7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
4! Copyright!©!Acronis!International!GmbH,!2002;2015!
,.%!.B561&!#E!42*1I2%!M1&?1&/!-2.!32*1&!61!2@@1@!*#!*)1!.1*I#&D!2.@!-#.E'(B&1@!E#&!2--1//!E!
*)1!-3'1.*!2$$>!
!
!"#$%!"#$%&'(!)*!&*($%''&*+!,-.)*&(!,--#((!%.#!&*-'/0#0!&*!$1#!2*($%''&*+!(#-$&)*!)3!$1&(!+/&0#4!5)*3&+/.%$&)*!)3!
6%$#7%8!9#.:#.(!%*0!"%$%!9)/.-#(!&(!#;<'%&*#0!&*!$1#!=)>&'#!,--#((!?<4!@A!(#-$&)*4!
0E!%#B!I'/)!*#!&15#*13%!52.2(1!%#B&!,--1//!H#6'31!"3'1.*/8!,-&#.'/!,--1//!"3'1.*!H2.2(151.*!
233#I/!%#B!*#!-&12*1!$#3'-'1/!$1&!,-*'?1!P'&1-*#&%!B/1&!#&!(&#B$>!F)1/1!$#3'-'1/!-2.\!
"#.E'(B&1!(1.1&23!2$$3'-2*'#.!/1**'.(/!
,//'(.!/1&?1&/8!E#3@1&/8!2.@!)#51!@'&1-*#&'1/!*#!61!@'/$32%1@!'.!*)1!-3'1.*!2$$!
J1/*&'-*!I)2*!-2.!61!@#.1!I'*)!E'31/!
J1/*&'-*!*)1!#*)1&!*)'&@!$2&*%!2$$/!*)2*!,--1//!H#6'31!"3'1.*!E'31/!-2.!61!#$1.1@!'.*#!
M1*!/1-B&'*%!&1fB'&151.*/!R/1&?1&!3#('.!E&1fB1.-%8!2$$3'-2*'#.!3#-D!$2//I#&@8!1*->S!
P'/2631!*)1!26'3'*%!*#!/*#&1!E'31/!#.!*)1!@1?'-1!
P'/2631!*)1!26'3'*%!*#!'.-3B@1!,--1//!H#6'31!"3'1.*!E'31/!'.!'FB.1/!62-DB$/!
J15#*13%!&1/1*!2!B/1&g/!2$$3'-2*'#.!3#-D!$2//I#&@!
V1&E#&5!2!&15#*1!I'$1!#E!*)1!,--1//!H#6'31!"3'1.*!2$$g/!3#-23!@2*2!2.@!/1**'.(/!
,.@!52.%!2@@'*'#.23!-#.E'(B&2*'#.!2.@!/1-B&'*%!#$*'#./!
!
Q.3%!#.1!,-&#.'/!,--1//!M1&?1&!'/!&1fB'&1@>! !
,!*%$'-23!.1*I#&D!15$3#%'.(!-3'1.*!52.2(151.*!'.-3B@1/!#.1!/1&?1&!I'*)!*)1!,-&#.'/!,--1//!M1&?1&!
2.@!,-&#.'/!,--1//!42*1I2%!M1&?1&!-#5$#.1.*/!'./*2331@!2.@!/1?1&23!2@@'*'#.23!42*1I2%!M1&?1&/!
2-*'.(!2/!E'31!/1&?1&/>!0.!*)'/!/-1.2&'#8!233!5#6'31!-3'1.*/!2&1!-#.E'(B&1@!*#!61!52.2(1@!6%!*)1!,-&#.'/!
,--1//!M1&?1&8!2.@!I'33!-#.*2-*!*)'/!/1&?1&!12-)!*'51!*)1!,--1//!H#6'31!"3'1.*!2$$3'-2*'#.!'/!/*2&*1@8!
*#!-)1-D!E#&!2.%!-)2.(1@!/1**'.(/!2.@!*#!2--1$*!2$$3'-2*'#.!3#-D!$2//I#&@!&1/1*/!2.@!&15#*1!I'$1!
-#552.@/!'E!.1-1//2&%>!
,--1//!H#6'31!"3'1.*!-3'1.*/!-2.!61!2//'(.1@!2!3'/*!#E!/1&?1&/8!/$1-'E'-!E#3@1&/!I'*)'.!/)2&1@!?#3B51/8!
2.@!)#51!@'&1-*#&'1/!'.!*)1'&!52.2(151.*!$#3'-%>!F)1/1!&1/#B&-1/!I'33!2B*#52*'-233%!2$$12&!'.!*)1!
,--1//!H#6'31!"3'1.*!2$$!2.@!*)1!-3'1.*!2$$!I'33!-#.*2-*!*)1/1!/1&?1&/!@'&1-*3%!2/!.11@1@!E#&!E'31!
2--1//>!
!"#$%!"#$%&'(!)*!#*%>'&*+!%*0!-)*3&+/.&*+!$1#!-'&#*$!B%*%+#B#*$!%.#!&*-'/0#0!&*!$1#!C)'&-&#(!?<4!DA!%*0!
=%*%+&*+!=)>&'#!"#:&-#(!(#-$&)*!)3!$1&(!+/&0#4!