{"id":385146,"date":"2024-10-20T03:29:18","date_gmt":"2024-10-20T03:29:18","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iec-60839-11-332021\/"},"modified":"2024-10-26T06:19:22","modified_gmt":"2024-10-26T06:19:22","slug":"bs-en-iec-60839-11-332021","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iec-60839-11-332021\/","title":{"rendered":"BS EN IEC 60839-11-33:2021"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
5<\/td>\nAnnex ZA (normative)Normative references to international publicationswith their corresponding European publications <\/td>\n<\/tr>\n
7<\/td>\nEnglish
CONTENTS <\/td>\n<\/tr>\n
13<\/td>\nFOREWORD <\/td>\n<\/tr>\n
15<\/td>\nINTRODUCTION <\/td>\n<\/tr>\n
16<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
17<\/td>\n3 Terms and definitions <\/td>\n<\/tr>\n
20<\/td>\n4 Overview
4.1 General <\/td>\n<\/tr>\n
21<\/td>\n4.2 Namespaces
Figures
Figure 1 \u2013 Overview of service dependencies
Tables
Table 1 \u2013 Defined namespaces in this document
Table 2 \u2013 Referenced namespaces (with prefix) <\/td>\n<\/tr>\n
22<\/td>\n4.3 Error handling
5 Credential service
5.1 General <\/td>\n<\/tr>\n
23<\/td>\n5.2 Service capabilities
5.2.1 General
5.2.2 ServiceCapabilities data structure
Figure 2 \u2013 Main data structures in the credential service <\/td>\n<\/tr>\n
24<\/td>\n5.2.3 GetServiceCapabilities command
Table 3 \u2013 GetServiceCapabilities command <\/td>\n<\/tr>\n
25<\/td>\n5.3 Credential information
5.3.1 General
5.3.2 Data structures <\/td>\n<\/tr>\n
28<\/td>\n5.3.3 GetCredentialInfoList command
Table 4 \u2013 GetCredentialInfo command <\/td>\n<\/tr>\n
29<\/td>\n5.3.4 GetCredentials command
Table 5 \u2013 GetCredentialInfoList command <\/td>\n<\/tr>\n
30<\/td>\n5.3.5 GetCredentialList command
Table 6 \u2013 GetCredentials command <\/td>\n<\/tr>\n
31<\/td>\n5.3.6 CreateCredential command
Table 7 \u2013 GetCredentialList command <\/td>\n<\/tr>\n
32<\/td>\nTable 8 \u2013 CreateCredential command <\/td>\n<\/tr>\n
33<\/td>\n5.3.7 SetCredential command <\/td>\n<\/tr>\n
34<\/td>\nTable 9 \u2013 SetCredential command <\/td>\n<\/tr>\n
35<\/td>\n5.3.8 ModifyCredential command <\/td>\n<\/tr>\n
36<\/td>\n5.3.9 DeleteCredential command
Table 10 \u2013 ModifyCredential command <\/td>\n<\/tr>\n
37<\/td>\n5.3.10 GetCredentialState command
5.3.11 EnableCredential command
Table 11 \u2013 DeleteCredential command
Table 12 \u2013 GetCredentialState command <\/td>\n<\/tr>\n
38<\/td>\n5.3.12 DisableCredential command
5.3.13 ResetAntipassbackViolation command
Table 13 \u2013 EnableCredential command
Table 14 \u2013 DisableCredential command <\/td>\n<\/tr>\n
39<\/td>\n5.3.14 GetSupportedFormatTypes command
5.3.15 GetCredentialIdentifiers command
Table 15 \u2013 ResetAntipassbackViolation command
Table 16 \u2013 GetSupportedFormatTypes command <\/td>\n<\/tr>\n
40<\/td>\n5.3.16 SetCredentialIdentifier command
Table 17 \u2013 GetCredentialIdentifiers command
Table 18 \u2013 SetCredentialIdentifier command <\/td>\n<\/tr>\n
41<\/td>\n5.3.17 DeleteCredentialIdentifier command
5.3.18 GetCredentialAccessProfiles command
Table 19 \u2013 DeleteCredentialIdentifier command
Table 20 \u2013 GetCredentialAccessProfiles command <\/td>\n<\/tr>\n
42<\/td>\n5.3.19 SetCredentialAccessProfiles command
