7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
214! Copyright!©!Acronis!International!GmbH,!2002;2015!
8 What's!N ew!
In#this#section#
O)2*g/!U1I!'.!,-&#.'/!,--1//!M1&?1&!>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>!9<`!
O)2*g/!U1I!'.!*)1!,-&#.'/!,--1//!2$$!>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>!9a<!
V&1?'#B/!J1312/1/!>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>!9aa!
8.1 What's!New!in!Acronis!Access!Server!
!"#$%!K/B>#.(!(/-1!%(!fl"TVYV@F!R9DDPF!mPaVanf!.#3#.!$)!,-.)*&(G!&*$#.*%'!-1%*+#!$.%-E&*+!(8($#B4!
!"#$%!K/B>#.(!(/-1!%(!fla4Y4V;Vdnf!&*0&-%$#!$1#!(<#-&3&-!>/&'0!&*!71&-1!%!-1%*+#!7%(!&*$.)0/-#04!
01&#/'2!011-22!rWaWi!
=Qd0Q"=E=QN+P!
F)1!,V0!@#-B51.*2*'#.!E#&!I16!-3'1.*/!)2/!611.!B$@2*1@8!'.-3B@'.(!/B$$#&*!2.@!@#-B51.*2*'#.!
E#&!.1*I#&D!E'31/!2.@!E#3@1&/>!
F)1!-#3#&!/-)151!#E!*)1!,-&#.'/!,--1//!I16/'*1!-2.!61!-#.E'(B&1@!*#!2!?2&'1*%!#E!$&1/1*!-#3#&!
/-)151/>!,3*1&.2*'?13%8!2@5'.'/*&2*#&/!-2.!@1?13#$!*)1'&!#I.!-B/*#5!-#3#&!/-)151>!F)1!-#3#&!
/-)151!-2.!61!-#.E'(B&1@!6%!2@5'.'/*&2*#&/!*)&#B()!*)1!O16!L0!"B/*#5'd2*'#.!R$>!^=S!$2(1>!
"B/*#5!3#(#/!-2.!.#I!61!B$3#2@1@!*#!5#@'E%!*)1!3##D!#E!*)1!I16!L0>!F)&11!'52(1!/'d1/!2&1!B/1@!
E#&!*)1!?2&'#B/!3#-2*'#./!*)1!3#(#!2$$12&/>!Q.!B$(&2@18!*)1!1C'/*'.(!-B/*#5!3#(#!R'E!2.%S!I'33!61!
B/1@!E#&!233!*)1!-B/*#5!3#(#!3#-2*'#./8!6B*!$&#$1&3%!/'d1@!3#(#/!-2.!61!B$3#2@1@!#.!*)1!O16!L0!
"B/*#5'd2*'#.!R$>!^=S!!$2(1>!
0E!2!B/1&g/!5#6'31!2--1//!$#3'-%!233#I/!2--1//!E!*)1!I16!-3'1.*8!*)1!@1E2B3*!1.ഗ.*!
'.?'*2*'#.!152'3!I'33!.#I!'.-3B@1!2!3'.D!*#!*)1!,-&#.'/!,--1//!I16!/'*1>!Z#&!-B/*#51&/!I)#!)2?1!
-B/*#5'd1@!*)1'&!1.ഗ.*!'.?'*2*'#.!152'3!*15$32*18!*)'/!2@@'*'#.23!*1C*!I'33!.11@!*#!61!
52.B233%!2@@1@!*#!*)1!-B/*#5'd1@!*15$32*1!'E!@1/'&1@>!
L/1&/!-2.!.#I!@#I.3#2@!*)1!-#.*1.*/!#E!*)1!E#3@1&!*)1%!2&1!-B&&1.*3%!6&#I/'.(!I'*)!*)1!
W?#8/4#,3!F#43-&W!#$*'#.>!
,@5'.'/*&2*#&/!#E!,-&#.'/!,--1//!I'33!.#!3#.(1&!61!$$*1@!*#!1C$3'-'*3%!/$1-'E%!*)1!(2*1I2%!
/1&?1&g/!2@@&1//!#.!2!.1I!'./*2332*'#.!@B&'.(!*)1!0.'*'23!-#.E'(B&2*'#.>!F)1!(2*1I2%!2@@&1//!I'33!
61!2B*#52*'-233%!/1*!*#!*)1!/251!2@@&1//!2/!*)1!,--1//!/1&?1&>!
H'.#&!-)2.(1/!I1&1!52@1!*#!*)1!@1E2B3*!1.ഗ.*!'.?'*2*'#.!152'3!*15$32*1!*#!$&1$2&1!E#&!2.!
B$-#5'.(!5#6'31!-3'1.*!&1312/1>!L/1&/!I)#!)2?1!-B/*#5!152'3!*15$32*1/!I'33!.11@!*#!B$@2*1!
*)15!52.B233%8!'E!@1/'&1@>!
05$&#?1@!3#('.!$1&E#&52.-1!2.@!(1.1&23!I16!2$$3'-2*'#.!$1&E#&52.-1!6%!-2-)'.(!/#51!/1**'.(/!
'.!515#&%>!
G2&'#B/!'5$&#?151.*/!*#!'.-&12/1!$1&E#&52.-1!2.@!*)&#B()$B*!I)1.!B$3#2@'.(!2.@!
@#I.3#2@'.(!M%.-!l!M)2&1!E'31/>!
,-&#.'/!,--1//!.#I!'./*233/!I'*)!s2?2!bBa<>!
!
R<5!9CG=+P!
Z'C1@!AP,V!-2-)'.(!1&&#&/!I)'-)!-#B3@!#--B&!'E!4P*6O0*0;/):!@16B(!3#(('.(!I2/!1.2631@>!
Z'C1@!2!$᢫!I'*)!U1I!J13'-!5#.'*#&'.(>!