The following articles will show you how to utilize the DualID Access Control-system to better manage your rental machines or your owned equipment.
Use the navigation on the right side of this article to jump to the sections that are relevant for you.
General introduction to DualID Access Control
Prerequisites
If you want to use Access Control, you need to have the right hardware installed. Here’s an overview of the basic hardware to consider:
DualID keypad
RFID USB card reader (optional)
RFID cards (MIFARE compatible) (optional)
Setting up Access Control in Trackunit Manager:
See how to enable Access Control and add, edit, or delete keys
Validity of keys
You can control how long a machine remains open after the ignition has been turned off. This time frame should not be too short, as the operator might turn off the machine for a few minutes during normal operation. It should also not be too long as untrained operators might use the machine if the machine access key is left open.
Ideally, you should put the setting somewhere between 1 and 10 minutes.
API
You can manage your access keys through an ERP-System via an API-connection. For more information, see the section on API at the end of this article
Increase safety on the job site
Operating machinery of any kind can be dangerous. Many machines require operators with professional training and a license to use certain types of machinery, be it a 9-ton excavator or a 30 m boom lift. However, on a big job site, sometimes untrained personnel get access to a machine, they are not trained to use. Often “just to move it” or because resources are scarce. But job site safety does not allow for compromises or cutting corners.
With Access Control you can avoid any unauthorized use of your machinery, while at the same time increasing safety.
Here’s what you need to do:
Install and activate Access Control on all relevant machinery. See how to get started with Access Control here
Create access keys for your operators. Ideally by using RFID-cards but it can also be a PIN-Code. See how to manage your Access Control keys here
Define who should be allowed to access which equipment. If available, you can add the IPAF-license number of the operators
Make sure to create a master PIN-key, which the Foreman, the Fleet Manager, and/or the Operations Manager always has available. This way machines can be moved quickly if they’re blocking traffic or in case of an emergency. Ideally, this key should be changed after each use to increase security
With these 4 steps you have all the necessary requirements in place to avoid any unauthorized use of your machines. Make sure that your staff is properly trained on how to use the system and to establish a clear process, where every operator always carries their access key with them and, most importantly, never lend out their access keys to untrained operators.
Investigate which operator/access key was used on which machine at what time
In the Operations Report you can see, which access key was active on which machine during a certain period of time. See how to generate an Operations Report here
You can search by machines, clients, groups, operators (key), operator's company, or zones. The report will show you machine activity paired with operator information.
Below you find an example report, with explanations to the data points.
If you want to analyse the machine usage during a specific time period, e.g. while a certain operator was using the machine, you can dig into Machine Insights found under Asset Home (for Insight customers only) or track the machine’s movement in the Movement Tab
Increase transparency in your billing process with machine pools
Maybe you are a contractor, who has rented 20 machines from a rental company for a certain project. On the job site, you have hired three sub-contractors to take care of the electrical work, ground works, and plumbing respectively. All three sub-contractors have access to the pool of 20 machines. However, you want to keep an overview of how many hours each sub-contractor uses of the machine pool, and bill them accordingly.
Here Access Control comes in handy:
Create and name a group that contains the 20 machines. Learn more about groups here
Create access keys for the sub-contractors. You can either create a number of identical keys for each sub-contractor or create individual keys for each operator of each sub-contractor. See how to create access keys
Make it easy to identify, which key belongs to which sub-contractor
Define which keys should have access to which machines. For example, the electricians might only need access the scissor lifts and not the excavator
Make sure to create a master PIN-key, which the Foreman, the Fleet Manager, and/or the Operations Manager always has available. This way machines can be moved quickly if they’re blocking traffic or in case of an emergency. Ideally, this key should be changed after use to increase security
With the basics in place, you can start to reap the benefits of machine pool based billing.
How to use reports for billing
Generate an Operations Report under the Report Tab. Choose which machines, clients, groups, operator's company, operators, or zones you want to base your report on.
Note: The Operator's Company can be added to each key when you create the key.
Below you can see an example of an Operations Report based from the month of December that shows two companies where operators had access to our machine pool.
On page 1 of the report you find a total overview of the operating hours split between the companies, i.e. sub-contractors.
On the following pages you will find details on each single machine and the operating time split between the operators.
For increased flexibility and more sorting options, you can export the report to Excel.
Now you're ready to start billing
You can now use this information to calculate the correct number of hours each contractor has used the machines in your machine pool. The reports or excel sheets can, if needed, be attached to your invoices.
Remotely inhibit machines from starting
You can use Access Control to remotely inhibit machines from starting. You do that by locking the installed relay in an open position, and thus preventing the ignition from starting the engine.
You can do this when:
A remote diagnostic of the machine found the machine not safe for operations
The customer has not paid his bills
There’re two ways to stop a machine from starting:
Lock a machine in Overview on the Map in Manager Classic
Lock a machine by disabling all access keys
Lock a machine in Overview on the Map in Manager Classic
Note: The lock/unlock feature needs to be activated. If you don't have access to it, you can see how to get it here
Go to the Map-view and click on Overview
Lock the machine by pressing Lock or unlock units. A locked machine will show a locked pad lock.
Lock a machine by disabling all access keys
Go to Manager Classic --> Settings --> Fleet
Select a machine and press Edit
Under Access Control set the access control mode to Locked for everyone
Either way, the machine will not start now, even if the operator presents a valid key.
It is important to note that you cannot stop a machine that is currently operating. You can only prevent a machine from starting again, after the ignition has been switched off. This is by intention, as stopping a machine during operation might be dangerous.
Also, we advise you to warn the customer or operator of the machine before you lock it remotely.
Controlling Access Control in your ERP-Software via API
Trackunit offers powerful and easy-to-use APIs, which allow you to export data to external ERP-systems as well as control settings in Trackunit Manager remotely. You can find detailed descriptions and documentation on our APIs on https://dev.trackunit.com/ (available in English only).
Relevant Access Control requests
CreateKey: https://dev.trackunit.com/docs/key
Use this post-request to create keys
CreateGroup: https://dev.trackunit.com/docs/group
Use this post-request to create groups
To create a machine pool as described above, you can easily create a group for the machines in question and then create keys valid only for this group.
GetKeyHistory: https://dev.trackunit.com/docs/keyhistory
Get information on the activation history of any given key.
GetReportTrip: https://dev.trackunit.com/docs/trip
Get information on how long a key was active on a certain machine.
The above two requests can be used to create a report over the activation history and overall usage of any given key, for example, if you want to create a usage overview of any given key after a machine has been rented.
You can do the same from the machine perspective, by using the following request:
GetUnitHistory: https://dev.trackunit.com/docs/unit-history
💡 Tip:
Need more help? Get support from the Trackunit Community
Find answers and get help from Trackunit Tech Support and Community Experts