7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
2! Copyright!©!Acronis!International!GmbH,!2002;2015!
"#$%&'()*!+*,*-.-/*!
"#$%&'()*!+!,-&#.'/!0.*1&.2*'#.23!45678!9::9;9:<=>!,33!&'()*/!&1/1&?1@>!
ĐƌŽŶŝƐĂŶĚĐƌŽŶŝƐ^ĞĐƵƌĞŽŶĞĂƌĞƌĞŐŝƐƚĞƌĞĚƚƌĂĚĞŵĂƌŬƐŽĨĐƌŽŶŝƐ/ŶƚĞƌŶĂƚŝŽŶĂů'ŵď,!
ΗĐƌŽŶŝƐŽŵƉƵƚĞǁŝƚŚŽŶĨŝĚĞŶĐĞΗĐƌŽŶŝƐ^ƚĂƌƚƵƉZĞĐŽǀĞƌLJDĂŶĂŐĞƌĐƌŽŶŝƐĐƚŝǀĞZĞƐƚŽƌĞ
ĐƌŽŶŝƐ/ŶƐƚĂŶƚZĞƐƚŽƌĞĂŶĚƚŚĞĐƌŽŶŝƐůŽŐŽĂƌĞƚƌĂĚĞŵĂƌŬƐŽĨĐƌŽŶŝƐ/ŶƚĞƌŶĂƚŝŽŶĂů'ŵď,!
A'.BC!'/!2!&1('/*1&1@!*&2@152&D!#E!A'.B/!F#&?23@/>!
GHI2&1!2.@!GHI2&1!J12@%!2&1!*&2@152&D/!2.@K#&!&1('/*1&1@!*&2@152&D/!#E!GHI2&18!0.->!'.!*)1!
L.'*1@!M*2*1/!2.@K#&!#*)1&!NB&'/@'-*'#./>!
O'.@#I/!2.@!HM;PQM!2&1!&1('/*1&1@!*&2@152&D/!#E!H'-&#/#E*!"#&$#&2*'#.>!
,33!#*)1&!*&2@152&D/!2.@!-#$%&'()*/!&1E1&&1@!*#!2&1!*)1!$&#$1&*%!#E!*)1'&!&1/$1-*'?1!#I.1&/>!
P'/*&'6B*'#.!#E!/B6/*2.*'?13%!5#@'E'1@!?1&/'#./!#E!*)'/!@#-B51.*!'/!$&#)'6'*1@!I'*)#B*!*)1!1C$3'-'*!
$1&5'//'#.!#E!*)1!-#$%&'()*!)#3@1&>!
P'/*&'6B*'#.!#E!*)'/!I#&D!#&!@1&'?2*'?1!I#&D!'.!2.%!/*2.@2&@!R$2$1&S!6##D!E#&5!E#&!-#551&-'23!
$B&$#/1/!'/!$&#)'6'*1@!B.31//!$&'#&!$1&5'//'#.!'/!#6*2'.1@!E!*)1!-#$%&'()*!)#3@1&>!
PQ"LHTUF,F0QU!0M!VJQG0PTP!W,M!0MW!,UP!,AA!TXVJTMM!QJ!0HVA0TP!"QUP0F0QUM8!
JTVJTMTUF,F0QUM!,UP!O,JJ,UF0TM8!0U"ALP0U4!,UY!0HVA0TP!O,JJ,UFY!QZ!HTJ"7,UF,[0A0FY8!
Z0FUTMM!ZQJ!,!V,JF0"LA,J!VLJVQMT!QJ!UQU;0UZJ0U4THTUF8!,JT!P0M"A,0HTP8!TX"TVF!FQ!F7T!
TXFTUF!F7,F!ML"7!P0M"A,0HTJM!,JT!7TAP!FQ![T!AT4,AAY!0UG,A0P>!
F)'&@!$2&*%!-#@1!52%!61!$&#?'@1@!I'*)!*)1!M#E*I2&1!2.@K#&!M1&?'-1>!F)1!3'-1./1!*1&5/!E#&!/B-)!
*)'&@;$2&*'1/!2&1!@1*2'31@!'.!*)1!3'-1./1>*C*!E'31!3#-2*1@!'.!*)1!&##*!'./*2332*'#.!@'&1-*#&%>!Y#B!-2.!
23I2%/!E'.@!*)1!32*1/*!B$;*#;@2*1!3'/*!#E!*)1!*)'&@!$2&*%!-#@1!2.@!*)1!2//#-'2*1@!3'-1./1!*1&5/!B/1@!
I'*)!*)1!M#E*I2&1!2.@K#&!M1&?'-1!2*!)**$\KKD6>2-&#.'/>-#5K-#.*1.*K]^_^!
01&#/'2!$,*-/*-3!*-1)/#4#('-2!
F1-).#3#('1/8!B/1@!'.!*)'/!$&#@B-*8!2&1!-#?1&1@!2.@!$&#*1-*1@!6%!#.1!#&!5#&1!L>M>!V2*1.*!UB561&/\!
]8:`]8ab:c!]89]=8<a_c!]89b<8<:`c!]8a<b8<a=c!]8a=a8a==c!]8a^^8b=_c!]8`]=89b9c!]8^:a8=aac!]8^a^8b9`c!
]8^=:8`]ac!]8]9<8<abc!]8]]_899<c!]8ba<8]b_c!]8bb^8<9:c!]8b_=8`:ac!]8_a`8:^`c!]8_a]8^<9c!]8_`_8^a=c!
]8_=a8_`bc!]8_]_8^_:c!b8::=8]_]c!b8:=<8:``c!b8:^_8a9:c!b8:]a8b<=c!b8:]`8:a=c!b8<`=8^:]c!b8<b:8_b`c!
b899=8<aac!b89^<8:a=c!b89_^89^`c!b8a<989=_c!b8a`]8<a]c!b8`b`8`9]c!b8^`=8]`bc!b8]a98<9<!2.@!$2*1.*!
$1.@'.(!2$$3'-2*'#./>!
!