7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
256! Copyright!©!Acronis!International!GmbH,!2002;2015!
,@@!$&#E'31!/1**'.(/!E#&!233#I'.(K@1.%'.(!*)1!26'3'*%!#E!B/1&/!*#!-&12*1!/%.-!E#3@1&/8!2.@!*#!$1&E#&5!2!
iB'-D#EE'-1€!WM2?1![2-DW>!
F)1!5#6'3T-)#!"3'1.*!H2.2(151.*!/1&?1&!-2.!.#I!61!-#.E'(B&1@!*#!/*#&1!@2*262/1!2.@!$&#E'31!
'.E#&52*'#.!'.!2!@'EE1&1.*!3#-2*'#.!*)2.!*)1!2$$3'-2*'#.!@'&1-*#&%8!233#I'.(!E#&!*)1!52.2(151.*!
/1&?1&!/1&?'-1!*#!61!E2'31@!#?1&!*#!#*)1&!-3B/*1&!.#@1/>!
F)1!5#6'3T-)#!,@5'.'/*&2*#&!.#I!@'/$32%/!*)1!.B561&!#E!3'-1./1/!-B&&1.*3%!61'.(!#--B$'1@8!2.@!I'33!
#.3%!@'/$32%!2!/'.(31!/1//'#.!E#&!12-)!B/1&K@1?'-1!'E!*)1!B/1&!)2/!&1-#..1-*1@!*#!*)1!5#6'3T-)#!/1&?1&!
5B3*'$31!*'51/>!
F)1!5#6'3T-)#!,@5'.'/*&2*#&!.#I!2B*#52*'-233%!&B./!I'*)!131?2*1@!$&'?'31(1/>!
F)1!1.ഗ.*!152'3!/B6N1-*!-2.!.#I!61!-B/*#5'd1@!'.!*)1!g5#6'3T-)#v52.2(151.*>-E(g!E'31>!
!
R<5!9CG=+P!
5#6'3T-)#!.#!3#.(1&!$1&5'*/!,-*'?1!P'&1-*#&%!WP'/*&'6B*'#.W!(&#B$/!*#!61!B/1@!*#!-&12*1!5#6'3T-)#!
"3'1.*!H2.2(151.*!(&#B$!$#3'-'1/>!P'/*&'6B*'#.!(&#B$/!2&1!$&#?'@1@!6%!H'-&#/#E*!E#&!152'3!$B&$#/1/!
#.3%>!0E!%#B!2&1!B/'.(!,P!WP'/*&'6B*'#.W!(&#B$/!E#&!2.%!#E!%#B&!5#6'3T-)#!"3'1.*!H2.2(151.*!$#3'-'1/8!
$312/1!B/1!*)1!W,-*'?1!P'&1-*#&%!L/1&/!2.@!"#5$B*1&/W!-#.*!$2.13!*#!-#.?1&*!*)1/1!(&#B$/!*#!
WM1-B&'*%W!(&#B$/>!
Z'C1@!2!$᢫!I)1&1!2!B/1&!*)2*!B/1@!@'EE1&1.*!B/1&.251!E#&52*/!*#!1.!!I'*)!5B3*'$31!@1?'-1/!
I#B3@!#--B$%!5B3*'$31!3'-1./1/>! ! Z#&!1C25$318!'E!#.1!@1?'-1!I2/!1.ŋ@!2/!WB/1&n1C25$31>-#5W!
2.@!2!/1-#.@!@1?'-1!I2/!1.ŋ@!2/!W1C25$31rB/1&W8!*)1!3'-1./'.(!3#('-!I#B3@!*&12*!*)#/1!2/!*I#!
/1$2&2*1!B/1&!2--#B.*/!E#&!3'-1./'.(!$B&$#/1/>!
Z'C1@!2!$᢫!I)1&1!2!B/1&!-#B3@!E2'3!*#!(1*!*)1!2$$&#$&'2*1!(&#B$!$&#E'31!'E!*)1!B/1&g/!,-*'?1!
P'&1-*#&%!$&'52&%!(&#B$!I2/!.#*!/1*!*#!*)1!@1E2B3*!#E!WP#52'.!L/1&/W>!
Z'C1@!2!$᢫!I)1&1!2!B/1&!-#B3@!E2'3!*#!(1*!*)1!2$$&#$&'2*1!(&#B$!$&#E'31!'E!*)1!B/1&g/!(&#B$!I2/!2!
WB.'?1&/23W!,-*'?1!P'&1-*#&%!(&#B$>!
Z'C1@!2!$᢫!I)1&1!B/1&/!I'*)!L.'-#@1!-)2&2-*1&/!'.!*)1'&!B/1&.251/!I#B3@!.#*!)2?1!*)1'&!
-&1@1.*'23/!/2?1@!2E*1&!1.!'.(!I'*)!5#6'3T-)#!"3'1.*!H2.2(151.*>!
Z'C1@!2!$᢫!I)1&1!*)1!/1&?1&!-#B3@!233#I!5#6'3T-)#!-3'1.*/!*#!#?1&I&'*1!E'31/!*)2*!I1&1!E32((1@!
2/!&12@;#.3%>!
Z'C1@!/#51!5#6'3T-)#!"3'1.*!H2.2(151.*!@'/$32%!'//B1/!#.!H2-!M2E2&'>!
Z'C1@!2!$᢫!I)1&1!G1&'d#.!'V2@!a!@1?'-1/!I1&1!@'/$32%1@!2/!W,FlFW!R2.@!?'-1!?1&/2S!'.!*)1!
5#6'3T-)#!"3'1.*!H2.2(151.*!@1?'-1/!$2(1>!
Z'C1@!2!$᢫!I)1&1!*)1!5#6'3T-)#!,@5'.'/*&2*#&!-#B3@!-&2/)!I)1.!?'1I'.(!*)1!3'/*!#E!-#..1-*1@!
B/1&/>!
Z'C1@!2!$᢫!I)1&1!*)1!'.?'*2*'#.!152'3!I#B3@!E2'3!*#!/)#I!*)1!B/1&.251>!
!
.#:'4=1)#!iW[!`@-4-,2-3P!9-:&6,&%!\ab\c!
=Qd0Q"=E=QN+P!