5.3.20 DeleteCredentialAccessProfiles command
Table 21 \u2013 SetCredentialAccessProfiles command <\/td>\n<\/tr>\n
43<\/td>\n5.4 Notification topics
5.4.1 General
5.4.2 Event overview (informative)
5.4.3 Status changes
Table 22 \u2013 DeleteCredentialAccessProfiles command <\/td>\n<\/tr>\n
44<\/td>\n5.4.4 Configuration changes <\/td>\n<\/tr>\n
45<\/td>\n6 Access rules service
6.1 General
Figure 3 \u2013 Main data structures in the access rules service <\/td>\n<\/tr>\n
46<\/td>\n6.2 Service capabilities
6.2.1 General
6.2.2 ServiceCapabilities data structure
6.2.3 GetServiceCapabilities command
6.3 Access profile information
6.3.1 General
Table 23 \u2013 GetServiceCapabilities command <\/td>\n<\/tr>\n
47<\/td>\n6.3.2 Data structures
6.3.3 GetAccessProfileInfo command <\/td>\n<\/tr>\n
48<\/td>\n6.3.4 GetAccessProfileInfoList command
Table 24 \u2013 GetAccessProfileInfo command <\/td>\n<\/tr>\n
49<\/td>\n6.3.5 GetAccessProfiles command
Table 25 \u2013 GetAccessProfileInfoList command <\/td>\n<\/tr>\n
50<\/td>\n6.3.6 GetAccessProfileList command
Table 26 \u2013 GetAccessProfiles command <\/td>\n<\/tr>\n
51<\/td>\n6.3.7 CreateAccessProfile command
Figure 4 \u2013 Multiple schedules per access point
Table 27 \u2013 GetAccessProfileList command <\/td>\n<\/tr>\n
52<\/td>\n6.3.8 SetAccessProfile command
Figure 5 \u2013 Result of schedule union
Table 28 \u2013 CreateAccessProfile command <\/td>\n<\/tr>\n
53<\/td>\n6.3.9 ModifyAccessProfile command
Table 29 \u2013 SetAccessProfile command <\/td>\n<\/tr>\n
54<\/td>\n6.3.10 DeleteAccessProfile command
Table 30 \u2013 ModifyAccessProfile command <\/td>\n<\/tr>\n
55<\/td>\n6.4 Notification topics
6.4.1 General
6.4.2 Event overview (informative)
6.4.3 Configuration changes
Table 31 \u2013 DeleteAccessProfile command <\/td>\n<\/tr>\n
56<\/td>\n7 Authentication behaviour service
7.1 General
7.2 Example
Table 32 \u2013 Example of schedule state to security level mapping <\/td>\n<\/tr>\n
57<\/td>\n7.3 Service capabilities
7.3.1 General
7.3.2 ServiceCapabilities data structure
Figure 6 \u2013 Authentication behaviour example <\/td>\n<\/tr>\n
58<\/td>\n7.3.3 GetServiceCapabilities command
7.4 Authentication profile information
7.4.1 General
Table 33 \u2013 GetServiceCapabilities command <\/td>\n<\/tr>\n
59<\/td>\n7.4.2 Data structures
Figure 7 \u2013 Related objects of an authentication profile <\/td>\n<\/tr>\n
60<\/td>\n7.4.3 GetAuthenticationProfileInfo command <\/td>\n<\/tr>\n
61<\/td>\n7.4.4 GetAuthenticationProfileInfoList command
Table 34 \u2013 GetAuthenticationProfileInfo command <\/td>\n<\/tr>\n
62<\/td>\n7.4.5 GetAuthenticationProfiles command
Table 35 \u2013 GetAuthenticationProfileInfoList command <\/td>\n<\/tr>\n
63<\/td>\n7.4.6 GetAuthenticationProfileList command
Table 36 \u2013 GetAuthenticationProfiles command <\/td>\n<\/tr>\n
64<\/td>\n7.4.7 CreateAuthenticationProfile command
Table 37 \u2013 GetAuthenticationProfileList command <\/td>\n<\/tr>\n
65<\/td>\n7.4.8 SetAuthenticationProfile command
Table 38 \u2013 CreateAuthenticationProfile command <\/td>\n<\/tr>\n
66<\/td>\n7.4.9 ModifyAuthenticationProfile command
Table 39 \u2013 SetAuthenticationProfile command <\/td>\n<\/tr>\n
67<\/td>\n7.4.10 DeleteAuthenticationProfile command
Table 40 \u2013 ModifyAuthenticationProfile command <\/td>\n<\/tr>\n
