7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
88! Copyright!©!Acronis!International!GmbH,!2002;2015!
5 Supplemental!Material!
In#this#section#
"#.E3'-*'.(!M#E*I2&1!>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>!bb!
A#2@!6232.-'.(!,-&#.'/!,--1//!>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>!bb!
F)'&@;$2&*%!M#E*I2&1!E#&!,-&#.'/!,--1//!>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>!_`!
L/'.(!,-&#.'/!,--1//!I'*)!H'-&#/#E*!Z#&1E&#.*!F)&12*!H2.2(151.*!42*1I2%!RFH4S! _=!
L.2**1.@1@!@1/D*#$!-3'1.*!-#.E'(B&2*'#.!>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>!<<9!
H#.'*#&'.(!,-&#.'/!,--1//!I'*)!U1I!J13'-!>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>!<<a!
L/'.(!*&B/*1@!/1&?1&!-1&*'E'-2*1/!I'*)!,-&#.'/!,--1//!>>>>>>>>>>>>>>>>>>>>>>>>>>>!<<`!
"&12*'.(!2!P&#$!Z#3@1&!>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>!<<^!
"B/*#5'd'.(!*)1!I16!'.*1&E2-1!>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>!<<b!
7#I!*#!/B$$#&*!@'EE1&1.*!,--1//!P1/D*#$!"3'1.*!?1&/'#./!>>>>>>>>>>>>>>>>>>>>>!<<b!
7#I!*#!5#?1!*)1!Z'31M*#&1!*#!2!.#.;@1E2B3*!3#-2*'#.>!>>>>>>>>>>>>>>>>>>>>>>>>>>!<<_!
,-&#.'/!,--1//!E#&!4##@!P%.25'-/!>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>!<<_!
H#6'310&#.!,$$"#..1-*!/B$$#&*!>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>!<a<!
0./*233'.(!,-&#.'/!,--1//!#.!2!H'-&#/#E*!Z2'3#?1&!"3B/*1&!>>>>>>>>>>>>>>>>>>>>>>!<^:!
L$(&2@'.(!E!5#6'3T-)#!`>=!#.!2! ! H'-&#/#E*!Z2'3#?1&!"3B/*1&!>>>>>>>>!<b]!
L$(&2@'.(!,-&#.'/!,--1//!#.!2!H'-&#/#E*!Z2'3#?1&!"3B/*1&>>>>>>>>>>>>>>>>>>>>!9<:!
")2.('.(!*)1!,-&#.'/!,--1//!F#5-2*!MMA!"'$)1&/!>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>!9<9!
5.1 Conflicting!Software!
F)1&1!2&1!/#51!/#E*I2&1!$&#@B-*/!*)2*!52%!-2B/1!$᢫/!I'*)!,-&#.'/!,--1//>!F)1!-B&&1.*3%!
D.#I.!-#.E3'-*/!2&1!3'/*1@!613#I\!
sDǁĂƌĞsŝĞǁΡWĞƌƐŽŶĂDĂŶĂŐĞŵĞŶƚ!;!F)'/!2$$3'-2*'#.!I'33!-2B/1!'//B1/!I'*)!*)1!,-&#.'/!
,--1//!@1/D*#$!-3'1.*!/%.-'.(!$&#-1//!2.@!'//B1/!I'*)!@131*'.(!E'31/>!V32-'.(!*)1!,-&#.'/!,--1//!
/%.-!E#3@1&!#B*/'@1!#E!*)1!7-&2#/,!E,/,(-.-/*!62-&!$&#F'4-!/)#B3@!2?#'@!*)1!D.#I.!-#.E3'-*/>!
5.2 Load!balancing!Acronis!Access!
F)1&1!2&1!*I#!52'.!I2%/!%#B!-2.!3#2@!6232.-1!,-&#.'/!,--1//\!
!
S#,3!:,4,/1'/(!#/4%!*)-!5,*-8,%!+-&;-&2!
F)'/!-#.E'(B&2*'#.!1./B&1/!*)2*!*)1!-#5$#.1.*/!B.@1&!*)1!)12?'1/*!3#2@/8!*)1!42*1I2%!M1&?1&/8!2&1!
3#2@!6232.-1@!2.@!23I2%/!2--1//'631!E#&!%#B&!5#6'31!-3'1.*/>!F)1!,--1//!M1&?1&!'/!.#*!61)'.@!*)1!3#2@!
6232.-1&!2/!'*!'/!.#*!&1fB'&1@!'.!#&@1&!*#!-#..1-*!*#!*)1!42*1I2%!M1&?1&/!E#&!B.52.2(1@!2--1//>!Z#&!
5#&1!'.E#&52*'#.!?'/'*!*)1!"3B/*1&!4&#B$/!R$>!`<S!2&*'-31>!
!
S#,3!:,4,/1'/(!,44!#F!01&#/'2!011-22!
F)'/!-#.E'(B&2*'#.!3#2@!6232.-1/!233!#E!,-&#.'/!,--1//g!-#5$#.1.*/!2.@!1./B&1/!)'();2?2'326'3'*%!E#&!
233!B/1&/>!Y#B!I'33!.11@!2*!312/*!*I#!/1$2&2*1!52-)'.1/!'.!#&@1&!*#!*1/*!*)'/!/1*B$>!H2.%!#E!*)1!
/1**'.(/!I)1.!-#.E'(B&'.(!3#2@!6232.-'.(!@'EE1&!61*I11.!@'EE1&1.*!/#E*I2&1!2.@!)2&@I2&1!/#!*)1%!I'33!
.#*!61!-#?1&1@!'.!*)'/!(B'@1>! !