7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
78! Copyright!©!Acronis!International!GmbH,!2002;2015!
<> [##*!B$!*)1!&1-#?1&%!.#@1>!,@NB/*!2.%!.1*I#&D!-#.E'(B&2*'#.!3'D1!0V!,@@&1//8!7#/*!U251!'E!
.11@1@>!F1/*!,-*'?1!P'&1-*#&%!-#..1-*'?'*%!2.@!MHFV!2--1//8!
9> 0E!.11@1@!&1/*#&1!*)1!5#/*!&1-1.*!,-&#.'/!,--1//!/#E*I2&1!/B'*1!62-DB$>!
a> G1&'E%!*)2*!F#5-2*!'/!.#*!&B..'.(!RO'.@#I/!"#.*!V2.13KM1&?'-1/S>!
`> 0E!.11@1@8!&1/*#&1!*)1!Z'31M*#&1>!H2D1!/B&1!*)1!&132*'?1!3#-2*'#.!#E!*)1!Z'31M*#&1!'/!*)1!/251!2/!'*!
I2/!'.!*)1!/#B&-1!-#5$B*1&>!0E!*)'/!'/!.#*!*)1!-2/18!*)1!3#-2*'#.!I'33!.11@!*#!61!2@NB/*1@!6%!B/'.(!
*)1!"#.E'(B&2*'#.!L*'3'*%>!
=> G1&'E%!*)2*!*)1!V#/*(&1MiA!/1&?'-1!'/!&B..'.(!RO'.@#I/!"#.*!V2.13KM1&?'-1/S>!
^> J1/*#&1!*)1!,-&#.'/!,--1//!@2*262/1>!
]> M*2&*!*)1!,-&#.'/!,--1//!F#5-2*!/1&?'-1>!
b> H'(&2*1!PUM!*#!$#'.*!*#!*)1!.1I!.#@1>!
_> G1&'E%!,-*'?1!P'&1-*#&%!2.@!MHFV!2&1!I#&D'.(!
4.2 Backing!up!and!Restoring!Acronis!Access!
0.!-2/1!%#B!.11@!*#!B$(&2@18!B$@2*1!#&!52'.*2'.!%#B&!,-&#.'/!,--1//!/1&?1&>!F)'/!2&*'-31!I'33!('?1!%#B!
*)1!62/'-/!#E!62-D'.(!B$!%#B&!@2*262/1!2.@!&1/*#&'.(!'*>!
R,1B'/(!6$!%#6&!3,*,:,2-2!
R,1B'/(!6$!%#6&!01&#/'2!011-22J2!3,*,:,2-!
F)1!E#33#I'.(!51*)#@!-&12*1/!2.!p>/f3!E'31!-#.*2'.'.(!2!*1C*!&1$&1/1.*2*'#.!#E!*)1!/#B&-1!@2*262/1>!
<> Q$1.!2!"#552.@!V$*!I'.@#I!2.@!.2?'(2*1!*#!*)1!U9>#3/)!E#3@1&!3#-2*1@!'.!*)1!V#/*(&1MiA!
'./*2332*'#.!@'&1-*#&%>!
1>(>!0P.V!"#E2%7:'&DW@#U9>#3/)V!
9> Q.-1!%#B&!-B&&1.*!"#552.@!V$*!@'&1-*#&%!'/!*)1!:'/!E#3@1&8!1.*1&!*)1!E#33#I'.(!3'.1\!
!
6:OP(+6.X$.62%7:'&%.XT.+-3*0C(69%Y4.*0'2)/%*00&%%O6'2P(07/2)!
I)1&1!+-3*0C(69%Y4!'/!*)1!@1/'&1@!E'31!.251!E#&!*)1!$&#@B-1@!62-DB$!E'31>!0*!-2.!'.-3B@1!2!EB33!
$2*)!*#!*)1!3#-2*'#.!I)1&1!%#B!I2.*!*)1!62-DB$!E'31!*#!61!-&12*1@8!E#&!'./*2.-1\!
A"#Z*0C(6%#+-3*0C(69%Y4!
!"#$%!(6%&7,/(66.//@A%&LJ69,&7* B/($!># !#*$#.#0!#;%-$'8!%(!(1)7*!%(!&$!&(!$1#!*%B#!)3!$1#!,-.)*&(!
,--#((!0%$%>% (#!
a> ,!WV2//I#&@\!W!3'.1!2$$12&/>!T.*1&!*)1!$#/*(&1/!$2//I#&@!*)2*!%#B!/1*!@B&'.(!*)1!,-&#.'/!,--1//!
'./*2332*'#.!$&#-1//>!
!"#$%!H8<&*+!$1#!<%((7).0!7&''!*)$!.#(/'$!&*!%*8!:&(/%'!-1%*+#(!&*!$1#!5)BB% *0!C.)B<$!7&*0)74!
`> Y#B&!62-DB$!E'31!I'33!2$$12&!'.!*)1!:'/!E#3@1&!6%!@1E2B3*!B.31//!*)1!#B*$B*!E'31!/$1-'E'-2*'#.!
-#.*2'./!2!EB33!$2*)!*#!2!@'EE1&1.*!@'&1-*#&%>!
!"#$%!23!8)/!7%*$!$)!>%-E/<!$1#!#*$&.#!C)($+.#9^\!0%$%>%(#!(#$!8)/!-%*!/(#!$1#!3) ' ' )7& *+!-)BB%*0L!
A'@LJ)A(--*DK*A&/9'%./*M*(--L?/B/N-!
W1#.#!(--L?/B/N-*7&''!>#!$1#!+#* #.%$#0!>%-E/<!3&'#4!2$!-%*!&*-'/0#!%!3/''!<%$1!(<#-&3&-%$&)*F!3).!&*($%*-#!
O"#P(6QJA/#(--L?/B/N-!
!
O).!3/''!(8*$%;! )*!$1&(!-)BB%*0!(##L*1$$<LSS7774<)($+.#(I'4).+S0)-(Sb4P S($%$&-S%<<M<+M0/B<%''41$B'!
1$$<LSS7774<)($+.#(I'4).+S0)-(Sb4VS($%$&-S%<<M<+M0/B<%''41$B'!