“Acronis” and “Acronis Secure Zone” are registered trademarks of Acronis International GmbH.
"Acronis Compute with Confidence", “Acronis Startup Recovery Manager”, “Acronis Active Restore”,
“Acronis Instant Restore” and the Acronis logo are trademarks of Acronis International GmbH.
Linux is a registered trademark of Linus Torvalds.
VMware and VMware Ready are trademarks and/or registered trademarks of VMware, Inc. in the
United States and/or other jurisdictions.
Windows and MS-DOS are registered trademarks of Microsoft Corporation.
All other trademarks and copyrights referred to are the property of their respective owners.
Distribution of substantively modified versions of this document is prohibited without the explicit
permission of the copyright holder.
Distribution of this work or derivative work in any standard (paper) book form for commercial
purposes is prohibited unless prior permission is obtained from the copyright holder.
DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE
EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
Third party code may be provided with the Software and/or Service. The license terms for such
third-parties are detailed in the license.txt file located in the root installation directory. You can
always find the latest up-to-date list of the third party code and the associated license terms used
with the Software and/or Service at http://kb.acronis.com/content/7696
Acronis patented technologies
Technologies, used in this product, are covered and protected by one or more U.S. Patent Numbers:
7,047,380; 7,275,139; 7,281,104; 7,318,135; 7,353,355; 7,366,859; 7,475,282; 7,603,533; 7,636,824;
7,650,473; 7,721,138; 7,779,221; 7,831,789; 7,886,120; 7,895,403; 7,934,064; 7,937,612; 7,949,635;
7,953,948; 7,979,690; 8,005,797; 8,051,044; 8,069,320; 8,073,815; 8,074,035; 8,145,607; 8,180,984;
8,225,133; 8,261,035; 8,296,264; 8,312,259; 8,347,137; 8,484,427; 8,645,748; 8,732,121 and patent
pending applications.
3.2.1 Group Policy ................................................................................................................................................... 33
3.3 On-boarding Mobile Devices ...................................................................................................43
3.3.1 Server-side Management Enrollment Process ........................................................................................... 44
3.3.2 User-side Management Enrollment Process .............................................................................................. 45
3.4 Managing Your Gateway Server ..............................................................................................48
3.4.1 Server Details ................................................................................................................................................. 50
10.8.3 New Relic ..................................................................................................................................................... 117
You must be logged in as an administrator before installing Acronis Access. Verify that you meet the
following requirements.
1.1.1 Operating System Requirements
Recommended:
Windows 2012 all flavors
Windows 2008 R2 64 bit
Supported:
Windows 2012 R2
Windows 2012, Standard and Datacenter editions
Windows 2008, all flavors, 32/64 bit
Note: For testing purposes, the system can be installed and runs on Windows 7 or later. These desktop class
configurations are not supported for production deployment.
1.1.2 Mobile Client requirements
The mobile client application is compatible with:
Supported devices:
Apple iPad 2nd, 3rd, 4th generation, Air, Air 2
Apple iPad Mini 1st, 2nd, 3rd generation
Apple iPhone 3GS, 4, 4S, 5, 5s, 5c, 6, 6 Plus
Apple iPod Touch 4th, 5th generation
Android Smartphones and Tablets (Devices with x86 processor architecture are not supported)
Android 2.2 or later (Devices with x86 processor architecture are not supported)
The Acronis Access app can be downloaded from:
For iOS http://www.grouplogic.com/web/meappstore
For Android https://play.google.com/store/apps/details?id=com.grouplogic.mobilecho
1.1.3 Minimum Hardware Recommendation
Processor: Intel/AMD
Note: Acronis Access server can be installed on virtual machines.
Memory:
Production environments: 8 GB minimum. More recommended.
Trial or Тest environments: 4 GB minimum. 8 GB or more recommended.
Disk Space:
The software installation requires 300MB of disk space.
Note: Please make sure that you have enough space to run the Acronis Access installer. 1GB of space is
required for the installer to run.
The file repository used by the Sync & Share features is installed on the local computer by
default.
Enough free space should be provided to meet testing parameters. 50 GB or more is
recommended.
1.1.4 Desktop Client Requirements
Supported operating systems:
Windows XP, Windows Vista, Windows 7, Windows 8 and 8.1
Note: In order to use the Acronis Access Desktop client on Windows XP, you will need to use relaxed SSL
cipher rules. For more information: Changing the Acronis Access Tomcat SSL Ciphers (p. 112).
Mac OS X 10.6.8 and higher with Mac compatible with 64-bit software.
Note: When installing the Acronis Access Desktop client, make sure that the sync-folder you create is not in
a folder synchronized by another software. For a list of known conflicts visit Conflicting Software (p. 110).
Supported web browsers:
Mozilla Firefox 6 and later
Internet Explorer 9 and later
Note: You can support an unsecure version of Internet Explorer 8 if necessary by following the Changing the
Acronis Access Tomcat SSL Ciphers (p. 112) article. Internet Explorer 8 is not supported for Server
Administration.
Note: When using Internet Explorer you have to make sure that Do not save encrypted pages to disk is
unchecked in order to be able to download files. This setting is found under Internet Options -> Advanced
1 Static IP Address.
Optional but recommended: DNS name matching the above IP address.
Network access to a Domain Controller if Active Directory will be used.
Network access to an SMTP server for email notifications and invite messages.
The address 127.0.0.1 is used internally by the Access Mobile Client and should not be routed
through any kind of tunnel (e.g. VPN).
The machine running Acronis Access needs to be bound to the Windows Active Directory.
Note: It is recommended to bind the server to the domain. Mobile clients will not be able to access Data sources
unless the server is bound to the domain.
If you want to allow mobile devices access from outside your firewall, there are several options:
Port 443 access: Acronis Access uses HTTPS for encrypted transport, so it fits in naturally with
common firewall rules allowing HTTPS traffic on port 443. If you allow port 443 access to your
Acronis Access server, authorized iPad clients can connect while inside or outside of your firewall.
Acronis Access can also be configured to use any other port you prefer.
VPN: The Access Mobile Client supports access through a VPN connection. Both the built in iOS
VPN client and third-party VPN clients are supported. iOS management profiles can optionally be
applied to devices using the Apple iPhone Configuration Utility to configure the certificate-based
iOS “VPN-on-demand” feature, giving seamless access to Acronis Access servers and other
corporate resources.
Reverse proxy server: If you have a reverse proxy server set up, iPad clients can connect without
the need for an open firewall port or a VPN connection. The Access Mobile Client app supports
reverse proxy pass-through authentication and username / password authentication.
Note: If you want to use a mobile device management like Good Dynamics or MobileIron, you will need to
upgrade to Acronis Access Advanced.
Certificates:
Acronis Access ships and installs with self-signed certificates for testing purposes. Production
deployments should implement proper CA certificates.
Note: Certain web browsers will display warning messages when using self-signed certificates. Dismissing those
messages allows the system to be used without problems. Using self-signed certificates for production
conditions is not recommended.
1.2 Installing Acronis Access on your server
Installing Acronis Access
Please make sure you are logged in as an administrator before installing Acronis Access.
The Configuration Utility will launch automatically to complete the installation
1.3 Using the Configuration Utility
The Acronis Access installer comes with a configuration utility, which allows you to quickly and easily
set up the access to your Acronis Access Gateway server, File Repository and Acronis Access Server.
Note: See the Network Requirements (p. 7) section for more information on best practices for the IP address
configurations of Acronis Access.
Note: For information on adding your certificate to the Microsoft Windows Certificate Store, visit the Using
Certificates (p. 110) article.
Port - The port of your Web Interface and Gateway Server.
Certificate - SSL certificate for your Web Interface and Gateway Server. You can choose a
certificate from the Microsoft Windows Certificate Store.
Redirect requests from port 80 - When selected, Tomcat will listen for incoming traffic on the
unsecure port 80 and redirect it to the HTTPS port you have specified above. If you have another
program listening on port 80, do not check this box.
File Store Path - Local path to your File Store. If you change the File Store path, you MUST
manually copy any files that are already in the original File Store location to your new location.
Note: If you move the File Store to another location, you should upload a new file to make sure it is going
into the correct new location. Another thing is downloading a file that was already in the file store to make
sure all of the files that were in the original location can be accessed at the new location.
1.4 Using the Setup wizard
After installing the software and running the configuration utility to setup the network port and SSL
certificate, the administrator now needs to configure the Acronis Access server. The Setup Wizard
detects most of the necessary settings (LDAP, Server and SMTP) automatically to help you get the
basic functionality of the server working. You can still change all of these settings manually before
proceeding.
Note: After the configuration utility has run, it will take 30-45 seconds for the server to come up the first time.
Navigate to the Acronis Access's web interface using any of the available IP addresses and the port
specified in the configuration utility. You will be prompted to set the password for the default
administrator account.
