36
KMS Implementer Lab Guide PRACTICAL EXERCISES IN KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17

Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

KMS Implementer Lab GuidePRACTICAL EXERCISES IN KMS 2.0

KMS v2.7 | Implementer Training | 3/22/17

Page 2: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

LAB 1: Profiles & Control Groups

Exercise 1: Create a new control group and authorize another implementer to use your group.

PAGE 1

1. Log into KMS and select the KEYS tab.

2. Click Manage Control Groups from the Administration menu.

3. Click Add Control Group from the bottom-right of the main display.

4. Type a unique Name for your new group.

5. Type a Default Profile Group name or leave the provided default value.

Page 3: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

PAGE 2

4. Type a unique Name for your new group.

5. Type a Default Profile Group name or leave the provided default value.

Page 4: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

Exercise 2: Create a small profile tree with at least three different generations of profiles. The profiles should be created inside of the default profile group of your new control group.

1. Click Mange Profiles from the Profiles menu.

2. Click Add Profile from the action buttons below the record grid.

PAGE 3

3. Select the key Manufacturer of the profile you are adding.

4. Select the lineage Title of the profile.

5. Type the Keyway, Biting and Keyset of the profile.

6. Click on the check box mark secured if appropriate.

7. Type a Note if desired and click restrict this note to me if you do not want anyone else to see your note; then click

Page 5: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

PAGE 4

8. Confirm the Control Group of the profile you are adding.

9. Confirm the Profile Group(s) listed or add new group and type a name in New Group, click Enter.

10. Click Continue.

11. Select the Building for the profile you are adding.

12. Select the Room of the building.

13. Select the object(s) if appropriate.

Note: Click on the check box Skip Access Assignments if you have more than one location to add.

14. Review the information for

Page 6: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

PAGE 5

15. Review the information for accuracy. Click Submit if correct or Previous to make changes.

The confirmation screen will summarize the instance that was created.

16. Click Close Window to return to the Profile Manger record display.

Page 7: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

Now, you can create a child profile.

1. Click Mange Profiles from the Profiles menu.

2. Click on the Check Box next to the ID number of the Profile you want to add a child profile under.

3. Click Add Profile from the action buttons below the record grid.

PAGE 6

Page 8: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

When you have completed the three profiles, you should see the additions to the tree you created, similar to the screen below:

PAGE 7

Note: When you are creating a child profile, information will prepopulate from the parent record.

4. Complete the steps as you did for the parent profile.

Page 9: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

Exercise 3: Create new access locations for your tree of profiles while learning how access locations propagate.

1. Click Mange Profile Groups from the Profiles menu.

2. Click on the Check Box next to the ID number of the Profile you want to add an Access Location to.

3. Click Access Locations from the action buttons below the record grid.

PAGE 8

3. Click the Building icon with the green + on it.

Page 10: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

Go on to create at least two more access locations, each on different branches of your profile tree.

PAGE 9

4. Select the Building for the profile you are adding.

5. Select the Room of the building.

6. Select the object(s) as appropriate.

7. Type a Note if desired and click restrict this note to me if you do not want anyone else to see your note.

8. Click Continue if correct or

9. Review the information for accuracy. Click Submit if correct or Previous to make changes.

You should the new Access Location at the bottom of the list.

16. Click Close Window to return to the Profile Manger record display.

Page 11: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

To verify the access locations for a profile, hover your pointer over the building icon in the ACCESSES column.

PAGE 10

Page 12: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

Lab 1 Review

Q1: The following list helps to define a profile

a) Biting, keyset, Title, Keyway

b) Biting, key stamp, Title, Keyway

c) Biting, keyset, Sequence, Keyway

d) keyset, Title, Keyway, Key Ring

Q2: Control Groups are used to …

a) Organize a lot of keys

b) Authorize a KCC’s access to a set of profiles and profile groups

c) Authorize an Implementer’s access to profiles and profile groups

d) Control which profiles can be added to KMS

Q3: The following is a valid list of titles…

a) Control, Change, Master, Child

b) Control, Change, Master, Great Grandmaster

c) Control, Change, Master, Great Master

d) Control, Leaf, Master, Sub-Master

Q4: When adding an Access Location (AL) to a profile

a) The AL will automatically apply to ancestor profiles (up the tree) but not to descendants (down the tree).

b) The AL will automatically apply to descendant profiles (down the tree) but not to ancestors (up the tree).

c) The AL will automatically apply to all profiles (up and down the tree) that are related to the selected profile.

d) The AL will only apply to the selected profile.

PAGE 11

Page 13: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

Q5: A “Secured” profile is one that…

a) Cannot be copied

b) Can only be viewed by its creator

c) Cannot be viewed by KCCs

d) None of the above, the “Secured” flag has no meaning.

PAGE 12

Page 14: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

Lab 2: Profile GroupsExercise 01: Create a new profile group and add your new profile tree to it. Create a new KCC and assign him to your new group.

Bonus: is the KCC now authorized? How can you tell?

Exercise 4: Create a Profile Group and add your profile tree from the previous exercise to it. Then, add a new KCC to the Profile Group.

