7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
22! Copyright!©!Acronis!International!GmbH,!2002;2015!
@-A6'&-!*),*!14'-/*!'2!-/,-3!8'*)!,/!01&#/'2!011-22!2-&;-&!;!0E!%#B!/131-*!*)'/!#$*'#.8!233!,--1//!
H#6'31!"3'1.*/!-#..1-*'.(!*#!*)'/!/1&?1&!2&1!&1fB'&1@!*#!61!52.2(1@!6%!2!,-&#.'/!,--1//!/1&?1&!
*)2*!'/!3'/*1@!B.@1&!,33#I2631!,-&#.'/!,--1//!/1&?1&/>!F)'/!#$*'#.!1./B&1/!*)2*!233!-3'1.*/!2--1//'.(!
*)1!/1&?1&!)2?1!*)1!/1**'.(/!2.@!/1-B&'*%!#$*'#./!%#B!&1fB'&1>!F)1!/1&?1&!.251!1.*1&1@!5B/*!
52*-)!*)1!52.2(151.*!/1&?1&!.251!-#.E'(B&1@!'.!*)1!,--1//!H#6'31!"3'1.*!2$$>!V2&*'23!.251/!
52%!23/#!61!B/1@!*#!233#I!5B3*'$31!-3'1.*!52.2(151.*!/1&?1&/!'.!2!@#52'.8!E#&!'./*2.-1>!V2&*'23!
.251/!@#!.#*!.11@!I'3@-2&@!/%56#3/>!
044#8!"4'-/*!"-&*'F'1,*-!06*)-/*'1,*'#/!;!0E!%#B!B.-)1-D!*)'/!#$*'#.8!B/1&/!I'33!.#*!61!2631!*#!
-#..1-*!?'2!-1&*'E'-2*1!2.@!I'33!61!2631!*#!-#..1-*!?'2!-3'1.*!B/1&.251!2.@!$2//I#&@!#&!/52&*!
-2&@>! !
044#8!<2-&/,.-I7,228#&3!06*)-/*'1,*'#/!;!0E!%#B!B.-)1-D!*)'/!#$*'#.8!B/1&/!I'33!.#*!61!2631!*#!
-#..1-*!?'2!B/1&.251!2.@!$2//I#&@!2.@!I'33!61!2631!*#!-#..1-*!?'2!-3'1.*!-1&*'E'-2*1!#&!/52&*!
-2&@>!
044#8!+.,&*!",&3!06*)-/*'1,*'#/!;!!0E!%#B!B.-)1-D!*)'/!#$*'#.8!B/1&/!I'33!.#*!61!2631!*#!-#..1-*!
?'2!/52&*!-2&@!2.@!I'33!61!2631!*#!-#..1-*!?'2!-3'1.*!B/1&.251!2.@!$2//I#&@!#&!-1&*'E'-2*1>! !
044#8!01&#/'2!011-22!0/3&#'3!14'-/*2!*#!,11-22!*)'2!2-&;-&!ʹ! 0E!%#B!B.-)1-D!*)'/!#$*'#.8!,.@&#'@!
@1?'-1/!I'33!.#*!61!2631!*#!-#..1-*!*#!*)1!,-&#.'/!,--1//!/1&?1&!2.@!%#B!I#.g*!61!2631!*#!2--1//!
52.2(151.*!2/!I133>!0E!%#B!/131-*!*)'/!#$*'#.8!%#B!-2.!EB&*)1&!/1*!I)'-)!-3'1.*/!-2.!-#..1-*!6%!
*)1!#$*'#./!613#I>!
044#8!2*,/3,&3!01&#/'2!011-22!0/3&#'3!14'-/*!;!0E!%#B!/131-*!*)'/!#$*'#.8!*)'/!,-&#.'/!,--1//!
/1&?1&!I'33!233#I!B/1&/!&B..'.(!*)1!/*2.@2&@!,.@&#'@!,-&#.'/!,--1//!-3'1.*!2$$!*#!-#..1-*>!0E!
%#B!@#!.#*!I2.*!*#!233#I!,.@&#'@!B/1&/!*#!2--1//!*)'/!,-&#.'/!,--1//!/1&?1&8!%#B!-2.!B.-)1-D!