Note: Administrators can be configured later on, for more information visit the Server Administration (p. 94)
section.
This wizard helps you setup the core settings for the functionality of your product.
General Settings cover settings of the web interface itself, like the language, the color scheme,
the server name used in admin notifications, licensing and administrators.
LDAP settings allow you to use Active Directory credentials, rules and policies with our product.
SMTP settings cover functionality in both Mobile Access features and Sync & Share features. For
Mobile Access, the SMTP server is used when sending enrollment invitations. Sync & Share
features use the SMTP server to send folder invitations, warnings, summaries of errors.
All of the settings you see in the Initial Configuration page will also be available after you complete it.
For more information on any of the settings, please visit the Server Administration (p. 94) articles.
Increasing the Acronis Access Tomcat Java Maximum Memory Pool ..... 29
To backup all of Acronis Access's elements and as part of your best practices and backup procedures, you may
want to read the Disaster Recovery guidelines (p. 18) article.
2.1 Disaster Recovery guidelines
High availability and fast recovery is of extreme importance for mission critical applications like
Acronis Access. Due to planned or unplanned circumstances ranging from local hardware failures to
network disruptions to maintenance tasks, it may be required to provision the means for restoring
Acronis Access to a working state in a very short period of time.
Introduction:
For mission critical applications like Acronis Access, high availability is of extreme importance. Due to
various circumstances ranging from local hardware failures to network disruptions to maintenance
tasks, it may be required to provision the means for restoring Acronis Access to a working state in a
very short period of time.
There are different ways to implement disaster recovery, including backup-restore, imaging,
virtualization and clustering. We will describe the backup-restore approach in the following sections.
Description of the Acronis Access elements:
Acronis Access is a solution composed of several discrete but interconnected elements:
Acronis Access Gateway Server
Note: Normally located here: C:\Program Files (x86)\Acronis\Access\Gateway Server
Acronis Access Server
Note: Normally located here: C:\Program Files (x86)\Acronis\Access\Access Server
Acronis Access Configuration Utility
Note: Normally located here: C:\Program Files (x86)\Acronis\Access\Configuration Utility
File Store
The location of the File Store is set during the installation when you first use the Configuration Utility.
Note: The FileStore structure contains user files and folders in encrypted form. This structure can be copied or
backed up using any standard file copy tool (robocopy, xtree). Normally this structure should be located in a
high availability network volume or NAS so the location may differ from the default.
PostGreSQL database. This is a discrete element running as a Windows service, installed and used by
Acronis Access. The Acronis Access database is one of the most critical elements because it maintains
all configurations, relationships between users and files, and file metadata.
All those components are needed in order to build a working instance of Acronis Access.
Resources needed to implement a fast recovery process
The resources needed to fulfill the disaster recovery process are:
Appropriate hardware to host the operating system, application and its data. The hardware must
meet the system and software requirements for the application.
A backup and restore process in place to ensure all software and data elements are available at
the time the switch is needed.
Network connectivity, including internal and external firewall and routing rules that permit users
to access the new node with no or minimal need to change client side settings.
Network access for Acronis Access to contact an Active Directory domain controller and SMTP
server.
Fast or automated DNS switching ability to redirect incoming request to the secondary node.
The process
Backup Setup
The recommended approach to provide a safe and fast recovery scenario can be described like this:
1. Have an installation of Acronis Access, including all elements in the secondary, restore, node. If
this is not possible, a full (source) machine backup or image is a good alternative. In virtualized
environments, periodic snapshots prove to be effective and inexpensive.
2. Backup the Acronis Access server software suite (all elements mentioned above, including the
entire Apache Software branch) regularly. Use any standard, corporate class backup solution for
the task.
3. Backup the FileStore as frequently as possible. A standard backup solution can be used, but an
automated differential copy tool is a good and sometimes preferred alternative due to the
amount of data involved. A differential copy minimizes the time this operation takes by updating
what is different between the source and target FileStores.
4. Backup the Acronis Access database as frequently as possible. This is performed by an automated
database dump script triggered by Windows Task Scheduler. The database dump should then be
backed up by a standard backup tool.
Recovery
Provided the conditions described in the section above have been met and implemented, the process
to bring online the backup resources is relatively simple:
1. Boot up the recovery node. Adjust any network configuration like IP Address, Host Name if
needed. Test Active Directory connectivity and SMTP access,
2. If needed restore the most recent Acronis Access software suite backup.
3. Verify that Tomcat is not running (Windows Control Panel/Services).
4. If needed, restore the FileStore. Make sure the relative location of the FileStore is the same as it
was in the source computer. If this is not the case, the location will need to be adjusted by using
the Configuration Utility.
5. Verify that the PostgreSQL service is running (Windows Control Panel/Services).
6. Restore the Acronis Access database.
7. Start the Acronis Access Tomcat service.
8. Migrate DNS to point to the new node.
9. Verify Active Directory and SMTP are working
2.2 Backing up and Restoring Acronis Access
In case you need to upgrade, update or maintain your Acronis Access server. This article will give you
the basics of backing up your database and restoring it.
Backing up your databases
Backing up your Acronis Access's database
The following method creates an *.sql file containing a text representation of the source database.
1. Open a Command Prompt window and navigate to the PostgreSQL\bin folder located in the
PostgreSQL installation directory.
e.g. cd "C:\Program Files (x86)\Acronis\Access\Common\PostgreSQL\bin"
2. Once your current Command Prompt directory is the bin folder, enter the following line:
pg_dump -U postgres -f mybackup.sql acronisaccess_production
where mybackup.sql is the desired file name for the produced backup file. It can include a full
path to the location where you want the backup file to be created, for instance:
D:\Backups\mybackup.sql
Note:acronisaccess_production must be entered exactly as shown as it is the name of the Acronis
Access database
3. A "Password: " line appears. Enter the postgres password that you set during the Acronis Access
installation process.
Note: Typing the password will not result in any visual changes in the Command Prompt window.
4. Your backup file will appear in the bin folder by default unless the output file specification
contains a full path to a different directory.
Note: If you want to backup the entire PostgreSQL database set you can use the following command:
pg_dumpall -U postgres > alldbs.sql
Where alldbs.sql will be the generated backup file. It can include a full path specification, for instance
D:\Backups\alldbs.sql
For full syntax on this command see: http://www.postgresql.org/docs/9.2/static/app-pg-dumpall.html
http://www.postgresql.org/docs/9.1/static/app-pg-dumpall.html
Info: For more information on PostgreSQL backup procedures and command syntax please read this:
http://www.postgresql.org/docs/9.2/static/backup.html
http://www.postgresql.org/docs/9.1/static/backup.html
Backing up your Gateway Server's database
1. Go to the server on which you have Acronis Access installed.
2. Navigate to the folder containing the database.
Note: The default location is: C:\Program Files (x86)\Acronis\Access\Gateway
Server\database
3.Copy the mobilEcho.sqlite3 file and paste it in a safe location.
Restoring Acronis Access
Restoring your Acronis Access's database
The database restore process is similar to the backup process.
1. Prior to executing the command to restore your database, make sure the source backup file is
located in a directory or location where it can be accessed by the logged in user.
2. Open a Command Prompt window and navigate to the PostgreSQL\bin folder located in the
PostgreSQL installation directory.
cd "C:\Program Files (x86)\Acronis\Access\Common\PostgreSQL\bin"
Note: This directory may be different if you installed PostgreSQL in a custom location.
3. You need to remove the old database first. To do so, stop the Acronis Access Tomcat service and
enter the following line:
Warning! Do not continue with this step unless you are certain you have made a successful backup.
Dropping the database is an irreversible process which deletes the entire database. All information is lost.
dropdb -U postgres acronisaccess_production
A "password for user postgres: " message may appear. If that happens, enter the postgres
password that you set during the Acronis Access installation process.
acronisaccess_production must be entered exactly as shown. This is the Acronis Access
database name.
4. Once the operation finishes, enter the following line:
createdb -U postgres acronisaccess_production
A "password for user postgres: " message may appear. If that happens, enter the postgres
password that you set during the Acronis Access installation process.
acronisaccess_production must be entered exactly as shown. This is the Acronis Access
database name.
5. To fill the newly created database with the information from your backup, enter the following
A "password for user postgres: " message may appear. If that happens, enter the postgres
password that you set during the Acronis Access installation process.
acronisaccess_production must be entered exactly as shown. This is the Acronis Access
database name.
6. Once the process has completed successfully, restart the postgres service and start the Acronis
Access Tomcat service.
Note: Typing the password will not result in any visual changes in the Command Prompt window.
