7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
151! Copyright!©!Acronis!International!GmbH,!2002;2015!
7 Adding!Kerberos!Constrained!Delegation!
Authentication!
Q.-1!%#B!)2?1!/1*B$!2.@!?1&'E'1@!*)1!,$$FB..13!I#&D/!?'2!L/1&.251KV2//I#&@!2B*)1.*'-2*'#.!E#&!
,-&#.'/!,--1//8!%#B!-2.!5#@'E%!*)1!-#.E'(B&2*'#./!-&12*1@!*#!233#I!m1&61&#/!"#./*&2'.1@!P131(2*'#.!
2B*)1.*'-2*'#.!*#!*)1!,-&#.'/!,--1//!42*1I2%>!O)1.!*)'/!'/!$&#$1&3%!-#.E'(B&1@!*)1!1.@!B/1&!I'33!.#*!
)2?1!*#!/B$$3%!2!B/1&.251!#&!$2//I#&@!*#!1.!!I'*)!52.2(151.*!#&!*#!6&#I/1!@2*2!/#B&-1/>!
!
F)'/!@#-B51.*!I'33!/1*!B$!*)1!62/'-!-#.E'(B&2*'#.!2.@!@131(2*1!*#!#.1!,-&#.'/!,-1//!42*1I2%!/1&?1&!
&B..'.(!#.!*)1!/251!/1&?1&!2/!*)1!52.2(151.*!/1&?1&!*#!233#I!1.ഗ.*!*#!*)2*!3#-23!52.2(151.*!
/1&?1&!2.@!6&#I/'.(!#E!@2*2/#B&-1/!-#.E'(B&1@!#.!*)2*!(2*1I2%>!,@@'*'#.23!@131(2*'#.!I'33!61!
&1fB'&1@!E#&!2@@'*'#.23!42*1I2%/8!M)2&1$#'.*!/1&?1&/8!2.@!&1/)2&1/>!
!
0E!%#B!2&1!(#'.(!*#!B/1!*)1!/251!'QM!@1?'-1!*#!*1/*!*)1!m1 &61&#/!"#./*2'.1@!P131(2*'#.!'*!'/!
&1-#551.@1@!%#B!B.'./*233!*)1!,-&#.'/!,--1//!H#6'31!-3'1.*!2*!*)'/!*'51>!
<> A#(!'.!*#!%#B&!mP"!/1&?1&!2/!2.!2@5'.'/*&2*#&>!
9> Z!*)1!O'.@#I/!M*2&*!51.B8!/131-*!044!7&#(&,.28!/131-*!03.'/'2*&,*';-!N##42!o!01*';-!
?'&-1*#&%!<2-&2!,/3!"#.$6*-&2>!
a> 0.!*)1!.1I3%!#$1.1@!-#./#318!1C$2.@!*)1!@#52'.!Rm1&61&#/!&1E1&/!*#!2!@#52'.!2/!2!&1235S>!
`> J'()*;-3'-D!<2-&2!2.@!/131-*!Q-8!o!<2-&>!
!
T.*1&!2!Q,.-!2.@!2!<2-&!S#(#/!Q,.-!E#&!*)1!m1&61&#/!/1&?'-1!2--#B.*>!F)1!.251!5B/*!/*2&*!
I'*)!dNN7I>!L/1!/*2.@2&@!23$)2.B51&'-!-)2&2-*1&/!I'*)!.#!I)'*1/$2-1!E#&!*)1!<2-&!S#(#/!
Q,.-8!2/!'*!'/!1.*1&1@!'.!2!-#552.@!$$*!32*1&!'.!*)1!(B'@1>!0E!dNN7I!2B*#52*'-233%!
2$$12&/!.1C*!*#!*)1!<2-&!4#(#/!/,.-!`$&-KH'/3#82!\aaac!E'13@8!@131*1!'*!E!*)2*!E'13@>!