1 Copyright © Acronis International GmbH, 2002-2014 Cover page Install And AdminCopyright Statement Copyright © Acronis International GmbH, 2002-201
10 Copyright © Acronis International GmbH, 2002-2014 Note: For information on adding your certificate to the Microsoft Windows Certificate Store, vi
100 Copyright © Acronis International GmbH, 2002-2014 Notification Settings Email administrator a summary of errors? – If enabled, a summary of
101 Copyright © Acronis International GmbH, 2002-2014 9.5 SMTP Acronis Access Server uses the configured SMTP server to send emails to invite users
102 Copyright © Acronis International GmbH, 2002-2014 9.6 LDAP Microsoft Active Directory can be used to provide mobile access and sync and share a
103 Copyright © Acronis International GmbH, 2002-2014
104 Copyright © Acronis International GmbH, 2002-2014 Enable LDAP? - If enabled, you will be able to configure LDAP. LDAP server address - ent
105 Copyright © Acronis International GmbH, 2002-2014 Available Parameters - The available parameters are different for each template and will ch
106 Copyright © Acronis International GmbH, 2002-2014 Note: Pressing the View Default button will show you the default template. Make sure you cli
107 Copyright © Acronis International GmbH, 2002-2014 Note: The supported licensed client counts are 50 and 100. If you've bought a 50 user lic
108 Copyright © Acronis International GmbH, 2002-2014 Note: In the cases where the product was updated and not a new installation, the log files wil
109 Copyright © Acronis International GmbH, 2002-2014 9. Enter the path to the newrelic.yml including the extension (e.g C:\software\newrelic.yml).
11 Copyright © Acronis International GmbH, 2002-2014 Navigate to the Acronis Access's web interface using any of the available IP addresses an
110 Copyright © Acronis International GmbH, 2002-2014 10 Supplemental Material In this section Conflicting Software ...
111 Copyright © Acronis International GmbH, 2002-2014 Note: Contact your preferred certificate vendor for more information or help with this procedu
112 Copyright © Acronis International GmbH, 2002-2014 Note: If you are importing a PFX file, you will need to change the file filter to “Personal In
113 Copyright © Acronis International GmbH, 2002-2014 6. Save the changes made to the server.xml file and restart the Acronis Access Tomcat service
114 Copyright © Acronis International GmbH, 2002-2014 10.6 Creating a Drop Folder This guide will cover setting up a Drop Folder using Acronis Acce
115 Copyright © Acronis International GmbH, 2002-2014 List Folder/Read Data Create Files/Write Data Read Permissions For the Creator Owner
116 Copyright © Acronis International GmbH, 2002-2014 11. If more than 10 minutes pass, restart your Acronis Access Tomcat service and wait a couple
117 Copyright © Acronis International GmbH, 2002-2014 10.8.2 Apache Tomcat Acronis Access Server uses ApacheTomcat for its web server. Acronis Acce
118 Copyright © Acronis International GmbH, 2002-2014 11 Sync & Share In this section Sharing Restrictions ...
119 Copyright © Acronis International GmbH, 2002-2014 Members of groups listed here will have their user accounts automatically created at first log
12 Copyright © Acronis International GmbH, 2002-2014 Going through the initial configuration process Licensing To start a trial: 1. Select Start
120 Copyright © Acronis International GmbH, 2002-2014 document. Acronis Access allows administrators to define policies to determine how long delete
121 Copyright © Acronis International GmbH, 2002-2014 11.5 User Expiration Policies Users who expire will lose access to all their data. You can re
122 Copyright © Acronis International GmbH, 2002-2014 11.6 File Repository These settings determine where files uploaded for syncing and sharing wi
123 Copyright © Acronis International GmbH, 2002-2014 11.7 Acronis Access Client These settings are for the Access Desktop Client. Force Legacy
124 Copyright © Acronis International GmbH, 2002-2014 Minimum Client Version - Sets the minimum client version that can connect to the server.
125 Copyright © Acronis International GmbH, 2002-2014 12 Upgrading In this section Upgrading from Acronis Access to a newer version ...
