What elements are required for basic setup and functioning?
The main elements are groups, users, identifiers, access restrictions, and connections between them. These are the basic elements that must be configured at the beginning.
Core system elements
Groups
Define the hierarchical structure and access boundaries. Each project, building, or area must start with a root group. All other elements — devices, users, identifiers — are linked to groups.The group hierarchy defines data visibility and access control:
Users in child groups cannot view or configure entities from parent groups.
Group administrators can only manage resources within their own group and its descendants.
➤ No user or device can be added without being assigned to a group.
Users
Represent real people in the system — residents, administrators, or concierges. Users are assigned to groups and granted access via identifiers and permissions.Profiles
Define what a user can see and do in the system. A profile is a set of permissions that grants access to specific actions — for example, adding users, managing devices, or configuring access rules. Profiles determine user capabilities within a specific group or across the entire system.Profiles are assigned when a user is created and can be edited later if needed.
Licenses
Define which features are available in the system. Licenses grant access to SIP calls, mobile app usage, remote door opening, integrations, and more.
Each license is assigned to a group or user and determines what functions are active and how many resources are available. Without a license, many features remain inaccessible.
Service logic and feature activation
Identifiers
Allow physical or digital access. Supported types include RFID or NFC cards, mobile apps via UKEY, license plates, access codes, QR codes for guests, biometric methods like Face ID, and credentials from third-party systems.
Each identifier is linked to a user and must be added before access is possible.Access restrictions
Define where, when, and how users can interact with devices — for example, which door, time of day, or elevator floor.Devices
Include panels, monitors, access controllers, elevator controllers, IP cameras, barriers, and other devices. Each device must be linked to a group and properly configured to receive updates and enforce access rules.Forwarding rules
Control how intercom calls or access attempts are routed — to mobile apps, concierge panels, external numbers, or specific devices.
Rules follow group logic and allow flexible call distribution based on the system structure.Virtual numbers
Used for intercom calls and call routing. Virtual numbers can be assigned to apartments, users, entrance panels, or monitors, and are linked to forwarding rules.Elevators
Managed as part of access control. Access to floors is defined via identifiers and permissions.Guest access
Allows issuing temporary identifiers with limited access, such as time-bound QR codes.Schedules
Time-based access rules that allow or restrict entry during certain hours or days.Access matrix
Advanced tool to manage and visualize access rights across multiple users and devices.
🔹 Getting started
To launch a project on BAS-IP Link Cloud, follow these steps:
Build a group hierarchy using group types like Building, Unit, Floor, and Apartment to reflect the layout of the site. Use the Custom type for partner projects or non-residential objects.
Assign licenses to the root group or to users to activate required features.
Add devices and link them to appropriate groups.
Add users and place them into the corresponding groups.
Set access restrictions to control who can access what and when.
Assign identifiers such as cards, UKEY, access codes, or QR codes.
👉 Continue with the FAQ list for specific setup instructions.