7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
237! Copyright!©!Acronis!International!GmbH,!2002;2015!
F)1!V&#N1-*/!*26!'.!*)1!I16!'.*1&E2-1!)2/!611.!#$*'5'd1@!E#&!'.-&12/1@!$1&E#&52.-1!2.@!/5##*)1&!
B/1&!'.*1&2-*'#.>! !
F)1!V&#N1-*/!*26!.#I!/B$$#&*/!$2('.2*'#.8!/#&*'.(8!E'3*1&'.(>!
F)1!5#?1!@'23#(!'.!*)1!I16!'.*1&E2-1!.#I!3#2@/!fB'-D3%8!1?1.!I)1.!*)1!B/1&!)2/!2!32&(1!)'1&2&-)%!#E!
E#3@1&/>!
,33!-3'1.*!-#..1-*'#./!-2.!61!@'/2631@!E#&!2@5'.'/*&2*'?1!$B&$#/1/!E!*)1!M1&?1&!M1**'.(/!$2(1!'.!
*)1!I16!L0>! !
,33!*'51/*25$/!B/1@!E#&!-#5$2&'/#.!#&!-23-B32*'#.!I'33!.#I!61!/1*!*#!@2*262/1!*'51!'./*12@!#E!/1&?1&!
*'51!*#!1./B&1!$&#$1&!#$1&2*'#.!'.!2!-3B/*1&!/-1.2&'#>! !
F)1!I16!'.*1&E2-1!.#I!$&#?'@1/!/B$$#&*!E#&!.#.;LM!@2*1;*'51!E#&52*/>!
PB$3'-2*1!E#3@1&!B$@2*1/!I'33!.#!3#.(1&!-2B/1!5B3*'$31!&1?'/'#./!#E!*)1!E#3@1&!*#!61!-&12*1@>!
F)1!@1E2B3*!V#/*(&1MiA!'./*2332*'#.!'/!.#I!-#.E'(B&1@!I'*)!5#&1!-2&1EB33%!*B.1@!$2&251*1&/!*#!
'5$&#?1!$1&E#&52.-1>! ! !
L/1&!$&#C%!,P!#6N1-*/!-2.!.#I!/B--1//EB33%!2B*)1.*'-2*1!*#!2-*'?T-)#>!
HB3*'$31!@#52'./!-2.!.#I!61!$&#?'@1@!E#&!AP,V!-#.E'(B&2*'#.!*#!61!2B*#52*'-233%!$&1;$1.@1@!*#!
B/1&.251/!E#&!3#('.>! ! !
A'.D/!'.!152'3/!I)1.!/)2&'.(!2!E#3@1&!*#!2!.1I!B/1&!I'33!.#I!@'&1-*!*)1!B/1&!'.*#!*)1!.1I!/)2&1!#.!*)1!
I16/'*1>! ! U#*1!*)2*!'E!*)1!@1E2B3*!*15$32*1/!)2?1!611.!23*1&1@8!*)1!$2//D1%!$2*)/!'.!*)1!.#*'E'-2*'#.!
152'3!*15$32*1!I'33!.11@!*#!61!5#@'E'1@!*#!3##D!3'D1!*)'/\! !
! yjq!n&##*vI16v2@@&1//!jo!
! yjq!$2//D1%v$2*)R!n$2//D1%8!z!\&1@'&1-*v$2*)!qo! !
! ! /)#Iv-#.*1.*/v.#@1v$2*)R!n.#@1>BB'@8!z\/)#Iv/%.-v3'()*6#C!qo!*&B1{! ! S!{!S!jo!
!
Z'31/!I'33!.#!3#.(1&!61!52&D1@!@131*1@!'E!*)1%!-2.g*!61!E#B.@!'.!*)1!&1$#/'*#&%>! ! F)1%!I'33!.11@!*#!
52.B233%!61!&15#?1@>!
F#5-2*!.#!3#.(1&!.11@/!*#!61!&1/*2&*1@!I)1.!Ma!&1$#/'*#&%!/1**'.(/!2&1!-)2.(1@>!
,33!2-*'?T-)#!/1&?1&!3#(('.(!'/!.#I!I&'**1.!*#!2!@2*1;/*25$1@!2-*'?T-)#>3#(!E'31!I)'-)!'/!&#*2*1@!@2'3%>! !
F)'/!3#(!E'31!-2.!61!E#B.@!'./'@1!*)1!F#5-2*!3#(/!E#3@1&>! ! !
,!-#.E'(B&2*'#.!E32(!)2/!611.!2@@1@!*#!233#I!*)1!2-*'?T-)#!I16!/1&?1&!*#!/B$$#&*!7FFV!-#..1-*'#./!
'./*12@!#E!7FFVM>! ! F#!233#I!7FFV!-#..1-*'#./8!/1*!JTiL0JTvMMA!*#!E23/1!'.!2-*'?T-)#>-E(>!
F)1!O'.@#I/!-3'1.*!HM0!E'31!'/!.#I!2?2'32631!'.!*)1!-3'1.*/!@#I.3#2@!@'&1-*#&%>! ! !
,-*'?T-)#g/!I16!2$$3'-2*'#.!'/!.#I!'./*2331@!'.!*)1!E#33#I'.(!3#-2*'#.\! !
! "\rV&#(&25!Z'31/!RCb^Sr4&#B$!A#('-r2-*'?T-)#!M1&?1&r2-*'?T-)#!O16!,$$3'-2*'#.!
,-*'?T-)#g/!F#5-2*!/1&?1&!'/!.#I!'./*2331@!'.!*)1!E#33#I'.(!3#-2*'#.\!
! "\rV&#(&25!Z'31/!RCb^Sr4&#B$!A#('-r"#55#.r2$2-)1;*#5-2*;]>:>a`!