7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
14! Copyright!©!Acronis!International!GmbH,!2002;2015!
0$$!H)'*-4'2*IR4,1B4'2*!;!M131-*!2!$&1@1E'.1@!I)'*13'/*!#&!632-D3'/*!*)2*!&1/*&'-*/!*)2*!*)'&@!
$2&*%!2$$/!*)2*!,-&#.'/!,--1//!E'31/!-2.!61!#$1.1@!'.*#!#.!*)1!@1?'-1>!F#!-&12*1!2!I)'*13'/*!#&!
632-D3'/*8!-3'-D!044#8-3!0$$2!'.!*)1!*#$!51.B!62&>!
+-/3'/(!9'4-2!*#!01&#/'2!011-22!F&#.!>*)-&!0$$2!;!0E!*)'/!#$*'#.!'/!@'/2631@8!*)1!,--1//!H#6'31!
"3'1.*!2$$3'-2*'#.!I'33!.#*!2--1$*!E'31/!/1.*!*#!'*!E!#*)1&!2$$3'-2*'#./g!>$-/!C/!E12*B&1>!
+-/3'/(!9'4-2!*#!01&#/'2!011-22!<2'/(!T6'1B#FF'1-!J+,;-!R,1BJ!;!0E!*)'/!#$*'#.!'/!@'/2631@8!*)1!
,-&#.'/!,--1//!2$$3'-2*'#.!I'33!.#*!2--1$*!E'31/!/1.*!*#!'*!E!*)1!iB'-D#EE'-1!2$$g/!+,;-!R,1B!
E12*B&1>!
=.,'4'/(!9'4-2!F&#.!01&#/'2!011-22!;!0E!*)'/!#$*'#.!'/!@'/2631@8!*)1!,--1//!H#6'31!"3'1.*!
2$$3'-2*'#.!I'33!#5'*!*)1!=.,'4!9'4-!6B**#.!2.@!.#*!233#I!E'31/!'.!,-&#.'/!,--1//!*#!61!152'31@!
E!*)1!2$$3'-2*'#.>!
!"#$L!H1#!,*0.)&0!<'%$3).B!0)#(!*)$!1%:#!%!>/&'$M&*!#B% & ' !%<<!).!3/*-$&)*!$1%$!-%*!>#!0&(%>'#04!H)!
>')-E!/(#.(!3.)B!B):&*+!3&'#(!&*$)!#B%&'(F!8)/!B/($!&*($#%0!0&(%>'#!;)$-1-.*<7'"-12*< 77$22*415$2*1-#"*
;#=$'*<))517,#1"-24!
7&'/*'/(!9'4-2!F&#.!01&#/'2!011-22!;!0E!*)'/!#$*'#.!'/!@'/2631@8!*)1!,--1//!H#6'31!"3'1.*!2$$3'-2*'#.!
I'33!#5'*!*)1!7&'/*!6B**#.!2.@!.#*!233#I!E'31/!'.!,-&#.'/!,--1//!*#!61!$&'.*1@>!
"#$%'/(!*-D*!9&#.!>$-/-3!9'4-2!;!0E!*)'/!#$*'#.!'/!@'/2631@8!*)1!,--1//!H#6'31!"3'1.*!I'33!.#*!
233#I!*)1!B/1&!*#!/131-*!*1C*!'.!#$1.1@!@#-B51.*/!E#&!-#$%K$2/*1!#$1&2*'#./>!F)'/!I'33!$&1?1.*!
@2*2!E!61'.(!-#$'1@!'.*#!#*)1&!2$$3'-2*'#./>!
!
0//#*,*'#/!,/3!=3'*'/(!
044#8!7?9!,//#*,*'#/!;!0E!*)'/!#$*'#.!'/!@'/2631@8!*)1!,--1//!H#6'31!"3'1.*!I'33!.#*!61!233#I1@!*#!
2..#*2*1!VPZ/>!
=3'*'/(!U!"&-,*'#/!#F!>FF'1-!F'4-2!;!0E!*)'/!#$*'#.!'/!@'/2631@8!B/1&/!I'33!.#*!61!233#I1@!*#!1@'*!
@#-B51.*/!B/'.(!*)1!'.*1(&2*1@!M52&*QEE'-1!1@'*#&>!
=3'*'/(!U!"&-,*'#/!#F!N-D*!F'4-2!;!0E!*)'/!#$*'#.!'/!@'/2631@8!B/1&/!I'33!.#*!61!233#I1@!*#!1@'*!>*C*!
E'31/!B/'.(!*)1!6B'3*;'.!*1C*!1@'*#&>!
1.2.3.3 Sync!Policy!
!