For CredoID to be able to Discover and communicate with controllers - firewall inbound rule must be created.
Default ports can be changed in additional-settings.
To create a firewall inbound rule - open Windows Defender Firewall with Advanced Security.
Click start, type cmd, right click on "Command Prompt" and select "Run as administrator".
Navigate to "C:\Program Files\Midpoint-Security\CredoID\Service" in Command Prompt by typing:
cd C:\Program Files\Midpoint-Security\CredoID\Service
Then type:
MDP.SID.Launcher.exe /AdminPasswordReset=true
It will start the service with default admin:admin
password.
Service has to be stopped before resetting password.
To stop the service - open "Task manager", navigate to "Services", find "CredoID Service", right click on it and select "Stop".
This expander can be used to transmit PSTN alarm messages to the alarm receiver center.
Only 1 CCS3800 Mbus PSTN module can be placed on the CCS7000/5000 system.
4-wire connection on Mbus. Daisy chain setup.
The Mbus is connected to the connection terminals +Vin, GND, A and B.
TMP connection can be used to connect the tamper switch. This input is configured as NC(Normally closed).
In on-premises wiring the first or only pair of inside wiring and jacks are color-coded in green for the tip conductor, and red for the ring side.
Used in CredoID v4, placed in Devices → Select device → IOLinkers.
Purpose: Defines rules which link output action or event messages to a Boolean expression composed of physical, schedule, or logical inputs.
Structure: Each rule is composed of three parts: a Left-Hand Side (LHS) expression, a Boolean operator, and a Right-Hand Side (RHS) expression.
Sample Listing
# IO Linker Rules configuration file
# O(IF,nn) - Output (set/clear type)
#
# = I(IF,ii)
# = L(logid) - Logical Bit
#
# where IF = interface board (IF=32 for Local IO)
# nn = function code
# ii = input status bit
VertX V100 | nn | VertX v200 | ii | VertX v300 | nn |
---|---|---|---|---|---|
Aux Relay | 1 | Relay #1 | 0 (nn) | Relay # 1 | 0 |
Aux 2 Relay | 17 | Relay #2 | 1 (nn) | Relay # 2 | 1 |
Door 1 - Door Switch | 12 (ii) | Input 1 | 16 | Relay # 3 | 2 |
Door 2 - Door Switch | 14 (ii) | Input 2 | 18 | Relay # 4 | 3 |
Input 3 | 20 | Relay # 5 | 4 | ||
Input 4 | 22 | Relay # 6 | 5 | ||
Input 5 | 24 | Relay # 7 | 6 | ||
Input 6 | 26 | Relay # 8 | 7 | ||
Input 7 | 28 | Relay # 9 | 8 | ||
Input 8 | 30 | Relay # 10 | 9 | ||
Input 9 | 32 | Relay # 11 | 10 | ||
Input 10 | 34 | Relay # 12 | 11 | ||
Input 11 | 36 | Input Point 1 | 0 (ii) | ||
Input 12 | 38 | Input Point 2 | 1 (ii) | ||
Input 13 | 40 | ||||
Input 14 | 42 | ||||
Input 15 | 44 | ||||
Input 16 | 46 |
Set initial output state during a start or a cold restart:
SET L(1) FALSE
Turn on Aux relay 1 on V100 (module IF=14) when the doors are open (door switch 1) on reader 1:
O(14,1) = L(1) | I(14,12)
Turn on Aux relay 2 on V100 (module IF=14) when the doors are open (door switch 2) on reader 2:
O(14,17) = L(1) | I(14,14)
Turn on Relay #5 on v300 (module IF=4) when input 5 is triggered on v200 (module IF=2):
O(4,4) = L(1) | I(2,24)
Turn on Relay #1 on v200 (module IF=6) when input 12 is triggered on v200 (module IF=6):
O(6,0) = L(1) | I(6,38)
Turn on Relay #9 on v300 (module IF=3) when input 2 is triggered on v300 (module IF=3):
O(3,8) = L(1) | I(3,2)
OSDP is an access control communications standard developed by the Security Industry Association (SIA) to improve interoperability among access control and security products.
OSDP describes the communication protocol for interfacing one or more readers to a controller. The OSDP specification describes the protocol implementation over a two-wire RS-485 multi-drop serial communication channel. Nevertheless, this protocol can be used to transfer secure data over any physical channel.
OSDP enables bi-directional communication between reader and controller. Refer to your controller documentation for required configuration.
Secure Channel is the encryption and authentication scheme used by OSDP V2 compliant devices to protect communication between controllers and readers. Secure Channel creates a secure session by using various initialization messages, which perform mutual authentication and establish a set of keys that are used in controller to reader communication.
Enabling secure channel disables install mode.
To set up HID Readers you need to have "HID Reader Manager" mobile application or a configuration card.
To use secure channel - reader should use OSDP and has to be in install mode before full synchronization with controller. To set up reader through "HID Reader Manager" application:
Some readers may require to cycle power after step 5.
Communication protocol screen should look like this:
To enable secure channel in "CredoID":
A Secure Channel session is initiated with a handshake that involves 2 command-reply transactions between the controller and reader. A session once established can be kept active endlessly until either party decides to discard it or until a timeout occurs.
In install mode
the default secure channel key can be used.
In secure mode
, only commands sent over secure channel are accepted.
Modes are only applicable for OSDP V2.
This might happen when updating CredoID from older version to newer one. After update, launch CredoID, wait until devices come online. If they come back in state "Sync error", select all and "Synchronize". Devices will come back in "Completed" state after few minutes.