126 Copyright © Acronis International GmbH, 2002-2014 6. Review the components which will be installed and press Install. 7. Review the installe
127 Copyright © Acronis International GmbH, 2002-2014 13 Users&Devices In this section Managing Mobile Devices ...
128 Copyright © Acronis International GmbH, 2002-2014 Device name – the device name set by the user. Model – type/model of the device. OS
129 Copyright © Acronis International GmbH, 2002-2014 device user and the Acronis Access IT administrator, in order to enable Acronis Access to decr
13 Copyright © Acronis International GmbH, 2002-2014 General Settings 1. Enter a Server Name. 2. Specify the root DNS name or IP address where u
130 Copyright © Acronis International GmbH, 2002-2014 4. Press Remote wipe... 5. Confirm the remote wipe by pressing Queue remote wipe. 6. A &apo
131 Copyright © Acronis International GmbH, 2002-2014 LDAP users and users with administrative rights are automatically licensed at creation. The
132 Copyright © Acronis International GmbH, 2002-2014 Adding an Ad-Hoc user 1. Open the Acronis Access Web Interface. 2. Log in with an administr
133 Copyright © Acronis International GmbH, 2002-2014 Deleted users without any content are completely removed. Users which had content (files, fold
134 Copyright © Acronis International GmbH, 2002-2014 14 What's New In this section What's New in Acronis Access Server ...
135 Copyright © Acronis International GmbH, 2002-2014 Java version 7 U71 is used in this release. (US9486) Improved audit logging when files a
136 Copyright © Acronis International GmbH, 2002-2014 Acronis Access 6.1.3 ENHANCEMENTS The default SSL bindings of Acronis Access no longer sup
137 Copyright © Acronis International GmbH, 2002-2014 Java 7 Update 51 is used in this release. BUG FIXES Fixed an issue with downloading Syn
138 Copyright © Acronis International GmbH, 2002-2014 Addressed a dependency issue that could prevent the Access Gateway service from starting au
139 Copyright © Acronis International GmbH, 2002-2014 The Acronis Gateway Server service is now dependent on other key services so it should be a
14 Copyright © Acronis International GmbH, 2002-2014 SMTP Note: You can skip this section, and configure SMTP later. 1. Enter the DNS name or IP
140 Copyright © Acronis International GmbH, 2002-2014 Acronis Access 6.0.1 ENHANCEMENTS Added a new policy to specify which gateway or cluster g
141 Copyright © Acronis International GmbH, 2002-2014 Clients who do not have sync and share enabled will no longer be incorrectly reported as “u
142 Copyright © Acronis International GmbH, 2002-2014 BUG FIXES The Default Language setting in Server Settings has been renamed to be clear tha
143 Copyright © Acronis International GmbH, 2002-2014 On Windows Server 2003, the uninstall process no longer reports that PostgreSQL was not ins
144 Copyright © Acronis International GmbH, 2002-2014 BUG FIXES Email notifications are now sent properly after an upgrade when custom templates
145 Copyright © Acronis International GmbH, 2002-2014 the following: ActiveRecord::JDBCError: ERROR: value too long for type character varying(255)
146 Copyright © Acronis International GmbH, 2002-2014 Sorting criteria chosen by the end user is now saved when browsing project folders. Even
147 Copyright © Acronis International GmbH, 2002-2014 A warning is presented if a user is invited for enrollment but does not match any existing
148 Copyright © Acronis International GmbH, 2002-2014 14.2 What's New in the Acronis Access app Access Mobile Client 6.1 ENHANCEMENTS Added
149 Copyright © Acronis International GmbH, 2002-2014 ENHANCEMENTS Added support for using smart cards to unlock the mobilEcho app and to authent
15 Copyright © Acronis International GmbH, 2002-2014 LDAP
150 Copyright © Acronis International GmbH, 2002-2014 the full functionality of the combined product. To request this upgrade, please submit this we
151 Copyright © Acronis International GmbH, 2002-2014 Folders can be downloaded as a ZIP file from the Projects view in the Web UI. Individual
152 Copyright © Acronis International GmbH, 2002-2014 activEcho 2.7.3 (Released: June 2013) ENHANCEMENTS: Switched to using the official AWS librar
