ics:keydb:admin
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
ics:keydb:admin [2021/03/03 23:02] – [Administrator Documentation] dfiorell | ics:keydb:admin [2021/05/04 23:22] (current) – [Basic Concepts] dfiorell | ||
---|---|---|---|
Line 4: | Line 4: | ||
When first loading the [[https:// | When first loading the [[https:// | ||
- | The Key Management system | + | The Key Management system |
- | * [[ics: | + | * [[ics: |
- | * [[ics: | + | * [[ics: |
* [[ics: | * [[ics: | ||
- | * [[ics: | ||
- | * [[ics: | ||
* [[ics: | * [[ics: | ||
- | * [[ics: | + | * [[ics: |
+ | * [[ics: | ||
* [[ics: | * [[ics: | ||
* [[ics: | * [[ics: | ||
+ | ---- | ||
+ | |||
+ | ===== Basic Concepts ===== | ||
+ | There are two parts to the key management system; the [[ics: | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ==== Key Box ==== | ||
+ | In the Key Management system, a serial number represents an individual physical key. Each serial number has a unique key number. A key number is associated with at least one room and building. A Key number may be associated with multiple buildings or rooms, but must be associated with at least one building or room. | ||
+ | |||
+ | Buildings, Rooms, and Key numbers are defined in the system. Then key numbers are associated with buildings and rooms. Once a key number is set up, serial numbers are created and linked to it. A Serial number can only have one key number. | ||
+ | |||
+ | Once the serial number is created and linked to a key number, the serial number is assigned to the Key Box. The Serial number now represents a physical key. A Key Request can be used to assign the Serial number from the Key Box to an individual. The Key Request is also used when the key is returned. | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ==== Key Requests ==== | ||
+ | In the Key Management system a Key Request represents a person. If someone needs a key they will fill out a Key Request. That Key Request will be used to track possession of the key. It will also be used to track if the key is lost or returned. | ||
+ | |||
+ | The Key Request will have information about the person making the request, as well as a list of keys they requested. It also includes supervisor approval and any deposits related to issued keys. The list of keys in the Request can be modified over time as keys are lost or returned. | ||
+ | |||
+ | A single person may have multiple Key Requests, but usually they only have one. |
ics/keydb/admin.1614812543.txt.gz · Last modified: 2021/03/03 23:02 by dfiorell