How does the system ensure security and control over tag use?
The system centralizes management of all access credentials, supports multiple tag types, and uses granular User vs. Company assignment. It enforces tag status, assignment permissions, session rules, power and energy limits, and provides audit trails and status management rules.
Related Articles
What is the Access Control & ID Tag Management Module?
The Access Control & ID Tag Management Module is a system that manages the full lifecycle of physical and digital charging identifiers (such as RFID and MAC Address). It allows Enterprise and CPO Admins to create, assign, and manage tags with ...
What tag types are supported?
The system supports multiple tag types with unique identifier validation. The Tag Types include: RFID MAC Address
How does the system ensure data integrity for settlement reports?
The Settlement module uses a strict Transaction Locking Mechanism. Once transactions are included in a settled settlement report, they are marked as “Settled” and excluded from all future settlement calculations. The system also generates granular, ...
What is the use of the ID Tag Management Module?
The module provides enterprise-grade security and guaranteed service reliability. It manages specific assignment rules (for individual users and corporate fleets) and uses intelligent offline caching, so charging is available even during internet ...
How do I edit an existing ID tag?
To edit a tag, use the Edit ID Tag page. The form is the same as the Create form but pre-populated with the tag’s existing values. On the Edit ID Tag page, you cannot change: Tag Serial Number Tag Type