Info: For full psql command syntax, please visit http://www.postgresql.org/docs/9.2/static/app-psql.html
1. Copy the mobilEcho.sqlite3 file you have backed up.
2. Go to the server on which you have Acronis Accessinstalled.
3. Navigate to the folder containing the database and paste the mobilEcho.sqlite3 file.
Note: The default location is: C:\Program Files (x86)\Acronis\Access\Gateway
Server\database
4.Restart the Acronis Access Gateway Server service.
Restoring Acronis Access to a new instance
1. Complete the Backup procedure explained above and move the alldbs.sql and mobilEcho.sqlite3
files to the new server.
2. On the new server, complete the Database restoration procedure explained above.
3. Start the Acronis Access services.
4. Complete the following procedure:
Configurations on the new instance
Note: It is highly recommended that you do not change the DNS names used by Acronis Access, only the IP
addresses they are pointing to. The following instructions assume you are re-using the DNS names of the
previous instance of Acronis Access
1. Open the Acronis Access web interface and login.
2. Navigate to Mobile Access -> Gateway Servers.
3. Press on the down arrow next to the Details button and select Edit.
4. Click on the SharePoint tab and enter the SharePoint administrator's credentials.
5. If the Address for administration is set as an IP address, change it to the new IP you set for the
Acronis Access Server.
6. Press Apply.
If you do not intend to use the same IP address as the previous instance, change the IP entries for the
DNS names used by the Acronis Access and Gateway Server.
As part of its normal operation Tomcat creates and writes information to a set of log files.
Unless periodically purged, these files accumulate and consume valuable space. It is commonly
accepted by the IT community that the informational value those logs provide degrades rapidly.
Unless other factors like regulations or compliance with certain policies play, keeping those log files
in the system a discrete number of days is what is required.
Introduction:
As part of its normal operation Tomcat creates and writes information to a set of log files. On
Windows, these files are normally located in the following directory:
“C:\Program Files (x86)\Acronis\Access\Common\apache-tomcat-7.0.34\logs”
Acronis Access saves it's own logs in the same directory as separate files.
Acronis Access's log files are named acronisaccess_date.
There are many tools capable of automating the task of deleting unneeded log files. For our example,
we will use a built-in Windows command called ForFiles.
Info: For information on ForFiles, syntax and examples visit
http://technet.microsoft.com/en-us/library/cc753551(v=ws.10).aspx
http://technet.microsoft.com/en-us/library/cc753551(v=ws.10).aspx
A sample process:
The sample process described below automates the process of purging log files older than a certain
number of days. Inside the sample batch file, this number is defined as a parameter so it can be
changed to fit different retention policies.
Info: The sample script (batch) file is designed to work on Windows 2008. Click here to download the script.
Optionally you could copy and paste the script code into an empty text document and save it as
“AASTomcatLogPurge.bat”
Click here for the full batch script code...
ECHO OFF
REM Script: aETomcatLogsPurge.bat
REM 2012-05-12: Version: 1.0: MEA: Created
ECHO This script will delete files older than a number of days from a directory
ECHO Run it from the command line or from a scheduler
ECHO Make sure the process has permissions to delete files in the target folder
REM ===== CONFIGURATIONS ===================================================
REM Note: all paths containing spaces must be enclosed in double quotes
REM Edit this file and set LogPath and NumDays below
REM Path to the folder where all Tomcat logs are
set LogPath="C:\Program Files (x86)\Group Logic\Common\apache-tomcat-7.0.34\logs"
Warning: We provide this example as a guideline so you can plan and implement your own process based on
the specifics of your deployment. The example is not meant nor tested to apply to all situations and
environments so use it as a foundation and at your own risk. Do not use it in production environments without comprehensive offline testing first.
Steps:
1. Copy the script to the computer running Acronis Access (Tomcat) and open it with Notepad or a
suitable plain text editor.
2. Locate the section illustrated in the picture below and edit the LogPath and NumDays variables
with your specific paths and retention settings:
In Acronis Access the log files are stored in the same folder as Tomcat's. (C:\Program Files
(x86)\Acronis\Access\Common\apache-tomcat-7.0.34\logs)
3. Select daily and select the time when the script will be run and how often the script should be
rerun (how often you want to backup your database).
4. Select Enabled from the Advanced settings and press OK.
On the Actions tab:
1. Click New.
2. Select Start a program for Action.
3. For Program/Script press Browse, navigate to and select the DatabaseBackup.bat file.
4. For Start in (optional), enter the path to the folder in which the script resides. e.g. If the path to
the script is C:\Program Files (x86)\Acronis\Access\Common\PostgreSQL\9.3\PSQL.bat enter C:\Program Files (x86)\Acronis\Access\Common\PostgreSQL\9.3\
5. Press OK.
Configure any additional settings on the other tabs and press OK.
You will be prompted for the credentials for the current account.
2.5 Increasing the Acronis Access Tomcat Java
Maximum Memory Pool
By default, the Acronis Access Tomcat's Java Maximum Memory Pool setting on a 64 bit operating
system is 4GBs. Depending on your deployment, you may need more.
Note: On a 32bit operating system, the maximum memory pool is 1GB.
To increase the maximum memory pool:
1.Click on the Start menu and navigate to All Programs -> Acronis Access.
This section of the web interface covers all the settings and configurations affecting mobile device
users.
3.1 Concepts
Access Mobile Clients connect directly to your server rather than utilizing a third-party service,
leaving you in control. Acronis Access server can be installed on existing file servers, allowing iPads,
iPhones and Android devices to access files located on that server. These are typically the same files
already available to PCs using Windows file sharing and Macs using ExtremeZ-IP File Server.
Clients access Acronis Access servers using their Active Directory user account. No additional
accounts need to be configured within Acronis Access. The Access Mobile Client also supports file
access using local computer accounts configured on the Windows server Acronis Access is running on,
in the event you need to give access to non-AD users. The client management features described
below require AD user accounts.
The deployment consists of a single Windows server running an installation of Acronis Access. This
includes the Acronis Access Server component installed and the Acronis Access Gateway Server
installed. This scenario allows devices running the Access Mobile Client application to connect to this
single file server, and allows for client management.
If client management is not needed, Data Sources can be setup on the local Gateway Server and the
Access Mobile Clients will be able to access these Data Sources. Each user will be in control of his
own app settings.
Fig 1. Single Gateway server, many Access Mobile Clients
Note: Details on installing Acronis Access are included in the Installing (p. 5) section of this guide. The
configuration of Data Sources is explained in the Mobile Access (p. 31) section.
If you wish to remotely manage your Access Mobile Clients, Acronis Access allows you to use a group
policy. This policy can:
Configure general application settings
Assign servers, folders, and home directories to be displayed in the client app
Restrict what can be done with files
Restrict the other third party apps that Access Mobile Client files can be opened into
Set security requirements (server login frequency, application lock password, etc.)
Disable the ability to include Access Mobile Client files in iTunes backups
Remotely reset a user's application lock password
Perform a remote wipe of the Access Mobile Client app's local data and settings
And many additional configuration and security options
Only one Acronis Access Server is allowed.
A typical network employing client management includes one server with the Acronis Access Server
and Acronis Access Gateway Server components installed. In this scenario, all mobile clients are
managed by the Acronis Access Server, and will contact this server each time the Acronis Access
application is started, to check for any changed settings and to accept application lock password
resets and remote wipe commands if necessary.
home directories in their management policy. These resources will automatically appear in the
Acronis Access app and the client app will contact these servers directly as needed for file access.
Note: Details on enabling and configuring the client management are included in the Policies (p. 33) and
Managing Mobile Devices (p. 127) section of this guide.
3.2 Policies
3.2.1 Group Policy
Acronis Access uses a single Group Policy to manage all of your mobile users.
3.2.1.1 Exceptions for policy settings
Acronis Access does not support the Acronis Access for Good Dynamics and Acronis Access with
Mobile Iron AppConenct apps.
3.2.1.2 Modifying the Policy
Changes to the policy will be applied to the relevant Acronis Access client users the next time they
launch the app.
Connectivity requirements
Acronis Access clients must have network access to the Acronis Access server in order to receive profile updates,
remote password resets, and remote wipes. If your client is required to connect to a VPN before they can access
Acronis Access, they will also need to connect to the VPN before management commands will be accepted.
To modify the Group policy
1. Click on the default group.
2. Make any changes necessary on the Edit Group Policy page and press Save.
where you prefer that a user cannot set an app password and will lock other users out of the
Access Mobile Client.
Required - This setting will force the user to configure an application lock password if they do
not already have one. The optional application password complexity requirements and failed
password attempt wipe setting only apply when App password creation is set to Required.
App will lock - This setting configures the application password grace period. When a
user switches from the Access Mobile Client to another application on their device, if
they return to the Access Mobile Client before this grace period has elapsed, they will
not be required to enter their application lock password. To require that the password is
entered every time, choose Immediately upon exit. If you would like the user to be able
to modify their App will lock setting from within the Access Mobile Client settings, select
Allow user to change this setting.