153 Copyright © Acronis International GmbH, 2002-2014 activEcho 2.7.0 (Released: February 2013) ENHANCEMENTS: Mac and Windows sync clients will now
154 Copyright © Acronis International GmbH, 2002-2014 Files will no longer be marked deleted if they can't be found in the repository. They
155 Copyright © Acronis International GmbH, 2002-2014 Duplicate files will no longer appear in the web interface if you pause and resume the client
156 Copyright © Acronis International GmbH, 2002-2014 Quotas can now be defined specifically for administrative users. Automatic purging of user acc
157 Copyright © Acronis International GmbH, 2002-2014 The domain for LDAP authentication list can use either ; or , as a delimiter. Various improvem
158 Copyright © Acronis International GmbH, 2002-2014 The activEcho 2.5 client is not compatible with the 2.1 server. Please upgrade your server
159 Copyright © Acronis International GmbH, 2002-2014 Email template notification errors could occur after a user is deleted from activEcho if they
16 Copyright © Acronis International GmbH, 2002-2014
160 Copyright © Acronis International GmbH, 2002-2014 Miscellaneous usability enhancements. BUG FIXES: Various bug fixes related to authentication
161 Copyright © Acronis International GmbH, 2002-2014 ENHANCEMENTS Users with mobilEcho 5.1 or later on iOS can now create their data sources dir
162 Copyright © Acronis International GmbH, 2002-2014 mobilEcho 5.0.3 BUG FIXES When configuring data sources the %USERNAME% token can now be us
163 Copyright © Acronis International GmbH, 2002-2014 mobilEcho 5.0 ENHANCEMENTS The mobilEcho Client Management Server is integrated with Acron
164 Copyright © Acronis International GmbH, 2002-2014 BUG FIXES Home directory configuration is now retrieved properly when LDAP is configured t
165 Copyright © Acronis International GmbH, 2002-2014 Increased the maximum volume name length to 127 UTF-8 characters to allow for longer volume na
166 Copyright © Acronis International GmbH, 2002-2014 mobilEcho 4.3 (Released: March 2013) ENHANCEMENTS: The mobilEcho server now supports mobilEcho
167 Copyright © Acronis International GmbH, 2002-2014 Fixed a problem where whitelists and blacklists could not be assigned when adding or editing a
168 Copyright © Acronis International GmbH, 2002-2014 Added a column to the LDAP search table for Distinguished Name so that users with the same nam
169 Copyright © Acronis International GmbH, 2002-2014 Fixed a problem where selecting the "Reindex all volumes" button in the mobilEcho Ad
17 Copyright © Acronis International GmbH, 2002-2014 Note: You can skip this section, and configure LDAP later. 1. Mark Enable LDAP. 2. Enter the
170 Copyright © Acronis International GmbH, 2002-2014 ENHANCEMENTS: Added profile settings for "Number of days to warn of pending lock" an
171 Copyright © Acronis International GmbH, 2002-2014 The mobilEcho Client Management server can now filter the invitations tables by username. The
172 Copyright © Acronis International GmbH, 2002-2014 Fixed a problem where users could fail to see their home directories if the client authenticat
173 Copyright © Acronis International GmbH, 2002-2014 Fixed a problem where the server could allow mobilEcho clients to overwrite files that were fl
174 Copyright © Acronis International GmbH, 2002-2014 HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\services\mobilEcho\Parameters4\Refreshable
175 Copyright © Acronis International GmbH, 2002-2014 The text of enrollment invitation emails can be customized. Please visit the GroupLogic Kno
176 Copyright © Acronis International GmbH, 2002-2014 Fixed a problem in the mobilEcho Administrator where the Help button would not adjust properly
177 Copyright © Acronis International GmbH, 2002-2014 Fixed a bug when listing the contents of folders which may have resulted in slow performance o
18 Copyright © Acronis International GmbH, 2002-2014 2 Maintenance Tasks To backup all of Acronis Access's elements and as part of your best p
19 Copyright © Acronis International GmbH, 2002-2014 Note: The FileStore structure contains user files and folders in encrypted form. This structure
