7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
44! Copyright!©!Acronis!International!GmbH,!2002;2015!
!
")2.('.(!V1&5'//'#./!E#&!M)2&1@!Z'31/!2.@!Z#3@1&/!
,-&#.'/!,--1//!B/1/!*)1!1C'/*'.(!O'.@#I/!B/1&!2--#B.*/!2.@!$2//I#&@/>![1-2B/1!,-&#.'/!,--1//!
ĞŶĨŽƌĐĞƐtŝŶĚŽǁƐEd&^ƉĞƌŵŝƐƐŝŽŶƐLJŽƵƐŚŽƵůĚŶŽƌŵĂůůLJƵƐĞtŝŶĚŽǁƐďƵŝůƚ;'.!*##3/!E#&!2@NB/*'.(!
@'&1-*#&%!2.@!E'31!$1&5'//'#./>!F)1!/*2.@2&@!O'.@#I/!*##3/!$&#?'@1!*)1!5#/*!E31C'6'3'*%!E#&!/1**'.(!B$!
%#B&!/1-B&'*%!$#3'-%>!
,-&#.'/!,--1//!P2*2!M#B&-1/!*)2*!&1/'@1!#.!2.#*)1&!MH[K"0ZM!E'31!/1&?1&!2&1!2--1//1@!B/'.(!2.!
MH[K"0ZM!-#..1-*'#.!E!*)1!42*1I2%!M1&?1&!*#!*)1!/1-#.@2&%!/1&?1&!#&!U,M>!0.!*)'/!-2/18!2--1//!*#!
*)1!/1-#.@2&%!/1&?1&!'/!$1&E#&51@!'.!*)1!-#.*1C*!#E!*)1!B/1&!3#((1@!'.*#!*)1!,--1//!H#6'31!"3'1.*!2$$>!
0.!#&@1&!E#&!*)2*!B/1&!*#!)2?1!2--1//!*#!E'31/!#.!*)1!/1-#.@2&%!/1&?1&8!*)1'&!2--#B.*!I'33!.11@!6#*)!
WO'.@#I/!M)2&1!V1&5'//'#./W!2.@!UFZM!/1-B&'*%!$1&5'//'#./!*#!2--1//!*)#/1!E'31/>!
V1&5'//'#./!*#!E'31/!&1/'@'.(!#.!M)2&1V#'.*!/1&?1&/!2&1!&1(B32*1@!'.!2--#&@2.-1!*#!*)1!M)2&1V#'.*!
$1&5'//'#./!-#.E'(B&1@!#.!*)1!M)2&1V#'.*!/1&?1&>!L/1&/!&1-1'?1!*)1!/251!$1&5'//'#./!*)&#B()!
,-&#.'/!,--1//!2/!*)1%!&1-1'?1!I)1.!*)1%!2--1//!M)2&1V#'.*!@#-B51.*!3'6&2&'1/!B/'.(!2!I16!6&#I/1&>!
In#this#section#
Z#3@1&/!>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>!``!
,//'(.1@!M#B&-1/!>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>!`]!
42*1I2%!M1&?1&/!G'/'631!#.!"3'1.*/!>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>!`_!
A1(2-%!P2*2!M#B&-1/>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>!`_!
1.5.1 Folders!
0.!2@@'*'#.!*#!42*1I2%!M1&?1&/8!Z#3@1&/!-2.!23/#!61!2//'(.1@!*#!,-&#.'/!,--1//!B/1&!2.@!(&#B$!
$#3'-'1/8!233#I'.(!*)15!*#!2B*#52*'-233%!2$$12&!'.!2!B/1&g/!,-&#.'/!,--1//!H#6'31!-3'1.*!2$$3'-2*'#.>!
Z#3@1&/!-2.!61!-#.E'(B&1@!*#!$#'.*!*#!2.%!,-&#.'/!,--1//!42*1I2%!M1&?1&8!#&!1?1.!2!/B6@'&1-*#&%!
I'*)'.!2!/)2&1@!?#3B51>!F)'/!233#I/!%#B!*#!('?1!2!B/1&!@'&1-*!2--1//!*#!2.%!E#3@1&/!*)2*!5'()*!61!
'5$#&*2.*!*#!*)15>! ! [%!@#'.(!/#8!*)1%!@#.g*!)2?1!*#!.2?'(2*1!*#!*)1!E#3@1&!6%!D.#I'.(!*)1!1C2-*!
/1&?1&8!/)2&1@!?#3B51!.2518!2.@!$2*)!*#!*)1!E#3@1&>!
Z#3@1&/!-2.!$#'.*!*#!2.%!*%$1!#E!-#.*1.*!*)2*!,-&#.'/!,--1//!'/!$&#?'@'.(!2--1//!*#>!F)1%!/'5$3%!&1E1&!
*#!3#-2*'#./!'.!42*1I2%!M1&?1&/!*)2*!)2?1!23&12@%!611.!-#.E'(B&1@!I'*)'.!*)1!,-&#.'/!,--1//!
52.2(151.*>!F)'/!-2.!61!2!3#-23!E'31!/)2&1!?#3B518!2!W.1*I#&D!&1/)2&1W!?#3B51!$&#?'@'.(!2--1//!*#!
E'31/!#.!2.#*)1&!E'31!/1&?1&!#&!U,M8!2!PZM!/)2&1!#&!2!M)2&1V#'.*!?#3B51>!
!"#$%!W1#*!-.#%$&*+!%!"O9!"%$%!9)/.-#!8)/!*# #0!$)!%00!$1#!3/''!<%$1!$)!$1#!"O9!'&E#!()L!
HH7"/),-9G7"/H-,/$2),7$H2=,'$!
!
Z#3@1&/!-2.!#$*'#.233%!61!-#.E'(B&1@!*#!/%.-!*#!*)1!-3'1.*!@1?'-1>!F)1!,--1//!H#6'31!"3'1.*!E#3@1&!/%.-!
#$*'#./!'.-3B@1\!
!"#$%!H1&(!(#$$&*+!0)#(!*)$!%33#-$!$1#!0#(E$) <!-'&#*$4!
Q#/-!K!F)1!E#3@1&!I'33!2$$12&!2/!2!.1*I#&D;62/1@!&1/#B&-1!'.!*)1!,-&#.'/!,--1//!-3'1.*!2$$!2.@!
-2.!61!2--1//1@!2.@!I#&D1@!I'*)!NB/*!3'D1!2!42*1I2%!/1&?1&>!
bKH,%!;!F)1!E#3@1&!I'33!2$$12&!2/!2!3#-23!E#3@1&!'.!*)1!,-&#.'/!,--1//!-3'1.*!2$$>!0*/!-#5$31*1!
-#.*1.*/!I'33!61!/%.-1@!E!*)1!/1&?1&!*#!*)1!@1?'-1!2.@!'*!I'33!61!D1$*!B$!*#!@2*1!'E!E' 31/!#.!*)1!