You can obtain the latest build of CredoID Docker container from Docker hub:
https://hub.docker.com/r/midpointdev/credoid
Docker Pull Command: docker pull midpointdev/credoid
For license please contact Midpoint Security support or order one through our partner network.
A duress code is a covert distress signal used by an individual who is being coerced by one or more hostile persons. It is used to warn others that they are being forced to do something against their will.
CredoID has a Duress PIN feature - if duress pin is used, access is granted as it would normally be, but event with reason „Duress code used“ is generated which can be used to trigger certain actions.
Duress pin code support is currently always enabled without any additional configuration. The default behavior functions only when the reader is in the „Card & PIN“ mode.
To use „Duress PIN“ with „CredoID“ - when entering pin you just have to add 1 to the last digit of your pin, for example if your pin is "1234" you'll have to enter "1235", if it ends with „9“ switch it to „0“.
„Duress PIN“ feature is implemented in „CredoID“ since version 4.10.221
Migration is possible only from CredoID v.4.11.288. If you are running Microsft SQL, you have to update current version to 4.11.288 and run migration tool. Database will be converted to PostgreSQL. Install 4.12.0 and run it on converted PostgreSQL database.
This tool is used to migrate database from Microsoft SQL Server to a PostgreSQL Server.
PostgreSQL version supported from 14.0 and onwards. We recommend to use 15.4.
It is also possible to order migration service from us, let us know by e-mail sales@midpoint-security.com
Before migrating:
It's best to install PostgreSQL database from embedded installer in CredoID setup.
Another option is official standalone installer (Postgre 14) from PostgreSQL website .
To install PostgreSQL DB if you already have CredoID v4.11.288 installed - run CredoID setup again and select "Pre-configured Postgre database server" and click "Modify".
PostgreSQL installation.
Download migration tool from CredoID repository. Current tool version is migration-tool-1.0.28.
After downloading and extracting the contents:
"SourceDatabase": {
"ConnectionString": "Server=localhost;Database=CredoID_MSSQL;User Id=sa;Password=CredoIDPassword1; MultipleActiveResultSets=true;"
},
"DestinationDatabase": {
"ConnectionString": "Server=localhost;Database=CredoID_PG;User Id=postgres;Password=CredoIDPassword1;"
},
Connection string parameters for "SourceDatabase" can be copied from your current "config.json" file which is located in "C:\ProgramData\Midpoint-Security\CredoID Service"
"MultipleActiveResultSets=true;" is a required parameter for source database "Connection String", you might need to remove it from "config.json" file after migration.
If you get "The given key was not present in the dictionary." message - you will need to remove "MultipleActiveResultSets= true;" from "config.json" in "C:\ProgramData\Midpoint-Security\CredoID Service".
NOTE: Please check the destination database for errors. Don't forget to fully synchronize devices.
The MR-50-S3B introduces a new jumper next to the reader port labeled J602. This is a 120Ø termination jumper used for OSDP connections.
If using a non-OSDP reader this jumper should be open.
If using OSDP, then this jumper should be terminated.
To remove event log messages from being logged in Windows Event viewer add config section below to "C:\ProgramData\Midpoint-Security\CredoID Service\config.log.json" :
"Logging": {
"EventLog": {
"LogLevel": {
"Default": "None"
}
}
}
When using an AH40 Aperio IP Communication hub and communicating using TLS, the device will be offline after a firmware migration from 1.x to 2.x due to a mismatch of certificates. To resolve, the following steps must be taken:
For some reason, after installing PostgreSQL, you may forget the password of the postgres
user. In such cases, you need to know how to reset the password to regain access to the PostgreSQL server.
PostgreSQL uses the pg_hba.conf
configuration file stored in the database data directory (e.g., C:\Program Files\PostgreSQL\16\data
on Windows) to control the client authentication. The hba
in pg_hba.conf
means host-based authentication.
To reset the password for the postgres
user, you need to follow these steps:
pg_hba.conf
configuration file.postgres
user account without a password.The following steps show you how to reset a password for the postgres user:
Backup the pg_hba.conf
file by copying it to a different location or rename it to pg_hba.conf.bk
Edit the pg_dba.conf
file and change all local connections from scram-sha-256
to trust
. By doing this, you can log in to the PostgreSQL database server without using a password.
# TYPE DATABASE USER ADDRESS METHOD
# IPv4 local connections:
host all all 127.0.0.1/32 trust
# IPv6 local connections:
host all all ::1/128 trust
# Allow replication connections from localhost, by a user with the
# replication privilege.
host replication all 127.0.0.1/32 trust
host replication all ::1/128 trust
Alternatively, you can run the following command from the Command Prompt (notice that you need to run the Command Prompt as the Administrator):
pg_ctl -D "C:\Program Files\PostgreSQL\16\data" restart
The "C:\Program Files\PostgreSQL\16\data"
is the data directory.
psql -U postgres
PostgreSQL will not require a password to log in.
postgres
user.postgres=# ALTER USER postgres WITH PASSWORD 'new_password';
pg_dba.conf
file, restart the PostgreSQL database server, and connect to the PostgreSQL database server with the new password.Original source - Reset Forgotten Password For postgres User.
HID Omnikey is a USB desktop reader. To use it with CredoID for credential enrollment - reader operation mode must be set to “Keyboard wedge” (KBW) - to set OMNIKEY readers' mode to Keyboard Wedge we recommend using “OMNIKEY workbench tool”.
If reader is set to KBW mode and connected to the PC when entering credentials in CredoID - select "Card data" field, present a card to the reader and card data will be entered into the selected field.