7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
82! Copyright!©!Acronis!International!GmbH,!2002;2015!
'!(%L83Q0I6%?%425%H,G96%2GD9+%.E0B%L83Q0I6%F,GG%;9%-+2*9669D%
%69.%L83Q0I6K>[%
'!(%KKKKK%!LQ%$&%"$L&MNO'C1M$L)%KKKKKKKKKKKKKKKKKKKKKK%
!"#$%
!"#$%KKKKK%)1C'1%KKKKKKKKKKKK%
'!(%&2+&,G96%2-.,2B6/%
%'!(%%%%%%%%R\-R/%.E9%-0.E%FE9+9%I28%F0B.%.2%D9G9.9%H,G96:%
%'!(%%%%%%%%R\6R/%+9*8+6,]9GI%G22J%,B6,D9%2.E9+%68;H2GD9+6%-+969B.%,B%.E9%H2GD9+%
39B.,2B9D%,B%.E9%;0.*E%H,G9%-0.E%
%'!(%%%%%%%%R\DR/%D0I6%H2+%D9G9.,B5%.E9%H,G96%2GD9+%.E0B%.E9%-+969B.%D0.9:%&2+%,B6.0B*9%
R\D%?YR%390B6%2GD9+%.E0B%Y%D0I6%
%'!(%%%%%%%%R\*R/%*2330BD%.2%9U9*8.9%.2%0*.80GGI%D9G9.9%H,G96/%R*3D%\*%D9G%^H,G9R:%
H2+H,G96%\-%_42570.E_%\6%\D%?_L83Q0I6_%\*%R*3D%\*%D9G%^&M4!R%
/!BD%
!"#$%KKKKK%`C1"#%&M4!%"$(74!1!Q%KKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKKK%
!
I,'-1-.%!W#!<.):&0#!$1& (!# ;%B<'#!%(!%!+/ & 0#'&*#!()! 8)/!-%*!<'%*!%*0!&B<'#B#*$!8)/.!)7*!<.)-#((!>%(#0!)*!
$1#!(<#-&3&-(!)3!8) /.!0#<')8B#*$4!H1#!#;%B<'#!&(!*)$!B#%*$!*).!$#($#0!$)!%< <'8!$)!%''!(&$/%$&)*(!%*0!
#*:&.)*B#*$(!()!/(#!&$!%(!%!3)/*0%$&)*!%*0!% $!8)/.!)7*!.&(E4!3"*-"#*(2$*1#*1-*)'"A(7#1"-*$-81'"-/$-#2*>1#="(#*
7"/)'$=$-218$*"4451-$*#$ 2#1-.*41'2#G!
M*1$/\!
<> "#$%!*)1!/-&'$*!*#!*)1!-#5$B*1&!&B..'.(!,-&#.'/!,--1//!RF#5-2*S!2.@!#$1.!'*!I'*)!U#*1$2@!#&!2!
/B'*2631!$32'.!*1C*!1@'*#&>!
9> A#-2*1!*)1!/1-*'#.!'33B/*&2*1@!'.!*)1!$'-*B&1!613#I!2.@!1@'*!*)1!A#(V2*)!2.@!UB5P2%/!?2&'2631/!
I'*)!%#B&!/$1-'E'-!$2*)/!2.@!&1*1.*'#.!/1**'.(/\!
!
! !
2*!,-.)*&(!,--#((!$1#!')+!3&'#(!%.#!($).#0!&*!$1#!(%B#!3)'0#.!%(!H)B-%$G(4!?!"#$%&'%()*+,-./*
01234#56%&7,/#566.//#!&))&7#(A(6C.D9&)6(9DEBFBGH#-&'/A!
a> M2?1!*)1!E'31>!