2 Copyright © Acronis International GmbH, 2002-2014 Table of contents 1 Installing ...
20 Copyright © Acronis International GmbH, 2002-2014 1. Boot up the recovery node. Adjust any network configuration like IP Address, Host Name if n
21 Copyright © Acronis International GmbH, 2002-2014 Info: For more information on PostgreSQL backup procedures and command syntax please read this:
22 Copyright © Acronis International GmbH, 2002-2014 A "password for user postgres: " message may appear. If that happens, enter the postg
23 Copyright © Acronis International GmbH, 2002-2014 2.3 Tomcat Log Management on Windows As part of its normal operation Tomcat creates and writes
24 Copyright © Acronis International GmbH, 2002-2014 REM NumDays - Log files older than NumDays will be processed set NumDays=14 REM ===== END OF C
25 Copyright © Acronis International GmbH, 2002-2014 4. To automate the process, open Task Scheduler and create a new task. Define a name and a des
26 Copyright © Acronis International GmbH, 2002-2014 6. Define at what time the task should start. It is recommended to run this process when the s
27 Copyright © Acronis International GmbH, 2002-2014 8. Click the Browse button, locate and select the script (batch) file. 9. When done, click
28 Copyright © Acronis International GmbH, 2002-2014 Creating the database backup script 1. Open Notepad (or another text editor) and enter the fo
29 Copyright © Acronis International GmbH, 2002-2014 On the Triggers tab: 1. Click New. 2. Select On a schedule for Begin the task. 3. Select da
3 Copyright © Acronis International GmbH, 2002-2014 9 Server Administration ...
30 Copyright © Acronis International GmbH, 2002-2014 2. Click on the Acronis Access Tomcat Configuration tool shortcut. 3. Open the Java tab. 4.
31 Copyright © Acronis International GmbH, 2002-2014 3 Mobile Access This section of the web interface covers all the settings and configurations a
32 Copyright © Acronis International GmbH, 2002-2014 If client management is not needed, Data Sources can be setup on the local Gateway Server and t
33 Copyright © Acronis International GmbH, 2002-2014 Acronis Access clients can be assigned a list of servers, specific folders within shared volume
34 Copyright © Acronis International GmbH, 2002-2014 3.2.1.3 Security Policy App password creation - The Access Mobile Client application can
35 Copyright © Acronis International GmbH, 2002-2014 where you prefer that a user cannot set an app password and will lock other users out of the Ac
36 Copyright © Acronis International GmbH, 2002-2014 3.2.1.4 Application Policy Require Confirmation When Deleting Files - When enabled, the us
37 Copyright © Acronis International GmbH, 2002-2014 Allow These settings can be used to disable certain Access Mobile Client application features
38 Copyright © Acronis International GmbH, 2002-2014 or create new files or folders on the Gateway Server server Gateway Server. This setting supers
39 Copyright © Acronis International GmbH, 2002-2014 3.2.1.5 Sync Policy Client is Prompted to Confirm Before Synced Files are Downloaded - Sel
4 Copyright © Acronis International GmbH, 2002-2014 14 What's New ...
40 Copyright © Acronis International GmbH, 2002-2014 3.2.1.6 Home Folders Display the user's home folder- This option causes a user'
41 Copyright © Acronis International GmbH, 2002-2014 3.2.1.7 Server Policy Required login frequency for resources assigned by this policy- sets
42 Copyright © Acronis International GmbH, 2002-2014 For every connection - The user is required to enter their password each time they connect t
43 Copyright © Acronis International GmbH, 2002-2014 3.2.2 Default Access Restrictions This section allows you to set whether mobile clients need t
44 Copyright © Acronis International GmbH, 2002-2014 Allow file and folder creation, renames and deletes Allow moving files Require confirm
45 Copyright © Acronis International GmbH, 2002-2014 to batch invite all members in a group. You can optionally remove one or more of those group me
46 Copyright © Acronis International GmbH, 2002-2014 The email guides them through the process of installing the Access Mobile Client and enterin
47 Copyright © Acronis International GmbH, 2002-2014 The username and password required are the user's Active Directory username and password.