*)'/!/1**'.(>!
044#8!0$$"#//-1*!.,/,(-3!01&#/'2!011-22!0/3&#'3!14'-/*!;!0E!%#B!/131-*!*)'/!#$*'#.8!*)'/!
,-&#.'/!,--1//!/1&?1&!I'33!233#I!,.@&#'@!B/1&/!I'*)!,-&#.'/!,--1//!-3'1.*/!1.ŋ@!'.!
H#6'310&#.>!0E!%#B!@#!.#*!I2.*!*#!233#I!,.@&#'@!B/1&/!1.ŋ@!'.!H#6'310&#.!*#!2--1//!*)'/!
,-&#.'/!,--1//!/1&?1&8!%#B!-2.!B.-)1-D!*)'/!/1**'.(>!
044#8!01&#/'2!011-22!'>+!14'-/*2!*#!,11-22!*)'2!2-&;-&!ʹ!0E!%#B!B.-)1-D!*)'/!#$*'#.8!'QM!@1?'-1/!
I'33!.#*!61!2631!*#!-#..1-*!*#!*)1!,-&#.'/!,--1//!/1&?1&!2.@!%#B!I#.g*!61!2631!*#!2--1//!
52.2(151.*!2/!I133>!0E!%#B!/131-*!*)'/!#$*'#.8!%#B!-2.!EB&*)1&!/1*!I)'-)!-3'1.*/!-2.!-#..1-*!6%!
*)1!#$*'#./!613#I>!
044#8!+*,/3,&3!01&#/'2!011-22!'>+!"4'-/*!ʹ!0E!%#B!/131-*!*)'/!#$*'#.8!*)'/!,-&#.'/!,--1//!
/1&?1&!I'33!233#I!B/1&/!&B..'.(!*)1!/*2.@2&@!'QM!,--1//!H#6'31!"3'1.*!2$$!*#!-#..1-*>!0E!%#B!
@#!.#*!I2.*!*#!233#I!'QM!B/1&/!*#!2--1//!*)'/!,-&#.'/!,--1//!/1&?1&8!%#B!-2.!B.-)1-D!*)'/!
/1**'.(>!
044#8!5##3!?%/,.'12!.,/,(-3!01&#/'2!011-22!'>+!14'-/*2!ʹ!0E!%#B!/131-*!*)'/!#$*'#.8!*)'/!
,-&#.'/!,--1//!/1&?1&!I'33!233#I!B/1&/!B/'.(!*)1!'QM!,--1//!H#6'31!"3'1.*!4##@!P%.25'-/!
52.2(1@!-3'1.*!*#!-#..1-*>!0E!%#B!@#!.#*!I2.*!*#!233#I!B/1&/!I'*)!*)1!'QM!,--1//!H#6'31!
"3'1.*!4##@!P%.25'-/!-3'1.*!*#!2--1//!*)'/!,-&#.'/!,--1//!/1&?1&8!%#B!-2.!B.-)1-D!*)'/!
/1**'.(>!
044#8!0$$"#//-1*!.,/,(-3!01&#/'2!011-22!'>+!14'-/*2!ʹ!0E!%#B!/131-*!*)'/!#$*'#.8!*)'/!
,-&#.'/!,--1//!/1&?1&!I'33!233#I!'QM!B/1&/!I'*)!,--1//!H#6'31!"3'1.*!1.ŋ@!'.!H#6'310&#.>!0E!
%#B!@#!.#*!I2.*!*#!233#I!'QM!B/1&/!1.ŋ@!'.!H#6'310&#.!*#!2--1//!*)'/!,-&#.'/!,--1///1&?1&8!
%#B!-2.!B.-)1-D!*)'/!/1**'.(>!
1.3 On;boarding!Mobile!Devices!
F#!(1*!/*2&*1@!I'*)!*)1!,-&#.'/!,--1//!5#6'31!-3'1.*8!B/1&/!.11@!*#!'./*233!*)1!,--1//!H#6'31!"3'1.*!
2$$3'-2*'#.!*)&#B()!*)1!,$$31!,$$!M*#&1>!0E!%#B&!-#5$2.%!'/!B/'.(!-3'1.*!52.2(151.*8!*)1!B/1&/!23/#!