7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
239! Copyright!©!Acronis!International!GmbH,!2002;2015!
AP,V!2B*)1.*'-2*'#.!6%!152'3!I'33!.#I!I#&D!$&#$1&3%!E#&!AP,V!@#52'./!I)1&1!2B*)1.*'-2*'#.!6%!
-#55#.!.251!'/!.#*!$1&5'**1@>! ! !
Z'C1@!?2&'#B/!-2/1;/1./'*'?'*%!6B(/!I'*)!AP,V!2B*)1.*'-2*'#.>!
,@@'.(!*&'23!/1&?1&!3'-1./1/!I'33!.#!3#.(1&!#--2/'#.233%!E2'3>! ! !
L./)2&'.(!2!E#3@1&!I'*)!L.'-#@1!-)2&2-*1&/!'.!*)1!.251!B/'.(!WJ15#?1!233W!I'33!.#!3#.(1&!-2B/1!2.!
1&&#&>! !
,!$1.@'.(!B/1&!-2.!.#I!61!&15#?1@!E!2!/)2&1@!E#3@1&!'E!%#B!)2?1!*)1!2$$&#$&'2*1!$1&5'//'#./8!
1?1.!'E!%#B!2&1!.#*!2.!2@5'.'/*&2*#&>!
L/1&/!-2.!.#!3#.(1&!/)2&1!@131*1@!E#3@1&/>!
05$&#?1@!1&&#&!)2.@3'.(!E#&!MHFV!1&&#&/>! ! !
H'/-1332.1#B/!#*)1&!6B(!E'C1/>!
!
,1*';=1)#!\WlWb!`@-4-,2-3P!>1*#:-&!\ab\c!
R<5!9CG=+P!
J12//'(.'.(!-#.*1.*!E!@131*1@!B/1&/!.#I!I#&D/!I)1.!fB#*2/!2&1!@'/2631@>!
!
,1*';=1)#!\WlWa!`@-4-,2-3P!>1*#:-&!\ab\c!
=Qd0Q"=E=QN+P!
A#(!2.@!L/1&/!*26/!/B$$#&*!$2('.2*'#.8!/#&*'.(8!E'3*1&'.(>!
A#(!2.@!L/1&/!*26/!)2?1!611.!#$*'5'd1@!E#&!'.-&12/1@!$1&E#&52.-1!2.@!/5##*)1&!B/1&!'.*1&2-*'#.>!
A#(!*26!$&#?'@1/!.1I!/*2&*!2.@!1.@!@2*1!@'/$32%!E'3*1&/>!
iB#*2/!-2.!61!@1E'.1@!E#&!'.@'?'@B23!,-*'?1!P'&1-*#&%!2.@!,@;)#-!B/1&/8!#?1&&'@'.(!(&#B$!$#3'-'1/>!
iB#*2/!-2.!.#I!61!@1E'.1@!/$1-'E'-233%!E#&!2@5'.'/*&2*'?1!B/1&/>!
,B*#52*'-!$B&('.(!#E!B/1&!2--#B.*/!'E!.#!2-*'?'*%!)2/!#--B&&1@8!#&!2!/$1-'E'-!26/#3B*1!*'51!)2/!$2//1@>!
MB$$#&*!E#&!-#.E'(B&'.(!*)1!31.(*)!#E!*'51!61E#&1!1C$'&2*'#.!#E!/)2&1@!3'.D/>!
U1I!/)2&1!$1&5'//'#./!233#I!#I.1&!*#!)'@1!@'/$32%!#E!/)2&1!51561&/!*#!.#.;#I.1&/8!2.@!$&1?1.*!
.#.;#I.1&/!E!'.?'*'.(!#*)1&/>!
U1I!61)2?'#&!I)1.!B./)2&'.(!$&#N1-*/8!3#-23!@2*2!I'33!61!@131*1@!E!*)1!-3'1.*!#.!.1C*!-#..1-*'#.>!
U1I!2@5'.'/*&2*'?1!/1**'.(!*#!)'@1!*)1!WP#I.3#2@!*)1!2-*'?T-)#!-3'1.*W!3'.D!*#!-#.*!I)'-)!B/1&/!
-2.!@#I.3#2@!2.@!'./*233!*)1!2-*'?T-)#!/%.-!-3'1.*>!
L/1&/!2--#B.*/!-2.!61!@'/2631@!*#!*15$#&2&'3%!$&1?1.*!2--1//!2.@!3#('.!*#!2-*'?T-)#>!
U1I!2@5'.'/*&2*'?1!/1**'.(!*#!-#.*!*)1!5'.'5B5!/B$$#&*1@!?1&/'#.!.B561&!#E!*)1!/%.-!-3'1.*>!