7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
120! Copyright!©!Acronis!International!GmbH,!2002;2015!
!
N)-!1#.$#/-/*2!#F!*)-!5##3!?%/,.'12!$4,*F#&.!'/1463-P!
5##3!"#/*!2-&;-&!;!,!/1&?1&;62/1@!-#./#31!*)2*!233#I/!*)1!1.*1&$&'/1!*#!1.2631!-3'1.*!2--1//!
*#!4##@!P%.25'-/!1.2631@!2$$/8!-&12*1!$#3'-%!/1*/!*)2*!(#?1&.!2$$3'-2*'#.!$1&5'//'#./!2.@!*)1!
@1?'-1!*%$1/!*)1%!2&1!233#I1@!*#!&B.!#.8!2.@!*)1!26'3'*%!*#!&1?#D1!2--1//!*#!#&!I'$1!4##@!
P%.25'-/!2$$/!#.!/$1-'E'-!@1?'-1/>!
5##3!7&#D%!2-&;-&!;!F)'/!/1&?'-1!'/!'./*2331@!#.!2.!#.;$&15'/1!/1&?1&!2.@!'/!B/1@!*#!$&#?'@1!
.1*I#&D!2--1//!E#&!4##@!P%.25'-/!2$$/!.11@'.(!*#!-#55B.'-2*1!I'*)!#.;$&15'/1!2$$3'-2*'#.!
/1&?1&/8!/B-)!2/!2!,-&#.'/!,--1//!42*1I2%!/1&?1&>!
01&#/'2!011-22!F#&!5##3!?%/,.'12!,$$!;!4##@!P%.25'-/!1.2631@!2$$/8!/B-)!2/!,-&#.'/!,--1//!
E#&!4##@!P%.25'-/8!'.-3B@1!6B'3*;'.!4##@!P%.25'-/!/1&?'-1/!*)2*!233#I!*)1!2$$!*#!61!&15#*13%!
52.2(1@!B/'.(!*)1!4##@!P%.25'-/!$32*E#&5!2.@!23/#!$&#?'@1!*)1!2$$!I'*)!Z0VM!<`:;9!-1&*'E'1@!
#.;@1?'-1!1.-&%$*1@!/1-B&1!/*#&2(1!2.@!4##@!/1-B&1!-#55B.'-2*'#.>!
!
01&#/'2!011-22!F#&!5##3!?%/,.'12!&-A6'&-2P!
01&#/'2!011-22!F#&!5##3!?%/,.'12!14'-/*!,$$!;!F)1!,-&#.'/!,--1//!E#&!4##@!P%.25'-/!-3'1.*!2$$!
2?2'32631!#.!*)1!,$$31!,$$!M*#&1!)**$\KKIII>(&#B$3#('->-#5KI16K51(##@2$$/*#&1!'/!
/$1-'E'-233%!@1/'(.1@!2/!2!4##@!P%.25'-/!'.*1(&2*1@!2$$3'-2*'#.>!O)1.!E'&/*!'./*2331@!2.@!&B.!#.!
2!@1?'-18!*)1!,-&#.'/!,--1//!E#&!4##@!P%.25'-/!2$$!I'33!$$*!*)1!B/1&!*#!2-*'?2*1!*)1!2$$!'.!
4##@!P%.25'-/>!F)'/!2-*'?2*'#.!'/!&1fB'&1@!61E#&1!*)1!B/1&!-2.!$&#-11@!I'*)!1.!'.(!*)1!2$$!
I'*)!*)1'&!,-&#.'/!,--1//!/1&?1&!2.@!2--1//'.(!E'31>!
01&#/'2!011-22!2-&;-&!;!,-&#.'/!,--1//!E#&!4##@!P%.25'-/!B/1/!*)1!/251!/1&?1&;/'@1!/#E*I2&1!2/!
/*2.@2&@!,-&#.'/!,--1//>!U#!/1&?1&;/'@1!-)2.(1/!2&1!&1fB'&1@!E#&!,-&#.'/!,--1//!/1&?1&/!*#!I#&D!
I'*)!4##@!P%.25'-/!1.2631@!,-&#.'/!,--1//!-3'1.*/>!F)'/!-2.!61!B/1@!*#!1./B&1!*)2*!233!*)1!
,--1//!H#6'31!"3'1.*/!*)2*!)2?1!2--1//!*#!,-&#.'/!,--1//!E'31/!2&1!52.2(1@!6%!4##@!P%.25'-/>!
Q.-1!2!,-&#.'/!,--1//!E#&!4##@!P%.25'-/!-3'1.*!'/!1.ŋ@!'.!4##@!P%.25'-/8!233!-#55B.'-2*'#.!
I'*)!*)1!42*1I2%!/1&?1&/!'/!&#B*1@!*)#B()!*)1!4##@!P%.25'-/!/1-B&1!-#55B.'-2*'#.!-)2..13>!
!