7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
26! Copyright!©!Acronis!International!GmbH,!2002;2015!
]> ")##/1!*)1!.B561&!#E!@2%/!%#Bg@!3'D1!*)1!'.?'*2*'#.!*#!61!?23'@!E#&!'.!*)1!UB561&!#E!@2%/!B.*'3!
'.?'*2*'#.!1C$'&1/!E'13@>!
b> ")##/1!*)1!.B561&!#E!V0U/!%#Bg@!3'D1!*#!/1.@!*#!12-)!B/1&!#.!*)1!'.?'*2*'#./!3'/*>!F)'/!-2.!61!
B/1@!'.!-2/1/!I)1&1!2!B/1&!52%!9!#&!a!@1?'-1/>!F)1%!I'33!&1-1'?1!'.@'?'@B23!152'3/!-#.*2'.'.(!12-)!
B.'fB1!#.1;*'51;B/1!V0U>! !
!"#$L!,-.)*&(!,--#((!'&-#*(&*+!%'')7(!#%-1!'&-#*(#0!/(#.!$)!%-$&:%$#!/<!$)!@!0#:&-#(F!#%-1!%00&$&)*%'!0#:&-#!
>#8)*0!@!&(!-)/*$#0!%(!%!*#7!/(#.!3).!'&-#*(&*+!</.<)(#(4!
_> ")##/1!*)1!?1&/'#.!#&!?1&/'#./!#E!*)1!,--1//!H#6'31!"3'1.*!*)2*!%#B!I#B3@!3'D1!%#B&!B/1&/!*#!
@#I.3#2@!2.@!'./*233!#.!*)1'&!@1?'-1>!Y#B!52%!-)##/1!'QM8!,.@&#'@8!#&![#*)>!0E!%#B!2&1!B/'.(!
,-&#.'/!,--1//!E#&!4##@!P%.25'-/8!%#B!-2.!/131-*!*)2*!#$*'#.!2.@!%#B&!B/1&/!I'33!#.3%!61!
@'&1-*1@!*#!@#I.3#2@!*)1!4##@!P%.25'-/!?1&/'#.!#E!*)1!,--1//!H#6'31!"3'1.*>!
<:> V&1//!M1.@>! !
!"#$%!23!8)/!+#$! %*!#..).!B#((%+#!71#*!(#*0&*+F!-)*3&.B!$1%$!$1#!9=HC!(#$$&*+(!&* !$1#!9=HC!$%>!/*0#.!
6#*#.%'!9#$$&*+(!%.#!-)..#-$4!,'()F!&3!8)/G.#!/(&*+!C$7('$*7"--$7#1"-F!:#.&38!$1%$!$1#!-#.$&3&- %$#!8)/!%.#!/(&*+!
B%$-1#(!$1# !1)($!*%B#!)3!8)/.!9=HC!(#.:#.4!
!
C/;'*'/(!62-&2!$&-;'#624%!-/,-3!:%!.#:'4=1)#!ZW[!#&!-,&4'-&!
5#6'3T-)#!9>X!@'@!.#*!&1fB'&1!2!V0U!.B561&!*#!1.!!2!-3'1.*!'.!*)1!"3'1.*!H2.2(151.*!/%/*15>!
F)1&1!2&1!*I#!#$*'#./!E#&!5'(&2*'.(!5#6'3T-)#!9>X!-3'1.*/!*#!*)1!,-&#.'/!,--1//!52.2(151.*!/%/*15>!
[%!@1E2B3*8!5#6'3T-)#!/1&?1&/!*)2*!2&1!B$(&2@1@!E!9>X!233#I!-3'1.*/!$&1?'#B/3%!52.2(1@!6%!*)1!
9>X!/1&?1&!*#!2B*#;1.!!2.@!2$$12&!'.!*)1!,-&#.'/!,--1//!?-;'1-2!3'/*!I'*)#B*!)2?'.(!*#!1.*1&!2!V0U!
