7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
219! Copyright!©!Acronis!International!GmbH,!2002;2015!
!
01&#/'2!011-22!lWbWi!
=Qd0Q"=E=QN+!
F)1!@1E2B3*!MMA!6'.@'.(/!#E!,-&#.'/!,--1//!.#!3#.(1&!/B$$#&*!0.*1&.1*!TC$3#&1&!b!-3'1.*!
-#..1-*'#./>!F#!1.2631!B./1-B&1!0.*1&.1*!TC$3#&1&!b!-#..1-*'#./!#.!2!.1I!'./*2332*'#.8!$312/1!
/11!*)'/!2&*'-31\!")2.('.(!*)1!,-&#.'/!,--1//!F#5-2*!MMA!"'$)1&/!R$>!9<9S>!RLMb`^:S! !
U1I!J13'-!2(1.*!B$@2*1@!*#!*)1!?1&/'#.!a>_>:>99_>!V312/1!.#*1!*)2*!U1I!J13'-!I'33!/*#$!I#&D'.(!
B.*'3!'*!'/!B$(&2@1@!*#!*)'/!&1312/1>!
V1&E#&52.-1!Q$*'5'd2*'#./!'.!,--1//!M1&?1&!E#&!)2.@3'.(!32&(1!.B561&/!#E!/13E;$&#?'/'#.1@!
E#3@1&/>!RPT<<`=9S!
T.)2.-1@!O16!L0!3#('.!*#!$&#?'@1!2!3'.D!*#!D.#I31@(1!62/1!2&*'-31!'.!-2/1!s2?2!"&%$*#(&2$)%!
TC*1./'#./!2&1!.#*!'./*2331@!$&#$1&3%>!M11!)**$/\KKD6>2-&#.'/>-#5K-#.*1.*K`]^<b!E#&!@1*2'3/>!
RLM_99^S!
,-&#.'/!,--1//!"3'1.*!E#&!H2-!)2/!611.!B$@2*1@!*#!/B$$#&*!H2-!QM!X!<:>_>=>!RLM_9`_S!
0./*2331&!'.-3B@1/!s2?2!G1&/'#.!]!L$@2*1!=<>!
,$2-)1!F#5-2*!B$@2*1@!*#!]>:>==>!RLM_a_9S!
!
R<5!9CG=+!
Z'C1@!'//B1!I'*)!fB1&%'.(!AP,V!'E!@16B(!3#(('.(!'/!1.2631@!*)2*!-#B3@!&1/B3*!'.!2.!1&&#&!I)1.!
$&#?'/'#.'.(!B/1&/>!RPT<<=`=S!
Q.!'./*233!#&!B$(&2@1!*)1!'./*2331&!I'33!23I2%/!'./*233!*)1!s2?2!"&%$*#(&2$)%!TC*1./'#.!E'31/!
&1(2&@31//!#E!*)1!s2?2!?1&/'#.>!F)'/!'/!@#.1!*#!1./B&1!*)2*!*)1!-#&&1-*!s"T!3'6&2&'1/!2&1!B/1@!1?1.!
'E!s2?2!?1&/'#.!o!]>:>=<!'/!'./*2331@!#.!*)1!/%/*15>!RPT<<9<_S!
!
01&#/'2!011-22!lWbW\!
=Qd0Q"=E=QN+!
Z'C1@!2!$#*1.*'23!'//B1!I'*)!B$3#2@'.(!32&(1!E'31/!?'2!,--1//!I16!-3'1.*!'.*1&E2-1>!
W@-A6'&-!-D,1*!.,*1)W!#$*'#.!)2/!611.!2@@1@!*#!W?#.,'/2!F#&!S?07!,6*)-/*'1,*'#/W>!O)1.!
,--1//!/)2&'.(!'.?'*2*'#.!152'3/!2&1!/1.*!*#!B/1&/!I)#/1!152'3!2@@&1//!@#52'.!52*-)1/!*)1!
@#52'./!3'/*1@!'.!g?#.,'/2!F#&!S?07!,6*)-/*'1,*'#/g!/1**'.(8!*)1%!I'33!61!'./*&B-*1@!*#!3#(!'.!I'*)!
*)1'&!'.*1&.23!AP,V!R,-*'?1!P'&1-*#&%S!-&1@1.*'23/>!L/1&/!I)#!@#!.#*!52*-)!g?#.,'/2!F#&!S?07!
,6*)-/*'1,*'#/g!I'33!61!'.?'*1@!*#!-&12*1!2.!,-&#.'/!,--1//!1C*1&.23!B/1&!2--#B.*>!L/1&/!I)#/1!
152'3!@#52'.!'/!2!/B6@#52'.!#E!2.!1.*&%!'.!g?#.,'/2!F#&!S?07!06*)-/*'1,*'#/g!I'33!&1-1'?1!
152'3/!I'*)!'.*1&.23!B/1&!AP,V!'./*&B-*'#./8!B.31//!*)'/!g@-A6'&-!-D,1*!.,*1)J!1)-1B:#D!'2!
1)-1B-3>!F)'/!-)1-D6#C!'/!B.-)1-D1@!6%!@1E2B3*!2.@!E#&!B$(&2@1/>!
,@NB/*1@!*)1!0$$4'1,*'#/!7#4'1%!2@5'.'/*&2*'#.!$2(1!*#!&1E31-*!-)2.(1/!'.!*)1!,-&#.'/!,--1//!E#&!
,.@&#'@!a>9>a!2$$3'-2*'#.>!
0.!2@@'*'#.!*#!61'.(!@1.'1@!2--1//!2.@!&1@'&1-*1@8!2.!1&&#&!51//2(1!I'33!.#I!61!@'/$32%1@!I)1.!
*&%'.(!*#!2--1//!2!M%.-!l!M)2&1!E#3@1&!%#B!@#!.#*!)2?1!2--1//!*#!?'2!2!LJA>!
F)1!2B@'*!3#(!.#I!233#I/!*)1!#I.1&!#E!2!/)2&1@!E#3@1&!*#!/11!I)1.!2!51561&!#E!*)1!/)2&1@!
E#3@1&!/1.@/!@#I.3#2@!3'.D/!*#!#*)1&/>!
"#.E'(B&2*'#.!B*'3'*%!B$@2*1@!*#!B/1!Q$1.MMA!<>:><)>!
F#5-2*!?1&/'#.!B$@2*1@!*#!]>:>=`>!