7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
223! Copyright!©!Acronis!International!GmbH,!2002;2015!
!
01&#/'2!011-22!lWaWb!
=Qd0Q"=E=QN+!
ĚĚĞĚĂŶĞǁƉŽůŝĐLJƚŽƐƉĞĐŝĨLJǁŚŝĐŚŐĂƚĞǁĂLJŽƌĐůƵƐƚĞƌŐƌŽƵƉǁŝůůďĞƵƐĞĚƚŽƐŚĂƌĞƵƐĞƌƐĐƚŝǀĞ
P'&1-*#&%!2//'(.1@!)#51!E#3@1&/>! ! ,-*'?1!P'&1-*#&%!2//'(.1@!)#51!E#3@1&/!I'33!.#I!
2B*#52*'-233%!61!/)2&1@!6%!2!(2*1I2%!I'*)#B*!*)1!.11@!*#!52.B233%!-&12*1@!2!@2*2!/#B&-1!#&!
ĞŶĂďůĞƚŚĞůůŽǁhƐĞƌƚŽĚĚEĞƚǁŽƌŬ&ŽůĚĞƌƐďLJhEƉĂƚŚŽƌhZ>ƉŽůŝĐLJƐĞƚƚŝŶŐ!
ŶĞǁƐĞƚƚŝŶŐΗ>WŝŶĨŽƌŵĂƚŝŽŶĐĂĐŚŝŶŐŝŶƚĞƌǀĂů8!'/!.#I!2?2'32631!#.!*)1!AP,V!M1**'.(/!$2(1!*#!
233#I!2@5'.'/*&2*#&/!*#!/$1-'E%!)#I!#E*1.!*)1!,-&#.'/!,--1//!/1&?1&!I'33!B$@2*1!'*/!-2-)1@!
'.E#&52*'#.!26#B*!AP,V!B/1&/!2.@!(&#B$/>!
,!.1I!/1**'.(8!WL/1!B/1&!$&'.-'$23!.251!RLVUS!E#&!2B*)1.*'-2*'#.!*#!42*1I2%!^ĞƌǀĞƌƐĞdžŝƐƚƐŽŶ
*)1!H#6'31!,--1//!M1**'.(/!$2(1>! ! 0E!1.2631@8!B/1&/!I'33!2B*)1.*'-2*1!*#!(2*1I2%!/1&?1&/!I'*)!
*)1'&!LVU!&1(2&@31//!#E!I)2*!E#&52*!#E!B/1&.251!*)1%!B/1@!*#!1.!>! ! 0E!@'/2631@8!B/1&/!I'33!61!
2B*)1.*'-2*1@!I'*)!I)2*1?1&!E#&52*!B/1&.251!*)1%!B/1@!*#!1.!>!
V1&E#&52.-1!'5$&#?151.*/!)2?1!611.!52@1!I)1.!@1*1&5'.'.(!AP,V!(&#B$!51561&/)'$/8!
I)'-)!I'33!'5$&#?1!*)1!/$11@!#E!1.ഗ.*!2.@!2B*)1.*'-2*'#.>! ! F#!'5$&#?1!$1&E#&52.-18!I1!
.#!3#.(1&!6%!@1E2B3*!'.-3B@1!.1/*1@!AP,V!@'/*&'6B*'#.!(&#B$/!I)1.!@1*1&5'.'.(!(&#B$!
51561&/)'$>! ! 0E!%#B&!-#.E'(B&2*'#.!&1fB'&1/!51561&/!#E!.1/*1@!@'/*&'6B*'#.!(&#B$/!*#!61!
ŝŶĐůƵĚĞĚƉůĞĂƐĞĞŶĂďůĞƚŚĞŶĞǁƐĞƚƚŝŶŐΗ/ŶĐůƵĚĞŶĞƐƚĞĚĚŝƐƚƌŝďƵƚŝŽŶŐƌŽƵƉŵĞŵďĞƌƐŚŝƉŽŶƚŚĞ
AP,V!/1**'.(/!$2(1>!
!
R<5!9CG=+!
