7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
19! Copyright!©!Acronis!International!GmbH,!2002;2015!
1.2.5 Allowed!Apps!
!
,-&#.'/!,--1//!"3'1.*!H2.2(151.*!233#I/!%#B!*#!-&12*1!I)'*13'/*/!#&!632-D3'/*/!*)2*!&1/*&'-*!*)1!
,--1//!H#6'31!"3'1.*g/!26'3'*%!*#!#$1.!E'31/!'.*#!#*)1&!2$$/!#.!2!5#6'31!@1?'-1>!F)1/1!-2.!61!B/1@!*#!
1./B&1!*)2*!2.%!E'31/!2--1//'631!*)&#B()!*)1!,--1//!H#6'31!"3'1.*!-2.!#.3%!61!#$1.1@!'.*#!/1-B&18!
*&B/*1@!2$$/>!
!
H)'*-4'2*2!;!233#I!%#B!*#!/$1-'E%!2!3'/*!#E!2$$/!*)2*!,-&#.'/!,--1//!E'31/!2&1!233#I1@!*#!61!#$1.1@!'.*#>!
,33!#*)1&!2$$/!2&1!@1.'1@!2--1//>!
R4,1B4'2*2!;!233#I!%#B!*#!/$1-'E%!2!3'/*!#E!2$$/!*)2*!,-&#.'/!,--1//!E'31/!2&1!.#*!233#I1@!*#!61!#$1.1@!
'.*#>!,33!#*)1&!2$$/!2&1!233#I1@!2--1//>!
!
0.!#&@1&!E#&!,-&#.'/!,--1//!*#!'@1.*'E%!2!$2&*'-B32&!2$$8!'*!.11@/!*#!D.#I!*)1!2$$g/!R6/34-!C3-/*'F'-&>!
,!3'/*!#E!-#55#.!2$$/8!2.@!*)1'&!6B.@31!'@1.*'E'1&/8!2&1!'.-3B@1@!'.!*)1!,-&#.'/!,--1//!O16!0.*1&E2-1!
6%!@1E2B3*>!0E!*)1!2$$!%#B!.11@!*#!I)'313'/*!#&!632-D3'/*!'/!.#*!'.-3B@1@8!%#B!I'33!.11@!*#!2@@!'*!*#!*)1!
3'/*>!
!"#$%!,<<!71&$#'&($&*+!%*0!>'%-E'&($&*+!%.#!* )$!-/..#*$'8!(/<<).$#0!>8!$1#!,--#((!=)>&'#!5'&#*$!3).!,*0.)&04!
S'2*2!
,@@!I)'*13'/*/!2.@!632-D3'/*/>!Q.-1!-&12*1@8!I)'*13'/*/!2.@!632-D3'/*/!-2.!61!2//'(.1@!*#!2.%!,-&#.'/!
,--1//!B/1&!#&!(&#B$!$#3'-%>!F)1%!I'33!#.3%!2$$3%!*#!*)1!B/1&!#&!(&#B$!$#3'-'1/!%#B!/$1-'E%>!
Q,.-!;!M)#I/!*)1!.251!#E!*)1!3'/*!/1*!6%!*)1!2@5'.'/*&2*#&>!
N%$-!;!M)#I/!*)1!*%$1!#E!*)1!3'/*!RI)'*13'/*K632-D3'/*S!
033!S'2*!;!Q$1./!*)1!,@@!2!U1I!O)'*13'/*!#&![32-D3'/*!51.B>!
In#this#section#
,@@'.(!,$$/!,?2'32631!E#&!A'/*/!>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>!<_!
Z'.@'.(!2.!,$$g/!6B.@31!'@1.*'E'1&!>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>!9:!
1.2.5.1 Adding!Apps!Available!for!Lists!
F#!2@@!2.!2$$!*#!61!'.-3B@1@!#.!2!I)'*13'/*!#&!632-D3'/*\!
<> "3'-D!044#8-3!0$$2!'.!*)1!*#$!51.B!62&>!
9> "3'-D!033!,$$!'.!*)1!0$$2!0;,'4,:4-!F#&!S'2*2!/1-*'#.>!
a> T.*1&!*)1!0$$!/,.->!F)'/!-2.!61!*)1!.251!#E!*)1!2$$!2/!'*!2$$12&/!'.!*)1!,$$!M*#&18!#&!2.!
23*1&.2*1!.251!#E!%#B&!-)##/'.(>!