Minimum password length - The minimum allowed length of the application lock
password.
Minimum number of complex characters - The minimum number of non-letter,
non-number characters required in the application lock password.
Require one or more letter characters - Ensures that there is at least one letter character
in the application password.
Mobile Client app will be wiped after X failed app password attempts - When this
option is enabled, the settings and data in the Access Mobile Client app will be wiped
after the specified number of consecutive failed app password attempts.
User can remove Mobile Client from management- Enable this setting if you would like your
Acronis Access users to be able to uninstall their management policy from within Acronis Access.
Doing so will return the application to full functionality and restore any configuration that was
changed by their policy.
Wipe all Acronis Access data on removal - When user removal of policies is enabled, this
option can be selected. If enabled, all data stored locally within the Access Mobile Client
application will be erased if it is removed from management, ensuring that corporate data
does not exist on a client not under management controls.
Allow iTunes to back up locally stored Acronis Access files - When this setting is disabled, the
Access Mobile Client will not allow iTunes to back up its files. This will ensure that no files within
Acronis Access' secure on-device storage are copied into iTunes backups.
Require Confirmation When Deleting Files - When enabled, the user will be asked for
confirmation each time they delete a file. If you would like the user to be able to later modify this
setting, select Allow user to change this setting.
Set the Default File Action - This option determines what will happen when a user taps a file in
the Access Mobile Client application. If this is not set, the client application defaults to Action
Menu. If you would like the user to be able to later modify this setting, select Allow user to
change this setting.
Display Thumbnail Previews for Server-Side Files - When enabled, thumbnail previews will be
displayed instead of filetype icons when browsing Data Sources and Gateway Servers.
Thumbnail Cache Size: - Sets how much space will be reserved for thumbnails.
Only Download Thumbnail Previews on WiFi Networks - When enabled, thumbnails will be
available only if the user is connected to a WiFi network.
These settings can be used to disable certain Access Mobile Client application features and
capabilities. All copy, create, move, rename, and delete settings apply to files or folders located on
Gateway servers. Files in the mobile client's local My Files folder are stored on the device and are not
affected. All other settings apply to any files in Acronis Access, both server-based and locally stored
on the client.
File Operations
File Copies / Creation - If this option is disabled, the user will not be able to save files from other
applications or from the iPad Photos library to a Gateway Server. They will also be unable to copy
or create new files or folders on the Gateway Server server Gateway Server. This setting
supersedes any NTFS permissions that client may have that allow file creation.
File Deletes - If this option is disabled, the user will not be able to delete files from the Gateway
Server. This setting supersedes any NTFS permissions that client may have that allow file
deletion.
File Moves - If this option is disabled, the user will not be able to move files from one location to
another on the Gateway Server, or from the server to the Access Mobile Client application's local
My Files storage. This setting supersedes any NTFS permissions that client may have that allow
file or folder moves.
File Renames - If this option is disabled, the user will not be able to rename files from the
Gateway Server. This setting supersedes any NTFS permissions that client may have that allow
file renames.
Folder Operations
Folder Copies - If this option is disabled, the user will not be able to copy folders on or to the
Gateway Server. This setting supersedes any NTFS permissions that client may have that allow
folder creation. File copies / creation must be enabled for this setting to be enabled.
Folder Deletes - If this option is disabled, the user will not be able to delete folders from the
Gateway Server. This setting supersedes any NTFS permissions that client may have that allow
folder deletion.
Folder Moves - If this option is disabled, the user will not be able to move folders from one
location to another on the Gateway Server, or from the server to the Access Mobile Client
application's local My Files storage. This setting supersedes any NTFS permissions that client may
have that allow file or folder moves. Folder copies must be enabled for this setting to be
enabled.
Folder Renames - If this option is disabled, the user will not be able to rename or folders from
the Gateway Server. This setting supersedes any NTFS permissions that client may have that
allow folder renames.
Adding New Folders - If this option is disabled, the user will not be able to create new, empty
folders on the Gateway Server.
Bookmarking Folders - If this option is disabled, the user will not be able to bookmark on-device
or on-server Acronis Access folders for quick shortcut access.
Data Leakage Protection
Opening Acronis Access Files in Other Applications - If this option is disabled, the Access Mobile
Client application will omit the Open In button and not allow files in Acronis Access to be opened
in other applications. Opening a file in another application results in the file being copied to that
application's data storage area and outside of Acronis Access control.
Client is Prompted to Confirm Before Synced Files are Downloaded - Select the conditions under
which the user must confirm before files in synced folders are downloaded. Options are: Always,
While on cellular networks only, and Never. If Allow User to Change This Setting is enabled,
clients will be able to change the confirmation options.
Auto-Sync Interval - When this option is enabled, Acronis Access will automatically sync never,
on app launch only or on several time intervals.
Allow User to Change This Setting - When this option is enabled, the users will be able to
change the time interval from the Access Mobile Client app.
Only Allow File Syncing While Device is on WiFi Networks - When this option is enabled,
Acronis Access will not allow files to be synced over cellular connections. If Allow User to Change This Setting is enabled, clients will be able to enable or disable automatic file syncing
while on WiFi networks.
Display the user's home folder- This option causes a user's personal home directory to appear in
the Access Mobile Client app.
Display name shown on client - Sets the display name of the home folder item in the Access
Mobile Client app.
Active Directory assigned home folder - The home folder shown in the Access Mobile Client
app will connect the user to the server/folder path defined in their AD account profile. The
Home Folder will be accessible via the selected Gateway.
Custom home directory path - The home folder shown in the Access Mobile Client app will
connect the user to the server and path defined in this setting. The %USERNAME% wildcard
can be used to include the user's username in the home folder path. %USERNAME% must be
capitalized.
Sync – This option selects the type of sync of your Home Directory.
Required login frequency for resources assigned by this policy- sets the frequency that a user
must log into the servers that are assigned to them by their policy.
Once only, then save for future sessions - The user enters their password when they are
initially enrolled in management. This password is then saved and used for any file server
connections they later initiate.
Once per session - After launching the Access Mobile Client, the user is required to enter
their password at the time they connect to the first server. Until they leave the Access
Mobile Client application, they can then connect to additional servers without having to
reenter their password. If they leave the Access Mobile Client for any period of time and then
return, they will be required to enter their password again to connect to the first server.
For every connection - The user is required to enter their password each time they connect
to a server.
Allow user to add individual servers - If this option is enabled, users will be able to manually add
servers from within the Access Mobile Client application, as long as they have the server's DNS
name or IP address. If you want the user to only have their policy Assigned Servers available,
leave this option disabled.
Allow saved passwords for user configured servers - If a user is allowed to add individual
servers, this sub-option determines whether they are allowed to save their password for
those server.
Allow File Server, NAS and Sharepoint Access From the Web Client - When enabled, Web Client
users will be able to see and access mobile Data Sources as well.
Allow User to Add Network Folders by UNC path or URL - When enabled, the mobile client users
will be able to add and access network folders and SharePoint sites not assigned to them or not
accessible through the existing Data Sources. The selected Gateway Server must have access to
those SMB shares or SharePoint sites.
Block access to specific network paths - When enabled, allows the administrator to create
and use blacklists of network paths which the users shouldn't be allowed to self-provision.
Only allow this Mobile Client to connect to servers with third-party signed SSL certificates - If
this option is enabled, the Access Mobile Client will only be permitted to connect to servers with
third-party signed SSL certificates.
Note: If the management server does not have a third-party certificate, the client will be unable to reach
the management server after it's initial configuration. If you enable this option, ensure you have third-party
certificates on all your Gateway Servers.
Warn client when connecting to servers with untrusted SSL certificates - If your users are
routinely connecting to servers that will be using self-signed certificates, you may choose to
disable the client-side warning dialog message they will receive when connecting to these
servers.
Client timeout for unresponsive servers - This option sets the client login connection timeout for
unresponsive servers. If your clients are on especially slow data connections, or if they rely on a
VPN-on-demand solution to first establish a connection before a Gateway Server is reachable,
this timeout can be set to a value greater than the 30 second default. If you want the client to be
able to change this through the Access Mobile Client app, check Allow user to change this setting.
This section allows you to set whether mobile clients need to be enrolled with the management
server.
3.3 On-boarding Mobile Devices
To get started with the Acronis Access app, users need to install it through the Apple App Store (iOS)
or the Google Play Store (Android). Depending on your company's deployment of Acronis Access, the
users may also need to enroll the Access Mobile app on their device with the Acronis Access Server.
Once enrolled, their mobile client configuration, security settings, and capabilities are controlled by
their Acronis Access management policy.
