7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
242! Copyright!©!Acronis!International!GmbH,!2002;2015!
MB$$#&*!E#&!/131-*'?1!/%.-'.(>! ! G'2!*)1!I168!B/1&/!-2.!$'-D!I)'-)!E#3@1&/!*)1%!I2.*!*#!)2?1!/%.-1@!
*#!*)1'&!@1/D*#$!?/>!#.3%!2--1//'631!?'2!*)1!I16>! ! F)'/!233#I/!B/1&/!*#!)2?1!2--1//!*#!/)2&1@!-#.*1.*!
6B*!.#*!.1-1//2&'3%!)2?1!233!-#.*1.*!/%.-1@!*#!*)1'&!3#-23!@1/D*#$>!
,@5'.'/*&2*#&/!-2.!.#I!&12//'(.!#I.1&/)'$!#E!-#.*1.*!I)1.!@131*'.(!2!B/1&!E!2-*'?T-)#8!#&!-2.!
-)##/1!*#!@131*1!2!B/1&!2.@!32*1&!&12//'(.!*)1!-#.*1.*!B/'.(!*)1!H2.2(1!P131*1@!L/1&/!$2(1>!
O)1.!2!B/1&g/!$1&5'//'#.!*#!/)2&1!'/!&15#?1@!E!2!/)2&1@!E#3@1&8!*)1!E#3@1&!'/!.#I!&15#?1@!E!
*)1'&!-3'1.*!2-*'?T-)#!/%.-!E#3@1&>!
2-*'?T-)#!-3'1.*/!/B$$#&*!$2B/'.(!K!&1/B5'.(!/%.-'.(>!
M%.-'.(!E'31/!*#!H2-!QM!X!-3'1.*/!'/!/'(.'E'-2.*3%!E2/*1&>!
F)1!E'31!&1$#/'*#&%!-2.!.#I!61!-#.E'(B&1@!*#!/*#&1!-#.*1.*!#.!2!LU"!$2*)!*#!/B$$#&*!.1*I#&D!@&'?1/>!
U1I!U#*'E'-2*'#.!/1**'.(!233#I/!*)1!2@5'.'/*&2*#&!*#!61!.#*'E'1@!I)1.!*)1!E'31!&1$#/'*#&%!E&11!/$2-1!
(#1/!613#I!2!/1*!*)&1/)#3@>!
P1E2B3*!152'3!*15$32*1/!-2.!.#I!61!?'1I1@!'.!*)1!52.2(151.*!/1**'.(/>!
O16!V&#N1-*/!$2(1!.#I!$&#?'@1/!2!/B552&%!#E!*)1!.B561&!#E!E'31/!2.@!E#3@1&/>!
O16!L/1&/!$2(1!$&#?'@1/!*)1!2@5'.'/*&2*#&!2!/B552&%!#E!'.@'?'@B23!B/1&g/!-#.*1.*!2.@!fB#*2!B/2(1>!
M%.-!-3'1.*/!.#!3#.(1&!*'51!#B*!'E!*)1!'.'*'23!/%.-!-#.*2'./!5#&1!*)2.!=:8:::!E'31/>!
O'.@#I/!-3'1.*!'./*2331&!'/!.#I!2?2'32631!2/!2!HM0!$2-D2(1!E#&!B/1!'.!2B*#52*1!@1$3#%51.*>!
P131*'.(!52.%!E'31/!2*!#.-1!E!*)1!I16!6&#I/1&!'/!5B-)!E2/*1&>!
O16!.#I!$&#?'@1/!2.!W0.?'*1W!6B**#.!E#&!*)1!E#3@1&!*)1!B/1&!'/!?'1I'.(>!
O16!3#(!?'1I!.#I!)2/!2!&1/1*!E'3*1&/!6B**#.>!
H2/*1&!1.-&%$*'#.!D1%!)2/!611.!5'(&2*1@!E!*)1!F#5-2*!@'&1-*#&%!'.*#!*)1!2-*'?T-)#!@2*262/1!*#!
$&1?1.*!2--'@1.*23!@2*2!3#//!'E!F#5-2*!'/!B.'./*2331@!I'*)#B*!$&#$1&!62-DB$/>!
!
R<5!9CG=+P!
T52'3!*15$32*1!.#*'E'-2*'#.!1&&#&/!-#B3@!#--B&!2E*1&!2!B/1&!'/!@131*1@!E!2-*'?T-)#!'E!*)1%!I1&1!
/)2&'.(!-#.*1.*>!
AP,V!/1**'.(/!2&1!.#!3#.(1&!?23'@2*1@!'E!AP,V!)2/!611.!@'/2631@!'.!*)1!52.2(151.*!/1**'.(/>!
O)1.!2!E#3@1&!'/!B./)2&1@8!*)1!#I.1&!-2.!.#I!/11!$2/*!1?1.*/!'.!*)1!I16!3#(!E#&!*)2*!E#3@1&>!
F)1!I16!3#(!233#I/!E'3*1&'.(!#E!$2/*!1?1.*/!E#&!B/1&/!I)#!2&1!.#!3#.(1&!$2&*!#E!*)1!/)2&1@!E#3@1&>!
05$&#?1@!*)1!O'.@#I/!@1/D*#$!/%.-!-3'1.*!B$(&2@1!1C$1&'1.-1!*#!.#*!#--2/'#.233%!&1fB1/*!*)2*!
TC$3#&1&!61!&1/*2&*1@>!
T52'3!2@@&1//1/!-#.*2'.'.(!*)1!E#33#I'.(!-)2&2-*1&/!2&1!.#I!?23'@!I)1.!'.?'*'.(!#&!2@@'.(!2!B/1&\! ! t!
|!l!p!;!q!}!~!•!k!w!j!g!h!K!u!v!z!{>!
F#5-2*!I16>C53!-#.E'(B&2*'#.!E'31!-2.!.#!3#.(1&!61!&1*&'1?1@!?'2!2!I16!6&#I/1&>!
H'/-1332.1#B/!6B(!E'C'.(!'.!@1/D*#$!/%.-'.(>!