68<\/td>\n7.5 Security level information
7.5.1 General
Figure 8 \u2013 Related objects of a security level
Table 41 \u2013 DeleteAuthenticationProfile command <\/td>\n<\/tr>\n
69<\/td>\n7.5.2 Data structures <\/td>\n<\/tr>\n
70<\/td>\nFigure 9 \u2013 Security level examples <\/td>\n<\/tr>\n
71<\/td>\n7.5.3 GetSecurityLevelInfo command
7.5.4 GetSecurityLevelInfoList command
Table 42 \u2013 GetSecurityLevelInfo command <\/td>\n<\/tr>\n
72<\/td>\n7.5.5 GetSecurityLevels command
Table 43 \u2013 GetSecurityLevelInfoList command <\/td>\n<\/tr>\n
73<\/td>\n7.5.6 GetSecurityLevelList command
Table 44 \u2013 GetSecurityLevels command <\/td>\n<\/tr>\n
74<\/td>\n7.5.7 CreateSecurityLevel command
Table 45 \u2013 GetSecurityLevelList command <\/td>\n<\/tr>\n
75<\/td>\n7.5.8 SetSecurityLevel command
Table 46 \u2013 CreateSecurityLevel command <\/td>\n<\/tr>\n
76<\/td>\n7.5.9 ModifySecurityLevel command
Table 47 \u2013 SetSecurityLevel command <\/td>\n<\/tr>\n
77<\/td>\n7.5.10 DeleteSecurityLevel command
Table 48 \u2013 ModifySecurityLevel command
Table 49 \u2013 DeleteSecurityLevel command <\/td>\n<\/tr>\n
78<\/td>\n7.6 Notification topics
7.6.1 General
7.6.2 Event overview (informative)
7.6.3 Configuration changes <\/td>\n<\/tr>\n
79<\/td>\n8 Schedule service
8.1 General
Figure 10 \u2013 Main data structures in the schedule service <\/td>\n<\/tr>\n
81<\/td>\n8.2 Recurrence
8.2.1 General
8.2.2 Weekly recurrence
Figure 11 \u2013 Recurrence support matrix <\/td>\n<\/tr>\n
82<\/td>\n8.2.3 Extended recurrence
8.2.4 Standard schedule recurrence
8.2.5 Special day recurrence
Figure 12 \u2013 Recurring events with an exception <\/td>\n<\/tr>\n
83<\/td>\n8.3 Service capabilities
8.3.1 General
8.3.2 ServiceCapabilities data structure
Figure 13 \u2013 Recurring events with a special day <\/td>\n<\/tr>\n
84<\/td>\n8.3.3 GetServiceCapabilities command
8.4 Schedule information
8.4.1 General
8.4.2 Data structures
Table 50 \u2013 GetServiceCapabilities command <\/td>\n<\/tr>\n
86<\/td>\nFigure 14 \u2013 SpecialDaysSchedule example
Figure 15 \u2013 Example of special day with time part <\/td>\n<\/tr>\n
87<\/td>\n8.4.3 GetScheduleInfo command <\/td>\n<\/tr>\n
88<\/td>\n8.4.4 GetScheduleInfoList command
Table 51 \u2013 GetScheduleInfo command <\/td>\n<\/tr>\n
89<\/td>\n8.4.5 GetSchedules command
Table 52 \u2013 GetScheduleInfoList command <\/td>\n<\/tr>\n
90<\/td>\n8.4.6 GetScheduleList command
Table 53 \u2013 GetSchedules command <\/td>\n<\/tr>\n
91<\/td>\n8.4.7 CreateSchedule command
Table 54 \u2013 GetScheduleList command <\/td>\n<\/tr>\n
92<\/td>\n8.4.8 SetSchedule command
Table 55 \u2013 CreateSchedule command <\/td>\n<\/tr>\n
93<\/td>\n8.4.9 ModifySchedule command
Table 56 \u2013 SetSchedule command <\/td>\n<\/tr>\n
94<\/td>\n8.4.10 DeleteSchedule command
Table 57 \u2013 ModifySchedule command
Table 58 \u2013 DeleteSchedule command <\/td>\n<\/tr>\n
95<\/td>\n8.5 Special day group information
8.5.1 General
8.5.2 Data structures
8.5.3 GetSpecialDayGroupInfo command <\/td>\n<\/tr>\n
96<\/td>\n8.5.4 GetSpecialDayGroupInfoList command
Table 59 \u2013 GetSpecialDayGroupInfo command <\/td>\n<\/tr>\n
97<\/td>\n8.5.5 GetSpecialDayGroups command
Table 60 \u2013 GetSpecialDayGroupInfoList command <\/td>\n<\/tr>\n
