7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
217! Copyright!©!Acronis!International!GmbH,!2002;2015!
L/1&/!&B..'.(!0.*1&.1*!TC$3#&1&!b!2&1!2B*#52*'-233%!&1@'&1-*1@!*#!*)1!,--1//!^!/*%31!I16!
-3'1.*!'.*1&E2-1>!
0.*1&.1*!TC$3#&1&!b!I'33!61!.#*!/B$$#&*1@!6%!*)1!&1@1/'(.1@!,--1//!]!I16!'.*1&E2-1>!
F)1/1!B/1&/!I'33!.#*!)2?1!2--1//!*#!E'31!/1&?1&8!U,M!2.@!M)2&1V#'.*!@2*2!/#B&-1/!E!*)1!
I16!-3'1.*!'.*1&E2-1>!
M1&?1&!,@5'.'/*&2*'#.!E!0.*1&.1*!TC$3#&1&!b!'/!.#*!/B$$#&*1@>!
Z'C1@!#--2/'#.23!-&2/)1/!'.!,--1//!P1/D*#$!"3'1.*!E#&!H2-!RPT<9b]_S>!
!
_Q>HQ!C++<=+P!
O)1.!B/'.(!/'.(31!$#&*!,--1//!42*1I2%!M1&?1&!-#.E'(B&2*'#.8!*)1&1!-#B3@!61!2.!'//B1!I'*)!
)2.@3'.(!$2*)/!3#.(1&!*)2.!9=^!-)2&2-*1&/>!V312/1!?'/'*!*)1!E#33#I'.(!m[!2&*'-31!*#!&1/#3?1!*)1!
'//B1!RPT<9`:=S\!)**$\KK/B$$#&*>5'-&#/#E*>-#5KD6Kb9:<9_!
!
01&#/'2!011-22!rWa!
=Qd0Q"=E=QN+!
J1@1/'(.1@!2.@!1.)2.-1@!,--1//!I16!-3'1.*!B/1&!'.*1&E2-1>!
01&#/'2!011-22!'/!.#I!.251@!01&#/'2!011-22!03;,/1-3!2.@!'/!*)1!B$(&2@1!$2*)!E#&!1C'/*'.(!B/1&/!
#E!,-&#.'/!,--1//!^!#&!12&3'1&>!,!.1I!?1&/'#.!*2'3#&1@!E#&!/5233K51@'B5!6B/'.1//1/!I'*)!/'5$31&!
&1fB'&151.*/!)2/!611.!23/#!'.*&#@B-1@>!F)'/!.1I!?1&/'#.!'/!.251@!,-&#.'/!,--1//>!
PB&'.(!.1I!'./*2332*'#./8!*)1!-#.E'(B&2*'#.!I'd2&@!.#I!2**15$*/!*#!@1*1-*!2.@!/%/*15!
-#.E'(B&2*'#.!#$*'#./8!/B-)!2/!MHFV!/1&?1&!2.@!,-*'?1!P'&1-*#&%!RAP,VS!/1&?1&>!
PB&'.(!'./*2332*'#.8!,-&#.'/!,--1//!2.@!,-&#.'/!,--1//!,@?2.-1@!-2.!.#I!61!-#.E'(B&1@!*#!
#$1&2*1!B/'.(!2!/'.(31!#$1.!$#&*!E#&!-3'1.*!-#..1-*'#./>!0.!*)'/!-#.E'(B&2*'#.8!233!,--1//!-3'1.*/!
R5#6'31!2$$8!@1/D*#$!/%.-!-3'1.*8!I16!-3'1.*!'.*1&E2-1S!B/1!*)1!/251!.1*I#&D!2@@&1//!2.@!$#&*!*#!
-#..1-*!*#!*)1!,--1//!/1&?1&>!
Z#3@1&/!2.@!E'31/!&1/'@'.(!#.!E'31!/1&?1&/8!U,M!2.@!M)2&1V#'.*!M1&?1&/!-2.!.#I!61!6&#I/1@!2.@!
2--1//1@!E!I'*)'.!*)1!,--1//!I16!-3'1.*!'.*1&E2-1>!F)'/!-2$26'3'*%!-2.!61!1.2631@!#&!@'/2631@!
#.!2!B/1&!#&!(&#B$!62/'/>!
L$@2*1@!(&2$)'-!@1/'(.!#E!@1E2B3*!152'3!*15$32*1/>!J1@1/'(.1@!.#*'E'-2*'#.!2.@!'.?'*2*'#.!152'3!
*15$32*1/>!
F)1!L/1&/!2@5'.'/*&2*'#.!$2(1!2.@!P1?'-1/!2@5'.'/*&2*'#.!$2(1!2&1!.#I!B.'E'1@!'.*#!2!/'.(31!
2@5'.!-#./#31!$2(1>!
,--1//!.#I!$&#?'@1/!-#.E3'-*!&1/#3B*'#.!E#&!M%.-!l!M)2&1!E'31/!2.@!E#3@1&/>!0E!B/1&/g!E'31!
5#@'E'-2*'#./!#?1&32$!2.@!-2B/1!-#.E3'-*/8!*)1!-#.E3'-*'.(!E'31/!I'33!61!&1.251@!I'*)!*)1!B/1&/!
.251!2.@!*)1!-B&&1.*!@2*18!/#!*)2*!*)1!-#.E3'-*'.(!E'31!'/!#6?'#B/!2.@!-2.!61!)2.@31@!2/!.11@1@>!
V&1?'#B/!*#!,--1//!]>:8!*)1/1!-#.E3'-*'.(!E'31/!I#B3@!)2?1!611.!/2?1@!2/!.1I!?1&/'#./>!
M%.-!l!M)2&1!E'31/!-2.!.#I!61!-#$'1@!61*I11.!M%.-!l!M)2&1!E#3@1&/!B/'.(!*)1!I16!-3'1.*!
'.*1&E2-1>!
M%.-!l!M)2&1!E'31!@#I.3#2@!3'.D/!-2.!61!.#I!61!(1.1&2*1@!2.@!-#$'1@!E#&!B/18!I'*)#B*!&1fB'&'.(!
2.!152'3!*#!61!/1.*!6%!*)1!,--1//!/1&?1&>!F)1!E'31!@#I.3#2@!3'.D/!E12*B&1!-2.!61!1.2631@!#&!
@'/2631@>!
L/1&.251/!-2.!.#I!61!2//'(.1@!*#!g,@;)#-g!1C*1&.23!B/1&/>!,33!M%.-!l!M)2&1!B/1&/!2&1!(1.1&233%!
&1E1&1@!*#!6%!B/1&!.251/!'./*12@!#E!NB/*!152'3!2@@&1//1/>!