{"id":344015,"date":"2024-10-20T00:09:20","date_gmt":"2024-10-20T00:09:20","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-60839-11-322017\/"},"modified":"2024-10-25T23:29:45","modified_gmt":"2024-10-25T23:29:45","slug":"bs-en-60839-11-322017","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-60839-11-322017\/","title":{"rendered":"BS EN 60839-11-32:2017"},"content":{"rendered":"

This part of IEC 60839<\/span> <\/span> defines the Web services interface for electronic access control systems. This includes listing electronic access control system components, their logical composition, monitoring their states and controlling them. It also includes a mapping of mandatory and optional requirements as per IEC 60839\u201111\u20111<\/span> <\/span>.<\/p>\n

This document applies to physical security only. Physical security prevents unauthorized personnel, attackers or accidental intruders from physically accessing a building, room, etc.<\/p>\n

Web services usage and device management functionality are outside of the scope of this document. Refer to IEC 60839\u201111\u201131<\/span> <\/span> for more information.<\/p>\n

This document does not in any way limit a manufacturer to add other protocols or extend the protocol defined here. For rules on how to accomplish this refer to IEC 60839\u201111\u201131<\/span> <\/span>.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
6<\/td>\nEnglish
CONTENTS <\/td>\n<\/tr>\n
9<\/td>\nFOREWORD <\/td>\n<\/tr>\n
11<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
12<\/td>\n1 Scope
2 Normative references
3 Terms, definitions and abbreviated terms
3.1 Terms and definitions <\/td>\n<\/tr>\n
14<\/td>\n3.2 Abbreviated terms
4 Overview
4.1 Interoperability
4.2 Event handling
4.3 Architecture <\/td>\n<\/tr>\n
15<\/td>\n4.4 External authorization (Overriding)
4.5 Security considerations
Figure 1 \u2013 Schematic overview of an access controlled door <\/td>\n<\/tr>\n
16<\/td>\n4.6 Door (access point) control
4.7 Design considerations
4.7.1 Instance-level capabilities
4.7.2 Retrieving status
4.7.3 Retrieving system configuration <\/td>\n<\/tr>\n
17<\/td>\n5 Access control
5.1 General
5.2 Service capabilities
5.2.1 General
5.2.2 Data structures: ServiceCapabilities
5.2.3 GetServiceCapabilities command <\/td>\n<\/tr>\n
18<\/td>\n5.3 Access point (portal side) information
5.3.1 Data structures
Tables
Table 1 \u2013 GetServiceCapabilities command <\/td>\n<\/tr>\n
19<\/td>\n5.3.2 GetAccessPointInfoList command <\/td>\n<\/tr>\n
20<\/td>\n5.3.3 GetAccessPointInfo command
Table 2 \u2013 GetAccessPointInfoList command
Table 3 \u2013 GetAccessPointInfo command <\/td>\n<\/tr>\n
21<\/td>\n5.4 Area information
5.4.1 Data structures: AreaInfo
5.4.2 GetAreaInfoList command
5.4.3 GetAreaInfo command
Table 4 \u2013 GetAreaInfoList command <\/td>\n<\/tr>\n
22<\/td>\n5.5 Access point (portal side) status
5.5.1 General
5.5.2 Data structures: AccessPointState
5.5.3 GetAccessPointState command
Table 5 \u2013 GetAreaInfo command <\/td>\n<\/tr>\n
23<\/td>\n5.6 Access control commands
5.6.1 General
5.6.2 Data structures: Decision enumeration
5.6.3 EnableAccessPoint command
Table 6 \u2013 GetAccessPointState command
Table 7 \u2013 EnableAccessPoint command <\/td>\n<\/tr>\n
24<\/td>\n5.6.4 DisableAccessPoint command
5.6.5 ExternalAuthorization command
Table 8 \u2013 DisableAccessPoint command
Table 9 \u2013 ExternalAuthorization command <\/td>\n<\/tr>\n
25<\/td>\n5.7 Notification topics
5.7.1 Event overview
