7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
92! Copyright!©!Acronis!International!GmbH,!2002;2015!
!"#$%!23!8)/!0)*G$!1%:#!%!-#.$&3&-%$#F!%!(#'3M(&+*#0!-#.$&3&-%$#!7&''!>#!-.#%$#0!>8!,-.)*&(!,--#((4!H1&(!
-#.$&3&-%$#!(1)/'0!K[H!>#!/(#0!&*!< .)0 /-$&)*!#*:&.)*B#*$(4!
!
`> U2?'(2*1!*#!*)1!,-&#.'/!,--1//!'./*2332*'#.!@'&1-*#&%!R1>(>!"\rV&#(&25!Z'31/!
RCb^Sr,-&#.'/r,--1//r,--1//!M1&?1&r!S!2.@!1@'*!,1&#/'2,11-22W1F(!I'*)!2!*1C*!1@'*#&>!
=> M1*!*)1!B/1&.2518!$2//I#&@8!2.@!'.*1&.23!2@@&1//!#E!*)1!/1&?1&!*)2*!I'33!61!&B..'.(!*)1!
V#/*(&1MiA!@2*262/1!2.@!/2?1!*)1!E'31>!F)'/!I'33!-#.E'(B&1!%#B&!,--1//!M1&?1&!*#!-#..1-*!*#!%#B&!
&15#*1!V#/*(&1MiA!@2*262/1>!1>(>\!
AZOA515Z5DS.e*0'2)/%*00&%%O6'2P(07/2)!
AZO$DS?B5,S.e62%7:'&%!
AZOE5DDM`?A.e6*%%Q2'Pa>=!
AZO_`D1B5,S.ea\9>[9Ia9>!
AZOE`?1.ec<=>!
^> Q$1.!M1&?'-1/>5/-!2.@!&1/*2&*!*)1!,-&#.'/!,--1//!/1&?'-1/>!
!
>/!#/-!#F!%#6&!011-22!,/3!5,*-8,%!2-&;-&2V!$-&F#&.!*)-!F#44#8'/(!2*-$2P!
F)'/!'/!*)1!/1&?1&!I)'-)!%#B!I'33!-#.E'(B&1!E'&/*!2.@!'*g/!/1**'.(/!I'33!61!&1$3'-2*1@!2-&#//!233!#*)1&!
/1&?1&/>!,E*1&!*)1!/1**'.(/!(1*!&1$3'-2*1@8!233!/1&?1&/!I'33!61!'@1.*'-23>!0*!@#1/!.#*!52**1&!I)'-)!/1&?1&!
%#B!-)##/1>!
<> Q$1.!M1&?'-1/>5/-!2.@!&1/*2&*!*)1!01&#/'2!011-22!N#.1,*!/1&?'-1>!F)'/!I'33!$#$B32*1!*)1!
@2*262/1!%#B!)2?1!-&12*1@>!
9> G'/'*!)**$/\KK5%2--1//!R'>1>!)**$/\KK<:>9]>b<>a!#&!)**$/\KK<:>9]>b<>`S!'.!%#B&!I16!6&#I/1&!2.@!
-#5$31*1!*)1!M1*B$!O'd2&@>!
2> </3-&!*)-!S'1-/2'/(!*,:P!
T.*1&!%#B&!3'-1./1!D1%8!52&D!*)1!-)1-D6#C!2.@!$&1//!"#/*'/6->! !
6> </3-&!*)-!5-/-&,4!+-**'/(2!*,:P!
T.*1&!2!M1&?1&!U251>!
F)1!O16!,@@&1//!/)#B3@!61!*)1!1C*1&.23!2@@&1//!#E!%#B&!3#2@!6232.-1&!R'>1>!
5%36>-#5$2.%>-#5S>!0E!%#B!2&1!.#*!B/'.(!$#&*!``a!%#B!I'33!)2?1!*#!I&'*1!*)1!$#&*!2/!I133>!