The Acronis Access application settings and features controlled by the management policy include:
Requiring an application lock password
App password complexity requirements
Ability to remove the Acronis Access app from management
Allow Acronis Access on-device files to be included in iTunes backups
Allow opening Acronis Access app files in other applications
Allow file and folder creation, renames and deletes
In this section
Server-side Management Enrollment Process ......................................... 44
User-side Management Enrollment Process ........................................... 45
Allow moving files
Require confirmation when deleting
Servers, folders, and home directories can be assigned so they automatically appear in the
Access Mobile Client app
Assigned folders can be configured to perform 1-way to 2-way syncing with the server
3.3.1 Server-side Management Enrollment Process
Inviting a user to enroll
Users are typically invited to enroll with the Acronis Access Server with an email that is sent from an
Acronis Access Administrator. If a user has multiple devices, they will need to be sent one invitation
email for each device that needs access.
This email includes a link to the Acronis Access app in the Apple App Store or Google Play Store, in
the case the app first needs to be installed. It also includes a second link that, when tapped while on
the device, will open Acronis Access and auto-complete the client enrollment form with the Acronis
Access Server's name and the user's username. By using this link, a user simply enters their account
password to complete client enrollment.
Using basic URL enrollment links:
You can give your users a standard URL that will automatically start the enrollment process when
tapped from the mobile device.
To determine the enrollment URL for your management server, open the Mobile Access tab and
open the Enroll Users tab. The URL is displayed on this page.
To generate a Acronis Access enrollment invitation:
1. Open the Mobile Access tab and open the Enroll Users tab
2. Press the Send Enrollment Invitation button.
3. Enter an Active Directory user name or group name and click Search. If a group is chosen, you can
press Add to show each email address in that group in the Users to invite list. This will allow you
to batch invite all members in a group. You can optionally remove one or more of those group
members before sending the invitations. You can perform 'begins with' or 'contains' searches for
Active Directory groups. Begins with search will complete much faster than contains searches.
4. Once you've added your first user or group, you can issue a new search and continue to add
additional users or groups to the list.
5. Review the list of Users to invite. You can Delete any users you would like to remove them from
the list.
6. If a user does not have an email address associated with their account, you will see No email
address assigned - click here to edit in the Email Address column. You can click any of these
entries to manually enter an alternate email address for that user.
7. Choose the number of days you'd like the invitation to be valid for in the Number of days until
invitation expires field.
Note: Acronis Access licensing allows each licensed user to activate up to 3 devices, each additional device
beyond 3 is counted as a new user for licensing purposes.
8. Choose the version or versions of the Access Mobile Client that you would like your users to
download and install on their device. You may choose iOS, Android, or Both.
9. Press Send.
Note: If you get an error message when sending, confirm that the SMTP settings in the SMTP tab under
General Settings are correct. Also, if you're using Secure connection, verify that the certificate you are using
matches the host name of your SMTP server.
3.3.2 User-side Management Enrollment Process
Each user sent a management enrollment invitation will receive an email that contains:
A link to install the Access Mobile Client from the Apple App Store.
A link used to launch the Access Mobile Client app and automate the enrollment process.
Their management server address.
The email guides them through the process of installing the Access Mobile Client and entering
their enrollment information.
If the Access Mobile Client app has already been installed, and the user taps the "Tap this link to automatically begin enrollment..." option while viewing this email on their device, Acronis Access
will automatically launch and the enrollment form will be displayed. The user's server address and
username are also encoded in this URL, so these fields are auto-completed in the enrollment form. At
this point, the user simply has to enter their password to complete the enrollment process.
The username and password required are the user's Active Directory username and password. These
credentials are used to match them to the group policy, to access the Gateway server and if the
policy allows it, the saving of their credentials for Acronis Access server logins.
If their management policy requires an application lock password, they will be prompted to enter
one. All password complexity requirements configured in their policy will be enforced for this initial
password, and for any change of their application lock password in the future.
To enroll in management
Enroll automatically via enrollment email
1. Open the email sent to you by your IT administrator and tap the click here to install the Acronis
Access link if you have not yet installed Acronis Access.
2. Once Acronis Access is installed, return to the invitation email on your device and tap Click this
link to automatically begin enrollment in step 2 of the email.
3. An enrollment form will be displayed. If you used the link in the invitation email to start the
enrollment process, your Server Address and Username will be automatically filled out.
4. Enter your password and tap Enroll Now to continue.
Note: The Username and Password are your standard company username and password. This is likely the
same as you use to log into your computer or to your email.
5. After completing the entire form, tap the Enroll button.
6. Depending on the configuration of your company's server, you may be warned that your
management server's security certificate is not trusted. To accept this warning and proceed, you
can click Proceed Always.
7. If a application lock password is required for your Access Mobile Client app, you will be asked to
set one. Password complexity requirements may apply and will be displayed if needed.
Manual enrollment
1. Open the Acronis Access app.
2. Open Settings.
3. Tap Enroll
4. Fill in your server's address, your username and password.
5. After completing the entire form, tap the Enroll button.
6. Depending on the configuration of your company's server, you may be warned that your
management server's security certificate is not trusted. To accept this warning and proceed, you
can click Proceed Always.
If a application lock password is required for your Access Mobile Client app, you will be asked to set
one. Password complexity requirements may apply and will be displayed if needed.
Ongoing Management Updates
After the initial management setup, Access Mobile Clients will attempt to contact the management
server each time the client app is started. Any settings changes, server or folder assignment changes,
application lock password resets, or remote wipes will be accepted by the client app at that time.
Acronis Access clients must have network access to the Acronis Access server in order to receive profile updates,
remote password resets, and remote wipes. If your client is required to connect to a VPN before they can access
Acronis Access, they will also need to connect to the VPN before management commands will be accepted.
Removing Management
There are two options to remove your Access Mobile Client from management:
Turn Off the Use Management option (if allowed by your policy)
Remove the Access Mobile Client application
Depending on your Acronis Access management policy settings, you may have the right to remove
the Access Mobile Client from management. This will likely result in you not being able to access
corporate files servers. If you are allowed to do so, follow these steps to unmanage your device:
To unmanage your device follow the steps below:
1. Tap the Settings menu.
2. Turn OFF the Use Management option.
3. Your profile may require that your Access Mobile Client data is wiped when removing the device
from management. You can cancel the process at this point if you don't want to be wiped.
4. Confirm removing Acronis Access from management by tapping YES in the confirmation window.
Note: If your Acronis Access management profile does not allow you to unmanage your client, the Use
Management option will not be displayed on the Settings menu. In this case the only way to remove the device
from management is by uninstalling the Access Mobile Client application. Uninstalling the application will erase
all existing Access Mobile Client data and settings and will return the user to default application settings after
reinstalling.
To uninstall the Access Mobile Client app, follow the steps below:
1. Hold your finger on the Access Mobile Client app icon until it starts shaking.
2. Tap the "X" button on the Access Mobile Client application and confirm the uninstall process.
3. To reinstall the Access Mobile Client app, visit http://www.grouplogic.com/web/meappstore
3.4 Managing Your Gateway Server
The Acronis Access Gateway Server is the server contacted by the Access Mobile Clients that handles
accessing and manipulating files and folders in file servers, SharePoint respositories, and/or Sync &
Share volumes. The Gateway Server is the "gateway" for mobile clients to their files.
The Acronis Access Server manages the Gateway Server from the same management console. The
Gateway Servers under management appear in the Gateway Servers section of the Mobile Access
menu.
Type - Shows the type of the gateway, at the moment it can only be of the Server type.
Name - Cosmetic name given to the gateway when you create it.
Address - DNS name or IP address of the gateway.
Version - Shows the version of the Acronis Access Gateway Server.
Status - Shows whether the server is Online or Offline.
Active Sessions - Number of currently active sessions to this Gateway Server.
Licenses Used - Number of licenses used and the number of available licenses.
License - Shows the current type(s) of license(s) used by the Gateway Server.
Search
Index local data sources for filename search
By default, indexed searching is enabled on all Gateway Servers. You can disable or enable indexed
searching for each Gateway Server in the Gateway’s Edit Server dialog.
Default path
By default on a standalone server, Acronis Access stores index files in the Search Indexes directory in
the Acronis Access Gateway Server application folder. If you would like to locate the index files in a
different location, enter the path to a new folder.
Support content search using Microsoft Windows Search where available
Support for content search of shared is enabled by default, and can be enabled or disabled by
checking this option. You can enable or disable content searching for each Gateway Server in the Edit
Server dialog.
In addition to enabling this setting, content search requires that the Microsoft Windows Search
application be installed on the Acronis Access Gateway server and be configured to index any data
source where content search is enabled. Windows Search is built into Windows Vista and no
additional installation is required. It is also built into Windows Server 2008, but it is not enabled by
default. To enable it add the Role called File Services in the Server Manager, and have the Windows
Search Service enabled. Windows Search can be configured to index the necessary data sources by
right clicking the Windows Search icon in the Start bar and selecting Windows Search Options. You
can do Windows content searches on Windows reshares but the remote machine(s) must be in the
same domain as the Gateway Server.
search on Windows Reshares. IP addresses are not supported by Windows Search.
