User`s manual
S2000-2 Operating
15 www.bolid.com
¾ The time periods when arming/disarming alarm loops of the S2000-2 are allowed (see Time
Schedules Section below)
The following access rights and restrictions are set individually for each access key involved in an
access group:
¾ The type of the key (is this key intended to be used as User, Locking, Unlocking or Master)
¾ The key lockout (a key be locked if necessary, e.g. if the key is lost or stolen)
¾ The additional code for the key or permission to use only main code in case of two-factor au-
thentication (see Two Factor Authentication Section below)
¾ The validity period of the key
The access key can be preprogrammed either by hardware or software ways see Key Program-
ming Section of this Manual.
Moreover, access control based on five different key patterns can be implemented through the access
point. In such a case the codes of presented keys are stored neither in the S2000-2 memory nor in
ARM Orion database, but instead to gain access they must meet on of the controller key pattern (see
Key Pattern Based Access Control Section below).