7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
41! Copyright!©!Acronis!International!GmbH,!2002;2015!
$&1/1.*!@131(2*1@!-&1@1.*'23/!*#!%#B&!M)2&1V#'.*!/1&?1&!#.!61)23E!#E!%#B!B/1&/>!T.263'.(!*)1!
,-&#.'/!,--1//!O'.@#I/!/1&?1&!*#!$1&E#&5!m1&61&#/!P131(2*'#.\!
<> 0.!01*';-!?'&-1*#&%!<2-&2!,/3!"#.$6*-&28!3#-2*1!*)1!O'.@#I/!/1&?1&!#&!/1&?1&/!*)2*!%#B!
)2?1!*)1!42*1I2%!M1&?1&!'./*2331@!#.>!F)1%!2&1!-#55#.3%!'.!*)1!"#.$6*-&2!E#3@1&>!
9> Q$1.!*)1!7&#$-&*'-2!I'.@#I!E#&!*)1!O'.@#I/!/1&?1&!2.@!/131-*!*)1!?-4-(,*'#/!*26>!
a> M131-*!N&62*!*)'2!1#.$6*-&!F#&!3-4-(,*'#/!*#!2$-1'F'-3!2-&;'1-2!#/4%!
`> M131-*!<2-!,/%!,6*)-/*'1,*'#/!$&#*#1#48!*)'/!'/!&1fB'&1@!E#&!.1(#*'2*'#.!I'*)!*)1!M)2&1V#'.*!
/1&?1&>!
=> Y#B!5B/*!.#I!2@@!2.%!M)2&1V#'.*!/1&?1&/!*)2*!%#B!I#B3@!3'D1!%#B&!B/1&/!*#!61!2631!*#!2--1//!
B/'.(!,-&#.'/!,--1//!>!0E!%#B&!M)2&1V#'.*!'5$3151.*2*'#.!-#./'/*/!#E!5B3*'$31!3#2@!6232.-1@!
.#@1/8!%#B!I'33!.11@!*#!2@@!12-)!M)2&1V#'.*KO'.@#I/!.#@1!*#!*)'/!3'/*!#E!$1&5'**1@!
-#5$B*1&/>!"3'-D!033WWW!*#!/12&-)!E#&!*)1/1!O'.@#I/!-#5$B*1&/!'.!,P!2.@!2@@!*)15>!Z#&!
12-)8!%#B!I'33!.11@!*#!/131-*!*)1!W)**$W!/1&?'-1!*%$1!#.3%>!
!
!"#$%!C'#%(#!%'')7!VD!$ )!PY!B&*/$#(!3).!$1#(#!-1%*+#!$)!<.)<%+%$#!$ 1.)/+1!,"!%*0!>#!%<<'�!>#3).#!
$#($&*+!-'&#*$!-)**#-$&:&$84!H1#8!7&''!*)$!$%E#!#33#-$!&BB#0&%$#'84 !
044#8!1#//-1*'#/2!*#!+),&-7#'/*!2-&;-&2!62'/(!2-4FK2'(/-3!1-&*'F'1,*-2!;!O)1.!1.2631@8!233#I/!
-#..1-*'#./!E!*)'/!42*1I2%!*#!M)2&1V#'.*!/1&?1&/!B/'.(!/13E;/'(.1@!-1&*'E'-2*1/>!
044#8!1#//-1*'#/2!*#!01&#/'2!011-22!2-&;-&2!8'*)!2-4F!2'(/-3!1-&*'F'1,*-2 !;!O)1.!1.2631@8!233#I/!
-#..1-*'#./!E!*)'/!42*1I2%!*#!,-&#.'/!,--1//!/1&?1&/!B/'.(!/13E;/'(.1@!-1&*'E'-2*1/>!
044#8!1#//-1*'#/2!F&#.!01&#/'2!011-22!2-&;-&2!8'*)!2-4F!2'(/-3!1-&*'F'1,*-2!;!O)1.!1.2631@8!
233#I/!-#..1-*'#./!*#!*)'/!42*1I2%!E!,-&#.'/!,--1//!/1&?1&/!B/'.(!/13E;/'(.1@!-1&*'E'-2*1/>!
+)#8!)'33-/!+ER!+),&-2!;!O)1.!1.2631@8!/)#I/!)'@@1.!/%/*15!MH[!/)2&1/!*#!*)1!B/1&/>!
"4'-/*!2-22'#/!*'.-#6*!'/!.'/6*-2!;!M1*/!*)1!*'51!61E#&1!2.!'.2-*'?1!B/1&!'/!D'-D1@!#B*!#E!*)1!
42*1I2%!M1&?1&>!
<2-!62-&!$&'/1'$,4!/,.-!`<7Qc!F#&!,6*)-/*'1,*'#/!8'*)!+),&-7#'/*!+-&;-&2!;!O)1.!1.2631@8!
B/1&/!I'33!2B*)1.*'-2*1!*#!M)2&1V#'.*!/1&?1&/!?'2!*)1'&!B/1&!$&'.-'$23!.251!R1>(>!
)&'/*#n(3'326/>-#5S8!#*)1&I'/1!*)1%!I'33!2B*)1.*'-2*1!I'*)!@#52'.KB/1&.251!R1>(>!
(3'326/K)&'/*#S>!
1.4.4 Licensing!Gateway!Servers!
Z#&!5#&1!'.E#&52*'#.!#.!3'-1./'.(!%#B&!42*1I2%!M1&?1&/8!?'/'*!*)1!A'-1./'.(!R$>!]9S!/1-*'#.>!
1.4.5 Cluster!Grou ps!
0.!,-&#.'/!,--1//!?1&/'#.!=><!#&!.1I1&8!%#B!)2?1!*)1!26'3'*%!*#!-&12*1!2!-3B/*1&!(&#B$!#E!42*1I2%!
M1&?1&/>! !
,!-3B/*1&!(&#B$!'/!2!-#331-*'#.!#E!42*1I2%!M1&?1&/!*)2*!/)2&1!*)1!/251!-#.E'(B&2*'#.>!F)'/!233#I/!%#B!
*#!-#.*!233!#E!*)1!42*1I2%/!'.!*)2*!(&#B$!2*!#.-1!'./*12@!#E!)2?'.(!*#!-#.E'(B&1!*)1!/251!/1**'.(/!
#.!1?1&%!42*1I2%!'.@'?'@B233%>!F%$'-233%!*)1/1!/1&?1&/!2&1!$32-1@!61)'.@!2!3#2@!6232.-1&!*#!$&#?'@1!
)'()!2?2'326'3'*%!2.@!/-2326'3'*%!E#&!5#6'31!-3'1.*/>!
Z#&!2!-3B/*1&1@!(2*1I2%!/1*B$8!%#B!.11@!2!3#2@!6232.-1&8!*I#!#&!5#&1!(2*1I2%/!2.@!2.!,-&#.'/!
,--1//!M1&?1&>!,33!#E!%#B&!42*1I2%!M1&?1&/!/)#B3@!61!2@@1@!*#!2!"3B/*1&!4&#B$!'.!*)1!,-&#.'/!,--1//!
I16!'.*1&E2-1!2.@!$32-1@!61)'.@!*)1!3#2@!6232.-1&>!Y#B&!,-&#.'/!,--1//!M1&?1&!2-*/!2/!6#*)!%#B&!
52.2(151.*!/1&?1&!2.@!*)1!/1&?1&!I'*)!I)'-)!5#6'31!-3'1.*/!1.!!'.!-3'1.*!52.2(151.*>!0*/!!'/!