7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
69! Copyright!©!Acronis!International!GmbH,!2002;2015!
=/,:4-!S?07e!;!0E!1.2631@8!%#B!I'33!61!2631!*#!-#.E'(B&1!AP,V>!
S?07!2-&;-&!,33&-22!;!1.*1&!*)1!PUM!.251!#&!0V!2@@&1//!#E!*)1!,-*'?1!P'&1-*#&%!/1&?1&!%#B!
I#B3@!3'D1!*#!B/1!E#&!&1(B32*'.(!2--1//>!
S?07!2-&;-&!$#&*!;!*)1!@1E2B3*!,-*'?1!P'&1-*#&%!$#&*!'/!ab_>!F)'/!I'33!3'D13%!.#*!.11@!*#!61!
5#@'E'1@>!
!"#$%!23!8)/G.#!(/<<).$&*+!B/'$&<'#!0)B%&*(!8)/!(1)/'0!<.)>%>'8!/(#!$1#!+ ' )>%'!-%$%')+!<).$4!
<2-!S?07!2-16&-!1#//-1*'#/e!;!@'/2631@!6%!@1E2B3*>!")1-D!*)1!6#C!*#!-#..1-*!*#!,-*'?1!
P'&1-*#&%!B/'.(!/1-B&1!AP,V>!
S?07!62-&/,.-!I!$,228#&3!;!*)'/!3#('.!-&1@1.*'23/!I'33!61!B/1@!E#&!233!AP,V!fB1&'1/>!,/D!%#B&!
,P!2@5'.'/*&2*#&!*#!E'.@!#B*!'E!%#B!)2?1!@1/'(.2*1@!/1&?'-1!2--#B.*/!*)2*!/)#B3@!61!B/1@>!
S?07!+-,&1)!R,2-!;!1.*1&!*)1!&##*!31?13!%#B!I#B3@!3'D1!/12&-)1/!E#&!B/1&/!2.@!(&#B$/!*#!
61('.>!0E!%#B!I#B3@!3'D1!*#!/12&-)!%#B&!1.*'&1!@#52'.8!1.*1&!W@-q@#52'..2518!
@-q@#52'./BEE'CW>!
?#.,'/2!F#&!S?07!,6*)-/*'1,*'#/!;!B/1&/!I'*)!152'3!2@@&1//1/!I)#/1!@#52'./!2&1!'.!*)'/!
-#552;@13'5'*1@!3'/*!5B/*!2B*)1.*'-2*1!2(2'./*!AP,V>! ! R'>1>*#!1.2631!AP,V!2B*)1.*'-2*'#.!
E#&!2.!2--#B.*!I'*)!*)1!152'3!f#-h(4'4,:2W1#.8!%#B!I#B3@!1.*1&!(4'4,:2W1#.S>!L/1&/!'.!#*)1&!
@#52'./!I'33!2B*)1.*'-2*1!2(2'./*!*)1!,-&#.'/!,--1//!@2*262/1>!
@-A6'&-!-D,1*!.,*1)!;!O)1.!1.2631@8!#.3%!B/1&/!E!*)1!@#52'./!1.*1&1@!'.!?#.,'/2!
F#&!S?07!,6*)-/*'1,*'#/!I'33!61!*&12*1@!2/!AP,V!B/1&/>!L/1&/!*)2*!2&1!51561&/!#E!#*)1&!
@#52'./!2.@!/B6;@#52'./!I'33!61!*&12*1@!2/!,@;)#->!
S?07!'/F#&.,*'#/!1,1)'/(!'/*-&;,4!;!/1*/!*)1!'.*1&?23!'.!I)'-)!,-&#.'/!,--1//!'/!-2-)'.(!*)1!
,-*'?1!P'&1-*#&%!/*&B-*B&1>!
7&#,1*';-4%!&-2#4;-!S?07!-.,'4!,33&-22-2!;!O)1.!*)'/!/1**'.(!'/!1.2631@8!,-&#.'/!,--1//!I'33!
/12&-)!,-*'?1!P'&1-*#&%!E#&!*)1!B/1&!I'*)!*)1!52*-)'.(!152'3!2@@&1//!#.!3#('.!2.@!'.?'*1!
1?1.*/>!F)'/!233#I/!B/1&/!*#!3#(!'.!I'*)!*)1'&!152'3!2@@&1//1/!2.@!(1*!'551@'2*1!E11@62-D!#.!
'.?'*2*'#./8!6B*!52%!61!/3#I!*#!1C1-B*1!'E!*)1!AP,V!-2*23#(!'/!?1&%!32&(1>!0E!%#B!1.-#B.*1&!2.%!
$1&E#&52.-1!$᢫/!#&!/3#I!&1/$#./1!#.!2B*)1.*'-2*'#.!#&!'.?'*18!B.-)1-D!*)'/!/1**'.(>!
<2-!S?07!4##B6$!F#&!*%$-K,)-,3!26((-2*'#/2!F#&!'/;'*-2!,/3!3#8/4#,3!4'/B2!K!AP,V!3##DB$!
E#&!*%$1;2)12@!I'33!/12&-)!AP,V!E#&!B/1&/!I'*)!52*-)'.(!152'3!2@@&1//1/>!F)'/!3##DB$!52%!61!
/3#I!2(2'./*!32&(1!AP,V!-2*23#(/>!0E!%#B!1.-#B.*1&!$1&E#&52.-1!$᢫/!I'*)!*%$1;2)12@8!
B.-)1-D!*)'/!/1**'.(>!
3.8 Email!Templates!
,-&#.'/!,--1//!52D1/!1C*1./'?1!B/1!#E!152'3!51//2(1/!*#!$&#?'@1!@%.25'-!'.E#&52*'#.!*#!B/1&/!2.@!
2@5'.'/*&2*#&/>!T2-)!1?1.*!)2/!2.!7FHA!2.@!*1C*!2//#-'2*1@!*15$32*1>!Y#B!-2.!-3'-D!*)1!T52'3!
F15$32*1!$B33!@#I.!51.B!*#!/131-*!2.!1?1.*!2.@!1@'*!6#*)!*15$32*1/>!
,33!152'3/!/1.*!6%!*)1!,-&#.'/!,--1//!/1&?1&!-2.!61!-B/*#5'd1@!*#!511*!%#B&!.11@/>!Z#&!12-)!152'38!
%#B!I'33!.11@!*#!$&#?'@1!6#*)!7FHA!2.@!*1C*;E#&52**1@!152'3!*15$32*1/>!F15$32*1!6#@'1/!5B/*!61!
I&'**1.!'.!TJ[8!1561@@1@!JB6%>!V312/1!&1?'1I!*)1!@1E2B3*!*15$32*1/!*#!@1*1&5'.1!)#I!61/*!*#!
-B/*#5'd1!%#B&!*15$32*1/>!
!"#$%!23!8)/!%.#!/(&*+!-/($)B!&B%+#(!&*!$1 #!#B%&'!$#B<'%$#(F!$1#(#!&B% +#(!(1)/'0!>#!1)($#0!%*0!B/($!>#!
()B#71#.#!%--#((&>'# !)*!$1#!&*$#.*#$4!
!
0E!%#B!)2?1!B$(&2@1@!E!5#6'3T-)#8!*)1!-B/*#5'd2*'#./!%#B!)2?1!@#.1!*#!*)1!152'3!*15$32*1/!2&1!
.#*!5'(&2*1@!2.@!%#B!I'33!.11@!*#!-B/*#5'd1!*)1!.1I!*15$32*1/>!,!-#$%!#E!%#B&!$&1?'#B/!5#6'3T-)#!