1. Click Mange Profile Groups from the Profiles menu.

2. Click Add Profile Group from the action buttons below the record grid.

PAGE 13

Page 15: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

PAGE 14

3. Select the Control Group the profile group will belong to.

4. Type a unique Name for your Profile Group.

TIP: Use the College/Unit, Facility Name, Facility Code and Department

5. Check make default group, if applicable.

6. Type a Note if desired and click restrict this note to me if you do not want anyone else to see your note; then click

8. Review the information for accuracy. Click Submit if correct or Previous to make changes.

The confirmation screen will summarize the instance that was created.

9. Click Close Window to return to the Profile Manger record display.

Page 16: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

The Profile Group you created should now show in the display, similar to the picture below:

Next, add a KCC (Key Control Coordinator) to the Profile Group.

1. Click on the Check Box next to the ID number of the Profile Group you want to add the KCC to.

2. Click Group Membership from the action buttons below the record grid.

PAGE 15

Page 17: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

PAGE 16

3. Type the netid of the person you wish to grant KCC rights to the Profile Group in the KMS User field, click Enter.

The name and netid of the KMS User should appear in the KCCs – currently assigned area. Repeat as required.

4. Type a Note if desired and click restrict this note to me if you do not want anyone else to see your note; then click Commit.

5. When all KCC’s have been

The confirmation screen will summarize any additions and removals made to the Profile Group.

6. Click Close Window to return to the Profile Manger record

Page 18: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

To verify the KCC’s for a Profile Group, hover your pointer over the person icon in the KCCS column.

PAGE 17

Page 19: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

Now, add your Profile Tree to the Profile Group.

PAGE 18

1. Click Mange Profiles from the Profiles menu.

2. Click on the Check Box next to the ID number of the Profile you want to add the Profile Group.

3. Click Manage Groups from the action buttons below the record grid.

Page 20: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

To verify the Profile Groups for a Profile, hover your pointer over the people icon in the PRFL GROUPS column.

PAGE 19

The confirmation screen will summarize any additions and removals of Profile Groups from the Profile.

8. Click Close Window to return to the Profile Manger.

4. Select the Control Group the profile will belong to.

Note: Once a Control Group is selected, the Subscribed Groups and Available Groups will populate unless a Profile Group has not been assigned.

5. Click the appropriate Profile Group from the Available Groups, click Enter. Repeat as required.

6. Type a Note if desired and click restrict this note to me if you do not want anyone else to see your note; then click Commit.

7. When you are done, click

Page 21: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

PAGE 20

Page 22: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

Lab 2 Review

Q1: Complete this thought: A Profile Group…

a) Organizes keys for AKCCs

b) Authorizes an Implementer’s profile access

c) Authorizes a KCC’s access to a set of profiles

d) Meets regularly on Thursdays to discuss keys

Q2: If Alice is an authorized KCC of Profile Group FOO, and we add a new profile to the group, which of the following statements is true?

a) Alice cannot see or use the new profile until we authorize her to use it.

b) Alice cannot see the profile until we authorize her again, but any keys based on the profile will be visible to her.

c) Alice can see the profile, but may not use it for anything until authorized to do so.

d) Alice may see and use the profile instantly.

Q3: When adding a profile to a group, what affect does the “automatically include children” flag have?

a) Adds the profile and its descendants to the target group, then stops.

b) Adds ONLY the profile’s descendants to the target group, then stops.

c) Adds the profile and its descendants to the target group, and will continue to add any future descendants when they are created.

d) None of the above

Q4: Profile groups are found organized under…

a) Key Groups

b) Control Groups

c) Profile Trees

d) None of the above

PAGE 21

Page 23: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

Q5: X-Domain KCCs can access…

a) All profiles, regardless of which groups they belong to.

b) Only the profiles in X-Domain Profile Groups.

c) Only the profiles found in the X-Domain Profile Group to which they have been authorized.

d) None of the above.

PAGE 22

Page 24: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

Lab 3: KeysExercise 1: Instantiate new keys from your profile tree (single and batch mode) and verify their existence.

1. Click Mange Profile from the Profiles menu.

2. Click on the Check Box next to the ID number of the Profile you want to create a key instance from.

3. Click Create Instance from the action buttons below the record grid.

PAGE 23

Page 25: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

OR

PAGE 24

When you are creating a key instance, information will prepopulate from the profile.

Let’s create a single key instance.

4. Type the Key Stamp for the instance you are creating.

5. Leave the default Mode to Single.

The system will choose the starting sequence value based on the last numeric sequence in KMS.

6. Type a Note if desired and click restrict this note to me if you do not want anyone else to

To create a batch of key instances.

4. Type the Key Stamp for the instance you are creating.

5. Click the Mode to Multiple.

The system will choose the starting sequence value based on the last numeric sequence in KMS.

NOTE: The default instances is 10. To change the number of instances, Type a numeric value.

6. Type a Note if desired and click restrict this note to me if you do not want anyone else to see your note; then click

Page 26: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

PAGE 25

7. Select the Profile Group the instance will belong to.

Note: Once a Profile Group is selected, the Key Group will populate.

