7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
234! Copyright!©!Acronis!International!GmbH,!2002;2015!
!
,1*';=1)#![WaWi!
R<5!9CG=+!
T52'3!.#*'E'-2*'#./!2&1!.#I!/1.*!$&#$1&3%!2E*1&!2.!B$(&2@1!I)1.!-B/*#5!*15$32*1/!I1&1!B/1@>!
!
,1*';=1)#![WaW\!
=Qd0Q"=E=QN+!
05$&#?1@!$1&E#&52.-1!#E!*)1!2-*'?T-)#!-3'1.*!I)1.!*)1&1!2&1!2!32&(1!.B561&!#E!B$@2*1/>!
!
R<5!9CG=+!
L$(&2@1/!E!2-*'?T-)#!9>]!.#I!I#&D!$&#$1&3%!#.!.#.;T.(3'/)!V#/*(&1MiA!'./*2332*'#./>!
!
,1*';=1)#![WaWb!
U#!-)2.(1/>!
!
,1*';=1)#![WaWa!
=Qd0Q"=E=QN+!
J1@1/'(.1@8!12/'1&!*#!B/1!V&#N1-*/!?'1I!E#&!1.@!B/1&/>!
2-*'?T-)#!"3'1.*/!RH2-KO'.@#I/S!)2?1!611.!3#-23'd1@!'.!41&52.8!s2$2.1/1!2.@!Z&1.-)>!
MB$$#&*!E#&!7FHA=!@&2(!2.@!@&#$!E'31!B$3#2@'.(!@'&1-*3%!*#!*)1!I16!'.*1&E2-1>!Q.1!#&!52.%!E'31/!
-2.!61!B$3#2@1@!?'2!P&2(!2.@!P&#$!'.!2!/'.(31!#$1&2*'#.>!
05$&#?1@!E'31!B$3#2@!)2.@3'.(8!'.-3B@'.(!$&#(&1//!'.@'-2*#&/!'.!*)1!I16!'.*1&E2-1!2.@!*)1!26'3'*%!
*#!-2.-13!B$3#2@/>!
Z#3@1&/!-2.!61!@#I.3#2@1@!2/!2!e0V!E'31!E!*)1!V&#N1-*/!?'1I!'.!*)1!O16!L0>!
0.@'?'@B23!E'31/!-2.!61!/)2&1@!I'*)!#*)1&!B/1&/>!F)#/1!B/1&/!I'33!(1*!2!3'.D!*#!@#I.3#2@!*)1!E'31/8!
I)'-)!-2.!61!-#.E'(B&1@!*#!1C$'&1>!
M)2&'.(!'.?'*2*'#.!@'23#(/!.#I!/B$$#&*!*%$1;2)12@!2(2'./*!6#*)!3#-23!B/1&/!2.@!B/1&/!'.!,-*'?1!
P'&1-*#&%!K!AP,V>!
F)1!$&1?'#B/!&1?'/'#./!E12*B&1!E#&!E'.@'.(!K!@#I.3#2@'.(!K!&1/*#&'.(!$&1?'#B/!?1&/'#./!#E!E'31/!)2/!
611.!&1@1/'(.1@!2.@!'/!5#&1!E31C'631>!V&1?'#B/!&1?'/'#./!-2.!61!/131-*1@!*#!61!W52@1!-B&&1.*W>!
2-*'?T-)#!@1/D*#$!-3'1.*/!RH2-KO'.@#I/S!.#I!/)#I!$&#(&1//!'.@'-2*#&/!E'31/!61'.(!/%.-)&#.'d1@>!
U1I!WB./B6/-&'61W!6B**#.!'/!2?2'32631!'.!E#3@1&/!/)2&1@!*#!%#B>!
M#&*'.(!-&'*1&'2!-)#/1.!6%!*)1!1.@!B/1&!'/!.#I!/2?1@!I)1.!6&#I/'.(!$&#N1-*!E#3@1&/>!
T?1.*!U#*'E'-2*'#./!-2.!.#I!61!-#.E'(B&1@!(3#6233%!2/!@1E2B3*!/1**'.(/!E#&!233!/)2&1/>!L/1&/!-2.!
#?1&&'@1!*)1!@1E2B3*/!E#&!'.@'?'@B23!/)2&1/>!
U#*'E'-2*'#./!-2.!.#I!61!-#.E'(B&1@!*#!61!/1.*!I)1.!2!E'31!'/!@#I.3#2@1@!K!/%.-1@>!
2-*'?T-)#!-3'1.*/!#.!O'.@#I/!.#I!$1&E#&5!?23'@2*'#.!#E!MMA!-1&*'E'-2*1/!B/'.(!*)1!6B'3*;'.!
O'.@#I/!-1&*'E'-2*1!/*#&1>!F)'/!'5$&#?1/!-#5$2*'6'3'*%!I'*)!a&@!$2&*%!-1&*'E'-2*1!2B*)#&'*'1/>!