
PLT-07917, Rev. A.0December 2025 Copyright © 2025 HID Global Corporation/ASSA ABLOY AB. All rights reserved. This document may not be reproduced, disseminated, or republished in any form without the prior written permission of Trademarks HID GLOBAL, HID, the HID Brick logo, HID Linq, HID Reader Manager, and HID Signo are trademarks or registeredtrademarks of HID Global, ASSA ABLOY AB, or its affiliate(s) in the US and other countries and may not be used withoutpermission. All other trademarks, service marks, and product or service names are trademarks or registered trademarks DESFire, DESFire EV1, DESFire EV2, and DESFire EV3 are registered trademarks of NXP B.V. and are used under license. Contacts For technical support, please visit:https://support.hidglobal.com. Introduction 1.1 Scope1.2 Product overview1.3 Benefits of a Transparent Architecture Solution Components 2.1 Hardware 2.1.1 Key Module92.1.2 Main Node102.1.3 IO Module112.1.4 Transparent HID Signo reader122.1.5 Card credentials12 2.2 Software 2.2.1 HID Linq Key Manager122.2.2 Main Node admin interface122.2.3 HID Reader Manager app12 Before Installation 3.1 Prerequisites143.1.1 Existing PACS143.1.2 Controller compatibility143.1.3 Credentials143.1.4 Software access143.1.5 Secure environment143.1.6 Network access14 System Architecture 4.1 System architecture overview4.2 Typical deployment diagram Installation Steps 5.1 Step 1: Prepare the Key Module using HID Linq Key Manager195.1.1 Install HID Linq Key Manager195.1.2 Connect the Key Module to a secure PC195.1.3 Create Keysets and load configuration195.1.4 Eject and disconnect the Key Module195.2 Step 2: Install the hardware205.2.1 Mount the Main Node205.2.2 Mount the IO Module(s)20 5.2.3 General wiring guidelines215.2.4 Wiring the Main Node and IO Modules power215.2.5 Wiring the Main Node TAMPER, AC FAIL, and BATT FAIL inputs215.2.6 Wiring the IO Module to the Main Node (Ethernet network)225.2.7 Wiring readers to the IO Module235.2.8 Wiring the IO Module to an existing PACS controller (OSDP)235.2.9 Wiring the IO Module TAMPER, BATT FAIL, and AC FAIL inputs245.3 Step 3: Configure DIP switches255.3.1 Main Node DIP switches255.3.2 Main Node DIP switch settings255.3.3 IO Module DIP switches265.4 Step 4: Initial power up and network access275.4.1 Powering on275.4.2 Accessing the Main Node admin interface275.5 Step 5: First-time login and secure password setup28 Operational Information Normal Operational Flows 7.1 Credential read and forwarding397.2 Controller command passthrough397.3 Tamper and error reporting397.3.1 Reported conditions39 Maintenance and Troubleshooting 8.1 Firmware updates418.2 Main Node and IO Module firmware41 8.2.1 Download firmware418.2.2 Enable admin mode418.2.3 Login to the admin interface418.2.4 Update Main Node firmware (if needed)418.2.5 Update IO Module firmware (if needed)418.2.6 Perform manual system tests418.2.7 Return to normal operation428.3 Key Module firmware428.4 Factory reset procedure42 Specifications 9.1 Main Node (M1-1100)459.2 Key Module (M1-1001)459.3 IO Module (M1-1002)46 Section01Introduction 1.1 Scope This document provides detailed instructions for the installation, initial setup, and configuration of the HID M1Transparent Gateway solution. The document is intended for trained security technicians familiar with Physical Access 1.2 Product overview The HID M1 Transparent Gateway enhances the security of existing physical access control systems by implementing atransparent architecture. HID M1 is installed "in-line" between existing OSDP-compatible PACS controllers and HID The HID M1 solution includes the following hardware components: lMain NodelKey ModulelIO Module(s)lTransparent HID Signo readersHID M1 supports the authentication of custom DESFire EV1/2/3 credentials using sovereign encryption keys managedby your organization, providing greater control and security over your access control infrastructure. 1.3 Benefits of a Transparent Architecture Enhanced security:Moves the credential decryption and authentication processes from the publicly accessible Reduced attack surface:Encrypts communication between the reader and the secure processing environment,minimizing the risk of data interception or reader tampering. Protection of sovereign keys:Ensures that your custom encryption keys remain within your control and are notmanaged by or shared with any third party. lUpgrade path:Allows existing OSDP-based PACS installations to benefit from transparent readers without requiring afull replacement of the existing system. Section02 Solution Components 2.1 Hardware 2.1.1 Key Module A secure hardware module that stores your custom DESFire encryption keys. The Key Module is provisioned using HID 2.1.2 Main Node The central processing unit of the gateway. The Main Node houses the Key Module and manages communication with 2.1.3 IO Module Connects the Main Node to transparent HID Signo™ readers and the existing PACS co