8. Click the appropriate Key Group.

9. Click Continue if you are done or Previous to make changes.

10. Review the information for accuracy. Click Submit if correct or Previous to make changes.

11. Click Close Window to return to the Profile Manger.

Page 27: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

Let’s verify that the keys you created are now viewable.

1. Click Review Keys from the Keys menu.

2. Select the Control Group and Profile Group in the filter and click the refresh arrows.

Your key instance(s), with that specific Key Stamp, should be displayed similar to the screen below.

PAGE 26

Page 28: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

Lab 3 Review

Q1: Under the new Key Stamping Standard, the key stamp is now…

a) Always the profile’s keyset.

b) Always the profile’s keyset plus any optional information supplied by the KCC.

c) A string in the form of: KEYWAY-KEYSET-BITING (sometimes with manufacturer added in).

d) Whatever the KCC asks for it to be.

Q2: What issue, specific to profiles, could prevent you from instantiating a key?

a) Profiles not authorized to a KCC cannot be instantiated.

b) Profiles without at least one access location cannot be instantiated.

c) Profiles created in a different time zone than yours, cannot instantiate keys in your TZ.

d) None, you can always instantiate an existing profile.

Q3: You attempt to instantiate a duplicate key; which of the following statements is true?

a) KMS will stop and ask if this is what you intend to do. After attesting to your intention, you may continue to add the new key.

b) KMS will inform you that duplicate keys are forbidden and stop the key instantiation process.

c) KMS will stall you with animations while it silently contacts the University Key Steward and informs them of your activities.

d) KMS will throw an error, unsure of how to proceed since it lacks any support for duplicate keys.

Q4: Which of the following lists contain defining attributes of keys:

a) Keyway, keyset, biting

b) Keyway, sequence, keyset

c) Key stamp, status, sequence

d) None of the above

PAGE 27

Page 29: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

Q5: You’ve instantiated a new key only to later learn that you’ve mistakenly placed it in the wrong key group; how can you fix this?

a) Delete the key and re-instantiate it; this time being careful to place it in the right group.

b) Under KEYS Tab > Manage Keys use the Re-Locate Keys command to move the key to the proper group.

c) Ask Zuul the Gatekeeper of Gozer to destroy the original key and anyone that may have come into contact with it.

d) Under KEYS Tab > Review Keys use the Move to Group command to move the key to the proper group.

PAGE 28

Page 30: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

Lab 4: Objects & Orders

Exercise 01: Create a new door object and add it as a new access location to one of your profiles.

PAGE 29

1. Select the FACILITIES tab.

2. Click Manage Facility Objects from the Objects menu.

3. Click red text for the Building you want to add an object to from the file browser.

Page 31: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

You should now see a list of the current objects for the building selected, similar to the one pictured below:

1. Click Create.

PAGE 30

To create a single object.

4. Select the Type of object you are creating.

5. Type a Label for the object.

6. Leave the default Mode to single object.

7. Click on all Options that apply to the object.

8. Click attach a note to this new object, if desired and type a Note; then click Submit.

To create a batch of key instances.

4. Select the Type of object you

Page 32: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

You can now confirm that your objects were successfully created by looking at the end of the list of objects for the selected facility, similar to the picture below:

PAGE 31

To create a batch of key instances.

4. Select the Type of object you

10. Review the information for accuracy. Click Submit if correct or Back to make changes.

Page 33: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

Exercise 02: Review and fulfill an electronic key order; verify the new keys exist.

PAGE 32

1. Select the KEY ORDERS tab.

2. Click Pending Orders from the key Orders menu.

3. Click on the Check Box next to the order number of the request you want to review.

4. Click Review.

Page 34: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

PAGE 33

4. Review the information.

5. When finished, close the window.

1. Click Pending Orders from the key Orders menu.

2. Click on the Check Box next to the order number of the request you want to fulfill.

3. Click Fulfill.

Page 35: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

PAGE 34

4. Confirm the information and type any changes that may be required.

NOTE: You may need to Review Keys to confirm that the key data is correct.

5. Click Continue.

Page 36: Access Control and Physical Security - LAB 1: …€¦ · Web viewKMS Implementer Lab Guide Practical Exercises in KMS 2.0 KMS v2.7 | Implementer Training | 3/22/17 LAB 1: Profiles

Lab 4 Review

Q1: To create an access location for a profile, what must first exist?

a) A facilities object with the lockable flag enabled.

b) A door-typed facilities object with the lockable flag enabled.

c) Any facilities object so long as it is in the proper room.

d) Any of the above

Q2: While fulfilling a key order, the dialogue throws an error stating that one of the profiles does not exist; you must…

a) This wouldn’t happen, EKO only forwards orders with complete profiles.

b) Click through the dialogue, it’ll create the missing profile for you.

c) Return to the KEYS Tab to create a new profile then return to EKO.

d) None of the above

Q3: A KCC contacts you citing a problem viewing new keys. The likely problem is…

a) The keys were never instantiated.

b) The profile that the keys are based on is not in the KCC’s profile group.

c) The keys were mistakenly added to the wrong key group.

d) Any of the above.

PAGE 35