7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
254! Copyright!©!Acronis!International!GmbH,!2002;2015!
Z'C1@!2!$᢫!I)1&1!B/1&/!-#B3@!E2'3!*#!2B*)1.*'-2*1!I'*)!M)2&1V#'.*!?#3B51/!'E!*)1'&!B/1&.251!
-#.*2'.1@!L.'-#@1!-)2&2-*1&/!2.@!2B*)1.*'-2*'#.!I2/!$1&E#&51@!B/'.(!UFAH>!
Z'C1@!2!$᢫!I)1&1!B/1&/!-#B3@!E2'3!*#!2B*)1.*'-2*1!I'*)!M)2&1V#'.*!?#3B51/!'E!*)1!B/1&!I2/!2!
51561&!#E!2!/B6@#52'.!2.@!2B*)1.*'-2*'#.!I2/!$1&E#&51@!B/'.(!UFAH>!
M)2&1V#'.*!@#-B51.*!3'6&2&'1/!I'33!.#I!@'/$32%!233!'*15/8!&1(2&@31//!#E!*)1!/1**'.(/!#E!*)1!3'6&2&%g/!
@1E2B3*!?'1I>!
F)1!WA2/*!"#.*2-*!F'51W!-#3B5.!#.!*)1!P1?'-1/!$2(1!#E!*)1!5#6'3T-)#!"3'1.*!H2.2(151.*!/1&?1&!
.#I!$&#$1&3%!/#&*/!6%!@2*1>!
Z'3*1&/!'.!*)1!5#6'3T-)#!"3'1.*!H2.2(151.*!/1&?1&!.#I!I#&D!$&#$1&3%!I'*)!L.'-#@1!-)2&2-*1&/>!
Z'3*1&/!'.!*)1!5#6'3T-)#!"3'1.*!H2.2(151.*!/1&?1&!.#I!W/*'-DW!2E*1&!$2('.2*'#.!/1**'.(/!2&1!-)2.(1@>!
P'/2631@!*)1!W0.@1C1@!M12&-)W!2.@!W"#.*1.*!M12&-)W!-)1-D6#C1/!I)1.!2@@'.(!#&!1@'*'.(!&1/)2&1!
?#3B51/!'.!*)1!5#6'3T-)#!,@5'.'/*&2*#&8!/'.-1!/12&-)!'/!.#*!/B$$#&*1@!#.!*)#/1!?#3B51/>!
F)1!5#6'3T-)#!,@5'.'/*&2*#&!.#I!2B*#52*'-233%!E'33/!'.!*)1!1C'/*'.(!$2*)!I)1.!1@'*'.(!2!M)2&1V#'.*8!
2-*'?T-)#!#&!&1/)2&1!?#3B51!$2*)>!
F)1!5#6'3T-)#!/1&?1&!.#I!&1*B&./!2!61**1&!1&&#&!-#@1!'E!*)1!B/1&!2**15$*/!*#!#?1&I&'*1!2!E'31!?'2!M2?1!
[2-D!*)2*!'/!-)1-D1@!#B*!*#!2.#*)1&!B/1&>!
!
.#:'4=1)#!ZWa!`@-4-,2-3P!g64%!\ab\c!
=Qd0Q"=E=QN+P!
,@@1@!/B$$#&*!E#&!2--1//'.(!@2*2!'.!M)2&1V#'.*!9::]!2.@!9:<:!@#-B51.*!3'6&2&'1/>! ! !
F)1!5#6'3T-)#!/1&?1&!-2.!.#I!/'5B3*2.1#B/3%!/B$$#&*!2-*'?T-)#!2.@!#*)1&!?#3B51!*%$1/>! ! V&1?'#B/!
?1&/'#./!&1fB'&1@!/I'*-)'.(!'.*#!2-*'?T-)#;#.3%!5#@1!*#!2--1//!2-*'?T-)#!@2*2>!
05$&#?1@!$1&E#&52.-1!#E!*)1!5#6'3T-)#!"3'1.*!H2.2(151.*!/1&?1&!6%!52D'.(!AP,V!fB1&'1/!W61('./!
I'*)W!&2*)1&!*)2.!W-#.*2'./W!6%!@1E2B3*>! ! ,@5'.'/*&2*#&/!52%!-)##/1!W-#.*2'./W!I)1.!/12&-)'.(!*#!
#6*2'.!*)1!$&1?'#B/!61)2?'#&>!
F)1!5#6'3T-)#!"3'1.*!H2.2(151.*!/1&?1&!-2.!.#I!E'3*1&!*)1!'.?'*2*'#./!*2631/!6%!B/1&.251>!
F)1!5#6'3T-)#!"3'1.*!H2.2(151.*!/1&?1&!-2.!.#I!1C$#&*!*)1!@1?'-1/!3'/*!*#!2!>-/?!E'31>!
F)1!5#6'3T-)#!"3'1.*!H2.2(151.*!/1&?1&!.#I!/#&*/!2.@!$2('.2*1/!*)1!@1?'-1/8!B/1&/8!(&#B$/!2.@!
'.?'*2*'#./!*2631/>!
,@@1@!2!$&#E'31!/1**'.(!*#!233#IK@'/233#I!B/1&/!E!-&12*'.(!6##D52&D/>!
,@@1@!2!$&#E'31!/1**'.(!*#!@'/2631!H%!Z'31/!I)'31!/*'33!233#I'.(!/%.-!E#3@1&/>!
,@@1@!2!$&#E'31!/1**'.(!*#!2B*#52*'-233%!3#-D!*)1!5#6'3T-)#!2$$!#&!I'$1!233!5#6'3T-)#!@2*2!'E!*)1!
@1?'-1!@#1/!.#*!-#.*2-*!*)1!52.2(151.*!/1&?1&!E#&!2!/$1-'E'1@!$1&'#@!#E!*'51>!
,@@1@!2!$&#E'31!/1**'.(!*#!$&1?1.*!B/1&/!E!/1**'.(!2.!2$$!$2//I#&@>!
Z'31/!-2.!.#I!61!-#$'1@!I'*)'.!2-*'?T-)#!?#3B51/!6%!*&2./E1&&'.(!@2*2!*)&#B()!*)1!-3'1.*>!
05$&#?1@!$1&E#&52.-1!&12@'.(!2.@!I&'*'.(!*#!2-*'?T-)#!?#3B51/>!