7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
135! Copyright!©!Acronis!International!GmbH,!2002;2015!
-/,.-/*06*#+6:.'*!;!F)'/!D1%!'/!#$*'#.23>!F)'/!I'33!-2B/1!*)1!1.ഗ.*!E#&5!*#!61!
ƐƵďŵŝƚƚĞĚĂƵƚŽŵĂƚŝĐĂůůLJƐŽƚŚĂƚƚŚĞLJƵƐĞƌĚŽĞƐŶŽƚŚĂǀĞƚŽƚĂƉƚŚĞŶƌŽůůEŽǁďƵƚƚŽŶƚŽ
$&#-11@>!F#!1.2631!*)'/!D1%8!/1*!'*/!?23B1!*#\!]-2!
&-A6'&-7CQ!ʹ!F)'/!D1%!'/!#$*'#.23>!0E!%#B!2&1!@'/*&'6B*'.(!2!V0U!*#!,-&#.'/!,--1//!5#6'31!B/1&/!
*)2*!*)1%!I'33!.11@!*#!52.B233%!1.*1&!'.*#!*)1!,-&#.'/!,--1//!1.ഗ.*!E#&58!%#B!-2.!
/$1-'E%!*)2*!*)1!V0U!E'13@!'/!'551@'2*13%!/)#I.!'.!*)1!E#&5!6%!ƐĞƚƚŝŶŐƚŚŝƐŬĞLJƐǀĂůƵĞƚŽ]-2!
-/,.-/*<2-&Q,.-!ʹ!F)'/!D1%!'/!#$*'#.23>!F)1!?23B1!#E!*)'/!D1%!I'33!61!'./1&*1@!'.*#!*)1!
L/1&.251!E'13@!'.!*)1!,-&#.'/!,--1//!1.ഗ.*!E#&5>!Y#B!-2.!B/1!2!H#6'310&#.!?2&'2631!*#!
2B*#-#5$31*1!*)'/!?23B1!I'*)!*)1!/$1-'E'-!ƵƐĞƌƐƵƐĞƌŶĂŵĞ!
-/,.-/*7,228#&3!ʹ!F)'/!D1%!'/!#$*'#.23>!F)1!?23B1!#E!*)'/!D1%!I'33!61!'./1&*1@!'.*#!*)1!
V2//I#&@!E'13@!'.!*)1!,-&#.'/!,--1//!1.ഗ.*!E#&5>!Y#B!-2.!B/1!2!H#6'310&#.!?2&'2631!*#!
ĂƵƚŽĐŽŵƉůĞƚĞƚŚŝƐǀĂůƵĞǁŝƚŚƚŚĞƐƉĞĐŝĨŝĐƵƐĞƌƐƉĂƐƐǁŽƌ@>!
5.13.3.2 Creating!a!Acronis!Access!app!Container!Policy!
A#(!'.*#8!#&!&1*B&.!*#8!%#B&!H#6'310&#.!GMV!I16!-#./#31g/!077+!U!">Q9C5+!*26>!
O'*)'.!0$$!+-**'/(28!-3'-D!033!Q-8!2.@!/131-*!"#/*,'/-&!7#4'1%!'.!*)1!0$$"#//-1*!51.B!'*15>!
H'*)'/!*)'2!/-8!"#/*,'/-&!7#4'1%V!-/*-&!*)-!F#44#8'/(!'/F#&.,*'#/P!
!
Q,.-!ʹ!dŚŝƐĐĂŶďĞĂŶLJŶĂŵĞLJŽƵĚůŝD1!*#!2//'(.!*#!*)'/!-#.E'(B&2*'#.>!Y#B!52%!-&12*1!5#&1!*)2.!
#.1!-#.E'(B&2*'#.!2.@!2//'(.!*)#/1!-#.E'(B&2*'#./!*#!@'EE1&1.*!H#6'310&#.!32613/>!
?-21&'$*'#/!ʹ!F)'/!-2.!61!2.%!@1/-&'$*'#.!%#B!3'D1>!
0$$4'1,*'#/!ʹ!F)'/!5B/*!61!/1*!*#!*)1!e/*0'#!20#*$&3&#.!#E!*)1!,--1//!H#6'31!"3'1.*!2$$8!I)'-)!'/\!
1#.W($4#('1W.#:'4-1)#!
=D-.$*!F&#.!0$$"#//-1*!$,221#3-!$#4'1%!;!M131-*!*)'/!#$*'#.!'E!%#B!I#B3@!3'D1!B/1&/!*#!61!2631!*#!
#$1.!,-&#.'/!,--1//!I'*)#B*!)2?'.(!*#!E'&/*!2B*)1.*'-2*1!I'*)!*)1'&!,$$"#..1-*!$2//-#@1>!
044#8!"#$%I7,2*-!N#!;!M131-*!*)'/!#$*'#.!'E!%#B!I#B3@!3'D1!B/1&/!*#!61!233#I1@!*#!-#$%!2.@!$2/*1!*1C*!
E!@#-B51.*/!?'1I1@!'.!*)1!,--1//!H#6'31!"3'1.*!'.*#!#*)1&!2$$/!#.!*)1!@1?'-1!*)2*!2&1!.#*!
52.2(1@!6%!,$$"#..1-*>!
044#8!7&'/*!;!M131-*!*)'/!#$*'#.!'E!%#B!I#B3@!3'D1!,-&#.'/!,--1//!B/1&/!*#!61!233#I1@!*#!$&'.*!
@#-B51.*/!*#!2?2'32631!,'&V&'.*!-2$2631!$&'.*1&/>!
044#8!+1&--/!",$*6&-!;!F)'/!#$*'#.!'/!.#*!%1*!/B$$#&*1@!'.!*)1!,$$"#..1-*!MPm>!0.!*)1!,--1//!H#6'31!
"3'1.*!B/1&/!I'33!23I2%/!61!233#I1@!*#!$1&E#&5!/-&11.!-2$*B&1/8!B.31//!*)1%!2&1!@'/2631@!#.!2!
@1?'-1;I'@1!31?13!6%!*)1'&!HPH!-#.E'(B&2*'#.>!