                                                                                                                                                                                            • Using the serial interface
                                                                                                                                                                                                                              • Changing the signalling
                                                                                                                                                                                                                                • Connect SmartRelay to network
                                                                                                                                                                                                                                • Planning and tracking locking device management tasks
                                                                                                                                                                                                                                  • Note installation, replacement or removal date
                                                                                                                                                                                                                                    • Planning and logging battery replacement
                                                                                                                                                                                                                                    • Exporting locking devices as a list
                                                                                                                                                                                                                                    • Permissions
                                                                                                                                                                                                                                      • Changing individual authorisations (cross)
                                                                                                                                                                                                                                        • Changing many authorisations (on identification media and/or locking devices)
                                                                                                                                                                                                                                          • Allowing all or blocking all
                                                                                                                                                                                                                                            • Access levels
                                                                                                                                                                                                                                              • Adding locking devices and identification media to access levels
                                                                                                                                                                                                                                                • Exporting access levels as a list
                                                                                                                                                                                                                                                • Controlling authorisations in terms of time (schedules)
                                                                                                                                                                                                                                                  • Adding locking devices to the schedule
                                                                                                                                                                                                                                                    • Adding identification medium to time group
                                                                                                                                                                                                                                                      • Add card/transponder to time group
                                                                                                                                                                                                                                                        • Adding PINs from a PIN code keypad to the time group
                                                                                                                                                                                                                                                    • Meaning of the authorisation crosses in the matrix
                                                                                                                                                                                                                                                    • Locking systems
                                                                                                                                                                                                                                                      • Changing locking system password
                                                                                                                                                                                                                                                        • Using a common locking level
                                                                                                                                                                                                                                                          • Creating a common locking level
                                                                                                                                                                                                                                                            • Creating transponders for common locking level
                                                                                                                                                                                                                                                              • Authorising a transponder with common locking level
                                                                                                                                                                                                                                                            • Synchronisation: Comparison between locking plan and reality
                                                                                                                                                                                                                                                              • Synchronising the locking device (including reading access list)
                                                                                                                                                                                                                                                                • Display locking device equipment and status
                                                                                                                                                                                                                                                                  • Displaying and exporting a locking device’s access list
                                                                                                                                                                                                                                                                  • Identifying an unknown locking device
                                                                                                                                                                                                                                                                    • Re-setting the locking device
                                                                                                                                                                                                                                                                      • Synchronising an identification medium
                                                                                                                                                                                                                                                                        • Synchronise a card/transponder (including importing physical access list)
                                                                                                                                                                                                                                                                          • Displaying the identification medium battery status
                                                                                                                                                                                                                                                                            • Displaying and exporting physical access lists for cards/transponders
                                                                                                                                                                                                                                                                          • Identifying an unknown ID medium
                                                                                                                                                                                                                                                                            • Recognise unknown cards/transponders
                                                                                                                                                                                                                                                                              • Identifying unknown PIN code keypad
                                                                                                                                                                                                                                                                              • Resetting identification media
                                                                                                                                                                                                                                                                                • Resetting cards/transponders
                                                                                                                                                                                                                                                                                  • Resetting the PIN code keypad
                                                                                                                                                                                                                                                                                  • Viewing connected/supported programming devices
                                                                                                                                                                                                                                                                                  • Your personalised AXM interface
                                                                                                                                                                                                                                                                                    • Interchanging (transposing) doors and persons in the matrix
                                                                                                                                                                                                                                                                                      • Select columns and rows in the matrix (enable/disable crosshairs)
                                                                                                                                                                                                                                                                                        • Click to change authorisations
                                                                                                                                                                                                                                                                                          • Hiding deactivated and defective identification media
                                                                                                                                                                                                                                                                                            • Showing or hiding rows/columns in the matrix
                                                                                                                                                                                                                                                                                              • Reading access list/physical access list during synchronisation
                                                                                                                                                                                                                                                                                                • Limiting the number of access list entries in the database
                                                                                                                                                                                                                                                                                                  • Pinning tabs
                                                                                                                                                                                                                                                                                                    • Changing automatic numbering
                                                                                                                                                                                                                                                                                                      • Changing the language
                                                                                                                                                                                                                                                                                                        • Preventing generated reports from opening automatically
                                                                                                                                                                                                                                                                                                        • Administrative tasks
                                                                                                                                                                                                                                                                                                          • Creating a backup
                                                                                                                                                                                                                                                                                                            • Restoring the backup
                                                                                                                                                                                                                                                                                                              • Exporting error logs
                                                                                                                                                                                                                                                                                                                • Displaying version number and licence key for the AXM installed
                                                                                                                                                                                                                                                                                                                  • User management
                                                                                                                                                                                                                                                                                                                    • Changing the user password
                                                                                                                                                                                                                                                                                                                      • Increase password security
                                                                                                                                                                                                                                                                                                                    • Statistics and logs
                                                                                                                                                                                                                                                                                                                      • Displaying and exporting a locking device’s access list
                                                                                                                                                                                                                                                                                                                        • Displaying and exporting physical access lists for cards/transponders
                                                                                                                                                                                                                                                                                                                          • Display doors for which a specific identification medium is authorised
                                                                                                                                                                                                                                                                                                                            • Displaying identification media which are authorised for a specific door
                                                                                                                                                                                                                                                                                                                              • Displaying a locking device’s equipment features
                                                                                                                                                                                                                                                                                                                                • View statistics and warnings (dashboard)
                                                                                                                                                                                                                                                                                                                                  • Tracking activities in the database (log)
                                                                                                                                                                                                                                                                                                                                    • Setting the log archiving period
                                                                                                                                                                                                                                                                                                                                  • Background knowledge and explanations
                                                                                                                                                                                                                                                                                                                                    • Identification media, locking devices and the locking plan
                                                                                                                                                                                                                                                                                                                                      • “Engaging”, “opening”, “locking”, etc.
                                                                                                                                                                                                                                                                                                                                        • Synchronisation of database and actual state
                                                                                                                                                                                                                                                                                                                                          • Access and physical access lists
                                                                                                                                                                                                                                                                                                                                            • Event management
                                                                                                                                                                                                                                                                                                                                              • Time groups and schedules
                                                                                                                                                                                                                                                                                                                                                • Time switchovers
                                                                                                                                                                                                                                                                                                                                                  • Examples
                                                                                                                                                                                                                                                                                                                                                • Access levels
                                                                                                                                                                                                                                                                                                                                                  • Passwords used
                                                                                                                                                                                                                                                                                                                                                    • Buildings and locations
                                                                                                                                                                                                                                                                                                                                                      • Hashtags
                                                                                                                                                                                                                                                                                                                                                      • Help and other information
                                                                                                                                                                                                                                                                                                                                                        1. Home
                                                                                                                                                                                                                                                                                                                                                        2. Permissions
                                                                                                                                                                                                                                                                                                                                                        3. Changing many authorisations (on identification media and/or locking devices)

                                                                                                                                                                                                                                                                                                                                                        Changing many authorisations (on identification media and/or locking devices) - AXM Lite

                                                                                                                                                                                                                                                                                                                                                        Further information

                                                                                                                                                                                                                                                                                                                                                        • Allowing all or blocking all
                                                                                                                                                                                                                                                                                                                                                        • Access levels
                                                                                                                                                                                                                                                                                                                                                        • Controlling authorisations in terms of time (schedules)

                                                                                                                                                                                                                                                                                                                                                        © 2026 SimonsVoss Technologies GmbH - Classification: Public

                                                                                                                                                                                                                                                                                                                                                        Download document (Manual: AXM Lite) as PDF