7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
111! Copyright!©!Acronis!International!GmbH,!2002;2015!
<`> "3'-D!*)1!0$$4%!6B**#.!*#!-#55'*!*)1!-)2.(1/>!
!
<=> 0.!*)1!31E*!$2.1!#E!*)1!Z#&1E&#.*!FH4!H2.2(151.*!"#./#31!-3'-D!E#/'*#&'/(8!*)1.!-3'-D!#.!*)1!
"#/F'(6&,*'#/!*26!'.!*)1!5'@@31!$2.1>!m11$!-3'-D'.(!#.!*)1!@-F&-2)!Q#8!3'.D!'.!*)1!&'()*!$2.1!
RN,2B2!*26S!B.*'3!*)1&1!'/!2!(&11.!'-#.!I'*)!*)1!-)1-D6#C!'.!E&#.*!#E!*)1!FH4!-#5$B*1&!.251!
R2&&2%!.251S>!
5.4.6 Configure!an!External!DNS!Entry!for!the!Acr onis!Access!
Gatewa y!Serv er!
,E*1&!*)1!FH4!-#.E'(B&2*'#.!$&#-1//!)2/!611.!-#5$31*1@8!%#B!.11@!*#!-&12*1!2!PUM!&1-#&@!'.!*)1!
1C*1&.23!PUM!/1&?1&/!'.!#&@1&!*#!&1@'&1-*!233!,-&#.'/!,--1//!@1/D*#$K5#6'31!-#..1-*'#./!*#!*)1!
1C*1&.23!.1*I#&D!2@2$*1&!#E!*)1!FH4>!F)1!PUM!1.*&%!/)#B3@!&1/#3?1!*)1!.251!#E!%#B&!/1&?1&!R1>(>!
2--1//>@#52'.>-#5S!*#!*)1!1C*1&.23!0V!2@@&1//!#E!*)1!FH4!/1&?1&>!,33!-3'1.*!&1fB1/*/!I'33!61!/1.*!*#!
2.@!52.2(1@!6%!FH4>!0.!*)'/!-#.E'(B&2*'#.!/-1.2&'#8!FH4!@#1/!.#*!&1fB'&1!-3'1.*/!*#!2B*)1.*'-2*18!
2.@!233!B/1&/!I'33!2--1//!*)1!,-&#.'/!,--1//!/1&?1&!I'*)#B*!2.%!D.#I31@(1!*)2*!*)1!&1/$#./1!'/!
-#5'.(!E!*)1!H'-&#/#E*!Z#&1E&#.*!FH4!'./*12@>!
5.4.7 Using!the!Access!Mobile!Client!with!a!TMG!reverse!proxy!
server!
F)'/!E12*B&1!'/!6B'3*;'.!2.@!&1fB'&1/!3'**31!*#!.#!-#.E'(B&2*'#.>!
C/!*)-!011-22!E#:'4-!"4'-/*!,$$!%#6!.,/6,44%!,33!*)-!2-&;-&!:%!3#'/(!*)-!F#44#8'/(P!
<> V&1//!*)1!Y!6B**#.!3#-2*1@!'.!*)1!31E*!-#&.1&>!F)'/!6B**#.!233#I/!%#B!*#!2@@!2!.1I!/1&?1&>!
9> 0.!*)1!+-&;-&!Q,.-!#&!C7!033&-22!E'13 @8!I&'*1!*)1!$2*)!*#!%#B&!/1&?1&!R1>(>!
%#B&/1&?1&>-#5$2.%.251>-#5K2!)**$\KK%#B&/1&?1&>-#5$2.%.251>-#5K5#6'31-)#--1//S>!
a> Z'33!'.!%#B&!1&-3-/*',42!R!B/1&.251!K!$2//I#&@!S>!
`> F2$!+,;-W!
!
5.4.8 Using!the!Access!Desktop!Client!with!a!TMG!reverse!proxy!
server.!
F)'/!E12*B&1!'/!6B'3*;'.!2.@!&1fB'&1/!3'**31!*#!.#!-#.E'(B&2*'#.>!
9#&!*)-!3-2B*#$!14'-/*P!
<> J0()*!-3'-D!#.!*)1!*&2%!,-&#.'/!,--1//!'-#.>!M131-*!7&-F-&-/1-2>!
9> 0.!*)1!+-&;-&!<@S!E'13@8!I&'*1!*)1!$2*)!*#!%#B&!/1&?1&!R1>(>!2--1//>-#5$2.%.251>-#5!
)**$\KK%#B&/1&?1&>-#5$2.%.251>-#5K2-*'?1-)#S>!
a> Z'33!'.!%#B&!1&-3-/*',42!R!B/1&.251!K!$2//I#&@!S>!
`> V&1//!0$$4%W!
=> P#.1t! !