5.7.2 General transaction event layout <\/td>\n<\/tr>\n
26<\/td>\n5.7.3 Access granted <\/td>\n<\/tr>\n
27<\/td>\n5.7.4 Access taken
5.7.5 Access not taken <\/td>\n<\/tr>\n
28<\/td>\n5.7.6 Access denied <\/td>\n<\/tr>\n
30<\/td>\n5.7.7 Duress
5.7.8 External authorization (Override) <\/td>\n<\/tr>\n
32<\/td>\n5.7.9 Status changes
5.7.10 Configuration changes <\/td>\n<\/tr>\n
33<\/td>\n6 Door (access point) control
6.1 General
6.2 Service capabilities
6.2.1 General
6.2.2 Data structures: ServiceCapabilities
6.2.3 GetServiceCapabilities command <\/td>\n<\/tr>\n
34<\/td>\n6.3 Door (access point) information
6.3.1 Data structures
Table 10 \u2013 GetServiceCapabilities command <\/td>\n<\/tr>\n
35<\/td>\n6.3.2 GetDoorInfoList command <\/td>\n<\/tr>\n
36<\/td>\n6.3.3 GetDoorInfo command
Table 11 \u2013 GetDoorInfoList command
Table 12 \u2013 GetDoorInfo command <\/td>\n<\/tr>\n
37<\/td>\n6.4 Door (access point) status
6.4.1 General
6.4.2 Data structures <\/td>\n<\/tr>\n
39<\/td>\n6.4.3 GetDoorState command <\/td>\n<\/tr>\n
40<\/td>\n6.5 Door (access point) control commands
6.5.1 General
6.5.2 AccessDoor command
Table 13 \u2013 GetDoorState command <\/td>\n<\/tr>\n
41<\/td>\n6.5.3 LockDoor command
Table 14 \u2013 AccessDoor command
Table 15 \u2013 LockDoor command <\/td>\n<\/tr>\n
42<\/td>\n6.5.4 UnlockDoor command
6.5.5 BlockDoor command
Table 16 \u2013 UnlockDoor command
Table 17 \u2013 BlockDoor command <\/td>\n<\/tr>\n
43<\/td>\n6.5.6 LockDownDoor command
6.5.7 LockDownReleaseDoor command
Table 18 \u2013 LockDownDoor command <\/td>\n<\/tr>\n
44<\/td>\n6.5.8 LockOpenDoor command
6.5.9 LockOpenReleaseDoor command
Table 19 \u2013 LockDownReleaseDoor command
Table 20 \u2013 LockOpenDoor command <\/td>\n<\/tr>\n
45<\/td>\n6.5.10 DoubleLockDoor command
Table 21 \u2013 LockOpenReleaseDoor command
Table 22 \u2013 DoubleLockDoor command <\/td>\n<\/tr>\n
46<\/td>\n6.6 Notification Topics
6.6.1 General
6.6.2 Status changes <\/td>\n<\/tr>\n
47<\/td>\n6.6.3 Configuration changes <\/td>\n<\/tr>\n
49<\/td>\nAnnex\u00a0A (normative)Access control interface XML schemata
A.1 Access control service WSDL <\/td>\n<\/tr>\n
56<\/td>\nA.2 Door control service WSDL <\/td>\n<\/tr>\n
66<\/td>\nA.3 Common schema <\/td>\n<\/tr>\n
68<\/td>\nAnnex\u00a0B (informative)Mapping of mandatory functions in IEC\u00a060839-11-1
Table B.1 \u2013 Access point interface requirements <\/td>\n<\/tr>\n
69<\/td>\nTable B.2 \u2013 Indication and annunciation requirements <\/td>\n<\/tr>\n
73<\/td>\nTable B.3 \u2013 Recognition requirements <\/td>\n<\/tr>\n
75<\/td>\nTable B.4 \u2013 Duress signalling requirements
Table B.5 \u2013 Overriding requirements <\/td>\n<\/tr>\n
76<\/td>\nTable B.6 \u2013 System self protection requirements <\/td>\n<\/tr>\n
77<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Alarm and electronic security systems – Electronic access control systems. Access control monitoring based on Web services<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2017<\/td>\n80<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":344020,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-344015","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/344015","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/344020"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=344015"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=344015"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=344015"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}