7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
244! Copyright!©!Acronis!International!GmbH,!2002;2015!
05$&#?151.*/!*#!@1/D*#$!/%.-'.(!I)1.!H'-&#/#E*!QEE'-1!E'31/!2&1!1@'*1@!@'&1-*3%!'.!*)1!2-*'?T-)#!
Z#3@1&>!
G2&'#B/!6B(!E'C1/!'.!@1/D*#$!/%.-'.(>! !
[B(!E'C1/!'.!2-*'?T-)#!/1&?1&!'./*2331&!*#!E'C!EB*B&1!B$(&2@1/>!
!
,1*';=1)#!\WaWb!`@-4-,2-3P!E,&1)!\ab\c!
R<5!9CG=+P!
05$&#?151.*/!*#!*)1!/1&?1&!2@5'.'/*&2*'#.!B/1&!1C$1&'1.-1>!
G2&'#B/!6B(!E'C1/!'.!@1/D*#$!/%.-'.(>!
05$&#?151.*/!*#!*)1!-3'1.*!'./*2331&!B$(&2@1!$&#-1//>!
!
,1*';=1)#!\WaWa!`@-4-,2-3P!9-:&6,&%!\ab\c!
0.'*'23!&1312/1!
8.3.2 mobilEc ho!
01&#/'2!011-22!+-&;-&!lWa!
F)1!5#6'3T-)#!2.@!2-*'?T-)#!$&#@B-*/!)2?1!611.!-#56'.1@!'.*#!2!/'.(31!.1I!$&#@B-*!-2331@!,-&#.'/!
,--1//!M1&?1&>! ! F)'/!-)2.(1/!*)1!6&2.@'.(!2.@!$&#@B-*!.251/!'.!*)1!5#6'31!2.@!@1/D*#$!-3'1.*/!2/!
I133!2/!*)1!I16!2$$3'-2*'#.>! ! ,-&#.'/!,--1//!M1&?1&!^>:!-2.!61!'./*2331@!2/!2.!B$(&2@1!*#!5#6'3T-)#!
2.@K#&!2-*'?T-)#!2.@!1C'/*'.(!3'-1./1/!I'33!-#.*'.B1!*#!I#&D>!"B/*#51&/!2&1!1.*'*31@!*#!1C-)2.(1!
*)1'&!1C'/*'.(!5#6'3T-)#!2.@K#&!2-*'?T-)#!3'-1./1R/S!E#&!2!.1I!,-&#.'/!,--1//!3'-1./1!*)2*!I'33!1.2631!
*)1!EB33!EB.-*'#.23'*%!#E!*)1!-#56'.1@!$&#@B-*>!F#!&1fB1/*!*)'/!B$(&2@18!$312/1!26:.'*!*)'2!8-:!F#&.>!
Z#&!*)1!32*1/*!'.E#&52*'#.8!$312/1!?'/'*!*)1!O)2*g!U1I!'.!,-&#.'/!,--1//!M1&?1&!R$>!9<`S!2&*'-31>!
!
.#:'4=1)#![WbWa!
=Qd0Q"=E=QN+!
L/1&/!I'*)!5#6'3T-)#!=><!#&!32*1&!#.!'QM!-2.!.#I!-&12*1!*)1'&!@2*2!/#B&-1/!@'&1-*3%!E!*)1!
2$$3'-2*'#.!*#!2--1//!2.%!E'31!/)2&1!#&!M)2&1V#'.*!3#-2*'#.>! ! L/1&/!1.*1&!LU"!$2*)/!#&!M)2&1V#'.*!
LJA/!E!*)1!-3'1.*>! ! U1I!$#3'-%!/1**'.(/!)2?1!611.!'.*&#@B-1@!#.!*)1!52.2(151.*!/1&?1&!*#!
-#.*!I)1*)1&!-3'1.*/!2&1!233#I1@!*#!-&12*1!*)1/1!@2*2!/#B&-1/8!2.@!I)'-)!42*1I2%!M1&?1&/!2&1!
B/1@!E#&!*)1/1!&1fB1/*/>!
HB3*'$31!42*1I2%!M1&?1&/!-2.!.#I!/)2&1!2!-#55#.!-#.E'(B&2*'#.!?'2!2!"3B/*1&!4&#B$>! ! ")2.(1/!
*#!*)1!/1**'.(/!2.@!$#3'-'1/!2//'(.1@!*#!*)1!"3B/*1&!4&#B$!2&1!2B*#52*'-233%!$B/)1@!*#!233!
51561&/!#E!*)1!4&#B$>! ! F)'/!I'33!*%$'-233%!61!B/1@!I)1.!5B3*'$31!42*1I2%!M1&?1&/!2&1!$32-1@!
61)'.@!2!3#2@!6232.-1&!E#&!)'()!2?2'326'3'*%>!
42*1I2%!M1&?1&/!.#I!/B$$#&*!2B*)1.*'-2*'#.!B/'.(!m1&61&#/>! ! F)'/!-2.!61!B/1@!*#!'.!/-1.2&'#/!
B/'.(!m1&61&#/!"#./*&2'.1@!P131(2*'#.!*#!2B*)1.*'-2*1!5#6'3T-)#!'QM!-3'1.*/!*)&#B()!2!&1?1&/1!
$&#C%!B/'.(!-3'1.*!-1&*'E'-2*1/>! ! 0*!23/#!-2.!61!B/1@!*#!2B*)1.*'-2*1!5#6'31!@1?'-1/!I'*)!-3'1.*!