7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
136! Copyright!©!Acronis!International!GmbH,!2002;2015!
044#8!>$-/!C/!;!M131-*!*)'/!#$*'#.!'E!%#B!I#B3@!3'D1!*#!233#I!,-&#.'/!,--1//!B/1&/!*#!#$1.!E'31/!'.*#!
#*)1&!2$$3'-2*'#./!#.!*)1!@1?'-1>!0E!/131-*1@8!*)'/!#$*'#.!I'33!23/#!233#I!%#B!*#!/$1-'E%!2!3'/*!#E!/$1-'E'-!
2$$/!*)2*!2&1!233#I1@>!
5.13.3.3 Assign!labels!to!the!new!Configuration!and!Container!Policy!
0.!#&@1&!E#&!*)1/1!.1I!$#3'-'1/!*#!61!2$$3'1@!*#!5#6'31!@1?'-1/8!1./B&1!*)2*!%#B!2//'(.!*)1!
H#6'310&#.!32613/!E#&!2.%!&1fB'&1@!B/1&/!*#!6#*)!*)1!"#/F'(6&,*'#/!2.@!*)1!"#/*,'/-&!7#4'1%>!
5.13.4 Activ ating!th e!Acronis!Access !iOS!cl ient!with!AppConnect!
Q.-1!*)1!.11@1@!"#.E'(B&2*'#.!2.@!"#.*2'.1&!V#3'-%!)2?1!611.!-&12*1@!#.!*)1!H#6'310&#.!GMV8!%#B!
2&1!&12@%!*#!'./*233!2.@!-#.E'(B&1!,-&#.'/!,--1//!#.!-3'1.*!@1?'-1/>!
!
=/26&-!E#:'4-hH#&B!'2!'/2*,44-3!,/3!1#/F'(6&-3!
[1E#&1!'./*233'.(!#&!2-*'?2*'.(!*)1!,--1//!H#6'31!"3'1.*8!1./B&1!*)2*!%#B!)2?1!'./*2331@!*)1!H#6'310&#.!
H#6'31nO#&D!'QM!2$$!)**$/\KK'*B.1/>2$$31>-#5K2$$K5#6'31'&#.;5#6'31;I#&D;-3'1.*K'@a9:^=_]_`!
#.!%#B&!@1?'-1>!F)'/!2$$!/1&?1/!2/!*)1!-#.@B'*!*)&#B()!I)'-)!,-&#.'/!,--1//!-#55B.'-2*1/!I'*)!*)1!
H#6'310&#.!GMV!2.@!&1-1'?1/!,$$"#..1-*!-#.E'(B&2*'#.!2.@!-#552.@/>!
,E*1&!H#6'31nO#&D!'/!'./*2331@8!%#B!5B/*!-#.E'(B&1!'*!I'*)!%#B&!B/1&!2--#B.*!'.E#&52*'#.!2.@!*)1!
2@@&1//!#E!%#B&!GMV!/1&?1&>!
Q.-1!H#6'31nO#&D!'/!'./*2331@!2.@!-#.E'(B&1@8!%#Bg&1!&12@%!*#!5#?1!E#&I2&@!I'*)!,-&#.'/!,--1//>!
F)1&1!2&1!*)&11!$#//'631!/-1.2&'#/!E#&!/1**'.(!B$!,-&#.'/!,--1//!I'*)!,$$"#..1-*\!
In#this#section#
,-&#.'/!,--1//!)2/!23&12@%!611.!'./*2331@!#.!*)1!@1?'-18!2.@!)2/!23&12@%!611.!1.ŋ@!I'*)!2!,-&#.'/!,--1//!M1&?1&! <a^!
,-&#.'/!,--1//!)2/!23&12@%!611.!'./*2331@!#.!*)1!@1?'-18!6B*!)2/!.#*!%1*!611.!1.ŋ@!I'*)!2!,-&#.'/!,--1//!M1&?1&! <a^!
,-&#.'/!,--1//!)2/!.#*!%1*!611.!'./*2331@!#.!*)1!@1?'-1!>>>>>>>>>>>>>>>>>>>>>>!<a]!
5.13.4.1 Acronis!Access!has!already!been!installed!on!the!device,!and!has!
already!been!enrolled!with!a!Acronis!Access!Server!
F)'/!/-1.2&'#8!'/!/'5'32&!*#!*)1!$&1?'#B/!/-1.2&'#8!*)1!#.3%!@'EE1&1.-1!61'.(!*)2*!*)1!,$$"#..1-*!
,-&#.'/!,--1//!"#.E'(B&2*'#.!I'33!.#*!61!B/1@!*#!2B*#;1.!!*)1!,--1//!H#6'31!"3'1.*!2$$>!0E!*)1!
,--1//!H#6'31!"3'1.*!2$$!'/!23&12@%!1.ŋ@!I'*)!2!,-&#.'/!,--1//!M1&?1&8!'*!I'33!52'.*2'.!*)2*!#&'('.23!
-#.E'(B&2*'#.>!,-&#.'/!,--1//!I'33!61-#51!52.2(1@!6%!,$$"#..1-*!2.@!I'33!61('.!B/'.(!*)1!
,$$"#..1-*!$2//-#@1!2.@!$1&5'//'#./!"#.*2'.1&!V#3'-'1/>!0E!%#B!&1fB'&1!2!B/1&!*#!1.!!I'*)!2!
@'EE1&1.*!,-&#.'/!,--1//!M1&?1&8!%#B!I'33!.11@!*#!)2?1!*)15!B.'./*233!,-&#.'/!,--1//!2.@!&1'./*233!*)1!
2$$!61E#&1!*)1%!-2.!61!-#.E'(B&1@!6%!,$$"#..1-*>!
5.13.4.2 Acronis!Access!has!already!been!installed!on!the!device,!but!has!
not!yet!been!enrolled!with!a!Acronis!Access!Server!
0.!*)1!/-1.2&'#!I)1&1!*)1!,-&#.'/!,--1//!'QM!2$$!52%!)2?1!611.!'./*2331@!#.!2!@1?'-1!2.@!#$1.1@!
$&1?'#B/3%!61E#&1!H#6'31nO#&D!2.@!,$$"#..1-*!GMV!-#.E'(B&2*'#./!)2?1!611.!/1*!B$>!M'5$3%!
/*2&*'.(!*)1!,--1//!H#6'31!"3'1.*!52%!.#*!*&'((1&!*)1!,$$"#..1-*!/1*B$!$&#-1//>!0.!*)'/!-2/18!'*!'/!
$#//'631!*#!52.B233%!/*2&*!*)1!,$$"#..1-*!/1*B$!$&#-1//!6%!#$1.'.(!*)1!M1**'.(/!51.B! ! I'*)'.!