98<\/td>\n8.5.6 GetSpecialDayGroupList command
Table 61 \u2013 GetSpecialDayGroups command <\/td>\n<\/tr>\n
99<\/td>\n8.5.7 CreateSpecialDayGroup command
Table 62 \u2013 GetSpecialDayGroupList command <\/td>\n<\/tr>\n
100<\/td>\n8.5.8 SetSpecialDayGroup command
Table 63 \u2013 CreateSpecialDayGroup command <\/td>\n<\/tr>\n
101<\/td>\n8.5.9 ModifySpecialDayGroup command
Table 64 \u2013 SetSpecialDayGroup command <\/td>\n<\/tr>\n
102<\/td>\n8.5.10 DeleteSpecialDayGroup command
8.6 Schedule status
8.6.1 ScheduleState data structure
Table 65 \u2013 ModifySpecialDayGroup command
Table 66 \u2013 DeleteSpecialDayGroup command <\/td>\n<\/tr>\n
103<\/td>\n8.6.2 GetScheduleState command
Figure 16 \u2013 Schedule states <\/td>\n<\/tr>\n
104<\/td>\n8.7 Notification topics
8.7.1 General
8.7.2 Event overview (informative)
8.7.3 Status changes
Table 67 \u2013 GetScheduleState command <\/td>\n<\/tr>\n
105<\/td>\n8.7.4 Configuration changes <\/td>\n<\/tr>\n
106<\/td>\n8.8 Examples
8.8.1 General
8.8.2 Access 24 \u00d7 7 for admin staff
8.8.3 Access on Monday and Wednesday from 06:00 to 20:00 for cleaning staff
8.8.4 Access from Friday 18:00 to 07:00 for maintenance staff <\/td>\n<\/tr>\n
107<\/td>\n8.8.5 Access on weekdays from 08:00 to 17:00 for employees <\/td>\n<\/tr>\n
108<\/td>\n8.8.6 Access from January 15, 2014, to January 14, 2015, from 09:00 to 18:00
8.8.7 Special days example 1 <\/td>\n<\/tr>\n
109<\/td>\n8.8.8 Special days example 2 <\/td>\n<\/tr>\n
111<\/td>\n8.8.9 Special days example 3 <\/td>\n<\/tr>\n
112<\/td>\nAnnex A (normative)Access control interface XML schemata
A.1 Credential service WSDL <\/td>\n<\/tr>\n
132<\/td>\nA.2 Access rules service WSDL <\/td>\n<\/tr>\n
142<\/td>\nA.3 Authentication behaviour service WSDL <\/td>\n<\/tr>\n
160<\/td>\nA.4 Schedule service WSDL <\/td>\n<\/tr>\n
179<\/td>\nAnnex B (informative)Mapping of mandatory functions in IEC 60839-11-1 <\/td>\n<\/tr>\n
180<\/td>\nTable B.1 \u2013 Access point interface requirements <\/td>\n<\/tr>\n
181<\/td>\nTable B.2 \u2013 Indication and annunciation requirements <\/td>\n<\/tr>\n
184<\/td>\nTable B.3 \u2013 Recognition requirements <\/td>\n<\/tr>\n
185<\/td>\nTable B.4 \u2013 Duress signalling requirements <\/td>\n<\/tr>\n
186<\/td>\nTable B.5 \u2013 Overriding requirements
Table B.6 \u2013 System self protection requirements <\/td>\n<\/tr>\n
187<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Alarm and electronic security systems – Electronic access control systems. Access control configuration based on Web services<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2021<\/td>\n188<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":385154,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[2641],"product_tag":[],"class_list":{"0":"post-385146","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-bsi","8":"first","9":"instock","10":"sold-individually","11":"shipping-taxable","12":"purchasable","13":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/385146","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/385154"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=385146"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=385146"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=385146"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}