7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
159! Copyright!©!Acronis!International!GmbH,!2002;2015!
!
Y#B!-2.!?1&'E%!*)1!M"TV!'/!$&#$1&3%!B$@2*1@!B/'.(!*)1!'QM!M1**'.(/!2$$>!L.@1&!M1**'.(/!;o!41.1&23!;o!
V&#E'31/!;o!F)1!M"TV!.251!%#B!-&12*1@!;o!H#&1!P1*2'3/!;o!"1&*'E'-2*1!;o!F)1!$#&*'#.!2E*1&!"Uq!%#B!
1.*1&!'.!*)1!/B6N1-*!.251!#E!*)1!M"TV8!%#B!/)#B3@!/11!1.*&'1/!E#&!WMB6N1-*!,3*1&.2*'?1!U251W!2.@!
WP'&1-*#&%!U251W>!0E!*)'/!'/!$&#$1&3%!$B331@!E!,-*'?1!P'&1-*#&%!'*!/)#B3@!52*-)!*)1!B/1&!*)2*!%#B!
B/1@!*#!2-*'?2*1!H#6'31nO#&D>!
!
0E!*)2*!'/!-#&&1-*!&1'./*233!*)1!,-&#.'/!,--1//!H#6'31!"3'1.*>!J1$12*!*)1!1.ഗ.*!/*1$/!E!61E#&1!
6B*!312?1!*)1!B/1&.251!2.@!$2//I#&@!E'13@/!632.D>!0E!233!'/!/B--1//EB3!%#B!/)#B3@!61!1.ŋ@!B/'.(!*)1!
2--#B.*!*)2*!52*-)1@!*)1!UF!V&'.-'$23!U251!'.!*)1!$&#E'31!%#B!NB/*!1C25'.1@>!
7.1.1 Adv anced!Delegatio n!Configur ations!
F)'/!2&*'-31!I'33!)13$!%#B!-#.E'(B&1!H#6'310&#.!-&1@1.*'23!@131(2*'#.!51*)#@/!I'*)!.1*I#&D!/)2&1/!
2.@!M)2&1V#'.*!/'*1/>!F)'/!(B'@1!&1fB'&1/!*)2*!%#B!)2?1!23&12@%!-#.E'(B&1@!6#*)!H#6'310&#.!2.@!
,-&#.'/!,--1//8!*)1'&!'.*1&#$1&26'3'*%!2.@!*)1'&!&1/$1-*'?1!,-*'?1!P'&1-*#&%!2--#B.*/!*)2*!@131(2*1!
2B*)1.*'-2*'#.>!
! !
9#&!/-*8#&B!2),&-2!,/3!+) ,&-7#'/*!2-&;-&2V!3#!*)-!F#44#8'/(P!
Z#33#I'.(!*)1/1!/*1$/8!%#B!I'33!1.2631!@131(2*'#.!E!*)1!42*1I2%!/1&?1&!*#!*)1!*2&(1*!/1&?1&R/S>!
<> Q$1.!01*';-!?'&-1*#&%!<2-&2!,/3!"#.$6*-&2>!