7.0
Table Of Contents
- 1 Mobile Access
- 2 Sync & Share
- 3 Server Administration
- 4 Maintenance Tasks
- 5 Supplemental Material
- 5.1 Conflicting Software
- 5.2 Load balancing Acronis Access
- 5.3 Third-party Software for Acronis Access
- 5.4 Using Acronis Access with Microsoft Forefront Threat Management Gateway (TMG)
- 5.4.1 Overview
- 5.4.2 Introduction
- 5.4.3 Install the SSL Server Certificate
- 5.4.4 Create a New Web Listener
- 5.4.5 Create a New Web Site Publishing Rule
- 5.4.6 Configure an External DNS Entry for the Acronis Access Gateway Server
- 5.4.7 Using the Access Mobile Client with a TMG reverse proxy server
- 5.4.8 Using the Access Desktop Client with a TMG reverse proxy server.
- 5.5 Unattended desktop client configuration
- 5.6 Monitoring Acronis Access with New Relic
- 5.7 Using trusted server certificates with Acronis Access
- 5.8 Creating a Drop Folder
- 5.9 Customizing the web interface
- 5.10 How to support different Access Desktop Client versions
- 5.11 How to move the FileStore to a non-default location.
- 5.12 Acronis Access for Good Dynamics
- 5.12.1 Introduction
- 5.12.2 Testing a trial version of Acronis Access for Good Dynamics
- 5.12.3 Requesting and configuring Acronis Access within Good Control
- 5.12.4 Good Dynamics Policy Sets and Acronis Access
- 5.12.5 Granting Acronis Access access to a Good Dynamics User or Group
- 5.12.6 Enrolling the Acronis Access client app in Good Dynamics
- 5.13 MobileIron AppConnect support
- 5.13.1 Introduction
- 5.13.2 Testing a trial version of Acronis Access with AppConnect
- 5.13.3 Creating an AppConnect configuration and policy for Acronis Access on your MobileIron VSP
- 5.13.4 Activating the Acronis Access iOS client with AppConnect
- 5.13.4.1 Acronis Access has already been installed on the device, and has already been enrolled with a Acronis Access Server
- 5.13.4.2 Acronis Access has already been installed on the device, but has not yet been enrolled with a Acronis Access Server
- 5.13.4.3 Acronis Access has not yet been installed on the device
- 5.13.5 Ongoing AppConnect management of Access Mobile Clients
- 5.13.6 Using AppConnect with Kerberos Constrained Delegation
- 6 Configuring an AppConnect tunnel between the Access Mobile client and the Access server via username/password authentication
- 7 Adding Kerberos Constrained Delegation Authentication
- 8 What's New
30! Copyright!©!Acronis!International!GmbH,!2002;2015!
1.4 Managing!Gateway!Servers!
F)1!,-&#.'/!,--1//!42*1I2%!M1&?1&!'/!*)1!/1&?1&!-#.*2-*1@!6%!*)1!,--1//!H#6'31!"3'1.*/!*)2*!)2.@31/!
2--1//'.(!2.@!52.'$B32*'.(!E'31/!2.@!E#3@1&/!'.!E'31!/1&?1&/8!M)2&1V#'.*!&1/$#/'*#&'1/8!2.@K#&!M%.-!l!
M)2&1!?#3B51/>! ! F)1!42*1I2%!M1&?1&!'/!*)1!W(2*1I2%W!E#&!5#6'31!-3'1.*/!*#!*)1'&!E'31/>! ! !
F)1!,-&#.'/!,--1//!M1&?1&!-2.!52.2(1!2.@!-#.E'(B&1!#.1!#&!5#&1!42*1I2%!M1&?1&/!E!*)1!/251!
52.2(151.*!-#./#31>! ! F)1!42*1I2%!M1&?1&/!B.@1&!52.2(151.*!2$$12&!'.!*)1!5,*-8,%!+-&;-&2!
/1-*'#.!#E!*)1!E#:'4-!011-22!51.B>!
N%$-!;!M)#I/!*)1!*%$1!#E!*)1!(2*1I2%8!2*!*)1!5#51.*!'*!-2.!#.3%!61!#E!*)1!M1&?1&!*%$1>!
Q,.-!;!"#/51*'-!.251!('?1.!*#!*)1!(2*1I2%!I)1.!%#B!-&12*1!'*>!
033&-22!;!PUM!.251!#&!0V!2@@&1//!#E!*)1!(2*1I2%>!
X-&2'#/!;!M)#I/!*)1!?1&/'#.!#E!*)1!,-&#.'/!,--1//!42*1I2%!M1&?1&>!
+*,*62!;!M)#I/!I)1*)1&!*)1!/1&?1&!'/!Q.3'.1!#&!QEE3'.1>!
01*';-!+-22'#/2!;!UB561&!#E!-B&&1.*3%!2-*'?1!/1//'#./!*#!*)'/!42*1I2%!M1&?1&>!
S'1-/2-2!<2-3!;!UB561&!#E!3'-1./1/!B/1@!2.@!*)1!.B561&!#E!2?2'32631!3'-1./1/>!
S'1-/2-!;!M)#I/!*)1!-B&&1.*!*%$1R/S!#E!3'-1./1R/S!B/1@!6%!*)1!42*1I2%!M1&?1&>!
Y#B!-2.!&1('/*1&!.1I!42*1I2%!M1&?1&/!B/'.(!*)1!033!/-8!5,*-8,%!+-&;-&!6B**#.>!Z!*)1!2-*'#./!
51.B!E#&!12-)!42*1I2%!M1&?1&!*)1!2@5'.'/*&2*#&!-2.!(1*!5#&1!@1*2'3/!#.!2!/1&?1&!2.@!'*/!
$1&E#&52.-18!1@'*!'*/!-#.E'(B&2*'#.8!-)2.(1!*)1!2--1//!&1/*&'-*'#./!E#&!*)1!/1&?1&8!-)2.(1!3'-1./'.(!E#&!
*)1!/1&?1&8!#&!&15#?1!*)1!42*1I2%!M1&?1&>!
!
M12&-)!
!
C/3-D!4#1,4!3,*,!2#6&1-2!F#&!F'4-/,.-!2-,&1)!
[%!@1E2B3*8!'.@1C1@!/12&-)'.(!'/!1.2631@!#.!233!42*1I2%!M1&?1&/>!Y#B!-2.!@'/2631!#&!1.2631!'.@1C1@!
ƐĞĂƌĐŚŝŶŐĨŽƌĞĂĐŚ'ĂƚĞǁĂLJ^ĞƌǀĞƌŝŶƚŚĞ'ĂƚĞǁĂLJƐĚŝƚ^ĞƌǀĞƌĚŝĂůŽŐ !
?-F,64*!$,*)! !
[%!@1E2B3*!#.!2!/*2.@23#.1!/1&?1&8!,-&#.'/!,--1//!/*#&1/!'.@1C!E'31/!'.!*)1!M12&-)!0.@1C1/!@'&1-*#&%!'.!
*)1!,-&#.'/!,--1//!42*1I2%!M1&?1&!2$$3'-2*'#.!E#3@1&>!0E!%#B!I#B3@!3'D1!*#!3#-2*1!*)1!'.@1C!E'31/!'.!2!
@'EE1&1.*!3#-2*'#.8!1.*1&!*)1!$2*)!*#!2!.1I!E#3@1&>! !
+6$$#&*!1#/*-/*!2-,&1)!62'/(!E'1#F*!H'/3#82!+-,&1)!8)-&-!,;,'4,:4-! !