Skip to content

STRAZH ACS#

Here and further in the text:

  • STRAZH - ACS;
  • Strazh - Access service.

Performs replication of user data from the ACS to the specified list of the Biometric System and generates StrazhController controllers from the received list of devices for subsequent execution of requests for entry or exit.

  • Supports the ACS version: 1.2.211201.648.

The integration supports operation in 1-phase and 2-phase modes.

Supported integration options for STRAZH ACS#

The face recognition device generates an event, Access passes the event to LP5, LP5 processes the event and returns the result to Access for further processing.

Transfer of user data from the ACS to LP5 occurs using two mechanisms:

  • replication - the mechanism for the initial transfer of user data;
  • synchronization - the mechanism for periodic transfer of user data when the composition/data of users changes.

For the synchronization/replication settings, see the service settings.

Each integration with LP5 (Table 69) uses the Luna service.

If the terminal does not have data output facilities (e.g., a screen), the SendToDevice pipeline is not required.

Table 69. LP5 integration options

Service Device Pipeline
1f
Strazh + StrazhController LunaFast4A1 MatchByPhoto + SendToDevice + SendToController
2f
Strazh + StrazhController Beward Strazh2FA + SendThermalEventToLuna/SendToLuna
BioSmart Strazh2FA + SendToLuna
Dahua Strazh2FA + SendToLuna
Dahua Thermo Strazh2FA + SendThermalEventToLuna
Fortuna315 Strazh2FA + SendThermalEventToLuna
HikvisionCamera Strazh2FA + SendToLuna
HikvisionCamera Thermo Strazh2FA + SendThermalEventToLuna
HikvisionTerminal Thermo Strazh2FA + SendThermalEventToLuna
LunaFast4A1 Strazh2FA + SendToLuna
Panda Strazh2FA + SendThermalEventToLuna
UniUbi Strazh2FA + SendThermalEventToLuna/ SendToLuna
VKVision02 Strazh2FA
R20Face Strazh2FA + SendToLuna

Each integration with CBS (Table 70) uses the CBS service.

Table 70. CBS integration options

Service Device Pipeline
CbsMts + Strazh + StrazhController Beward MatchByPhoto + SendToDevice + Strazh2FA
Dahua MatchByPhoto + Strazh2FA
HikvisionCamera MatchByPhoto + Strazh2FA
LunaFast4A1 MatchByPhoto + SendToDevice + Strazh2FA
UniUbi MatchByPhoto + SendToDevice + Strazh2FA

Standard integration using STRAZH ACS#

When integrating with STRAZH, standard Access components (Figure 107) and (Table 71) are used.

Component diagram for 1-phase integration
Figure 107. Component diagram for 1-phase integration

Table 71. Integration Description

Component Description
Person A person wishing to pass through a passage point.
Passage point A set of components used to control human access. More than one passage point can be connected, limited by the ACS license. A passage point can be used for both entry and exit. Each direction uses its own reader and video data source.
Video data source A device for extracting a frame of a person's face. It can be either a biometric terminal (LUNA FAST 4A1 and others) or a camera connected via FaceStream. A biometric terminal allows you to create feedback to show a person information about the passage.
Device ... An Access component for receiving data from a video data source. Selected based on the device used.
MatchByPhoto Pipeline Access Component for interaction with the BS. When working with a biometric terminal, it is necessary to additionally connect the SendToDevice pipeline
Biometric System A system for comparing a reference photo of a person and the best frame received from a video data source. We can be either Luna, or supporting CBS.
Apacs Service An Access component for replicating/synchronizing employees from the ACS and listening to ACS events.
SendToController Pipeline Access Component for sending the card number and full name to the ApacsController after matching the person and confirming the card number in Access.
ApacsController Access component for sending the card number to the ACS. When using the gate or pusr controller, you must use the appropriate component. When using a biometric terminal, sends the employee's full name to it for display on the screen.
Apacs ACS Central software for working with Apacs. Stores employee data and makes a decision on granting access.
Turnstile Barrier device for access control

2f integration (Figure 108) and (Table 72).

Component diagram for 2f integration
Figure 108. Component diagram for 2f integration

Table 72. Integration description

Component Description
Person A person wishing to pass through a passage point.
Passage point A set of components used to control human access. More than one passage point can be connected, limited by the ACS license. A passage point can be used for both entry and exit. Each direction uses its own reader and video data source.
Video data source A device for extracting a frame of a person's face. It can be either a biometric terminal (LUNA FAST 4A1 and others) or a camera connected via FaceStream. A biometric terminal allows you to create feedback to show a person information about the passage.
Device ... An Access component for receiving data from a video data source. Selected based on the device used.
MatchByPhoto pipeline Access component for interacting with the BS. When working with a biometric terminal, it is necessary to additionally connect the pipeline SendToDevice
BS Service Access component for interaction with the BS: for LP5 it is Luna, for CBS - the corresponding CBS service.
Biometric system A system for comparing a reference photo of a person and the best frame received from a video data source. We can be either LP5 or supporting CBS.
Storage Access component for storing information about employees.
SendToController Pipeline Access Component for sending the card number to the StrazhController after matching a person and confirming the card number in Access.
StrazhController Controller Access component for sending the card number to the ACS.
STRAZH ACS Central software for working with the ACS. Stores employee data and makes decisions on granting access.
Turnstile Barrier device for access control
Strazh service Access component for replicating/synchronizing employees from the ACS and listening to ACS events.