SharePoint
Entering these credentials is optional for general SharePoint support, but required to enumerate site
collections. For example, say you have two site collections: http://sharepoint.example.com and
http://sharepoint.example.com/SeparateCollection. Without entering credentials, if you create a
volume pointing to http://sharepoint.example.com, you will not see a folder called
SeparateCollection when enumerating the volume. The account needs to have Full Read access to
the web application.
3.4.1 Server Details
Opening the Details page of a Gateway Server gives you a lot of useful information about that
specific server and its users.
The Status section gives you information about the Gateway Server itself. Information like the
operating system, the type of the license, number of licenses used, version of the Gateway Server
and more.
Displays a table of all users currently active in this Gateway Server.
User - Shows the user's Active Directory (full) name.
Location - Shows the IP address of the device.
Device - Shows the name given to the device by the user.
Model - Shows the type/model of the device.
OS - Shows the operating system of the device.
Client Version - Shows the version of the Acronis Access app installed on the device.
Policy - Shows the policy for the account used by the device.
Idle Time - Shows the time the user has spent connected to the gateway.
The Logging section allows you to control whether the logging events from this specific Gateway
Server will be shown in the Audit Log and allows you to enable Debug logging for this server.
To enable Audit Logging for a specific gateway server:
1. Open the web interface.
2. Log in as an administrator.
3. Open the Mobile Access tab.
4. Open the Gateway Servers tab.
5. Find the server for which you want to enable Audit Logging.
6. Press the Details button.
7. In the Logging section check Audit Logging.
8. Press the Save button.
To enable Debug Logging for a specific gateway server:
Note: The default location for the debug logs is: C:\Program Files (x86)\Acronis\Access\Gateway
Server\Logs\AcronisAccessGateway
1. Open the web interface.
2. Log in as an administrator.
3. Open the Mobile Access tab.
4. Open the Gateway Servers tab.
5. Find the server for which you want to enable Debug Logging.
By default, indexed searching is enabled on all Gateway Servers. You can disable or enable indexed
searching for each Gateway Server in the Gateway’s Edit Server dialog.
Default path
By default on a standalone server, Acronis Access stores index files in the Search Indexes directory in
the Acronis Access Gateway Server application folder. If you would like to locate the index files in a
different location, enter the path to a new folder.
Support content search using Microsoft Windows Search where available
Support for content search of shared is enabled by default, and can be enabled or disabled by
checking this option. You can enable or disable content searching for each Gateway Server in the Edit
Server dialog.
In addition to enabling this setting, content search requires that the Microsoft Windows Search
application be installed on the Acronis Access Gateway server and be configured to index any data
source where content search is enabled. Windows Search is built into Windows Vista and no
additional installation is required. It is also built into Windows Server 2008, but it is not enabled by
default. To enable it add the Role called File Services in the Server Manager, and have the Windows
Search Service enabled. Windows Search can be configured to index the necessary data sources by
right clicking the Windows Search icon in the Start bar and selecting Windows Search Options. You
can do Windows content searches on Windows reshares but the remote machine(s) must be in the
same domain as the Gateway Server.
Note: The Data Source's volume path must be a hostname or a fully qualified name in order to use content
search on Windows Reshares. IP addresses are not supported by Windows Search.
Entering these credentials is optional for general SharePoint support, but required to enumerate site
collections. For example, say you have two site collections: http://sharepoint.example.com and
http://sharepoint.example.com/SeparateCollection. Without entering credentials, if you create a
volume pointing to http://sharepoint.example.com, you will not see a folder called
SeparateCollection when enumerating the volume. The account needs to have Full Read access to
the web application.
To give your account Full Read permission, follow these steps (for SharePoint 2010):
Minimum iOS client version - When enabled, users connecting to this Gateway will be required
to have this or a later version of the Acronis Access iOS client app..
Use Kerberos for SharePoint Authentication - If your SharePoint server requires Kerberos
authentication, you should enable this setting. You will also need to make an update to the
Active Directory computer object for the Windows server or servers that are running the
Gateway server software. The Acronis Access Windows server needs to be given permission to
present delegated credentials to your SharePoint server on behalf of you users. Enabling the
Acronis Access Windows server to perform Kerberos Delegation:
1. In Active Directory Users and Computers, locate the Windows server or servers that you
have the Gateway Server installed on. They are commonly in the Computers folder.
2. Open the Properties window for the Windows server and select the Delegation tab.
3. Select Trust this computer for delegation to specified services only
4. Select Use any authentication protocol, this is required for negotiation with the SharePoint
server.
5. You must now add any SharePoint servers that you would like your users to be able to access
using Acronis Access . If your SharePoint implementation consists of multiple load balanced
nodes, you will need to add each SharePoint/Windows node to this list of permitted
computers. Click Add... to search for these Windows computers in AD and add them. For
each, you will need to select the "http" service type only.
Note: Please allow 15 to 20 minutes for these change to propagate through AD and be applied before
testing client connectivity. They will not take effect immediately.
Allow connections to SharePoint servers using self-signed certificates - When enabled, allows
connections from this Gateway to SharePoint servers using self-signed certificates.
Allow connections to Acronis Access servers with self signed certificates - When enabled, allows
connections from this Gateway to Acronis Access servers using self-signed certificates.
Allow connections from Acronis Access servers with self signed certificates - When enabled,
allows connections to this Gateway from Acronis Access servers using self-signed certificates.
Show hidden SMB Shares - When enabled, shows hidden system SMB shares to the users.
Client session timeout in minutes - Sets the time before an inactive user is kicked out of the
Gateway Server.
Use user principal name (UPN) for authentication with SharePoint Servers - When enabled,
users will authenticate to SharePoint servers via their user principal name (e.g.
hristo@glilabs.com), otherwise they will authenticate with domain/username (e.g.
glilabs/hristo).
3.5 Managing Data Sources
You can share NTFS directories located on your Windows server or on a remote SMB/CIFS file share
for access by Acronis Access users. When Acronis Access mobile users connect, they see these Data
Sources as folders. You can create Data Sources that provide access to an Sync & Share server.
Note: With Acronis Access, you can have a total of 3 Data Sources located on remote locations. These locations
include SharePoint sites, SharePoint libraries and SMB/CIFS shares.
Access to SharePoint 2007, 2010, 2013, 365 content
Acronis Access can provide access to files residing in document libraries on SharePoint 2007, 2010,
2013 and 365 servers. An Acronis Access SharePoint data source can point to an entire SharePoint
server, a specific SharePoint site or subsite, or a specific document library. These files can be opened,
PDF annotated, edited, and synced, just like files that reside in traditional file server or NAS storage.
Acronis Access also supports Check Out and Check In of SharePoint files.
SharePoint authentication methods supported
Acronis Access supports SharePoint servers that allow client authentication using NTLMv1, NTLMv2,
Claims based and Kerberos. If your SharePoint server requires Kerberos authentication, you will need
to make an update to the Active Directory computer object for the Windows server or servers that
are running the Acronis Access server software. The Acronis Access Windows server needs to be
given permission to present delegated credentials to your SharePoint server on behalf of you users.
Claims based authentication involves authenticating with an authentication server, obtaining an
authentication token, and providing that token to the SharePoint server, rather than authenticating
with the SharePoint server directly. Acronis Access supports claims based authentication to Office
365 SharePoint sites. To authenticate, the gateway server first contacts Microsoft Online to
determine the location of the authentication server. This server may be hosted by Microsoft Online,
or may be within the corporate network (via Active Directory Federated Services). Once
authentication is complete and an binary security token is obtained, this token is sent to the
SharePoint server, which returns an authentication cookie. This cookie is then provided to
SharePoint in lieu of other user credentials.
Changing Permissions for Shared Files and Folders
Acronis Access uses the existing Windows user accounts and passwords. Because Acronis Access
enforces Windows NTFS permissions, you should normally use Windows’ built-in tools for adjusting
directory and file permissions. The standard Windows tools provide the most flexibility for setting up
your security policy.
Acronis Access Data Sources that reside on another SMB/CIFS file server are accessed using an
SMB/CIFS connection from the Gateway Server to the secondary server or NAS. In this case, access to
the secondary server is performed in the context of the user logged into the Access Mobile Client app.
In order for that user to have access to files on the secondary server, their account will need both
"Windows Share Permissions" and NTFS security permissions to access those files.
Permissions to files residing on SharePoint servers are regulated in accordance to the SharePoint
permissions configured on the SharePoint server. Users receive the same permissions through
Acronis Access as they receive when they access SharePoint document libraries using a web browser.