F)1!,--1//!P1/D*#$!"3'1.*!#.!O'.@#I/!I'33!.#!3#.(1&!-&2/)!'E!*)1!-3'1.*!@#I.3#2@/!#&!B$3#2@/!2!
)B(1!.B561&!#E!E'31/>! ! !
42*1I2%!/1&?1&/!I'33!.#I!61!2B*#52*'-233%!-#.*2-*1@!2E*1&!*)1%!2&1!2@@1@!#.!E&1/)!'./*2332*'#./8!
/#!*)1%!-2.!'551@'2*13%!61!2@@1@!*#!2!-3B/*1&!(&#B$!#&!)2?1!/13E;$&#?'/'#.'.(!1.2631@>! ! !
M%.-!l!M)2&1!EB.-*'#.23'*%!2.@!@2*2!/#B&-1/!I'33!.#I!-#.*'.B1!*#!I#&D!@B&'.(!*)1!(&2-1!$1&'#@!
2E*1&!*)1!3'-1./1!1C$'&1/>! ! !
,B@'*!3#(!3'-1./'.(!I2&.'.(!51//2(1/!2&1!.#I!$&#$1&3%!3#-23'd1@!'.!233!-2/1/>! ! !
G#3B51/!I'33!.#!3#.(1&!61ĐŽŵĞŝŶĂĐĐĞƐƐŝďůĞŝĨƚŚĞŝƌƉĂƌĂŵĞƚĞƌƐŝŶĐůƵĚĞĚƚŚĞƉŝƉĞ;ͿƐLJŵďŽů !
M1.@'.(!3'.D/!#&!'.?'*2*'#./!E!*)1!,-&#.'/!,--1//!5#6'31!2$$3'-2*'#.!I'33!.#!3#.(1&!E2'3!I)1.!
*)1!@1?'-1!'/!-#.E'(B&1@!E#&!32.(B2(1/!#*)1&!*)2.!T.(3'/)8!Z&1.-)8!41&52.!#&!s2$2.1/1>! !
F)1!'./*2331&!I'33!.#!3#.(1&!-&12*1!5B3*'$31!42*1I2%!/1&?1&!1.*&'1/!'.!V&#(&25/!2.@!Z12*B&1/!#.!
B$(&2@1!E#&!.#.;T.(3'/)!'./*2332*'#./>! ! !
Z'C1@!2!6B(!I)1&1!*)1!,-&#.'/!,--1//!F#5-2*!/1&?'-1!I#B3@!$1&'#@'-233%!E2'3!*#!/*2&*B$!-#&&1-*3%!
2.@!I#B3@!.11@!*#!61!&1/*2&*1@!'.!#&@1&!*#!233#I!-3'1.*/!*#!-#..1-*>! ! !
&ŝdžĞĚĂďƵŐǁŚĞƌĞĐůŝĞŶƚƐƚŚĂƚĂƌĞĐŽŶĨŝŐƵƌĞĚƚŽƌĞƋƵŝƌĞĐƌĞĚĞŶƚŝĂůƐŽŶĐĞƉĞƌƐĞƐƐŝŽŶĐŽƵůĚ
$$*!*)1!B/1&!E#&!2!$2//I#&@!I)1.!-#..1-*'.(!*#!*)1!52.2(151.*!/1&?1&!2E*1&!*)1!/1&?1&!I2/!
B$(&2@1@!E!`>C>!
M13E;$&#?'/'#.1@!E#3@1&/!.#I!-2.!61!2@@1@!2.@!&15#?1@!/B--1//EB33%!I)1.!*)1!$&#E'31!'/!
-#.E'(B&1@!*#!B/1!1'*)1&!2!(2*1I2%!/1&?1&!#&!2!-3B/*1&!(&#B$8!&1(2&@31//!#E!I)1*)1&!#&!.#*!*)1!
/1&?1&!#&!-3B/*1&!(&#B$!'/!#.3'.1>! ! !
V#3'-%!$&'#&'*%!#&@1&!I'33!61!&1/$1-*1@8!/#!B/1&/!I'33!&1-1'?1!*)1!)'()1/*!$&'#&'*%!(&#B$!$#3'-%!*#!
I)'-)!*)1%!2&1!1.*'*31@>! ! ! !