7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
260! Copyright!©!Acronis!International!GmbH,!2002;2015!
M$1-'E'-!5#6'3T-)#!/)2&1@!?#3B51/!#&!E#3@1&/!I'*)'.!/)2&1@!?#3B51/!-2.!.#I!61!2//'(.1@!*#!B/1&!#&!
(&#B$!$&#E'31/>!F)1/1!/)2&1@!?#3B51/!#&!E#3@1&/!2&1!*)1.!2B*#52*'-233%!@'/$32%1@!'.!*)1!5#6'3T-)#!
-3'1.*!2$$>!
M)2&1@!?#3B51/!#&!E#3@1&/!2//'(.1@!*#!B/1&!#&!(&#B$!$&#E'31/!-2.!61!-#.E'(B&1@!*#!2B*#52*'-233%!
#.1;I2%!/%.-!E!/1&?1&!*#!5#6'3T-)#!-3'1.*8!52D'.(!*)1!-#.*2'.1@!E'31/!2?2'32631!E#&!#.3'.1!#&!
#EE3'.1!B/1>!
!
!
R<5!9CG=+P!
Z'C1@!2!$᢫!I)1&1!*)1!5#6'3T-)#!/1&?1&!I#B3@!.#*!$&#$1&3%!&1$#&*!E&11!/$2-1!E#&!
/1&?1&;*#;/1&?1&!-#$'1/>!
05$&#?1@!1&&#&!51//2(1/!2.@!$&#-1//'.(!'E!2!B/1&!2**15$*/!*#!-#$%!#&!5#?1!E'31/!'.*#!*)1!&##*!#E!2!
.1*I#&D!&1/)2&1>!
Z'C1@!2!$᢫!I)1&1!2!B/1&!-#B3@!61!2B*)1.*'-2*1@!I'*)!,P!6%!-#.*2-*'.(!5#6'3T-)#!?'2!2!I16!
6&#I/1&>! ! F)'/!-#B3@!-2B/1!2!B/1&!2--#B.*!*#!61-#51!3#-D1@>!
05$&#?1@!*)1!/$11@!#E!'./*2332*'#.8!$2&*'-B32&3%!E#&!B$(&2@1/>!
Z'C1@!2!$᢫!I)1&1!E'31/!2.@!E#3@1&/!1.@'.(!2!$1&'#@!#&!/$2-1!-#B3@!E2'3!*#!-#$%!$&#$1&3%>!
Z'C1@!2!$᢫!3#(('.(!'.*#!*)1!52.2(151.*!L0!I'*)!2!B/1&.251!-#.*2'.'.(!.B561&/8!1>(>!
W1<9a`=W>!
L$@2*1@!Q$1.MMA!3'6&2&%!*#!32*1/*!?1&/'#.>! ! Q$1.MMA!3'6&2&'1/!2&1!B/1@!E#&!1.-&%$*'#.>!
!
.#:'4=1)#!\WbWb!`@-4-,2-3P!g64%!\abbc!
R<5!9CG=+P!
Z'C1@!2!6B(!I)1.!3'/*'.(!*)1!-#.*1.*/!#E!E#3@1&/!I)'-)!52%!)2?1!&1/B3*1@!'.!/3#I!$1&E#&52.-1!#&!
-3'1.*!*'51#B*/!'E!52.%!#E!*)1!E#3@1&/!I1&1!.#*!2--1//'631!*#!*)1!-3'1.*>!
!
.#:'4=1)#!\WbWa!`@-4-,2-3P!g64%!\abbc!
=Qd0Q"=E=QN+P!
,@@1@!*)1!26'3'*%!*#!-&12*1!5#6'3T-)#!/)2&1/!*)2*!&1/)2&1!@2*2!#.!2!&15#*1!/%/*15>! ! F)1!5#6'3T-)#!
&1/)2&1!E12*B&1!'/!#.3%!2?2'32631!E#&!-B/*#51&/!I'*)!2.!1.*1&$&'/1!3'-1./1>! ! J1/)2&1/!-2.!61!2!
$2&*'-B32&!/)2&1!R1>(>!Wrr/1&?1&r/)2&1WS!#&!2.!1.*'&1!/1&?1&!RWrr/1&?1&rWS>!
F)1!5#6'3T-)#!-3'1.*!-2.!.#I!$1&E#&5!-#$%!2.@!5#?1!#$1&2*'#./!#.!E#3@1&/!I)1.!-#..1-*1@!*#!2!
/1&?1&!&B..'.(!5#6'3T-)#!M1&?1&!9><!#&!32*1&8!2.@!*)1!52.2(151.*!L0!.#I!)2/!/1**'.(/!*#!233#I!#&!
@'/233#I/!*)1/1!#$1&2*'#./>!
F)1!52.2(151.*!L0!.#I!)2/!*)1!26'3'*%!*#!2@@!2!.1I!(&#B$!#&!B/1&!B/'.(!/1**'.(/!E!2.!1C'/*'.(!
B/1&!#&!(&#B$>!