7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
258! Copyright!©!Acronis!International!GmbH,!2002;2015!
Z'C1@!2!$᢫!I)1&1!5#6'3T-)#!-#B3@!E2'3!*#!'./*233!#&!&B.!#.!/%/*15/!5'//'.(!2!/%/*15!PAA!
R.#&523'd>@33S>!
Z'C1@!2!$᢫!I)1&1!*)1!-3'1.*!-#B3@!E2'3!*#!-#$%!2!E'31!*#!*)1!/1&?1&!'E!*)1!B/1&!2--#B.*!@'@!.#*!
)2?1!$1&5'//'#.!*#!-23-B32*1!*)1!25#B.*!#E!E&11!/$2-1!#.!*)1!?#3B51>! ! F)1!-3'1.*!I#B3@!&1$#&*!2.!
1&&#&!26#B*!*)1&1!.#*!61'.(!1.#B()!E&11!/$2-1!#.!*)1!?#3B51>!
J15#?1@!1C*&2.1#B/!3#(('.(!E!*)1!5#6'3T-)#!AQ4>FXF!E'31>!
Z'C1@!2!$᢫!I)1&1!E#3@1&/!-#B3@!.#*!61!$&#?'/'#.1@!E#&!/1&?1&/!I)#/1!@'/$32%!.251!-#.*2'.1@!
$2&1.*)1/1/>!
!
.#:'4=1)#!iWb!`@-4-,2-3P!Q#;-.:-&!\abbc!
=Qd0Q"=E=QN+P!
"3'1.*!52.2(151.*!$&#E'31/!-2.!.#I!61!-#.E'(B&1@!I'*)!*)1!E#33#I'.(!.1I!/1**'.(/\!
!!!!!!!!;!F)1!.B561&!#E!'.-#&&1-*!2$$!$2//I#&@!2**15$*/!*)2*!-2.!61!52@1!61E#&1!*)1!3#-23!@2*2!
!!!!!!!!!!I'*)'.!*)1!5#6'3T-)#!2$$!'/!2B*#52*'-233%!I'$1@>!F)'/!E12*B&1!'/!@'/2631@!6%!@1E2B3*>!
!!!!!!!!;!O)1*)1&!*)1!B/1&!'/!&1fB'&1@!*#!-#.E'&5!61E#&1!/%.-'.(!#--B&/!R#$*'#./!2&1\!
!!!!!!!!!!W,3I2%/W8!WU1?1&W8!2.@!WQ.3%!#.!a4WS>!
!!!!!!!!;!O)1*)1&!/%.-'.(!'/!233#I1@!2.%!*'518!#&!#.3%!I)'31!#.!O'Z'!.1*I#&D/>!
!!!!!!!!;!"3'1.*!*'51#B*!E#&!B.&1/$#./'?1!/1&?1&/!.#I!2--1$*/!2@@'*'#.23!?23B1/!#E!_:8!<9:!2.@!<b:!
/1-#.@/>!
F)1!5#6'3T-)#!"3'1.*!H2.2(151.*!/1&?1&!-2.!.#I!61!-#.E'(B&1@!*#!-#55B.'-2*1!I'*)!,-*'?1!
P'&1-*#&%!?'2!/1-B&1!AP,V>! ! ! ! ! ! !
V&#E'31/!.#I!@1E2B3*!*#!233#I!E'31/!*#!61!-2-)1@!#.!*)1!3#-23!@1?'-1>! ! 0E!-2-)'.(!'/!@'/2631@!#&!'E!*)1!
W,33#I!E'31/!*#!61!/*#&1@!#.!*)'/!@1?'-1W!/1**'.(!'/!@'/2631@8!.#!E'31/!I'33!61!-2-)1@>!
F)1!*1C*!#E!1.ഗ.*!'.?'*2*'#.!152'3/!-2.!61!-B/*#5'd1@>! ! V312/1!?'/'*!*)1!4&#B$A#('-!m.#I31@(1!
[2/1!E#&!5#&1!'.E#&52*'#.\!)**$\KK/B$$#&*>(&#B$3#('->-#5Ku$qa]`_!
,@@1@!2!/1**'.(!*#!*)1!52.2(151.*!-#.E'(B&2*'#.!E'31!*#!-#.*!*)1!.251!*)2*!1.ഗ.*!'.?'*2*'#.!
152'3/!2$$12&!E!R1>(>!W5#6'3T-)#!0.?'*2*'#.!y5#6'3T-)#v'.?'*2*'#.n1C25$31>-#5oW>! ! G1&/'#.!
a>:!#.3%!233#I1@!2.!2@@&1//!*#!61!/$1-'E'1@!R1>(>!W5#6'3T-)#v'.?'*2*'#.n1C25$31>-#5WS>!
F)1!G,A0PvAQ40UvU,HTM!E'13@!#E!*)1!52.2(151.*!-#.E'(B&2*'#.!E'31!.#I!/B$$#&*/!,-*'?1!P'&1-*#&%!
(&#B$/!'.!2@@'*'#.!*#!/$1-'E'-!B/1&/!*)2*!-2.!2@5'.'/*1&!*)1!5#6'3T-)#!"3'1.*!H2.2(151.*!/1&?'-1>!
")2.('.(!MHFV!/1**'.(/!I'*)'.!*)1!52.2(151.*!-#.E'(B&2*'#.!E'31!.#!3#.(1&!&1fB'&1/!2!&1/*2&*!#E!*)1!
5#6'3T-)#!"3'1.*!H2.2(151.*!/1&?'-1>!
V&#E'31/!E#&!B/1&/!2.@!(&#B$/!*)2*!.#!3#.(1&!1C'/*!'.!,-*'?1!P'&1-*#&%!2&1!.#I!52&D1@!2/!/B-)!'.!*)1!
5#6'3T-)#!"3'1.*!H2.2(151.*!/1&?'-1>!
,@@1@!*)1!26'3'*%!*#!/)#I!'.2--1//'631!'*15/!#.3%!#.!&1/)2&1!?#3B51/>! ! F)'/!-2.!61!B/1EB3!'.!-2/1/!
I)1&1!@1*1&5'.'.(!E'31!2.@!E#3@1&!2--1//'6'3'*%!'/!-2B/'.(!$1&E#&52.-1!$᢫/>! ! F)'/!61)2?'#&!-2.!
61!2@NB/*1@!6%!5#@'E%'.(!*)1!E#33#I'.(!&1('/*&%!/1**'.(!2.@!&1/*2&*'.(!*)1!/1&?'-1\!