7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
118! Copyright!©!Acronis!International!GmbH,!2002;2015!
9'4-!?-4-*-2!
9#43-&!"#$'-2!
+-/3'/(!9'4-2!*#!01&#/'2!011-22!F&#.!>*)-&!0$$2! !
+-/3'/(!9'4-2!*#!01&#/'2!011-22!<2'/(!T6'1B#FF'1-!J+,;-!R,1BJ!
!
?#/-q!]#6&!?&#$!9#43-&!'2!/#8!1#/F'(6&-3!,/3!&-,3%!F#&!62-W!
5.9 Customizing!the!web!interface!
,-&#.'/!,--1//!233#I/!E#&!*)1!I16!62/1@!B/1&!'.*1&E2-1!*#!61!5#@'E'1@!*#!/2*'/E%!6&2.@'.(!2.@!3##D!
2.@!E113!&1fB'&151.*/>!F)1!3#(#!-2.!61!-)2.(1@!*#!$1&5'*!-B/*#51&/!*#!61**1&!'.*1(&2*1!*)1!/#3B*'#.!
I'*)!*)1'&!-#&$#&2*1!/*2.@2&@/>!
N#!,33!,!162*#.!4#(#P!
<> Q$1.!*)1!I16!'.*1&E2-1!2.@!.2?'(2*1!*#!5-/-&,4!+-**'/(2!;o!+-&;-&>!
9> M131-*!<2-!"62*#.!S#(#!2.@!/131-*!*)1!@1/'&1@!'52(1>!F)1!E'31!5B/*!61!2!sVT4!#&!VU48!I'*)!2!
5'.'5B5!I'@*)!#E!<^:!$'C13/>!F#!/131-*!2.#*)1&!'52(18!-3'-D!#.!"B/*#5!A#(#8!$'-D!Q-8WWW!E!
*)1!@&#$!@#I.!51.B!2.@!/131-*!2!.1I!'52(1!E'31>! !
a> V&1//!+,;->!
!"#$%!5/($)B!\)+)!&B%+#(!%.#!($).#0!&*!$1#!W#>!,<<'&-%$&)*h -/($)B&`%$&)*(!3)'0#.F!+#*#.%''8!3)/*0!%$L!
6%H@'".',/*N15$2*KOPQLH<7'"-12H<77$22H<77$22*C$'8$'HI$]*<))517,#1"- H7(2#"/1b,#1"-24!H1#(#!3&'#(!%.#!
.#$%&*#0!)*!,-.)*&(!,--#((!/<+.%0#(4!
!"#$%!5)<8.&+1$!*)$&-#(F!')+)(!%*0!#'#B#*$(!%$!$1#!>)$$)B!?3))$#.A!)3!#%-1!7#>!<%+#!B/($!*)$!># !B)0&3�!).!
#'&B&*%$#0!7&$1)/$!,-.)*&(G(!#;<'&-&$!-)*(#*$4!
5.10 How!to!support!different!Access!Desktop!Client!
versions!
0E!%#B!I2.*!*#!B/1!2!?1&/'#.!#E!,--1//!P1/D*#$!"3'1.*!I)'-)!'/!@'EE1&1.*!E!*)1!32*1/*8!E#33#I!*)1/1!
/*1$/\!
<> P#I.3#2@!*)1!?1&/'#.!#E!,--1//!P1/D*#$!"3'1.*!I)'-)!%#B!I2.*!*#!B/1>!H2D1!/B&1!%#B!)2?1!*)1/1!
`!E'31/\!
,-&#.'/,--1//H2->d'$!
,,"3'1.*0./*2331&>5/'!
,-&#.'/,--1//0./*2331&>@5(!
,-&#.'/,--1//"3'1.*0./*2331&>1C1!
9> "#$%!*)1!E'31/>!
a> Q.!*)1!/1&?1&8!#$1.!*)1!,--1//!P1/D*#$!"3'1.*/!E#3@1&!R!!"#E'2:'*+.F/4&%.
GHIJK#50'2)/%#500&%%#500&%%.D&'L&'#M&3.5664/0*7/2)#04/&)7%!S>!
`> "&12*1!2!/B6;E#3@1&!E#&!*)'/!?1&/'#.!#E!*)1!-3'1.*>!0*!/)#B3@!61!.251@!I'*)!*)1!14'-/*!;-&2'#/!
/6.:-&!R1>(>!\WrWaDblr8!\WlWaWDbZa8!\WrWbDbZ[S>!
=> V2/*1!*)1!`!E'31/!'.!*)1!/B6;E#3@1&!%#B!NB/*!-&12*1@>!
^> U1C*8!#$1.!*)1!H-:!<2-&!C/*-&F,1-!#E!%#B&!,-&#.'/!,--1//!/1&?1&>!
]> A#(;'.!2/!2.!,3.'/'2*&,*#&!2.@!(#!*#!*)1!+%/1!U!+),&-!*26!2.@!#$1.!*)1!01&#/'2!011-22!"4'-/*!
$2(1>!