7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
251! Copyright!©!Acronis!International!GmbH,!2002;2015!
Z'C1@!2!$᢫!I)1&1!*)1!/1&?1&!-)1-D!E#&!E&11!@'/D!/$2-1!'.!2!E#3@1&!I#B3@!'.-#&&1-*3%!-)1-D!*)1!
E&11!/$2-1!2*!*)1!&##*!#E!*)1!5#6'3T-)#!?#3B51>! ! !
Z'C1@!2!$᢫!I)1&1!#$1.!E'31!)2.@31/!I#B3@!.#*!61!-3#/1@!E#&!9`!)#B&/!'E!2!-3'1.*!@'/-#..1-*1@!'.!
*)1!5'@@31!#E!2!E'31!*&2./E1&>! ! F)1/1!)2.@31/!I'33!.#I!61!-3#/1@!I)1.!*)1!/1//'#.!*'51/!#B*8!2E*1&!<=!
5'.B*1/>!
Z'C1@!2!$᢫!I)1&1!*)1!W,33#I!'FB.1/!2.@!'"3#B@!*#!62-D!B$!3#-233%!/*#&1@!5#6'3T-)#!E'31/W!$&#E'31!
/1**'.(!I#B3@!23I2%/!&1?1&*!*#!1.2631@!2E*1&!/2?'.(!52.2(151.*!$&#E'31>!
!
.#:'4=1)#!ZWb!`@-4-,2-3P!?-1-.:-&!\ab\c!
=Qd0Q"=E=QN+P!
,@@1@!2.!23*1&.2*'?1!-3'1.*!52.2(151.*!/1&?1&!2B*)1.*'-2*'#.!51-)2.'/5!/#!*)2*!5#6'3T-)#!-3'1.*/!
*)2*!2&1!-#.E'(B&1@!*#!.#*!/2?1!-&1@1.*'23/!E#&!2//'(.1@!/1&?1&/!2.@!E#3@1&/!-2.!2B*)1.*'-2*1!*#!*)1!
52.2(151.*!/1&?1&!*#!&1*&'1?1!*)1'&!$&#E'31!I'*)#B*!&1fB'&'.(!*)1'&!,-*'?1!P'&1-*#&%!$2//I#&@!61!
/*#&1@!#.!*)1!@1?'-1>!
H#@'E'1@!*)1!2$$!$2//I#&@!&1/1*!$&#-1//>!F)'/!I2/!.1-1//2&%!*#!/B$$#&*!*)1!.1I!-B/*#5!#.;@1?'-1!
1.-&%$*'#.!*)2*!'/!'.-3B@1@!'.!*)1!5#6'3T-)#!`><!-3'1.*!2$$>!0E!2!52.2(1@!-3'1.*!E#&(1*/!*)1'&!2$$!
$2//I#&@8!*)1%!.#I!$&#?'@1!*)1'&!2@5'.'/*&2*#&!I'*)!2!-#@1!(1.1&2*1@!6%!*)1!2$$>!F)1!2@5'.'/*&2*#&!
1.*1&/!*)'/!-#@1!'.*#!*)1!5#6'3T-)#!"3'1.*!H2.2(151.*!I16!-#./#31!2.@!&1-1'?1/!2!/1-#.@!-#@1!
*)2*!*)1%!('?1!62-D!*#!*)1!-3'1.*>!F)'/!-#@1!233#I/!*)1!B/1&!*#!&1/1*!*)1'&!2$$!$2//I#&@!2.@!(1*!'.*#!
*)1!2$$>!
T.)2.-1@!*)1!I2%!&1/#B&-1/!R/1&?1&/!2.@!E#3@1&/S!2&1!$&#?'/'#.1@!*#!-3'1.*/>! ! V&#?'/'#.1@!&1/#B&-1/!
2&1!.#!3#.(1&!2//'(.1@!@'&1-*3%!*#!B/1&K(&#B$!$&#E'31/>!L/1&/!#&!(&#B$/!2&1!.#I!2//'(.1@!@'&1-*3%!*#!
'.@'?'@B23!2//'(.1@!&1/#B&-1/!2.@!12-)!B/1&!&1-1'?1/!*)1!EB33!-#331-*'#.!#E!&1/#B&-1/!2//'(.1@!*#!*)1'&!
B/1&!2--#B.*!#&!2!(&#B$!*)1%!2&1!2!51561&!#E>!
,@@1@!*)1!26'3'*%!*#!/1.@!B$!*#!*)&11!1.ഗ.*!'.?'*2*'#./!*#!*)1!/251!152'3!2@@&1//!2B*#52*'-233%!
E#&!B/1&/!I'*)!5B3*'$31!@1?'-1/>!
,@@1@!2!-#3B5.!*#!*)1!AP,V!/12&-)!*2631!E#&!P'/*'.(B'/)1@!U251!/#!*)2*!B/1&/!I'*)!*)1!/251!.251!
'.!@'EE1&1.*!/B6@#52'./!-2.!61!@'/*'.(B'/)1@>!
,@@1@!.1I!52.2(151.*!$&#E'31!/1**'.(!*#!233#I!#&!@'/233#I!B/1&/!E!#$1.'.(!2.@K#&!/1.@'.(!3'.D/!
*#!E'31/>!
,@@1@!-3'1.*!4##@!P%.25'-/!/*2*B/!'.!*)1!52.2(151.*!/1&?1&!P1?'-1/!3'/*>! ! P1?'-1/!1.ŋ@!I'*)!
4##@!P%.25'-/!I'33!.#!3#.(1&!)2?1!*)1!WJ1/1*!,$$!V2//I#&@W!#$*'#.!2?2'32631>!F)1!2$$!$2//I#&@!'/!
52.2(1@!I'*)'.!*)1!4##@!"#.*!-#./#31!'.!*)'/!/-1.2&'#>!
!
R<5!9CG=+P!
Z'C1@!2!$᢫!I)1&1!)'@'.(!'.2--1//'631!E'31/!#.!&1/)2&1/!I)1.!#.1!#E!*)1!?#3B51/!I2/!2!
M)2&1V#'.*!?#3B51!-#B3@!-2B/1!/#51!#E!*)1!?#3B51/!*#!E2'3!*#!2$$12&!#.!*)1!-3'1.*>!
Z'C1@!2!$᢫!I)1&1!*)1!"3'1.*!H2.2(151.*!,@5'.'/*&2*#&!-#B3@!E2'3!*#!E'3*1&!*)1!@1?'-1/!#&!
'.?'*2*'#./!*2631/8!#&!-#B3@!*2D1!2!?1&%!3#.(!*'51!*#!-#5$31*1!*)1!E'3*1&>!Z'3*1&'.(!'/!.#I!@#.1!I'*)#B*!
*)1!.11@!*#!$1&E#&5!2@@'*'#.23!AP,V!&1fB1/*/>!