7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
259! Copyright!©!Acronis!International!GmbH,!2002;2015!
!!!!!!!!
7mTYvAQ",AvH,"70UTrMYMFTHr"B&&1.*"#.*M1*r/1&?'-1/r5#6'3T-)#rV2&251*1&/`rJ1E&1/)2631rV
1dr7'@10.2--1//'6310*15/Q.J1/)2&1/!
!
R<5!9CG=+P!
Z'C1@!2!$᢫!I)1&1!*)1!5#6'3T-)#!"3'1.*!H2.2(151.*!/1&?1&!I#B3@!.#*!$&#$1&3%!-23-B32*1!2.!
,-*'?1!P'&1-*#&%!)#51!@'&1-*#&%!$2*)!'E!*)1!2//#-'2*1@!gU1*I#&D!&1/)2&1!$2*)!52$$'.(g!'.-3B@1@!2!
*&2'3'.(!62-D/32/)>!
Z'C1@!2!$᢫!I)1&1!*)1!5#6'3T-)#!"3'1.*!H2.2(151.*!/1&?1&!I#B3@!.#*!$&#$1&3%!-23-B32*1!2.!
,-*'?1!P'&1-*#&%!)#51!@'&1-*#&%!$2*)!*)2*!#.3%!'.-3B@1@!2!/1&?1&!2.@!/)2&1!.251>!R'>1>!
rr/1&?1&.251r/)2&1.251S!
Z'C1@!2!$᢫!*)2*!-#B3@!$&1?1.*!.1*I#&D!&1/)2&1!?#3B51/!-#.E'(B&1@!I'*)!$2*)/!*#!*)1!&##*!#E!2!
/1&?1&!R'>1>!rr/1&?1&.251S!E!2$$12&'.(!$&#$1&3%!'.!*)1!5#6'3T-)#!-3'1.*>!
5#6'3T-)#!-3'1.*/!.#I!23I2%/!3#(!'.*#!$&#?'/'#.1@!/1&?1&/!B/'.(!EB33%!fB23'E'1@!@#52'.!2--#B.*/>!0.!
$&1?'#B/!?1&/'#./!#E!5#6'3T-)#8!*)1!-&1@1.*'23/!1.*1&1@!2*!1.ഗ.*!*'51!I#B3@!61!B/1@!*#!
2B*)1.*'-2*1!I'*)!E'31!/1&?1&/8!1?1.!'E!*)1/1!-&1@1.*'23/!@'@!.#*!'.-3B@1!2!@#52'.!.251!R1>(>!
@#52'.rB/1&S>!F)'/!-#B3@!-2B/1!$᢫/!'E!*)1!$&#?'/'#.1@!/1&?1&!I2/!#.!2!@'EE1&1.*!@#52'.!*)2.!
*)1!52.2(151.*!/1&?1&!2.@!2--1//!*#!*)1!/1&?1&!'.!*)1!/1-#.@2&%!@#52'.!&13'1@!#.!2!@#52'.!*&B/*!
I'*)!*)1!$&'52&%!@#52'.>!F)'/!61)2?'#&!-2.!61!&1?1&*1@!*#!*)1!$&1?'#B/!@1E2B3*!6%!/1**'.(!*)1!
E#33#I'.(!&1('/*&%!?23B1!*#!:!2.@!&1/*2&*'.(!*)1!/1&?'-1\!
!!!!!!!!
7mTYvAQ",AvH,"70UTrMYMFTHr"B&&1.*"#.*M1*r/1&?'-1/r5#6'3T-)#rV2&251*1&/`rJ1E&1/)2631rV
1drP#52'.,.@L/1&.251M)#B3@[1M1.*F#"3'1.*!
!
Z'C1@!2!$᢫!I)1&1!*)1!5#6'3T-)#!"3'1.*!H2.2(151.*!/1&?1&!@'@!.#*!$&#$1&3%!/#&*!WA2/*!-#.*2-*!
@2*1W!$&#$1&3%!#.!*)1!P1?'-1/!$2(1>!
Z'C1@!2!$᢫!'.!*)1!5#6'3T-)#!,@5'.'/*&2*#&!I)1&1!*)1!713$!6B**#.!I#B3@!.#*!2@NB/*!$&#$1&3%!2/!
*)1!L/1&/!I'.@#I!I2/!&1/'d1@>!
!
.#:'4=1)#!iWa!`@-4-,2-3P!>1*#:-&!\abbc!
=Qd0Q"=E=QN+P!
"1.*&233%!52.2(1@!@1?'-1!1.ഗ.*>!"3'1.*!1.ഗ.*!'.?'*2*'#./!2&1!.#I!(1.1&2*1@!2.@!152'31@!
*#!*)1!B/1&!E!*)1!5#6'3T-)#!"3'1.*!H2.2(151.*!,@5'.'/*&2*#&>!F)1/1!'.?'*2*'#./!'.-3B@1!2!
#.1;*'51!B/1!V0U!.B561&!&1fB'&1@!E#&!-3'1.*!1.ഗ.*>! !
J15#*1!I'$1!2.@!&15#*1!&1/1*!#E!2$$!$2//I#&@/!'/!.#I!$1&E#&51@!#.!2!$1&;@1?'-1!62/'/>!
0.@'?'@B23!@1?'-1!/*2*B/!'/!.#I!@'/$32%1@!'.!*)1!5#6'3T-)#!"3'1.*!H2.2(151.*!,@5'.'/*&2*#&>!F)'/!
'.-3B@1/!@1?'-1!B/1&!.2518!@1?'-1!.2518!@1?'-1!*%$18!'QM!?1&/'#.8!5#6'3T-)#!?1&/'#.8!5#6'3T-)#!
/*2*B/8!32/*!-#.*2-*!*'51>!
L/1&/g!,-*'?1!P'&1-*#&%!2//'(.1@!.1*I#&D!)#51!E#3@1&/!-2.!.#I!61!2B*#52*'-233%!@'/$32%1@!'.!*)1!
5#6'3T-)#!-3'1.*!2$$>!