Frequently asked questions about Siedle Secure

Secure Controller: installation and commissioning

The Siedle Secure Controller is designed for installation in a distribution's security switch cabinet and for surface mounting.

Yes, an adapter for top hat rail mounting is included with the Siedle Secure Controller.

To remove the cover:

  1. Unscrew the small cross-head screw on the front

  2. Slightly open the cover on the side with the cross-head screw

  3. Remove the cover by pulling it forwards.

To re-fit the cover, follow the steps in reverse.

To set up an access control system controlled by the Siedle Secure Controller, all you need is a standard computer and a network connection. Commissioning is web-based. All login information can be found in the product information.

Yes, all the installation and administration of the Secure Controller takes place via the web. It doesn't matter where the computer that is being used is located. It just needs to be networked with the Secure Controller. The person who is accessing the Secure Controller must have the relevant rights ('role').

All doors that a Secure Controller controls are created in its wizard – so up to four. This also applies if several Secure Controllers are networked with one another: Doors can only be created in the wizard of the Secure Controller which controls those doors. Programming is web-based; the IP address of each Secure Controller must be used.

Our Secure Controller can be commissioned without instructions and programmed without extensive expert knowledge: The integrated wizard guides you through the web-based installation in six easy steps. The user interface – also used for further administration (user administration, reporting, etc.) – is designed to be intuitive.

Our Quick Guide describes these commissioning steps with images. It also explains how to add users and ID.

Of course, detailed commissioning instructions are included with every Secure Controller and these can also be downloaded .

Secure Controller: cabling

At least a CAT6 network cable is needed for the Ethernet power supply (LAN) and the Siedle Secure Controller network connection.

A J-Y(St)Y cable must be used for connecting the bus lines. The shield must be applied to the cable inlet on the Siedle Secure Controller.

Yes, the terminal designations are identical (NO/COM/NC). The switching contacts are visually separated from one another by a white frame on the circuit board.

Secure Controller: time and user management

Yes, the following time profiles can be created: For doors: Here you can define time periods when certain doors are permanently open and access to the building is permitted without ID, for example. For users: These profiles can be used to define a time frame, for example, in which a user can access a building or part of a building.

The number of users is, for all intents and purposes, unlimited; in terms of numbers, the Secure Controller can manage up to 500,000 users.

All access profiles and users can be managed by a person who has the relevant access rights to the system – for example, building owners, caretakers, property management and HR department employees or the system installer. Specialist prior knowledge is not required; the web-based user interface is intuitive. Detailed commissioning instructions are also available to download .

In the Secure Controller, you can define the functions that each person can access. Three authorisation levels, called roles, are provided, which can be assigned to as many people as desired:


This authorisation can be used, for example, to create, delete and modify users (cards/codes), user groups and week programs as well as track reporting. This role is normally assigned to building owners, caretakers or property management/HR department employees.


This role is used by the person carrying out the commissioning. This can be used to set read devices at the entrance, doors, property managers and roles, for example.


This role is reserved for the Siedle factory service team.

All user data is created in the master, which then synchronises with all the slaves. The slaves store the information in their own memories so that each slave can continue to work independently should the master controller fail.

Yes, this is possible: If a readID One reader is available, the ownerless transponder can be read in with ease and the user can be determined using the system administrator's list. Without a readID One, the transponder data can be read using the Siedle electronic key reader which was previously assigned the role of teach-in reader.

If someone forgets a password, a new one must be assigned. Please contact Siedle customer service and have the MAC address of the Secure Controller to hand. This can be found on its type plate.

Secure Controller: function

Yes, this is possible. Siedle recommends networking several Secure Controllers in a master-slave topography for fail safety and due to the specification. An I/O extension with the relevant Siedle module, available from Siedle Engineering, is also conceivable. However, this extension should only be used for lift control.

Yes, it can. A Siedle I/O extension module may be needed for this. This can be obtained from Siedle Engineering.

Yes, the Siedle Secure Controller can handle one protocol on each of its two bus lines. For example, Siedle Vario bus on line A and the Open Supervised Device Protocol (OSDP) on line B.

The Secure Controller has two bus lines. Up to eight modules can be connected to each of these – so up to 16 function modules in total.

Our NG 706-30/33-… line rectifier is suitable for supplying two Secure Controllers.

Each Secure Controller has four relays, which each have two connections – for exit buttons and door status, for example. So each Secure Controller has eight inputs and four outputs (relays). As up to 64 Secure Controllers can be networked in a Siedle access control system, up to 512 inputs can be created in total (64 Controllers each with four relays with two inputs each).

Yes, this contact load corresponds to the CE certification. Therefore, higher values are not possible.

Yes, it is possible to use this electronic key reader (ELM 611-02), for example if this module is already installed in a system. However, we recommend using the ELM 600 electronic key reader, which uses MIFARE DESfire V2 technology – currently the highest security standard for electronic identification. For commissioning, the ELM 600-0 option must be selected in the Secure Controller's menu.

Yes, this may be possible, however these must be checked on a case-by-case basis due to differing technical prerequisites. Our ordering department will take care of this for you.

All information about system updates and firmware downloads is available online on the Secure Controller product page .

readID One: Frequently asked questions (FAQ)

Yes, this is possible: The readID One is detected by the Siedle system as a keyboard. Transponder data can thus be transferred to our programming software (PRS) which is also compatible with the entrance controller.

No, this is not possible for security and data protection reasons.

Yes, this is possible: Simply hold the ownerless transponder over the readID One's read area to read the data. This can then be compared with the system administrator's list to determine the user.

Any more questions about our products or services?
Your contact