7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
238! Copyright!©!Acronis!International!GmbH,!2002;2015!
,-*'?T-)#g/!F#5-2*!'/!.#I!-#.E'(B&1@!*#!&1@'&1-*!7FFV!*#!7FFVM!6%!@1E2B3*>! ! !
"B/*#51&/!.#*!.11@'.(!&1@'&1-*'#.!&1E1&!*#!*)1!#.3'.1!@#-B51.*2*'#.\! !
! )**$/\KK@#-/>(&#B$3#('->-#5K@'/$32%K,-*'?T-)#K2-*'?T-)#hM1&?1&w2-*'?T-)#M1&?1&;J1@'&1-*'.
(7FFV&1fB1/*/*#7FFVM!
F)1!3'/*!#E!/)2&1/!)2/!.#I!611.!&15#?1@!E!*)1!31E*!$2.13!#E!*)1!$&#N1-*/!I16!$2(1!*#!'5$&#?1!*)1!
$2(1!$1&E#&52.-1>!
Z'3*1&'.(!#$*'#./!)2?1!611.!2@@1@!*#!$&#N1-*/!$2(1!/'@162&>!
05$&#?1@!/)B*@#I.!/$11@!#E!*)1!H2-!2.@!O'.@#I/!/%.-!-3'1.*/>! ! !
L$(&2@1@!@1E2B3*!F#5-2*!'./*2332*'#.!*#!?1&/'#.!]>:>a`!2.@!F#5-2*!U2*'?1!R*-.2*'?1;<>@33S!*#!?1&/'#.!
<><>9`>!
L$(&2@1@!@1E2B3*!?1&/'#.!#E!V#/*(&1MiA!*#!_>9><>!
G23'@2*'#.!#E!/B$$#&*!E#&!O'.@#I/!9:<9!M1&?1&>!
G23'@2*'#.!#E!/B$$#&*!E#&!s2?2!]!B$@2*1!<=>!
G23'@2*'#.!#E!/B$$#&*!E#&!O'.@#I/!b!E#&!*)1!O'.@#I/!/%.-!-3'1.*>! ! !
L/1&/!#.!0T]!I'33!.#I!1C$3'-'*3%!&1-1'?1!2.!1&&#&!51//2(1!*)2*!0T]!'/!.#*!/B$$#&*1@>!
!
R<5!9CG=+P! ! !
Z'C1@!2!-#B$31!#E!&2&1!'./*2.-1/!I)1&1!*)1!/%.-!-3'1.*!-#B3@!&1-1'?1!2!@2*262/1! !
1&&#&!2.@!-#B3@!.#!3#.(1&!/%.->! ! !
! ! !
L.@1&!3#2@8!-3'1.*!I'33!.#!3#.(1&!#--2/'#.233%!-#&&B$*!E'31/!#.!@#I.3#2@!2.@!B$3#2@!*)1!-#&&B$*1@!
?1&/'#./>! ! !
PB$3'-2*1!E'31/!I'33!.#!3#.(1&!2$$12&!'.!*)1!I16!'.*1&E2-1!'E!%#B!$2B/1!2.@!&1/B51!*)1!-3'1.*!'.!*)1!
5'@@31!#E!B$3#2@'.(!2!E'31>! ! !
Z'C1@!2!H2-!-3'1.*!6B(!I)1&1!*)1!-3'1.*!&1-1'?1/!2.!1&&#&!I)1.!2!E'31!'/!@131*1@!#EE!*)1!/1&?1&!/'@1!
I)'31!*)1!-3'1.*!'/!@#I.3#2@'.(!*)1!E'31>!
F)1!/%.-!-3'1.*!I'33!.#!3#.(1&!E2'3!*#!-#5$31*1!'.!&2&1!-2/1/!I)1&1!E#3@1&/!2&1!2((&1//'?13%!&1.251@!
I'*)!/'5'32&!.251/>!
F)1!/%.-!-3'1.*!I'33!.#!3#.(1&!2**15$*!*#!@131*1!E'31/!&1$12*1@3%!'E!'*!-2..#*!/B--11@>!
F#5-2*!/1**'.(/!)2?1!611.!-)2.(1@!*#!1./B&1!*)2*!/%.-'.(!&1fB1/*/!E!*)1!-3'1.*!I'33!/B--11@!1?1.!
I)1.!*)1&1!2&1!52.%!*#$;31?13!E#3@1&/>!
Z'31!2.@!E#3@1&/!I'*)!.251/!-#.*2'.'.(!j8!v8!2.@!t!I'33!.#I!61!)2.@31@!$&#$1&3%>!
HB3*'$31!6B(!E'C1/!*#!/%.-!-3'1.*!-#.*1C*!51.B!#$*'#./!*#!/B$$#&*!2!?2&'1*%!#E!E'31!2.@!E#3@1&!.251/!
I)'-)!$&1?'#B/3%!I#B3@!E2'3>! ! !