.B561&>!0E!%#B!I#B3@!3'D1!*#!1./B&1!*)2*!233!@1?'-1/!2--1//'.(!*)1!/%/*15!)2?1!1.ŋ@!I'*)!2!V0U!
.B561&8!%#B!-2.!@'/2631!*)'/!/1**'.(>!0.!*)2*!-2/18!'E!*)1!B/1&!@#1/.g*!)2?1!<2-&!1,/!&-.#;-!E#:'4-!
"4'-/*!F&#.!.,/,(-.-/*!$&'?'31(1/8!*)1!B/1&!I'33!.11@!*#!@131*1!,-&#.'/!,--1//!E!*)1'&!@1?'-1!
2.@!&1'./*233!2!.1I!-#$%!E!*)1!,$$!M*#&1!61E#&1!*)1%!-2.!1.!!B/'.(!2!V0U!.B561&>!
,3/#!.#*1!*)2*!I)1.!*)'/!2B*#;1.!!/1**'.(!'/!1.2631@8!'*!I'33!61!$#//'631!*#!@#!2.!'FB.1/!62-DB$!#E!2!
@1?'-1!&B..'.(!2!52.2(1@!?1&/'#.!#E!5#6'3T-)#!9>X!#&!a>:8!&1/*#&1!*)2*!62-DB$!*#!2!.1I!@1?'-18!2.@!
2/!3#.(!2/!*)1!B/1&!)2/!*)1!2-*'?1!@'&1-*#&%!B/1&.251!2.@!$2//I#&@!E#&!*)1!2//#-'2*1@!2--#B.*8!*)2*!
.1I!@1?'-1!-2.!61!2B*#52*'-233%!1.ŋ@!'.!-3'1.*!52.2(151.*!I'*)#B*!2!V0U!.B561&>!
0*!'/!&1-#551.@1@!*)2*!%#B!@'/2631!*)1!2B*#;1.!!/1**'.(!2E*1&!%#B&!$&1?'#B/3%!52.2(1@!-3'1.*/!
)2?1!233!2--1//1@!*)1!52.2(151.*!/1&?1&!E#&!*)1!E'&/*!*'51>!F)1%!I'33!2$$12&!'.!*)1!P1?'-1/!3'/*!I)1.!
*)'/!)2$$1./>!
F#!233#I!5#6'3T-)#!-3'1.*/!*)2*!I1&1!23&12@%!1.ŋ@!'.!5#6'3T-)#!9>X!"3'1.*!H2.2(151.*!*#!
2B*#52*'-233%!1.!!2E*1&!%#B&!5#6'3T-)#!"3'1.*!H2.2(151.*!/1&?1&!'/!B$(&2@1@!*#!*)1!,-&#.'/!
,--1//!M1&?1&8!1.2631!*)1!044#8!.#:'4=1)#!14'-/*2!$&-;'#624%!.,/,(-3!:%!\WG!2-&;-&2!,/3!.,/,(-3!
.#:'4=1)#!14'-/*2!&-2*#&-3!*#!/-8!3-;'1-2!*#!,6*#K-/,!8'*)#6*!7CQ!/1**'.(>!
1.3.2 User;side!M anage ment !Enro ll ment!Pr oce ss!
T2-)!B/1&!/1.*!2!52.2(151.*!1.ഗ.*!'.?'*2*'#.!I'33!&1-1'?1!2.!152'3!*)2*!-#.*2'./\!
,!3'.D!*#!'./*233!*)1!,--1//!H#6'31!"3'1.*!E!*)1!,$$31!,$$!M*#&1>!
,!3'.D!B/1@!*#!32B.-)!*)1!,--1//!H#6'31!"3'1.*!2$$!2.@!2B*#52*1!*)1!1.ഗ.*!$&#-1//>!
,!#.1;*'51!B/1!V0U!.B561&>!
F)1'&!52.2(151.*!/1&?1&!2@@&1//>!