7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
240! Copyright!©!Acronis!International!GmbH,!2002;2015!
MB$$#&*!$&#?'@1@!E#&!-&12*'.(!F#5-2*!/1&?1&!-3B/*1&/!&B..'.(!2-*'?T-)#!E#&!3#2@!6232.-'.(!2.@!
&1/'3'1.-1>!
05$&#?1@!@'2(.#/*'-!3#(('.(!$&#?'@1@!'.!*)1!E'31!&1$#/'*#&%!/1&?'-1>!
P1/D*#$!M%.-!-3'1.*/!#.!H2-!2.@!O'.@#I/!.#I!$&#?'@1!2!51.B!#$*'#.!*#!@'/$32%!&1-1.*3%!B$@2*1@!
E'31/>!
"3'-D'.(!2.!1.*&%!'.!*)1!3'/*!#$1./!*)1!E#3@1&!-#.*2'.'.(!*)1!E'31>!
H2-!QM!X!/%.-!-3'1.*!.#I!/B$$#&*/!42*1D11$1&!/'(.'.(!2.@!.#*'E'-2*'#.!-1.*1&!#.!QM!X!<:>b>!
J1-#551.@!B$(&2@'.(!*#!*)1!32*1/*!?1&/'#.!#E!*)1!-3'1.*!@B1!*#!/'(.'E'-2.*!$1&E#&52.-1!2.@!/*26'3'*%!
'5$&#?151.*/!'.!6#*)!O'.@#I/!2.@!H2-!@1/D*#$!-3'1.*/>!
F)1!/%.-!-3'1.*!#.!H2-!2.@!O'.@#I/!.#I!/1*/!2!-B/*#5!'-#.!E#&!*)1!2-*'?T-)#!/%.-!E#3@1&>!
F)1!/1&?1&!'./*2331&!233#I/!/1**'.(!*)1!B/1&!2--#B.*!*)1!E'31!&1$#/'*#&%!/1&?'-1!&B./!B.@1&!*#!/*#&1!*)1!
&1$#/'*#&%!#.!.1*I#&D!?#3B51/>!
V&#N1-*/!*26!-2.!.#I!61!E'3*1&1@!6%!'*15/!/)2&1@!6%!2!B/1&8!#&!/)2&1@!I'*)!2!B/1&>!
")2.(1!*)1!@1E2B3*!152'3!*15$32*1!I)1.!'.?'*'.(!2!B/1&!*#!2!/)2&1!*#!233#I!*)1!B/1&!*#!/131-*!*#!/*2&*!
/%.-'.(!*)1!-#.*1.*!'551@'2*13%>! ! 0E!%#B!)2?1!-B/*#5'd1@!*)1!'.?'*1!*#!/)2&1!*15$32*1!'.!*)1!$2/*8!
B$@2*1!*)1!E#33#I'.(!'*15/\!
! yjq!/)#Iv-#.*1.*/v.#@1v$2*)R!n.#@1>BB'@!S!jo!
*#!
! yjq!/)#Iv-#.*1.*/v.#@1v$2*)R!n.#@1>BB'@8!z\/)#Iv/%.-v3'()*6#C!qo!*&B1{!S!jo!
!
G23'@2*'#.!#E!/B$$#&*!E#&!s2?2!]!B$@2*1!]>!
!
R<5!9CG=+P!
G2&'#B/!'5$&#?151.*/!*#!AP,V!2B*)1.*'-2*'#.8!'.-3B@'.(!-2/1!/1./'*'?'*%!'//B1/!I'*)!@#52'.!.251/!
2.@!/B$$#&*!E#&!5B3*'$31!152'3!@#52'./>!
F)1!@#52'.!E#&!AP,V!2B*)1.*'-2*'#.!3'/*!-2.!B/1!1'*)1&!c!#&!8!2/!2!@13'5'*1&>!
G2&'#B/!'5$&#?151.*/!#.!/%.-'.(!E'31/!2.@!E#3@1&/!I)1&1!2.!'*15!#&!*)1!$2&1.*!E#3@1&R/S!)2?1!611.!
@131*1@>!
Z'C1@!E'31/!5#@'E'-2*'#.!@2*1/!*)2*!I1&1!.#*!/1*!$&#$1&3%!62/1@!#.!*'51d#.1/!B.@1&!/#51!
-'&-B5/*2.-1/>!
V1&'#@!'/!2!?23'@!-)2&2-*1&!'.!Ma!6B-D1*!.251/!I)1.!B/'.(!,52d#.!Ma!E#&!*)1!E'31!&1$#/'*#&%>!
Z'C1@!)'()!"VL!B/2(1!#.!6#*)!H2-!2.@!O'.@#I/!@1/D*#$!-3'1.*/>!
H'/-1332.1#B/!#*)1&!6B(!E'C1/>!
!
!