7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
230! Copyright!©!Acronis!International!GmbH,!2002;2015!
,!I2&.'.(!'/!$&1/1.*1@!'E!2!B/1&!'/!'.?'*1@!E#&!1.ഗ.*!6B*!@#1/!.#*!52*-)!2.%!1C'/*'.(!
B/1&K(&#B$!$#3'-%>!
F)1!@1?'-1/!*2631!.#I!3'/*/!*)1!B/1&!#&!(&#B$!$#3'-%!'.!B/1!E#&!12-)!@1?'-1>!
"2-)1@!,-*'?1!P'&1-*#&%!K!AP,V!'.E#&52*'#.!26#B*!B/1&/!'/!.#I!B$@2*1@!$1&'#@'-233%!'.!*)1!
62-D(&#B.@>!
"#.*1.*!/12&-)'.(!'/!.#I!2?2'32631!2(2'./*!&15#*1!O'.@#I/!E'31!/)2&1/!&B..'.(!O'.@#I/!M12&-)>!
,!$#3'-%!-2..#*!61!61!@131*1@!'E!2!@1?'-1!'/!61'.(!52.2(1@!6%!'*!
5#6'3T-)#!1.ഗ.*!'.?'*2*'#.!*15$32*1/!-2.!61!5#@'E'1@!@'&1-*3%!E!I'*)'.!*)1!I16!
2@5'.'/*&2*'#.!-#./#31>!HB3*'$31!32.(B2(1/!E#&!12-)!*15$32*1!2&1!/B$$#&*1@>!
,!.1I!*#D1.!'/!2?2'32631!'.!*)1!1.ഗ.*!'.?'*2*'#.!*15$32*1/!*#!'.-3B@1!*)1!,-*'?1!P'&1-*#&%!
B/1&g/!P'/$32%!U251>!
P1?'-1/!3'/*!2.@!@1?'-1!@1*2'3/!/-&11.!.#I!/)#I!I)1*)1&!@1?'-1/!2&1!52.2(1@!6%!4##@!P%.25'-/!
#&!H#6'310&#.!,$$"#..1-*>!
MB$$#&*!E#&!2B*)1.*'-2*'.(!*#!*)1!I16!2@5'.'/*&2*'#.!-#./#31!B/'.(!MMA?9!)2/!611.!@1$&1-2*1@!
6%!*)1!*&2./'*'#.!*#!*)1!,$2-)1!F#5-2*!I16!/1&?1&>!
MB$$#&*!E#&!*&2-1!3#(('.(!2.@!$1&E#&52.-1!5#.'*#&'.(!?'2!U1I!J13'->!
!
R<5!9CG=+!
05$&#?1@!/B$$#&*!E#&!1C$#&*'.(!L.'-#@1!-)2&2-*1&/!*#!FXF!#&!"MG!E'31/>!
Z#3@1&/!*)2*!-2..#*!61!/)2&1@!.#!3#.(1&!)2?1!*)1!0.?'*1>>>!#$*'#.>!
L/1&/!-2.!.#I!&15#?1!*)15/13?1/!E!*)1!/)2&1!1?1.!'E!*)1%!@#!.#*!)2?1!$1&5'//'#.!*#!'.?'*1!
#*)1&!B/1&/!*#!*)1!/)2&1>!
0E!2!E'31!#&!E#3@1&!-2..#*!61!@#I.3#2@1@!*#!2!O'.@#I/!-3'1.*!61-2B/1!*)1!.251!'/!*##!3#.(8!
B.-)1-D'.(!*)1!M%.-!*#!@1?'-1/!#$*'#.!'.!*)1!I16!'.*1&E2-1!.#I!&1/#3?1/!*)1!1&&#&!#.!*)1!-3'1.*!
6%!&15#?'.(!*)1!1.*'&1!/)2&1@!E#3@1&>!
2-*'?T-)#!-3'1.*/!$&#$1&3%!)2.@31!1&&#&!I)1.!B$3#2@'.(!E'31/!2.@!B/1&!'/!#B*!#E!fB#*2!/$2-1>!
L/1&/!-2.!.#I!61!@131*1@!1?1.!'E!*)1%!2&1!3'/*1@!#.!*)1!632-D!3'/*>!
Z'31/!-2.!61!B$3#2@1@!*#!*)1!&1$#/'*#&%!I)1.!1.-&%$*'#.!'/!@'/2631@>!
7#51!@'&1-*#&%!-#.E'(B&2*'#.!'/!.#I!&1*&'1?1@!$&#$1&3%!I)1.!AP,V!'/!-#.E'(B&1@!*#!B/1!*)1!
(3#623!-2*23#(>!
05$&#?1@!)2.@3'.(!#E!,-*'?1!P'&1-*#&%!3##DB$/!I)1.!*&2'3'.(!/$2-1/!2&1!B/1@>!
F)1!WT.ŋ@!2*W!@2*1!'/!.#I!E#&52**1@!$&#$1&3%!I)1.!1C$#&*'.(!*#!>"MG!E'31>!
05$&#?1@!/B$$#&*!E#&!@'/$32%'.(!L.'-#@1!?'2!*)1!I16!2@5'.'/*&2*'#.!B/1&!'.*1&E2-1>!
M)2&1V#'.*!E#3@1&/!1.@'.(!I'*)!2!/$2-1!-2.!.#I!61!1.B51&2*1@!6%!-3'1.*/>!
M)2&1V#'.*!3'6&2&'1/!*)2*!)2?1!1C*&2!/32/)1/!.#I!/B$$#&*!E'31!@131*'#.!2.@!-#$%!$&#$1&3%>!
!
!
!
!
!