Skip to main content
All CollectionsManager Classic
Become successful with Access Control in Manager Classic
Become successful with Access Control in Manager Classic

Find out who operated an asset at the time of an accident, how to bill for actual usage of equipment, or how to increase job-site safety.

Updated over 6 months ago

The following articles will show you how to utilize the DualID Access Control-system to better manage your rental machines or your owned equipment.

Use the navigation on the right side of this article to jump to the sections that are relevant for you.

General introduction to DualID Access Control

Prerequisites

If you want to use Access Control, you need to have the right hardware installed. Here’s an overview of the basic hardware to consider:

  • DualID keypad

  • RFID USB card reader (optional)

  • RFID cards (MIFARE compatible) (optional)


Setting up Access Control in Trackunit Manager:

Validity of keys

You can control how long a machine remains open after the ignition has been turned off. This time frame should not be too short, as the operator might turn off the machine for a few minutes during normal operation. It should also not be too long as untrained operators might use the machine if the machine access key is left open.
Ideally, you should put the setting somewhere between 1 and 10 minutes.


API

You can manage your access keys through an ERP-System via an API-connection. For more information, see the section on API at the end of this article

Increase safety on the job site

Operating machinery of any kind can be dangerous. Many machines require operators with professional training and a license to use certain types of machinery, be it a 9-ton excavator or a 30 m boom lift. However, on a big job site, sometimes untrained personnel get access to a machine, they are not trained to use. Often “just to move it” or because resources are scarce. But job site safety does not allow for compromises or cutting corners.

With Access Control you can avoid any unauthorized use of your machinery, while at the same time increasing safety.


Here’s what you need to do:

  1. Install and activate Access Control on all relevant machinery. See how to get started with Access Control here

  2. Create access keys for your operators. Ideally by using RFID-cards but it can also be a PIN-Code. See how to manage your Access Control keys here

  3. Define who should be allowed to access which equipment. If available, you can add the IPAF-license number of the operators

  4. Make sure to create a master PIN-key, which the Foreman, the Fleet Manager, and/or the Operations Manager always has available. This way machines can be moved quickly if they’re blocking traffic or in case of an emergency. Ideally, this key should be changed after each use to increase security

With these 4 steps you have all the necessary requirements in place to avoid any unauthorized use of your machines. Make sure that your staff is properly trained on how to use the system and to establish a clear process, where every operator always carries their access key with them and, most importantly, never lend out their access keys to untrained operators.


Investigate which operator/access key was used on which machine at what time


In the Operations Report you can see, which access key was active on which machine during a certain period of time. See how to generate an Operations Report here

You can search by machines, clients, groups, operators (key), operator's company, or zones. The report will show you machine activity paired with operator information.

Below you find an example report, with explanations to the data points.

Access control use case- operations report.png

If you want to analyse the machine usage during a specific time period, e.g. while a certain operator was using the machine, you can dig into Machine Insights found under Asset Home (for Insight customers only) or track the machine’s movement in the Movement Tab

Increase transparency in your billing process with machine pools

Access control use case sub-comtractors.png

Maybe you are a contractor, who has rented 20 machines from a rental company for a certain project. On the job site, you have hired three sub-contractors to take care of the electrical work, ground works, and plumbing respectively. All three sub-contractors have access to the pool of 20 machines. However, you want to keep an overview of how many hours each sub-contractor uses of the machine pool, and bill them accordingly.

Here Access Control comes in handy:

  1. Create and name a group that contains the 20 machines. Learn more about groups here

  2. Create access keys for the sub-contractors. You can either create a number of identical keys for each sub-contractor or create individual keys for each operator of each sub-contractor. See how to create access keys

  3. Make it easy to identify, which key belongs to which sub-contractor

  4. Define which keys should have access to which machines. For example, the electricians might only need access the scissor lifts and not the excavator

  5. Make sure to create a master PIN-key, which the Foreman, the Fleet Manager, and/or the Operations Manager always has available. This way machines can be moved quickly if they’re blocking traffic or in case of an emergency. Ideally, this key should be changed after use to increase security


With the basics in place, you can start to reap the benefits of machine pool based billing.


How to use reports for billing

Generate an Operations Report under the Report Tab. Choose which machines, clients, groups, operator's company, operators, or zones you want to base your report on.

Note: The Operator's Company can be added to each key when you create the key.

Access control use case-reports1.png



Below you can see an example of an Operations Report based from the month of December that shows two companies where operators had access to our machine pool.

On page 1 of the report you find a total overview of the operating hours split between the companies, i.e. sub-contractors.

On the following pages you will find details on each single machine and the operating time split between the operators.

access control use case-reports2.png





For increased flexibility and more sorting options, you can export the report to Excel.

Now you're ready to start billing


You can now use this information to calculate the correct number of hours each contractor has used the machines in your machine pool. The reports or excel sheets can, if needed, be attached to your invoices.

Remotely inhibit machines from starting

You can use Access Control to remotely inhibit machines from starting. You do that by locking the installed relay in an open position, and thus preventing the ignition from starting the engine.

You can do this when:

  • A remote diagnostic of the machine found the machine not safe for operations

  • The customer has not paid his bills

There’re two ways to stop a machine from starting:

  • Lock a machine in Overview on the Map in Manager Classic

  • Lock a machine by disabling all access keys

map overvies.png

Lock a machine in Overview on the Map in Manager Classic

Note: The lock/unlock feature needs to be activated. If you don't have access to it, you can see how to get it here

  1. Go to the Map-view and click on Overview

  2. Lock the machine by pressing Lock or unlock units. A locked machine will show a locked pad lock.

lock or unlock.png


Lock a machine by disabling all access keys

  1. Go to Manager Classic --> Settings --> Fleet

  2. Select a machine and press Edit

  3. Under Access Control set the access control mode to Locked for everyone

lock.png



Either way, the machine will not start now, even if the operator presents a valid key.

It is important to note that you cannot stop a machine that is currently operating. You can only prevent a machine from starting again, after the ignition has been switched off. This is by intention, as stopping a machine during operation might be dangerous.

Also, we advise you to warn the customer or operator of the machine before you lock it remotely.


Controlling Access Control in your ERP-Software via API

Trackunit offers powerful and easy-to-use APIs, which allow you to export data to external ERP-systems as well as control settings in Trackunit Manager remotely. You can find detailed descriptions and documentation on our APIs on https://dev.trackunit.com/ (available in English only).

Relevant Access Control requests


CreateKey: https://dev.trackunit.com/docs/key
Use this post-request to create keys

CreateGroup: https://dev.trackunit.com/docs/group
Use this post-request to create groups

To create a machine pool as described above, you can easily create a group for the machines in question and then create keys valid only for this group.

GetKeyHistory: https://dev.trackunit.com/docs/keyhistory
Get information on the activation history of any given key.

GetReportTrip: https://dev.trackunit.com/docs/trip
Get information on how long a key was active on a certain machine.

The above two requests can be used to create a report over the activation history and overall usage of any given key, for example, if you want to create a usage overview of any given key after a machine has been rented.

You can do the same from the machine perspective, by using the following request:

GetUnitHistory: https://dev.trackunit.com/docs/unit-history


💡 Tip:

Need more help? Get support from the Trackunit Community
Find answers and get help from Trackunit Tech Support and Community Experts


Did this answer your question?