7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
45! Copyright!©!Acronis!International!GmbH,!2002;2015!
/1&?1&!2&1!2@@1@8!5#@'E'1@8!#&!@131*1@>!F)'/!E#3@1&!'/!'.*1.@1@!*#!('?1!3#-23K#EE3'.1!2--1//!*#!2!/1*!
#E!/1&?1&;62/1@!E'31/!2.@!2$$12&/!2/!&12@;#.3%!*#!*)1!B/1&>!
\KH,%!;!F)1!E#3@1&!I'33!2$$12&!2/!2!3#-23!E#3@1&!'.!*)1!,-&#.'/!,--1//!-3'1.*!2$$>!0*/!-#5$31*1!
-#.*1.*/!I'33!'.'*'233%!61!/%.-1@!E!*)1!/1&?1&!*#!*)1!@1?'-1>!0E!E'31/!'.!*)'/!E#3@1&!2&1!2@@1@8!
5#@'E'1@8!#&!@131*1@8!1'*)1&!#.!*)1!@1?'-1!#&!#.!*)1!/1&?1&8!*)1/1!-)2.(1/!I'33!61!/%.-1@!62-D!*#!
*)1!/1&?1&!#&!@1?'-1>!
!
J1fB'&1!M231/E#& -1!2-*'?'*%!3#(('.(!
,-&#.'/!)2/!$2&*.1&1@!I'*)!M231/E#&-1!*#!#EE1&!2.!#$*'#.!E#&!3#(('.(!2--1//!*#!E'31/!/)#I.!*#!
-B/*#51&/!B/'.(!,-&#.'/!,--1//>!T.263'.(!*)'/!#$*'#.!I'33!&1fB'&1!2.%!B/1&!I)#!)2/!*)'/!E#3@1&!
2//'(.1@!*#!*)1'&!52.2(151.*!$#3'-%!*#!3#(!2!-B/*#51&!2-*'?'*%!'.!M231E#&-1!61E#&1!*)1%!-2.!#$1.!2.%!
E'31!'.!*)1!E#3@1&>!F)'/!'/!@#.1!-#5$31*13%!I'*)'.!*)1!,--1//!H#6'31!"3'1.*!2$$>! !
,33!'*15/!'.!*)'/!E#3@1&!I'33!61!&1/*&'-*1@!E!61'.(!152'31@8!$&'.*1@8!-#$'1@!#&!5#?1@!#B*/'@1!
*)'/!E#3@1&8!#&!#$1.1@!'.!#*)1&!2$$/!#.!*)1!@1?'-1>! !
F)'/!E12*B&1!&1fB'&1/!2!,-&#.'/!,--1//!-3'1.*!2.@!/1&?1&!#E!?1&/'#.!=>:!#&!32*1&>!
,-&#.'/!,--1//!E#&!,.@&#'@!-3'1.*/!@#1/!.#*!/B$$#&*!*)'/!M231/E#&-1!'.*1(&2*'#.>!
!
M)2&1V#'.*!M'*1/!2.@!A'6&2&'1/!
Y#B!-2.!('?1!12/%!2--1//!*#!M)2&1V#'.*!/'*1/!2.@!3'6&2&'1/!*#!%#B&!,--1//!H#6'31!"3'1.*!B/1&/!6%!
-&12*'.(!2!P2*2!M#B&-1>!F)1&1!2&1!2!-#B$31!#E!I2%/!*#!-&12*1!M)2&1V#'.*!P2*2!M#B&-1/!@1$1.@'.(!#.!
%#B&!M)2&1V#'.*!-#.E'(B&2*'#.\!
"&12*'.(!2!P2*2!M#B&-1!E#&!2!I)#31!M)2&1V#'.*!/'*1!#&!/B6/'*1!
O)1.!-&12*'.(!2!P2*2!M#B&-1!E#&!2!M)2&1V#'.*!/'*1!#&!/B6/'*18!%#B!#.3%!.11@!*#!E'33!'.!*)1!<@S!E'13@>!
F)'/!/)#B3@!61!2@@&1//!#E!%#B&!M)2&1V#'.*!/'*1!#&!/B6/'*1>!
&9:9.;776%"88%;*'&62/)79+-02+6*)-902+"<=>>>!
&9:9.;776%"88%;*'&62/)79+-02+6*)-902+"<=>>>8%(3%/7&.)*+&!
"&12*'.(!2!P2*2!M#B&-1!E#&!,!+),&-7#'/*!S':&,&%!
O)1.!-&12*'.(!2!P2*2!M#B&-1!E#&!2!M)2&1V#'.*!A'6&2&%8!%#B!.11@!*#!E'33!6#*)!*)1!<@S!2.@!?#16.-/*!
S':&,&%!Q,.-!E'13@/>!0.!*)1!LJA!E'13@!%#B!1.*1&!*)1!2@@&1//!#E!%#B&!M)2&1V#'.*!/'*1!#&!/B6/'*1!2.@!E#&!
*)1!P#-B51.*!A'6&2&%!U251!E'13@!%#B!1.*1&!*)1!.251!#E!%#B&!A'6&2&%>!
&9:9.$?@".;776%"88%;*'&62/)79+-02+6*)-902+"<=>>>!
&9:9.A20(+&)7.@/3'*'-.B*+&".,-.@/3'*'-!
"&12*'.(!2!P2*2!M#B&-1!E#&!,!2$-1'F'1!F#43-&!8'*)'/!,!+),&-7#'/*!S':&,&%!
O)1.!-&12*'.(!2!P2*2!M#B&-1!E#&!2!/$1-'E'-!E#3@1&!I'*)'.!2!M)2&1V#'.*!A'6&2&%8!%#B!I'33!)2?1!*#!E'33!'.!
233!E'13@/>!0.!*)1!LJA!E'13@!%#B!1.*1&!*)1!2@@&1//!#E!%#B&!M)2&1V#'.*!/'*1!#&!/B6/'*18!E#&!*)1!P#-B51.*!
A'6&2&%!U251!E'13@!%#B!1.*1&!*)1!.251!#E!%#B&!A'6&2&%!2.@!E#&!*)1!MB6$2*)!E'13@!%#B!1.*1&!*)1!.251!
#E!*)1!@1/'&1@!E#3@1&>!
&9:9.$?@".;776%"88%;*'&62/)79+-02+6*)-902+"<=>>>!
&9:9.A20(+&)7.@/3'*'-.B*+&".,*'C&7/):.@/3'*'-!
&9:9.D(36*7;".D*4&%.?&62'7!
!"#$%!W1#*!- .#%$& *+!%!"%$%!9)/.-#!<)&*$&*+!$)!%!91%.#C)&*$!.#()/.-#!/(&*+!%!9/><%$1F!8)/!-% **)$!#*%>'#!$1#!
C=">*I=$-*J'">21-.*C$'8$'!)<$&)* 4!