7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
252! Copyright!©!Acronis!International!GmbH,!2002;2015!
Z'C1@!2!$᢫!I)1&1!2**15$*'.(!*#!&12@!2!E'31!#.!2.!2-*'?T-)#!?#3B51!*)2*!.#!3#.(1&!1C'/*/!I#B3@!
&1/B3*!'.!2!-#&&B$*1@!E'31!61'.(!&12@!&2*)1&!*)2.!2.!1&&#&!61'.(!&1*B&.1@>!
Z'C1@!2!$᢫!I)1&1!*)1!$&1/1.-1!#E!2!5'/-#.E'(B&1@!#&!B.2?2'32631!2-*'?T-)#!?#3B51!-#B3@!-2B/1!
-3'1.*/!*#!*'51!#B*!I)1.!2**15$*'.(!*#!&1*&'1?1!*)1!?#3B51!3'/*>!
Z'C1@!2!5'/312@'.(!51//2(1!'.!*)1!"3'1.*!H2.2(151.*!,@5'.'/*&2*#&!'E!2!$&#E'31!I2/!-#.E'(B&1@!*#!
)2?1!g,$$!$2//I#&@!5B/*!-#.*2'.!-#5$31C!-)2&2-*1&/g!(&12*1&!*)2.!*)1!gH'.'5B5!$2//I#&@!31.(*)g>!
Z'C1@!2!$᢫!I)1.!*)1!-3'1.*!52.2(151.*!/1&?1&!I2/!-#.E'(B&1@!*#!B/1!2!.#.;@1E2B3*!$#&*!R'>1>!
.#*!$#&*!a:::S!2.@!*)1!/1&?1&!I2/!B$(&2@1@>!F)1!E'&/*!*'51!*)1!52.2(151.*!/1&?1&!I#B3@!&B.!2E*1&!
B$(&2@1!'*!I#B3@!2**15$*!*#!B/1!$#&*!a:::!&2*)1&!*)2.!*)1!-#.E'(B&1@!$#&*>!
H#@'E'1@!*)1!51//2(1!'.!*)1!"3'1.*!H2.2(151.*!,@5'.'/*&2*#&!I)1.!&15#?'.(!2!-B&&1.*3%!52.2(1@!
-3'1.*!E!*)1!@1?'-1/!3'/*!*#!'.@'-2*1!*)2*!*)1!-3'1.*!52%!2B*#52*'-233%!&11.!!2*!2!32*1&!*'51!'E!
1.ഗ.*!V0U/!2&1!.#*!61'.(!B/1@>!
Z'C1@!2!$᢫!I)1&1!*)1!"3'1.*!H2.2(151.*!,@5'.'/*&2*#&!-#B3@!@'/$32%!2.!1&&#&!'E!2!$&#E'31!I2/!
-#.E'(B&1@!*#!B/1!2!)#51!E#3@1&!I'*)!2.!15$*%!-B/*#5!$2*)>!
Z'C1@!2!$᢫!I)1&1!:;6%*1!E'31/!I#B3@!E2'3!*#!@#I.3#2@!#&!/%.-!I'*)!2!W@1?'-1!.#*!&12@%W!1&&#&>!
"#.*1.*!/12&-)!'/!.#I!2B*#52*'-233%!@'/2631@!#.!2-*'?T-)#!2.@!M)2&1V#'.*!?#3B51/!/'.-1!-#.*1.*!
/12&-)!'/!.#*!2?2'32631>!
Z'C1@!2!$᢫!I)1&1!B/1&/!I'*)!152'3!2@@&1//!61('..'.(!I'*)!B.@1&/-#&1!R1>(>!
WvB/1&n1C25$31>-#5WS!-#B3@!E2'3!*#!&1-1'?1!1.ഗ.*!'.?'*2*'#./>!
"3'1.*!H2.2(151.*!,@5'.'/*&2*#&!.#I!&1*B&./!2!61**1&!1&&#&!51//2(1!*)2.!WB.D.#I.!&1/B3*W!'E!*)1!
AP,V!/1&?1&!&1fB'&1/!MMA>!
Z'C1@!2!$᢫!I)1&1!/1//'#./!-#B3@!*'51!#B*!I)'31!@#I.3#2@'.(!?1&%!32&(1!E'31/>!
Z'C1@!2!$᢫!I)1&1!-#.E'(B&'.(!2.!2//'(.1@!E#3@1&!I'*)!2.!'.?23'@!$2*)!R1>(>!W"\rE##r62&WS!-#B3@!
-2B/1!*)1!L/1&/!$2(1!*#!/)#I!*)1!1&&#&!W-2.g*!5#@'E%!E&#d1.!/*&'.(W>!
Z'C1@!2!$᢫!I)1&1!/131-*'.(!*)1!WJ1'.@1C!233!?#3B51/W!6B**#.!'.!*)1!5#6'3T-)#!,@5'.'/*&2*#&!
I#B3@!(1.1&2*1!2.!'.?23'@!1&&#&!51//2(1>!
Z'C1@!2!$᢫!I)1&1!E'3*1&'.(!#.!2!L.'-#@1!/*&'.(!'.!*)1!"3'1.*!H2.2(151.*!,@5'.'/*&2*#&!-#B3@!
(1.1&2*1!2.!W'.-#5$2*'631!-)2&2-*1&!1.-#@'.(/W!1&&#&>!
M)2&1V#'.*!WO'D'!V2(1!42331&%W!3'6&2&'1/!2&1!.#I!&15#?1@!E!/'*1!1.B51&2*'#./!61-2B/1!*)1%!2&1!
.#*!/B$$#&*1@!6%!5#6'3T-)#>!
Z'C1@!2!$᢫!I)1&1!.1I!$&#E'31!/1**'.(/!-#B3@!61-#51!-#&&B$*1@!#.!B$(&2@1>!
Z'C1@!2!$᢫!I)1&1!2!M)2&1V#'.*!@#-B51.*!3'6&2&%!?#3B51!I#B3@!E2'3!*#!I#&D!'E!*)1!@#-B51.*!
3'6&2&%!.251!I2/!LJA!1.-#@1@8!1>(>!WH%j9:A'6&2&%W>!
!
.#:'4=1)#!ZWaWi!`@-4-,2-P!>1*#:-&!\ab\c!
=Qd0Q"=E=QN+P!
,@@1@!/B$$#&*!E#&!M)2&1V#'.*!-B/*#5!@#-B51.*!3'6&2&'1/>!