7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
233! Copyright!©!Acronis!International!GmbH,!2002;2015!
0.;2$$!*1C*!E'31!1@'*'.(>!
,@@1@!/B$$#&*!E#&!M)2&1V#'.*!a^=>!
F)1!1.-&%$*'#.!5#@B31!B/1@!6%!5#6'3T-)#!'/!.#I!Z0VM!<`:;9!-1&*'E'1@>!
,3*1&.2*'?1!(&'@!?'1I!E#&!6&#I/'.(!E'31/8!I'*)!*)B56.2'3!$&1?'1I/!#E!#.;@1?'-1!E'31/>!
HB3*'$31!E'31/!-2.!.#I!61!#$1.1@!/'5B3*2.1#B/3%>!
0E!E'31!/%.-)&#.'d2*'#.!'/!#--B&&'.(!I)1.!312?'.(!*)1!5#6'3T-)#!2$$8!'*!I'33!.#I!-#.*'.B1!'.!*)1!
62-D(&#B.@!B.*'3!*)1!E'31!*&2./E1&!-#5$31*1/!#&!*)1!$&#-1//!'/!/*#$$1@!6%!'QM>!
F)1!'.*1&?23!2*!I)'-)!5#6'3T-)#!I'33!$1&E#&5!E'31!/%.-/!I)'31!*)1!2$$!'/!#$1.!-2.!.#I!61!/1*>!
M%.-'.(!-2.!.#I!61!-#.E'(B&1@8!E!I'*)'.!*)1!2$$8!*#!2B*#52*'-233%!#--B&!#.3%!I)1.!*)1!
@1?'-1!)2/!2!O'Z'!-#..1-*'#.>! !
05$&#?151.*/!*#!/%.-!$&#(&1//!2.@!1&&#&!'.@'-2*'#.>!
5#6'3T-)#!3'.D/!*#!M)2&1V#'.*!3#-2*'#./!'.!/'*1!-#331-*'#./!-2.!.#I!61!#$1.1@8!2/!3#.(!2/!*)1!B/1&!
)2/!2--1//!*#!2!)'()1&;31?13!3#-2*'#.!#.!*)1!M)2&1V#'.*!/1&?1&!I)1&1!*)1!/'*1!-#331-*'#.!&1/'@1/>!
F1C*!/12&-)!2.@!*2631!#E!-#.*1.*/!2&1!.#I!2?2'32631!I)1.!?'1I'.(!2!VPZ!E'31!I)'31!%#B&!0F!
2@5'.'/*&2*#&!)2/!@'/2631@!VPZ!2..#*2*'#.>! !
MB$$#&*!E#&!B/1&!-1&*'E'-2*1!2B*)1.*'-2*'#.!I'*)!5#6'3T-)#!/1&?1&/>!
H'/-1332.1#B/!E'C1/!2.@!'5$&#?151.*/>!
8.3 Previous!Releases!
8.3.1 activEc ho!
01&#/'2!011-22!+-&;-&!lWa!
F)1!5#6'3T-)#!2.@!2-*'?T-)#!$&#@B-*/!)2?1!611.!-#56'.1@!'.*#!2!/'.(31!.1I!$&#@B-*!-2331@!,-&#.'/!
,--1//!M1&?1&>! ! F)'/!-)2.(1/!*)1!6&2.@'.(!2.@!$&#@B-*!.251/!'.!*)1!5#6'31!2.@!@1/D*#$!-3'1.*/!2/!
I133!2/!*)1!I16!2$$3'-2*'#.>! ! ,-&#.'/!,--1//!M1&?1&!^>:!-2.!61!'./*2331@!2/!2.!B$(&2@1!*#!5#6'3T-)#!
2.@K#&!2-*'?T-)#!2.@!1C'/*'.(!3'-1./1/!I'33!-#.*'.B1!*#!I#&D>!"B/*#51&/!2&1!1.*'*31@!*#!1C-)2.(1!
*)1'&!1C'/*'.(!5#6'3T-)#!2.@K#&!2-*'?T-)#!3'-1./1R/S!E#&!2!.1I!,-&#.'/!,--1//!3'-1./1!*)2*!I'33!1.2631!
*)1!EB33!EB.-*'#.23'*%!#E!*)1!-#56'.1@!$&#@B-*>!F#!&1fB1/*!*)'/!B$(&2@18!$312/1!26:.'*!*)'2!8-:!F#&.>!
Z#&!*)1!32*1/*!'.E#&52*'#.8!$312/1!?'/'*!*)1!O)2*g!U1I!'.!,-&#.'/!,--1//!M1&?1&!R$>!9<`S!2&*'-31>!
!
,1*';=1)#![WbWa!
R<5!9CG=+!
05$&#?1@!$1&E#&52.-1!@'/$32%'.(!*)1!3#(!E#&!.#.;2@5'.'/*&2*'?1!B/1&/!
TC$'&1@!3'-1./1!.#*'E'-2*'#./!I'33!.#!3#.(1&!2$$12&!I)1.!2-*'?T-)#!'/!@'/2631@!?'2!*)1!,--1//!
M1&?1&!2@5'.'/*&2*#&!
U1I!B/1&/!*)2*!&1-1'?1!2.!'.?'*1!152'3!.#I!&1-1'?1!2!51//2(1!*#!/1*!*)1'&!'.'*'23!$2//I#&@!
'./*12@!#E!-)2.('.(!*)1!$2//I#&@!
F)1!L$3#2@!U1I!Z'31/!@'23#(!.#!3#.(1&!/)#I/!2.!1C*&2!E'13@!I)1.!B/'.(!0.*1&.1*!TC$3#&1&!b!#&!_!
F)1!O'.@#I/!P1/D*#$!"3'1.*!I'33!.#!3#.(1&!&1;B$3#2@!-#.*1.*!'.!/#51!/'*B2*'#./!I)1.!*)1!B/1&g/!
$2//I#&@!1C$'&1/!2.@!'/!&1;1.*1&1@!
H'/-1332.1#B/!E'C1/!*#!*)1!E'31!/%.-!3#('-!'.!*)1!P1/D*#$!"3'1.*!