Inner Range

image description

Integriti

Inner Range Integriti System Design & Integration

The IP-connected Integriti Access Control & Security System is abundantly expandable, providing options from a single site through to an enterprise-scale security system with large numbers of users, doors & events spread across multiple sites.

Integrity can also be integrated with third-party software and hardware systems, including HR databases, Windows Active Directory, CCTV systems, lift systems, lighting, HVAC, fire, and BMS systems.


Integration with Third-Party Systems

Inner Range Integriti is a sophisticated access control and security system that can integrate with a wide range of systems to create a comprehensive security solution. Examples of systems that can be integrated with Inner Range Integriti include:

  • CCTV Systems: Integriti can integrate with CCTV systems, including Axis, Avigilon, to allow events in one system to correspond to events in the other. This integration enhances security by linking access control events with video surveillance.
  • Building Management Systems (BMS): Integriti can directly control and communicate with third-party systems for elevators, heating, cooling, and lights, making it a versatile solution for building automation.
  • Active Directory: Integriti supports integration with Microsoft Active Directory, allowing for streamlined management of security and access control information, such as user permissions.
  • Access Control: The Integriti Access Controller (IAC) can manage up to 8 doors locally or up to 240 doors via RS-485 Sub-LAN expansion, demonstrating its scalability in access control applications.
  • Intercom Systems: Integration with intercom systems, such as BAS-IP, allows Integriti users to initiate and end intercom calls directly from the Integriti interface, stream live video from intercoms, and covertly monitor intercoms when required.
  • Visitor Management Systems: The integration with Sine Visitor Management enhances Integriti’s functionality by improving safety, security, and compliance for visitors, contractors, staff, and assets. It allows for automatically generating access credentials and permissions for visitors and contractors.
  • High-Rise Building Management: Integriti is ideal for managing access and security in high-rise buildings, integrating with systems for video surveillance, lift/elevator control, and other building facilities such as gyms, pools, and car parks.
  • 2N IP-based Intercom Systems: This integration allows for standard intercom functions and advanced actions based on intercom notifications, such as covertly monitoring audio or video and managing intercom settings through the Integriti platform.

Inner Range Integriti High Availability & Fault Tolerance

Inner Range Integriti ensures high availability and fault tolerance by allowing multiple installations of the Integriti services, which can connect to any available server. This setup is designed to provide high availability and fault tolerance using Microsoft Failover Clustering and a Microsoft SQL Cluster.

The Integriti system consists of three server components: the Application Server, the Controller Server, and the Integration Server. Each maintains an independent connection to the SQL cluster and all application servers in the cluster. Integriti Active Clustering is employed, where all services are always active and considered equal rather than arranged in a primary/backup configuration.

An Additional Server Node (High Availability) license must be purchased when a new server is added to the cluster. This license allows the activation of an additional application server on the same database cluster as the initial machine used to configure the system. The license key includes data that cryptographically pairs the machine with the cluster, preventing unauthorized servers from attaching.

Each service connects to the SQL cluster and registers its connection details, using the database as a conduit for disseminating the information necessary for the servers to establish a bidirectional TCP link between themselves. Suppose any server is not directly routable or is behind a NAT. In that case, the address information can be manually configured in the database to allow servers to connect to alternate IP Addresses or traverse NATs.

The Integriti Active Clustering design ensures that all data pertinent to a connection is stored in the shared database, which allows all servers to be available at all times for high availability and load balancing. If any node fails, clients or controllers connected to that node would automatically switch to another available node in the cluster. The system can support at least two nodes and extend to 64 if necessary.

In summary, Inner Range Integriti achieves high availability and fault tolerance through a robust clustering configuration that utilizes Microsoft Failover Clustering, a SQL Cluster, and a licensing system that ensures secure and scalable server integration within the cluster.


Choose an Inner Range Integriti Certified Partner

JD Security has installed 500+ Integriti Systems and manages the Integriti infrastructure of some of Australia’s largest organisations. Every JD Security Integriti project is designed and installed by our Integriti Certified & Advanced Certified Technicians.


Contact Us

Call us on 1300 556 334 or email [email protected] to learn more.

For customers in New Zealand please call 0800 345 677 or email [email protected] to learn more.

Return to Top ▲Return to Top ▲