7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
236! Copyright!©!Acronis!International!GmbH,!2002;2015!
,1*';=1)#!\WrW\!`@-4-,2-3P!E,%!\abic!
R<5!9CG=+P!
Z'31/!I)'-)!I1&1!.#*!EB33%!B$3#2@1@!*#!*)1!E'31!&1$#/'*#&%!I'33!.#I!61!&15#?1@!E!*)1!
&1$#/'*#&%!'E!*)1!&1$#/'*#&%!'/!2--1//'631!2E*1&!*)1!B$3#2@!E2'3B&1!#--B&/>!
Z'C1@!2!&2&1!-2/1!I)1&1!*)1!2-*'?T-)#!-3'1.*!I#B3@!E2'3!*#!/%.-!@B1!*#!*)1!/*&B-*B&1!#E!2!/%/*15!E'31!0P>!
!
,1*';=1)#!\WrWb!`@-4-,2-3P!0$&'4!\abic!
=Qd0Q"=E=QN+P! !
F)1!2-*'?T-)#!I16!/1&?1&!2.@!/%/*15!-2.!.#I!61!5#.'*#&1@!B/'.(!*)1!U1I!J13'-!5#.'*#&'.(!*##3/>! !
Z#&!5#&1!'.E#&52*'#.!26#B*!*)1!.1I!EB.-*'#.23'*%!2.@!#6*2'.'.(!2!3'-1./18!&1E1&!*#!
)**$\KK.1I&13'->-#5K!
L$(&2@'.(!I'33!.#I!52'.*2'.!'.*1&51@'2*1!-1&*'E'-2*1!E'31/!-#.E'(B&1@!E#&!*)1! ! 2-*'?T-)#!F#5-2*!
'./*2332*'#.g/!7FFVM!-#..1-*'#./>!
05$&#?1@!3#2@!/$11@!#E!B/1&/!$2(1!6%!-2-)'.(!-#.*1.*!B/2(1>!
!
R<5!9CG=+P! !
O16!B/1&/!&B..'.(!#.!0.*1&.1*!TC$3#&1&!b!#&!0.*1&.1*!TC$3#&1&!_!'.!-#5$2*'6'3'*%! !
5#@1!I'33!.#!3#.(1&!&1-1'?1!2.!1&&#&!*)2*!*)1'&!6&#I/1&!'/!'.-#5$2*'631!I'*)!2-*'?T-)#>!
Z#3@1&/!I'*)!.251/!'.!*)1!E#&52*!YYYYHHPP!I'33!.#!3#.(1&!E2'3!*#!/%.-!E!*)1!2-*'?T-)#!-3'1.*!*#!
*)1!/1&?1&>!
!
,1*';=1)#!\WrWa!`@-4-,2-3P!9-:&6,&%!\abic!
=Qd0Q"=E=QN+P!
H2-!2.@!O'.@#I/!/%.-!-3'1.*/!I'33!.#I!61!.#*'E'1@!I)1.!*)1%!)2?1!B$@2*1@!-#.*1.*!2?2'32631!E#&!
@#I.3#2@>! ! F)1/1!.#*'E'-2*'#./!I'33!&1@B-1!3#2@!#.!*)1!/1&?1&!2.@!'5$&#?1!$1&E#&52.-1!6%!2?#'@'.(!
52.%!B..1-1//2&%!&1fB1/*/!E!-3'1.*/!*#!*)1!/1&?1&!*#!-)1-D!E#&!B$@2*1/!I)1.!.#.1!2&1!2?2'32631>! ! !
H2-!2.@!O'.@#I/!/%.-!-3'1.*/!)2?1!611.!52@1!5#&1!&1/'3'1.*!*#!1&&#&/!#.!/'.(31!E'31/!2.@!E#3@1&/>!
F)1!-3'1.*!/%.-'.(!$&#-1//!I'33!.#!3#.(1&!/*#$!'E!2!/'.(31!3#-D1@!E'31!'/!B$@2*1@>! ! ,33!#*)1&!E'31/!I)'-)!
-2.!61!/B--1//EB33%!B$@2*1@!I'33!61>! ! F)1!-3'1.*!/%.-'.(!$&#-1//!I'33!23/#!.#!3#.(1&!/*#$!'/!2!E'31!
-2..#*!61!/B--1//EB33%!@#I.3#2@1@>! ! ,33!#*)1&!E'31/!I)'-)!-2.!61!/B--1//EB33%!@#I.3#2@1@!I'33!61>!
H2-!2.@!O'.@#I/!/%.-!-3'1.*/!-2.!.#I!2B*#52*'-233%!@#I.3#2@!2.@!'./*233!B$@2*1/>!
P#I.3#2@!/$11@!#E!32&(1!.B561&/!#E!E'31/!*#!/%.-!-3'1.*!)2/!611.!'5$&#?1@>!
,3*1&'.(!*)1!$&1E1&1.-1/!#.!*)1!-3'1.*!I'33!.#!3#.(1&!-2B/1!2!$2B/1@!-3'1.*!*#!61('.!/%.-'.(>! ! !
O'.@#I/!/%.-!-3'1.*!.#I!#EE1&/!2!WM)#I!$&1?'#B/!2-*'?T-)#!?1&/'#./W!-#.*1C*!51.B!#$*'#.>!