7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
96! Copyright!©!Acronis!International!GmbH,!2002;2015!
%#B&!FH4!/1&?1&!*#!(1*!'*!I#&D'.(!I'*)!,-&#.'/!,--1//>!F#!B/1!FH4!2/!&1?1&/1!$&#C%!2.@!E'&1I233!E#&!
%#B&!,-&#.'/!,--1//!/1&?1&!%#B!.11@!*#!-&12*1!*I#!/1$2&2*1!.1*I#&D/!#.!%#B&!FH4!-#5$B*1&\!
'.*1&.23!2.@!1C*1&.23>!F)1!*I#!FH4!.1*I#&D!2@2$*1&/!/)#B3@!61!$&#$1&3%!-#.E'(B&1@8!#.1!I'*)!2!
$&'?2*1!R'.*1&.23!0V!2@@&1//S!2.@!#.1!I'*)!2!$B63'-!R1C*1&.23!0V!2@@&1//S>!F)1!,-&#.'/!,--1//!/1&?1&!
/)#B3@!61!$2&*!#E!*)1!'.*1&.23!.1*I#&D>!
F#!B/1!,-&#.'/!,--1//!I'*)!FH4!%#B!.11@!*#!-#5$31*1!*)1!/*1$/!@1/-&'61@!'.!*)'/!@#-B51.*\!
Q6*2'.!2.!MMA!/1&?1&!-1&*'E'-2*1!2.@!'./*233!'*!*#!%#B&!,-&#.'/!,--1//!/1&?1&!2.@!*#!*)1!FH4!/1&?1&!
-#5$B*1&>!
"&12*1!2!I16!3'/*1.1&!'.!FH4>!
"&12*1!.1I!I16!/'*1!$B63'/)'.(!&B31!E#&!*)1!,-&#.'/!,--1//!42*1I2%!/1&?1&8!/#!*)2*!*)1!-3'1.*/!
E!#B*/'@1!%#B&!.1*I#&D!-2.!-#..1-*!*#!,-&#.'/!,--1//>!
"&12*1!2.!1C*1&.23!PUM!&1-#&@!'.!%#B&!PUM!/1&?1&>!
F)1!,--1//!H#6'31!"3'1.*!2$$!/B$$#&*/!*)1/1!E#&5/!#E!2B*)1.*'-2*'#.!I'*)!2!&1?1&/1!$&#C%!/1&?1&\!
V2//;*)&#B()!2B*)1.*'-2*'#.!
7FFV!2B*)1.*'-2*'#.!RB/1&.251!l!$2//I#&@S!
"1&*'E'-2*1!2B*)1.*'-2*'#.!
5.4.2 Introduction!
,-&#.'/!,--1//!-3'1.*/!-#..1-*!*#!*)1!,-&#.'/!,--1//!/1&?1&!&B..'.(!'./'@1!%#B&!E'&1I233!/1-B&13%!?'2!
7FFVM!2.@!.11@!*#!*&2?1&/1!%#B&!E'&1I233!?'2!1'*)1&!GVU8!7FFV!&1?1&/1!$&#C%!#&!2.!#$1.!7FFVM!$#&*>!
F)'/!2&*'-31!$&#?'@1/!/*1$!6%!/*1$!'./*&B-*'#./!*)2*!1.2631!-#..1-*'#./!6%!%#B&!B/1&!&B..'.(!*)1!
,-&#.'/!,--1//!@1/D*#$!#&!5#6'31!-3'1.*!E!#B*/'@1!%#B&!.1*I#&D!B/'.(!*)1!W&1?1&/1!$&#C%W!
EB.-*'#./!#E!*)1!H'-&#/#E*!Z#&1E&#.*!F)&12*!H2.2(151.*!42*1I2%!RFH4S!/#E*I2&18!I)'-)!'/!*)1!
/B--1//#&!*#!0M,!M1&?1&!9::^>!
Z#&1E&#.*!F)&12*!H2.2(151.*!42*1I2%!RFH4S!'/!2!/1-B&1!I16!(2*1I2%!*)2*!1.2631/!/2E1!15$3#%11!
I16!B/1!*)&#B()!-#5$&1)1./'?1!$&#*1-*'#.!2(2'./*!523I2&18!523'-'#B/!I16!/'*1/!2.@!?B3.1&26'3'*'1/>!
[B'3@'.(!#.!'*/!$&1@1-1//#&8!0M,!M1&?1&!9::^8!FH4!$&#?'@1/!.1I!LJA!E'3*1&'.(8!2.*';523I2&18!2.@!
'.*&B/'#.;$&1?1.*'#.!*1-).#3#('1/!*#!$&#*1-*!6B/'.1//1/!2(2'./*!*)1!32*1/*!I16;62/1@!*)&12*/>!F)1/1!
*1-).#3#('1/!2&1!'.*1(&2*1@!I'*)!-#&1!.1*I#&D!$&#*1-*'#.!E12*B&1/!/B-)!2/!E'&1I233!2.@!GVU!*#!-&12*1!
2!B.'E'1@8!12/%;*#;52.2(1!(2*1I2%>!
F)1!Z#&1E&#.*!FH4!/#3B*'#.!'.-3B@1/!*I#!/1$2&2*13%!3'-1./1@!-#5$#.1.*/\!
Z#&1E&#.*!FH4!/1&?1&!*)2*!$&#?'@1/!LJA!E'3*1&'.(8!2.*'523I2&1!'./$1-*'#.8!'.*&B/'#.!$&1?1.*'#.8!
2$$3'-2*'#.;!2.@!.1*I#&D;32%1&!E'&1I233!2.@!7FFVK7FFVM!'./$1-*'#.!'.!2!/'.(31!/#3B*'#.>!
Z#&1E&#.*!FH4!O16!V&#*1-*'#.!M1&?'-1!*)2*!$&#?'@1/!*)1!-#.*'.B#B/!B$@2*1/!E#&!523I2&1!
E'3*1&'.(!2.@!2--1//!*#!-3#B@;62/1@!LJA!E'3*1&'.(!*1-).#3#('1/!2((&1(2*1@!E!5B3*'$31!O16!
/1-B&'*%!?1.@#&/!*#!$&#*1-*!2(2'./*!*)1!32*1/*!O16;62/1@!*)&12*/>!
In#this#section#
L.@1&/*2.@'.(!Z#&1E&#.*!F)&12*!H2.2(151.*!42*1I2%!RFH4S!U1*I#&D!F#$#3#(%! _]!
L.@1&/*2.@'.(!Z#&1E&#.*!F)&12*!H2.2(151.*!42*1I2%!2B*)1.*'-2*'#._b!