48 Copyright © Acronis International GmbH, 2002-2014 Connectivity requirements Acronis Access clients must have network access to the Acronis Access
49 Copyright © Acronis International GmbH, 2002-2014 Version - Shows the version of the Acronis Access Gateway Server. Status - Shows whether
5 Copyright © Acronis International GmbH, 2002-2014 1 Installing In this section Requirements ...
50 Copyright © Acronis International GmbH, 2002-2014 Note: The Data Source's volume path must be a hostname or a fully qualified name in order
51 Copyright © Acronis International GmbH, 2002-2014 Status The Status section gives you information about the Gateway Server itself. Information
52 Copyright © Acronis International GmbH, 2002-2014 Active Users Displays a table of all users currently active in this Gateway Server. User -
53 Copyright © Acronis International GmbH, 2002-2014 3.4.2 Editing Gateway Servers General Settings Display Name - Sets the display name of the Ga
54 Copyright © Acronis International GmbH, 2002-2014 Logging The Logging section allows you to control whether the logging events from this specif
55 Copyright © Acronis International GmbH, 2002-2014 7. In the Logging section check Debug Logging. 8. Press the Save button. Search Index local
56 Copyright © Acronis International GmbH, 2002-2014 SharePoint Entering these credentials is optional for general SharePoint support, but require
57 Copyright © Acronis International GmbH, 2002-2014 3. Under Web Applications click on Manage web applications. 4. Select your web application fr
58 Copyright © Acronis International GmbH, 2002-2014 6. From the Permission Policy Levels section, select the checkbox for Full Read - Has Full rea
59 Copyright © Acronis International GmbH, 2002-2014 Advanced Note: It is recommended that these settings only be changed at the request of a cust
6 Copyright © Acronis International GmbH, 2002-2014 Android 2.2 or later (Devices with x86 processor architecture are not supported) The Acronis
60 Copyright © Acronis International GmbH, 2002-2014 Minimum iOS client version - When enabled, users connecting to this Gateway will be required
61 Copyright © Acronis International GmbH, 2002-2014 Access to SharePoint 2007, 2010, 2013, 365 content Acronis Access can provide access to files
62 Copyright © Acronis International GmbH, 2002-2014 3.5.1 Folders In addition to Gateway Servers, Folders can also be assigned to Acronis Access u
63 Copyright © Acronis International GmbH, 2002-2014 Creating a Data Source for a specific folder within a SharePoint Library When creating a Dat
64 Copyright © Acronis International GmbH, 2002-2014 Creating a Data Source
65 Copyright © Acronis International GmbH, 2002-2014 To create a Data source: 1. Open the Acronis Access Web Interface. 2. Open the Mobile Access
66 Copyright © Acronis International GmbH, 2002-2014 4 Settings Enrollment Settings Mobile Client Enrollment Address - specifies the address wh
67 Copyright © Acronis International GmbH, 2002-2014 5 Quick Start: Mobile Access This guide provides the essential steps for configuring your Grou
68 Copyright © Acronis International GmbH, 2002-2014 2. Specify the root DNS name or IP address where users can access the website (starting with h
69 Copyright © Acronis International GmbH, 2002-2014 LDAP
7 Copyright © Acronis International GmbH, 2002-2014 Google Chrome Safari 5.1.10 or later 1.1.5 Network Requirements 1 Static IP Address.