In addition to Gateway Servers, Folders can also be assigned to Acronis Access user and group
policies, allowing them to automatically appear in a user's Acronis Access Mobile client application.
Folders can be configured to point to any Acronis Access Gateway Server, or even a subdirectory
within a shared volume. This allows you to give a user direct access to any folders that might be
important to them. By doing so, they don't have to navigate to the folder by knowing the exact
server, shared volume name, and path to the folder.
Folders can point to any type of content that Acronis Access is providing access to. They simply refer
to locations in Gateway Servers that have already been configured within the Acronis Access
management. This can be a local file share volume, a "network reshare" volume providing access to
files on another file server or NAS, a DFS share or a SharePoint volume.
Note: When creating a DFS Data Source you need to add the full path to the DFS like so:
\\company.com\namespace\share
Folders can optionally be configured to sync to the client device. The Access Mobile Client folder sync
options include:
None - The folder will appear as a network-based resource in the Acronis Access client app and
can be accessed and worked with just like a Gateway server.
1-Way - The folder will appear as a local folder in the Acronis Access client app. Its complete
contents will be synced from the server to the device and it will be kept up to date if files on the
server are added, modified, or deleted. This folder is intended to give local/offline access to a set
of server-based files and appears as read-only to the user.
2-Way - The folder will appear as a local folder in the Acronis Access client app. Its complete
contents will initially be synced from the server to the device. If files in this folder are added,
modified, or deleted, either on the device or on the server, these changes will be synced back to
the server or device.
SharePoint Sites and Libraries
You can give easy access to SharePoint sites and libraries to your Access Mobile Client users by
creating a Data Source. There are a couple of ways to create SharePoint Data Sources depending on
your SharePoint configuration:
Creating a Data Source for a whole SharePoint site or subsite
When creating a Data Source for a SharePoint site or subsite, you only need to fill in the URL field.
This should be address of your SharePoint site or subsite.
e.g. https://sharepoint.mycompany.com:43222
e.g. https://sharepoint.mycompany.com:43222/subsite name
Creating a Data Source for a SharePoint Library
When creating a Data Source for a SharePoint Library, you need to fill both the URL and Document
Library Name fields. In the URL field you enter the address of your SharePoint site or subsite and for
the Document Library Name field you enter the name of your Library.
e.g. URL: https://sharepoint.mycompany.com:43222
e.g. Document Library Name: My Library
Creating a Data Source for a specific folder within a SharePoint Library
When creating a Data Source for a specific folder within a SharePoint Library, you will have to fill in
all fields. In the URL field you enter the address of your SharePoint site or subsite, for the Document
Library Name field you enter the name of your Library and for the Subpath field you enter the name
of the desired folder.
e.g. URL: https://sharepoint.mycompany.com:43222
e.g. Document Library Name: Marketing Library
e.g. Subpath: Sales Report
Note: When creating a Data Source pointing to a SharePoint resource using a Subpath, you cannot enable the
Show When Browsing Server option.
The Access Mobile Client supports NTLM, Kerberos Constrained Delegation, Claims based and
SharePoint 365 authentication. Depending on your SharePoint setup, you may need to make some
additional configurations to the Gateway Server used to connect to these Data Sources. For more
information visit the Editing Gateway Servers (p. 53) article.
7. Select the Gateway Server which will give access to this folder.
8. Select the location of the data. This can be on the actual Gateway Server, on another SMB server,
on a SharePoint Site or Library or on a Sync & Share server.
Note: When selecting Sync & Share, make sure to enter the full path to the server with the port number.
e.g.: https://mycompany.com:3000
9. Based on your choice of location, enter the path to that folder, server, site or library.
10. Select the Sync type of this folder.
11. Enable Show When Browsing Server if you want this Data Source to be visible when Acronis
Access mobile clients browse the Gateway Server.
12. Press the Save button.
Note: On a clean installation of Acronis Access, if you have enabled Sync & Share and you have a Gateway
Server present, you will have a Sync & Share Data Source created automatically. It points to the URL you set in
the Server section of the initial configuration. This folder allows your mobile users to access your Sync & Share
files and folders.
Mobile Client Enrollment Address - specifies the address which mobile clients should use when
enrolling in client management.
Note: It is highly recommended to use a DNS name for the mobile client enrollment address. After
successfully enrolling in management, the Acronis Access app stores the address of the mana gement server.
If that address is an IP address and it changes, the users cannot reach the server, the app cannot be
unmanaged and the users will have to delete the whole app and enroll in management again.
First Run ................................................................................................... 67
Configuring your Group Policy ................................................................. 72
Installing the Access Mobile Client application ....................................... 72
Enrolling in client management ............................................................... 72
This guide provides the essential steps for configuring your Group Policy, adding a Data Source and
installing the Access Mobile Client app. For more detailed instructions on configuring the Acronis
Access Gateway Server and the management components, see the Mobile Access (p. 31) section.
5.1 First Run
If you haven't done so already, install and configure Acronis Access. For more information on doing
so, check the Installing (p. 5) and Configuration Utility sections.
When you first open the web interface, you will have to set a password for the default administrator
account and after you log in, you will be greeted by the Setup Wizard.
Warning! Please do not forget your administrator password as the support department cannot recover this
password for you
Note: It may take 30-45 seconds until the application becomes available after starting it from the Configuration
Utility.
Once you have completed the above, you are ready to go through the Initial Configuration described
below.
With the Group Policy, you can administer what your users can do with files and what they have
access to.
Configuring your Group Policy:
1. Open the Policies tab.
2. Click on the Default policy.
3. Make the necessary configurations in each of the tabs (Security (p. 34), Application (p. 36), Sync
(p. 39), Home Folders (p. 40) and Server (p. 41)) and press Save.
6.1 Installing the Access Mobile Client application
1. Browse to Acronis Access in the Apple App Store or Google Play store
From your iOS device, visit the Apple App Store and search for Acronis Access, or follow this
link: http://www.grouplogic.com/web/meappstore
From your Android device, visit the Google Play store and search for Acronis Access, or follow
this link: https://play.google.com/store/apps/details?id=com.grouplogic.mobilecho
2. Install the Acronis Access app and tap it to launch it.
3. At the Welcome screen, tap Continue.
Tap the “+” icon on iOS to add a server.
On Android, open the Settings menu and tap Add Server.
4. Enter the Server Name or IP address of the server you installed Acronis Access on. You can
optionally enter a Display Name for this server, which will appear in the server list.
5. Enter a Username that has access to the Gateway Server. Acronis Access uses standard NTFS
permissions to regulate access.
6. Toggle Save Password to ON if you would like to save your password, then enter and confirm
your password.
7. Tap Save to commit the server settings.
8. Tap the server listed in the left hand pane to connect and browse available volumes.
9. For full details on the Access Mobile Client application’s settings and features, visit the Mobile
Client page.
6.2 Enrolling in client management
After installing Acronis Access with Mobile Access enabled, you can use the Access Mobile Client in
two ways:
If your organization centrally manages the Access Mobile Client's access and settings, you will need
to request access to Acronis Access from your IT department. You will receive an enrollment email
once you have been granted access. The email includes the information and instructions you will
need to start using the Access Mobile Client.
If your Acronis Access server allows access without your Access Mobile Client being centrally
managed, you can get started by simply entering your Acronis Access server's name along with your
username and password.
Each user sent a management enrollment invitation will receive an email that contains:
A link to install the Access Mobile Client from the Apple App Store.
A link used to launch the Access Mobile Client app and automate the enrollment process.
Their management server address.
The email guides them through the process of installing the Access Mobile Client and entering
their enrollment information.
If the Access Mobile Client app has already been installed, and the user taps the "Tap this link to automatically begin enrollment..." option while viewing this email on their device, Acronis Access
will automatically launch and the enrollment form will be displayed. The user's server address and
username are also encoded in this URL, so these fields are auto-completed in the enrollment form. At
this point, the user simply has to enter their password to complete the enrollment process.
The username and password required are the user's Active Directory username and password. These
credentials are used to match them to the group policy, to access the Gateway server and if the
policy allows it, the saving of their credentials for Acronis Access server logins.
If their management policy requires an application lock password, they will be prompted to enter
one. All password complexity requirements configured in their policy will be enforced for this initial
password, and for any change of their application lock password in the future.
To enroll in management
Enroll automatically via enrollment email
1. Open the email sent to you by your IT administrator and tap the click here to install the Acronis
Access link if you have not yet installed Acronis Access.
2. Once Acronis Access is installed, return to the invitation email on your device and tap Click this
link to automatically begin enrollment in step 2 of the email.
3. An enrollment form will be displayed. If you used the link in the invitation email to start the
enrollment process, your Server Address and Username will be automatically filled out.
