7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
215! Copyright!©!Acronis!International!GmbH,!2002;2015!
Z'C1@!2!$᢫!I)1&1!2!B/1&g/!@1/D*#$!/%.-1@!.1*I#&D!E#3@1&!5'()*!.#*!61!&15#?1@!I)1.!*)1!
/1&?1&;/'@1!.1*I#&D!E#3@1&!I2/!&15#?1@!E!*)1'&!2//'(.1@!@2*2!/#B&-1/>!
Z'C1@!2.!'//B1!I)1&1!(2*1I2%!E'31!/)2&1/!-#B3@!.#*!61!6&#I/1@!E!*)1!I16!$#&*23!'E!2!
52.2(151.*!/1&?1&!'/!&1fB'&1@!2.@!*)1!52.2(151.*!/1&?1&!'/!3'/*1.'.(!#.!2!.#.;/*2.@2&@!$#&*>!
O)1.!2!B/1&!B$(&2@1/!E!,-&#.'/!,--1//!^>C8!'E!2!B/1&!*&'1/!*#!&1/1*!*)1'&!$2//I#&@!61E#&1!*)1%!
)2?1!/B--1//EB33%!3#((1@!'.!2(2'./*!,--1//!]>C8!*)1%!I'33!.#!3#.(1&!1.-#B.*1&!2.!1&&#&>!
J1.25'.(!2!*#$;31?13!<;I2%!/%.-!E#3@1&!#.!*)1!@1/D*#$!-3'1.*!I'33!.#!3#.(1&!$&#@B-1!2!I2&.'.(>!
Z'C1@!2!*'51#B*!1&&#&!*)2*!-#B3@!#--B&!I)1.!@#I.3#2@'.(!32&(1!E'31/!?'2!*)1!5#6'31!-3'1.*>!
!
_Q>HQ!C++<=+P!
0E!%#B!)2?1!1.@;B/1&/!&B..'.(!0.*1&.1*!TC$3#&1&!b8!$312/1!-#./'@1&!B$(&2@'.(!*#!2!5#&1!/1-B&1!
6&#I/1&>!,@5'.'/*&2*#&/!-2.!-)2.(1!*)1!MMA!6'.@'.(/!*#!/B$$#&*!0.*1&.1*!TC$3#&1&!b!B/1&/!I'*)!
*)1!E#33#I'.(!3'5'*2*'#./!RPT<9^`_S\!
L/1&/!&B..'.(!0.*1&.1*!TC$3#&1&!b!2&1!2B*#52*'-233%!&1@'&1-*1@!*#!*)1!,--1//!^!/*%31!I16!
-3'1.*!'.*1&E2-1>!
0.*1&.1*!TC$3#&1&!b!I'33!61!.#*!/B$$#&*1@!6%!*)1!&1@1/'(.1@!,--1//!]!I16!'.*1&E2-1>!
F)1/1!B/1&/!I'33!.#*!)2?1!2--1//!*#!E'31!/1&?1&8!U,M!2.@!M)2&1V#'.*!@2*2!/#B&-1/!E!*)1!
I16!-3'1.*!'.*1&E2-1>!
M1&?1&!,@5'.'/*&2*'#.!E!0.*1&.1*!TC$3#&1&!b!'/!.#*!/B$$#&*1@>!
!
01&#/'2!011-22!rWaW\!
=Qd0Q"=E=QN+P!
,-&#.'/!,--1//!M1&?1&!2.@!P1/D*#$!"3'1.*/!E#&!H2-!2.@!V"!2&1!.#I!3#-23'd1@!'.!V#3'/)>!
,-&#.'/!,--1//!.#I!233#I/!/%.-'.(!E'31!/1&?1&8!U,M!l!M)2&1V#'.*!E#3@1&/!*#!2!H2-!#&!V"!?'2!*)1!
,--1//!P1/D*#$!"3'1.*>!F)'/!E12*B&1!-2.!61!1.2631@!#&!@'/2631@!'.!*)1!WH#6'31!,--1//W!$#3'-%!2.@!
&1fB'&1/!*)2*!,--1//!O16!"3'1.*!2--1//!*#!*)1/1!@2*2!/#B&-1/!'/!23/#!1.2631@>!
T.)2.-151.*/!*#!B/1&K152'3!2@@&1//!1.*&%!'.!*)1!/)2&'.(!@'23#(!6#C!'.!*)1!,--1//!O16!"3'1.*>!
,--1//!O16!"3'1.*!.#I!@'/$32%/!2!5B3*';31?13!6&12@-&B56!*&2'3>!
MH[!.1*I#&D!/)2&1/!2&1!.#I!/131-*2631!2/!Z'31!J1$#/'*#&%!@1/*'.2*'#./!'.!*)1!,--1//!M1&?1&!
"#.E'(B&2*'#.!L*'3'*%!RPT<a`]9S>!
F)1!,--1//!M1&?1&!"#.E'(B&2*'#.!L*'3'*%!I'33!.#I!@1E2B3*!*#!2!/13E;/'(.1@!-1&*'E'-2*1!'E!.#!/B'*2631!
-1&*'E'-2*1/!2&1!2?2'32631!'.!"#5$B*1&rV1&/#.23!-1&*'E'-2*1!/*#&1>!RPT<9_baS!
4QMF!1.-&%$*'#.!'/!/B$$#&*1@!'.!JB//'2.!3#-23'd2*'#.!#E!,--1//!M1&?1&!]>:>9!RLM__99S>!
,--1//!*#!U1*I#&D!7#51!Z#3@1&/!'/!.#I!'.-3B@1@!'.!*)1!O16!"3'1.*!RLM_]aaS>!
U1*I#&D!@2*2!/#B&-1/!I'*)!jB/1&.251j!I'3@-2&@/!'.!*)1'&!$2*)!2&1!.#I!/B$$#&*1@!'.!*)1!O16!
"3'1.*!RPT<a9:^S>!
O16!"3'1.*!B$3#2@!.#I!233#I/!B$3#2@'.(!5#&1!*)2.!<:!E'31/!/'5B3*2.1#B/3%>!RPT<9]<_S!
s2?2!]!L$@2*1!]<!'/!B/1@!'.!*)'/!&1312/1>!
!
R<5!9CG=+P!
Z'C1@!2.!'//B1!152'3'.(!M%.-!l!M)2&1!E'31!@#I.3#2@!3'.D/!?'2!*)1!'QM!5#6'31!-3'1.*!RPT<a<]]S>!