70 Copyright © Acronis International GmbH, 2002-2014
71 Copyright © Acronis International GmbH, 2002-2014 Note: You can skip this section, and configure LDAP later. 1. Mark Enable LDAP. 2. Enter the
72 Copyright © Acronis International GmbH, 2002-2014 6 Configuring your Group Policy With the Group Policy, you can administer what your users can
73 Copyright © Acronis International GmbH, 2002-2014 If your Acronis Access server allows access without your Access Mobile Client being centrally m
74 Copyright © Acronis International GmbH, 2002-2014 The email guides them through the process of installing the Access Mobile Client and enterin
75 Copyright © Acronis International GmbH, 2002-2014 The username and password required are the user's Active Directory username and password.
76 Copyright © Acronis International GmbH, 2002-2014 Connectivity requirements Acronis Access clients must have network access to the Acronis Access
77 Copyright © Acronis International GmbH, 2002-2014 7 Quick Start: Sync & Share This guide provides the essential steps for setting up Sync &a
78 Copyright © Acronis International GmbH, 2002-2014 2. Specify the root DNS name or IP address where users can access the website (starting with h
79 Copyright © Acronis International GmbH, 2002-2014 LDAP
8 Copyright © Acronis International GmbH, 2002-2014 1. Download the Acronis Access installer. 2. Disable any anti-virus software you have or it ma
80 Copyright © Acronis International GmbH, 2002-2014
81 Copyright © Acronis International GmbH, 2002-2014 Note: You can skip this section, and configure LDAP later. 1. Mark Enable LDAP. 2. Enter the
82 Copyright © Acronis International GmbH, 2002-2014 8 Web Client 1. Launch you web browser and navigate to: https://myserver https://myserver, wh
83 Copyright © Acronis International GmbH, 2002-2014 2. Press the Save button. Uploading files 1. Navigate into the new folder by clicking its n
84 Copyright © Acronis International GmbH, 2002-2014 Another way of uploading files is simply dragging and dropping them to the web page:
85 Copyright © Acronis International GmbH, 2002-2014 Clicking on a file or folder shows the available actions in the right sidebar. Downloading a
86 Copyright © Acronis International GmbH, 2002-2014 Sharing a Folder Note: If you want to share a file or folder that was shared with you by anoth
87 Copyright © Acronis International GmbH, 2002-2014 3. In the Sharing lightbox, enter an email address and an appropriate text message. An email c
88 Copyright © Acronis International GmbH, 2002-2014 c. Press Copy Link. d. Share the link via whatever method you prefer. Subscribing to email n
89 Copyright © Acronis International GmbH, 2002-2014 You can look at the history of events by opening the Log tab. Search and filter options are ava
9 Copyright © Acronis International GmbH, 2002-2014 9. Press Exit to close the installer. The Configuration Utility will launch automatically to c
90 Copyright © Acronis International GmbH, 2002-2014 4. Create another folder inside My Projects with a name Collaterals. 5. Place some files int
91 Copyright © Acronis International GmbH, 2002-2014 a. Right Click on it. b. From the context menu, select Share with Acronis Access c. This wi
92 Copyright © Acronis International GmbH, 2002-2014 If you prefer to use your web browser instead: 1. Open https://server.com/ https://server.com
93 Copyright © Acronis International GmbH, 2002-2014 4. In the Sharing lightbox, enter an email address and an appropriate text message. An email c
94 Copyright © Acronis International GmbH, 2002-2014 9 Server Administration In this section Administering a Server ...
95 Copyright © Acronis International GmbH, 2002-2014 9.2 Administrators and Privileges Provisioned LDAP Administrator Groups This section allows y
96 Copyright © Acronis International GmbH, 2002-2014 To add a provisioned LDAP administrator group: 1. Press the Add Provisioned Group. 2. Mark
97 Copyright © Acronis International GmbH, 2002-2014 4. Press the Add Administrator button under Administrative Users. 5. Select either the Active
98 Copyright © Acronis International GmbH, 2002-2014 Timestamp – shows the date and time of the event. Type – shows the level of severity of
99 Copyright © Acronis International GmbH, 2002-2014 Automatically purge log entries more than X Y old - When enabled, logs older than a number o
Comentarios a estos manuales