Setting up STRAZH ACS software for two-factor authentication#

The ACS has implemented privilege levels. For 1F and 2F authorization to work, the access point privilege level must be equal to the employee's level, otherwise access will be denied.

If the employee has a higher privilege level than the access point, authorization will only occur by 1F (by card).

To configure the software, follow these steps:

1․ Go to ACS Settings > Access Points > Create a new one (if not created).

2․ Enter the required access point data if necessary.

This completes the process of setting up 1F authorization, follow steps 3-5 if 2F is planned.

3․ Click the "Additional parameters" tab and add "Confirmation of access by an external system" with the value "Yes".

4․ Add the "Maximum waiting time for confirmation of access by an external system" parameter.

5․ Adjust the timeout for waiting for a response from the external system and the default decision if the system does not have time to process the request.

After this, when trying to pass through this point with a card whose privilege level is lower than the privilege level of the point, an event with type: access_confirmation and data in the form of a JSON object with the fields request and response will be sent via the SSE mechanism.

The request contains a request for access, and the response contains a preliminary decision of the ACS about the possibility of access (i.e., a decision after standard checks of the profile, schedule, etc.).

Then the ACS waits for a decision on access to be sent to it via HTTP POST to /access_confirmation indicating the UUID of the request and a decision to let in or not.

Regardless of the ACS decision in response, the external system can let in or not let in.

Methods of interaction with STRAZH#

An API is used тo exchange data with the ACS (Table 73).

Table 73. STRAZH methods

Task Method Description
Log in POST /api/v1/login/ Access authorization in ACS. Authorization occurs when adding a service and after the token expires
Get information about ACS GET /api/v1/info Getting the ACS version to check compatibility and display in the UI.
Get employees GET /api/v1/staff Replication and synchronization of employees (person_id, full name, photo) from ACS to local storage
Get information about an employee GET /api/v1/staff/{person_id} Getting employee data from ACS (full name, photo)
Get employee photo GET /api/v1/images/{person_id} Get employee photo from ACS to send to biometric system
Get access points GET /api/v1/access_points Get access point (controller) IDs for manual matching of cameras/terminals and access points
Open access point POST /api/v1/request_access Send signal to controller to grant access.
Confirm 2nd factor POST /api/v1/access_confirmation Send confirmation to ACS about passing verification by the second factor (photo)
Open SSE connection GET /sse Open SSE connection to view event queue (reading, updating employee data)

STRAZH interaction process diagrams#

Strazh service connection#

Sequence diagram (Figure 109).

Process diagram for ACS connection
Figure 109. Process diagram for ACS connection

1․ The user added the Strazh service to Access. 2․ Access sends an authorization request to the ACS. 3․ The ACS returns an authorization token. The token has a lifetime, after which Access re-performs authorization. 4․ Access sends a request to obtain information about the ACS. 5․ The ACS returns information. Access uses only the ACS version to check compatibility and user information in the UI. 6․ Access requests information about access points (controllers) connected to the ACS. 7․ The ACS returns the access point IDs. 8․ Access creates StrazhController controllers in accordance with the received IDs. 9․ Access sends a request to obtain information about employees to replicate data to the local storage. 10․ ACS returns person_id, full name and photo. 11․ Access sends a request to open an SSE connection to view the list of events (changes in employees, access). 12․ ACS opens an SSE connection with Access.

Modifying employees in STRAZH ACS#

Sequence diagram (Figure 110).

Process diagram for changing employees in ACS
Figure 110. Process diagram for changing employees in ACS

1․ Access views the event queue in ACS via SSE connection. 2․ The employee is changed in ACS (added, changed or deleted). 3․ Access finds events with the CREATE, MODIFY_DATA or DELETE tags in the queue. 4․ Access deletes the employee from the local storage. 5․ Access requests data on the employee by his person_id. 6․ ACS returns the full name and photo of the employee. 7․ Access updates the employee information in the local storage.

Processing STRAZH events with 1 factor#

Sequence diagram (Figure 111).

Process diagram with 1 factor
Figure 111. Process diagram with 1 factor

1․ Employee at the biometric terminal at the checkpoint. 2․ Terminal sends the best photo of the employee to Access. 3․ Access sends a photo of the employee to the Biometric System. 4․ BS compares the photo from the terminal and the one saved in the database. 5․ BS returns to Access a decision on granting access. 6․ Access sends a signal to the controller to open the access point.

Processing STRAZH events with 2 factors#

Sequence diagram (Figure 112).

Process diagram with 2 factors
Figure 112. Process diagram with 2 factors

1․ Employee at the biometric terminal at the checkpoint. 2․ The terminal sends the best shot of the employee to Access. 3․ Access sends the employee's photo to the Biometric System. 4․ The BS compares the photo from the terminal and the one stored in the database. 5․ The BS returns to Access a decision on granting access. 6․ The employee applies the card (the card use subprocess does not depend on photo processing, but, as a rule, the photo arrives first). 7․ The access point sends information to Access via SSE about the passage (access point ID, passage direction, and person_id). 8․ Access aggregates information about each factor and sends a signal to the controller to open the access point.