I haven’t tried to stress the EST command in my tests and therefore see if there’s any kind of hard limit, but we need to handle this with care. If we start abusing with the communication between the Securitas backend and the panel, we will raise some alarms on their side.
It would be better as @segalion is suggesting that everybody tracks their keys, remotes and so on as Securitas already has this push communication between the panel and the backends in their workflows.
So, I’d suggest putting in the component requirements, that all the keys and remotes should be tracked before any use.
“Tiene algún coste descargar o usar My Verisure? Descargar la aplicación My Verisure o acceder a la misma no tiene ningún coste. Por defecto todos los clientes disponen de una tarifa plana de 50 peticiones remotas al mes, agotados estos usos, cada petición puede tener un pequeño coste. En dicho caso, se te notificará de dicho coste a través de la propia aplicación mediante una pantalla de aviso que se mostrará siempre antes de ejecutar cualquier acción, para que estés informado en todo momento de los costes y tarifas.”
That’s cool … at home we only use the mobile app and therefore we do more than 50 operations every month, so I assume this is just a kind of disclaimer …
@segalion, not sure how to deal with that inside hass.io, but maybe makes sense having the chance to hardcode the installation ID (numinst) in the configuration.yaml instead of discovering the number via “INS”, as this probably works for both of us now as we just have a single installation.
Thanks a lot for your work; it is great. The only thing I could see missing is that I cannot arm the system in night mode, but the rest is working fine. It is great to see the status of the alarm at a glance rather than going through the Securitas App, then Login then ask for status of alarm then wait. Pues Muchas gracias por sus esfuerzos!