7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
93! Copyright!©!Acronis!International!GmbH,!2002;2015!
F)1!"3'1.*!T.ഗ.*!,@@&1//!/)#B3@!61!*)1!1C*1&.23!2@@&1//!#E!%#B&!3#2@!6232.-1&!R'>1>!
5%36>-#5$2.%>-#5S>!
M131-*!%#B&!"#3#&!M-)151>!
M131-*!*)1!32.(B2(1!E#&!*)1!,B@'*!A#(!51//2(1/>!
-> </3-&!*)-!+EN7!*,:P!
T.*1&!*)1!PUM!.251!#&!0V!2@@&1//!#E!%#B&!MHFV!/1&?1&!
T.*1&!*)1!$#&*!#E!%#B&!MHFV!/1&?1&>!
0E!%#B!@#!.#*!B/1!-1&*'E'-2*1/!E#&!%#B&!MHFV!/1&?1&8!B.52&D!<2-!2-16&-!1#//-1*'#/eW!
T.*1&!*)1!.251!I)'-)!I'33!2$$12&!'.!*)1!WZW!3'.1!'.!152'3/!/1.*!6%!*)1!/1&?1&>!
T.*1&!*)1!2@@&1//!I)'-)!I'33!/1.@!*)1!152'3/!/1.*!6%!*)1!/1&?1&>!
0E!%#B!B/1!B/1&.251K$2//I#&@!2B*)1.*'-2*'#.!E#&!%#B&!MHFV!/1&?1&8!52&D!L/1!MHFV!
2B*)1.*'-2*'#.u!2.@!1.*1&!%#B&!-&1@1.*'23/>!
V&1//!+,;->!
@> </3-&!*)-!S?07!*,:P!
H2&D!=/,:4-!S?07>!
T.*1&!*)1!PUM!.251!#&!0V!2@@&1//!#E!%#B&!AP,V!/1&?1&>!
T.*1&!*)1!$#&*!#E!%#B&!AP,V!/1&?1&>!
0E!%#B!B/1!2!-1&*'E'-2*1!E#&!-#..1-*'#./!I'*)!%#B&!AP,V!/1&?1&8!52&D!<2-!+-16&-!S?07!
"#//-1*'#/>!
T.*1&!%#B&!AP,V!-&1@1.*'23/8!I'*)!*)1!@#52'.>!R1>(>!2-&#.'/r)&'/*#S>!
T.*1&!%#B&!AP,V!/12&-)!62/1>!
T.*1&!*)1!@1/'&1@!@#52'.R/S!E#&!AP,V!2B*)1.*'-2*'#.>!R'>1>*#!1.2631!AP,V!2B*)1.*'-2*'#.!
E#&!2.!2--#B.*!I'*)!*)1!152'3!N#1n(3'326/>-#58!%#B!I#B3@!1.*1&!(3'326/>-#5S!
V&1//!+,;->!
1> </3-&!*)-!S#1,4!5,*-8,%!*,:P!
!"#$%*23!8)/G.#!&*($%' ' & *+!>)$1!%!6%$#7%8!9#.:#.!%*0!$1#!,-.)*&(!,--#((!9#.:#.!)*!$1#!(%B#!B%-1&*#F!
$1#!6%$#7%8!9#.:#.!7&''!%/$)B%$&-%''8!># !0#$#-$#0!%*0!%0B&*&($#.#0!>8!$1#!,-.)*&(!,--#((!9#.:#.4! !
M1*!2!PUM!.251!#&!0V!2@@&1//!E#&!*)1!3#-23!42*1I2%!M1&?1&>!F)'/!'/!2.!'.*1&.23!2@@&1//!
61)'.@!*)1!3#2@!6232.-1&!R'>1>!<:>9]>b<><:S>!
V&1//!+,;->!
E> </3-&!*)-!9'4-!@-$#2'*#&%!*,:P!
! F)1!Z'31!J1$#/'*#&%!,@@&1//!/)#B3@!61!*)1!'.*1&.23!2@@&1//!#E!*)1!/1&?1&!%#B!)2?1!
-&12*1@!E#&!*)1!E'31!&1$#/'*#&%!!R'>1>!<:>9]>b<>9S>!
a> Q.-1!%#Bg?1!-#5$31*1@!*)1!M1*B$!O'd2&@8!$&1//!9'/'2)!2.@!.2?'(2*1!*#!E#:'4-!011-22!;o!
5,*-8,%!+-&;-&2>!
`> 0*!'/!*'51!*#!&1('/*1&!%#B&!/1-#.@!42*1I2%!/1&?1&\!
2> T.*1&!2!P'/$32%!.251!E#&!*)1!/1-#.@!42*1I2%>!
6> F)1!033&-22!9#&!03.'/'2*&,*'#/!/)#B3@!61!2.!'.*1&.23!2@@&1//!61)'.@!*)1!3#2@!6232.-1&!R'>1>!
<:>9]>b<><<S>!
-> T.*1&!*)1!03.'/'2*&,*'#/!_-%>!Y#B!-2.!#6*2'.!'*!6%!(#'.(!*#!*)1!52-)'.1!#.!I)'-)!*)1!
42*1I2%!%#B!2&1!2@@'.(!'/!'./*2331@8!.2?'(2*'.(!*#!)**$/\KK5%(2*1I2%\``a!R'>1>!
)**$/\KK<:>9]>b<><:!#&!)**$/\KK<:>9]>b<><<S!2.@!*)1!D1%!I'33!61!@'/$32%1@!*)1&1>!Z#&!5#&1!
'.E#&52*'#.!?'/'*!*)1!J1('/*1&'.(!.1I!42*1I2%!M1&?1&/!R$>!a<S!2&*'-31>!
@> V&1//!+,;->!