7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
222! Copyright!©!Acronis!International!GmbH,!2002;2015!
F)1!,-&#.'/!42*1I2%!M1&?1&!/1&?'-1!'/!.#I!@1$1.@1.*!#.!#*)1&!D1%!/1&?'-1/!/#!'*!/)#B3@!61!
2//B&1@!*#!/*2&*!$&#$1&3%!I)1.!*)1!/1&?1&!/*2&*/!B$>!
O)1.!2!"3B/*1&!4&#B$!'/!@'/62.@1@8!2.%!$#3'-'1/!*)2*!I1&1!B/'.(!*)2*!"3B/*1&!4&#B$!2/!*)1!
'ĂƚĞǁĂLJ^ĞƌǀĞƌƵƐĞĚƚŽĂĐĐĞƐƐDLJEĞƚǁŽƌŬ&ŽůĚĞƌƐ;ůŽĐĂƚŝŽŶƐĂĚĚĞĚďLJƚŚĞƵƐĞƌͿǁŝůůďĞ
B$@2*1@!*#!'./*12@!B/1!*)1!32/*!42*1I2%!M1&?1&!*)2*!I2/!2!51561&!#E!*)1!"3B/*1&!4&#B$>!
Z'C1@!2.!'//B1!I'*)!152'3!2@@&1//!E'3*1&'.(!E#&!1.ŋ@!B/1&/>!
,@5'.'/*&2*#&/!/)#B3@!.#!3#.(1&!(1*!2!E2*23!1&&#&!$2(1!I)1.!-)2.('.(!*)1!32.(B2(1!/1**'.(!2E*1&!
&1-1'?'.(!2.!1&&#&!51//2(1>!
,@5'.'/*&2*#&/!/)#B3@!.#!3#.(1&!1.-#B.*1&!$᢫/!2$$3%'.(!*&'23!1C*1./'#./!2E*1&!B$(&2@'.(!2.!
1C$'&1@!/1&?1&>!
AP,V!/%.-!2.@!/)2&1!B/1&/!/)#B3@!.#I!23I2%/!61!3'/*1@!2/!AP,V!#.-1!*)1%!)2?1!/B--1//EB33%!
2B*)1.*'-2*1@8!1?1.!'E!*)1'&!152'3!@#52'.!@#1/!.#*!52*-)!*)1!@#52'./!E#&!AP,V!2B*)1.*'-2*'#.>! !
,@5'.'/*&2*#&/!-2.!61!2@@1@!E!AP,V!1?1.!'E!*)1!152'3!@#52'.!'/!.#*!'.-3B@1@!'.!@#52'./!
E!AP,V!2B*)1.*'-2*'#.>!
O)1.!2@5'.'/*&2*#&/!2@@!.1I!B/1&/!#&!2@5'.'/*&2*#&/8!*)1%!I'33!&1-1'?1!2.!'551@'2*1!1&&#&!
51//2(1!'E!2@@'.(!2!B/1&!I'*)!2.!'.?23'@!152'3!2@@&1//>!
V1.@'.(!'.?'*2*'#./!I'33!.#I!61!$&#$1&3%!&1/#3?1@!*#!(&2.*!/%.-!2.@!/)2&1!2--1//!*#!1C'/*'.(!
2@5'.'/*&2*'?1!B/1&/>!
džƉŽƌƚƐŽĨƚŚĞƵƐĞƌƐƚĂďůĞǁŝůůŶŽǁŝŶĐůƵĚĞƚŚĞƚŚĞ>ŝĐĞŶƐĞĚΗĨŝĞůĚ!
M1.@'.(!2!@#I.3#2@!3'.D!I'33!.#I!&1/$1-*!*)1!632-D3'/*!2.@!I)'*13'/*!&1/*&'-*'#./>!
M12&-)'.(!E#&!.1I!AP,V!B/1&/!*#!1.!!/)#B3@!61!5B-)!E2/*1&>!
U1I!B/1&/!I)#!2&1!'.!6#*)!2!AP,V!$&#?'/'#.1@!2@5'.'/*&2*#&/!(&#B$!2.@!2!AP,V!$&#?'/'#.1@!
/%.-!2.@!/)2&1!(&#B$!I'33!(1*!*)1!-#56'.1@!$1&5'//'#./>!
H2$$'.(!2!)#51!@'&1-*#&%!*#!2.!1C'/*'.(!@2*2!/#B&-1!.#I!I#&D/!$&#$1&3%!'E!*)1!2?2'32631!@2*2!
/#B&-1!B/1/!*)1!jLMTJU,HTj!I'3@-2&@>!
AP,V!/12&-)1/!.#!3#.(1&!@'/$32%!6B'3*;'.!(&#B$/!I)'-)!2&1!.#*!?23'@!-)#'-1/!E#&!(&#B$!
51561&/)'$/>!
M3#I!)#51!@'&1-*#&%!3##DB$/!I'33!.#!3#.(1&!-2B/1!5#6'31!B/1&/!*#!E2'3!*#!1.!>!
Z'C1@!2.!'//B1!I)'-)!-#B3@!-2B/1!2B*)1.*'-2*'.(!2.@!2--1//'.(!2//'(.1@!/#B&-1/!I'*)!-1&*'E'-2*1/!
#.!O'.@#I/!9::a!J9!*#!E2'3>!
L.3'-1./1@!2@)#-!B/1&/!2&1!.#I!$&#$1&3%!&1/*&'-*1@!E!-#..1-*'.(!I'*)!*)1!-3'1.*!*#!*)1!
/1&?1&>!
0.E#&52*'#.!'.!*)1!42*1I2%!M1&?1&/!*2631!'/!.#I!B$@2*1@!'551@'2*13%8!'./*12@!#E!I)1.!%#B!#$1.!
*)1!@1*2'3/!*26!E#&!*)1!/1&?1&>!
dŚĞĐŽƐŵĞƚŝĐĨƌŽŵΗĂĚĚƌĞƐƐŝŶĞŵĂŝůƐƐĞŶƚďLJĐƌŽŶŝƐĐĐĞƐƐŶŽǁĂƉƉĞĂƌƐĂƐƚŚĞĂĐƚƵĂůƐĞŶĚĞƌƐ
152'3!2@@&1//>!
Q3@!,-&#.'/!,--1//!/1&'23!.B561&/!2&1!.#I!&15#?1@!I)1.!2!.1I!62/1!/1&'23!.B561&!'/!2$$3'1@>!
F)1!'./*2331&!I'33!.#!3#.(1&!-&12*1!5B3*'$31!42*1I2%!/1&?1&!1.*&'1/!'.!V&#(&25/!2.@!Z12*B&1/!#.!
B$(&2@1>!
Z'C1@!515#&%!312D!'.!42*1I2%!/1&?1&>!
!
01&#/'2!011-22!lWaW\!
R<5!9CG=+!
0.-3B@1/!B$(&2@1@!Q$1.MMA!PAA!*#!2@@&1//!d-,&*R4--3!?B3.1&26'3'*%>!