7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
114! Copyright!©!Acronis!International!GmbH,!2002;2015!
!
CF!%#6!8,/*!*#!.#/'*#&!*)-!,1*6,4!1#.$6*-&!,2!8-44!
<> Q$1.!)**$\KK.1I&13'->-#5K!)**$\KK.1I&13'->-#5K!2.@!3#(!'.!I'*)!%#B&!2--#B.*>!
9> V&1//!M1&?1&/!2.@!@#I.3#2@!*)1!U1I!J13'-!'./*2331&!E#&!%#B&!#$1&2*'.(!/%/*15>!
a> 0./*233!*)1!U1I!J13'-!5#.'*#&!#.!%#B&!/1&?1&>!
`> F)1!U1I!J13'-!/1&?1&!5#.'*#&!&1fB'&1/!H'-&#/#E*!>UTF!Z&251I#&D!`>!F)1!3'.D!*)1!U1I!J13'-!
'./*2331&!*2D1/!%#B!*#!'/!#.3%!E#&!*)1!H'-&#/#E*!>UTF!Z&251I#&D!`!"3'1.*!V&#E'31>!Y#B!I'33!.11@!*#!
(#!*#!*)1!H'-&#/#E*!P#I.3#2@!"1.*1&!2.@!@#I.3#2@!*)1!1.*'&1!>UTF!`!Z&251I#&D!E!*)1!
'.*1&.1*!2.@!'./*233!'*!61E#&1!&B..'.(!*)1!U1I!J13'-!M1&?1&!H#.'*#&!'./*2331&>!
=> O2'*!B.*'3!U1I!J13'-!@1*1-*/!%#B&!/1&?1&>!
5.7 Using!trusted!server!certificates!with!Acronis!Access!
F)'/!/1-*'#.!1C$32'./!)#I!*#!-#.E'(B&1!,-&#.'/!,--1//!I'*)!*&B/*1@!/1&?1&!-1&*'E'-2*1/>![%!@1E2B3*8!
,-&#.'/!,--1//!I'33!B/1!2!/13E;(1.1&2*1@!MMA!-1&*'E'-2*1>!L/'.(!2!-1&*'E'-2*1!/'(.1@!6%!2!*&B/*1@!
"1&*'E'-2*1!,B*)#&'*%!I'33!1/*263'/)!*)1!'@1.*'*%!#E!*)1!/1&?1&!2.@!233#I!6&#I/1&/!*#!-#..1-*!I'*)#B*!
@'/$32%'.(!2!I2&.'.(!51//2(1!*)2*!*)1!/1&?1&!'/!B.*&B/*1@>!
!"#$%!,-.)*&(!,--#((!(1&<(!%*0!&*($%''(!7&$1!(#'3M(&+*#0!-#.$&3&-%$#(!3).!$#($&*+!</.<)(#(4!C.)0/-$&)*!
0#<')8B#*$(!(1)/'0!&B<'#B#*$!<.)<#.!5,!-#.$&3&-%$#(4!
!"#$%!5#.$%&*!7#>!>.)7(#.(!7&''!0&(<'%8!7%.*&*+!B #((%+#(!71#*!/(&*+!(#'3M(&+*#0!-#.$&3&-%$#(4!"&(B&((&*+!$1 )(#!
B#((%+#(!%'')7(!$1#!(8($#B!$)!>#!/(#0!7&$1)/$!<.)>'#B(4!R(&*+!(#'3M(&+*#0!-#.$&3&-%$#(!3).!<.)0/-$&)*!
-)*0&$&)*(!&(!* )$!.#-)BB#*0#04!
!"#$%!5.#%$&*+!-#.$&3&-%$#(!&(!*)$!%*0!7&''!*#:#.!>#!%!3/*-$&)*!)3!,-.)*&(!,--#((4!H1&(!-#.$&3&-%$#!.#I/#($!&(!&*!* )!
7%8!*#-#((%.8!3).!$1#!)<#.%$&)*!)3!,-.)*&(!,--#((!>/ $!&$!&(!.#I/&.#0!>8!5#.$&3&-%$#!:#*0).(4!
!
5-/-&,*'/(!,!1-&*'F'1,*-!&-A6-2*!;',!CC+P!
Z#&!5#&1!'.E#&52*'#.!#.!*)'/!$&#-1@B&18!$312/1!&1E1&!*#!*)1!E#33#I'.(!H'-&#/#E*!m.#I31@(1![2/1!
2&*'-31\!)**$\KK*1-).1*>5'-&#/#E*>-#5K1.;B/K3'6&2&%K--]a9_:^R?qI/><:S>2/$C!
!
5-/-&,*'/(!,!1-&*'F'1,*-!&-A6-2*!;',!>$-/++SP!
!"#$%!O).!$1&(!+/&0#!8)/!*##0!$)!1%:#![<#*99\! & *($%''#04!
!"#$%*5)*$%-$!8)/.!<.#3#..#0!-#.$&3&-%$#!:#*0).!3).!B).#!&*3) .B%$& )*!).!1#'<!7&$1!$1&(!<.)-#0/.#4!
N#!(-/-&,*-!,!$,'&!#F!$&';,*-!B-%!,/3!$6:4'1!"-&*'F'1,*-!+'(/'/(!@-A6-2*!`"+@c!F#&!*)-!8-:!2-&;-&!
p00+-&;-&pP!
<> Q$1.!2.!131?2*1@!-#552.@!$$*!2.@!1.*1&!*)1!E#33#I'.(!-#552.@\!
2-9B66G%+9P%?B9F%?B2D96%?J9I28.%3I69+]9+:J9I%?28.%CC)9+]9+:*6+%?B9FJ9I%+60/<=[V%
F)'/!-&12*1/!2!*I#!E'31/>!F)1!E'31!.%2-&;-&WB-%!-#.*2'./!2!$&'?2*1!D1%c!@#!.#*!@'/-3#/1!*)'/!E'31!*#!
2.%#.1>![1!/B&1!*#!62-DB$!*)1!$&'?2*1!D1%8!2/!*)1&1!'/!.#!512./!*#!&1-#?1&!'*!/)#B3@!'*!61!3#/*>!
F)1!$&'?2*1!D1%!'/!B/1@!2/!'.$B*!'.!*)1!-#552.@!*#!(1.1&2*1!2!"-&*'F'1,*-!+'(/'/(!@-A6-2*!`"+@c>!