4. Enter your password and tap Enroll Now to continue.
Note: The Username and Password are your standard company username and password. This is likely the
same as you use to log into your computer or to your email.
5. After completing the entire form, tap the Enroll button.
6. Depending on the configuration of your company's server, you may be warned that your
management server's security certificate is not trusted. To accept this warning and proceed, you
can click Proceed Always.
7. If a application lock password is required for your Access Mobile Client app, you will be asked to
set one. Password complexity requirements may apply and will be displayed if needed.
Manual enrollment
1. Open the Acronis Access app.
2. Open Settings.
3. Tap Enroll
4. Fill in your server's address, your username and password.
5. After completing the entire form, tap the Enroll button.
6. Depending on the configuration of your company's server, you may be warned that your
management server's security certificate is not trusted. To accept this warning and proceed, you
can click Proceed Always.
If a application lock password is required for your Access Mobile Client app, you will be asked to set
one. Password complexity requirements may apply and will be displayed if needed.
Ongoing Management Updates
After the initial management setup, Access Mobile Clients will attempt to contact the management
server each time the client app is started. Any settings changes, server or folder assignment changes,
application lock password resets, or remote wipes will be accepted by the client app at that time.
Acronis Access clients must have network access to the Acronis Access server in order to receive profile updates,
remote password resets, and remote wipes. If your client is required to connect to a VPN before they can access
Acronis Access, they will also need to connect to the VPN before management commands will be accepted.
Removing Management
There are two options to remove your Access Mobile Client from management:
Turn Off the Use Management option (if allowed by your policy)
Remove the Access Mobile Client application
Depending on your Acronis Access management policy settings, you may have the right to remove
the Access Mobile Client from management. This will likely result in you not being able to access
corporate files servers. If you are allowed to do so, follow these steps to unmanage your device:
To unmanage your device follow the steps below:
1. Tap the Settings menu.
2. Turn OFF the Use Management option.
3. Your profile may require that your Access Mobile Client data is wiped when removing the device
from management. You can cancel the process at this point if you don't want to be wiped.
4. Confirm removing Acronis Access from management by tapping YES in the confirmation window.
Note: If your Acronis Access management profile does not allow you to unmanage your client, the Use
Management option will not be displayed on the Settings menu. In this case the only way to remove the device
from management is by uninstalling the Access Mobile Client application. Uninstalling the application will erase
all existing Access Mobile Client data and settings and will return the user to default application settings after
reinstalling.
To uninstall the Access Mobile Client app, follow the steps below:
1. Hold your finger on the Access Mobile Client app icon until it starts shaking.
2. Tap the "X" button on the Access Mobile Client application and confirm the uninstall process.
To reinstall the Access Mobile Client app, visit http://www.grouplogic.com/web/meappstore
First Run ................................................................................................... 77
Web Client ................................................................................................ 82
Using the desktop client .......................................................................... 89
This guide provides the essential steps for setting up Sync & Share, using the web interface to access
files and using the Acronis Access desktop client. For more detailed instructions on configuring these
components, see the Sync & Share and Desktop Client sections.
7.1 First Run
If you haven't done so already, install and configure Acronis Access. For more information on doing
so, check the Installing (p. 5) and Configuration Utility sections.
When you first open the web interface, you will have to set a password for the default administrator
account and after you log in, you will be greeted by the Setup Wizard.
Warning! Please do not forget your administrator password as the support department cannot recover this
password for you
Note: It may take 30-45 seconds until the application becomes available after starting it from the Configuration
Utility.
Once you have completed the above, you are ready to go through the Initial Configuration described
below.
1. Launch you web browser and navigate to: https://myserver https://myserver, where myserver is
the URL or IP address of the computer running the Acronis Access server.
2. Login with your credentials.
a. If you have just installed the Acronis Access server, login as administrator with the password
you set after the installation process. If this is the first time you open the web interface, you
will be asked to set the password now.
b. If you received an email inviting you to Acronis Access you may need to set your own
personal password at this point or log in using your Active Directory credentials.
c. If your Acronis Access server has been configured to use Active Directory for authentication
and user account provisioning you should be able to login using valid network credentials.
Note: If you are logged in as the default administrator, you won't have access to the Web Client. You must use
an account different from the default administrator.
Creating a folder
1.Click the Create Folder button and enter a name for the new folder. In this example we will use
Clicking on a file or folder shows the available actions in the right sidebar.
Downloading a file
If you want to download a file, simply click on its name. You can also click on the row to the right of
the file or folder name and press Download from the sidebar.
Note: When using Internet Explorer you have to make sure that Do not save encrypted pages to disk is
unchecked in order to be able to download files. This setting is found under Internet Options -> Advanced ->
Security.
Copying a file or folder
If you want to copy a file or folder, do the following:
1. Click on the row to the right of the file or folder name and select Copy.
2. In the new lightbox, navigate to the folder where you want to paste the file and press Copy.
Moving a file or folder
1. Click on the row to the right of the file or folder name and select Move.
2. In the new lightbox, navigate to the folder where you want to move the file and press Move.
Note: If you want to share a file or folder that was shared with you by another user, you need to have the
permissions to invite other users to that share. If you do not have the permissions to invite other users, you will
not be able to share the files and folders with another user. The option Sharing in the right sidebar will not be
visible as well.
To share a folder with a colleague or business partner, do the following:
1. Click on Sync&Share.
2. Click on the folder you want to share and select Sharing from the sidebar.
3. In the Sharing lightbox, enter an email address and an appropriate text message. An email
containing your information and access instructions will be generated and sent to the recipient.
Note: If the Allow editing and deletion check box is disabled, invited users can only download and read
documents included in the shared folder.
Sharing a single file
Note: If you want to share a file or folder that was shared with you by another user, you need to have the
permissions to invite other users to that share. If you do not have the permissions to invite other users, you will
not be able to share the files and folders with another user. The option Sharing in the right sidebar will not be
visible as well.
1. Open the Acronis Access Web Interface.
2. If you've logged in with an administrator account, press Leave Administration in the upper right
corner.
3. Locate the desired file and click on the row next to its name.
a)Sending a link via email
a. Select Send Link from the sidebar.
b. Enter the desired expiration time and language for the invitation.
c. Enter the email address(es) of the user(s) you want to receive the download link.
d. Press Send.
b)Sending a link via other methods
a. Select Get Link from the sidebar.
b. Enter the desired expiration time and language for the invitation.
You can look at the history of events by opening the Log tab. Search and filter options are available.
Event importance is marked with different colors.
8.1 Using the desktop client
First Steps
Note: If you haven't installed your Acronis Access Desktop Client yet, you can do so by following the Client
Installation and Configuration guide.
1. Open the folder you selected for syncing during the configuration process. This is just a normal
folder, so instead of calling it Sync Folder you should use more regular names. In this example we
named it My Projects.
2. Create a folder named Marketing Campaign inside My Projects.
3. Create a text document inside My Projects, fill it with text, and then save and close it.
4. Create another folder inside My Projects with a name Collaterals.
5. Place some files into it by copying them from your computer.
6. Now it’s time to share a folder with a colleague. You can do this in two different ways: directly
from Windows Explorer or using your web browser. Follow step 7 to share content from your
desktop using Windows Explorer, or follow step 8 to share content using your preferred web
browser.
Note: You can also share just a single file as described at the bottom of this article.
7. If you want to do it right from your desktop, select the Marketing Campaign folder
a. Right Click on it.
b. From the context menu, select Share with Acronis Access
c. This will launch a web browser and show you the invite dialog.
d. In the Invite others dialog enter an email address and an appropriate text message.
4. In the Sharing lightbox, enter an email address and an appropriate text message. An email
containing your information and access instructions will be generated and sent to the recipient.
Note: If the Allow editing and deletion check box is disabled, invited users can only download and read
documents included in the shared folder.
Regardless of the method used to invite a person, the recipient will then receive one or two emails,
depending on whether he is an internal (Active Directory) or external user.
a. For an external user, the first email with subject You have been invited to Acronis Access.
contains a link to set a personalized password.
b. The second email with subject You have been given access to Marketing Campaign contains
your message and a link for accessing the shared files.
Once the invited user clicks on the link to access the system (and set his password if needed) you and
your colleague will share access over the files in the Marketing Campaign folder.
Make sure you tell your colleague about the Access Desktop Client, so you can synchronize files
automatically among your computers.
1. Note: The maximum path length is different between Mac OS X and Windows which can lead to
syncing errors in cross platform deployments. On Windows there is an OS limitation of 260
characters (MAX_PATH) total for the entire path, including the "C:\mysharefolder\" part. So
on Windows the max filename length will be 260 - [share folder path length] - 1 (for NULL
terminator).
e.g. The user is sharing C:\my_shared_documents and is trying to download a file into
C:\my_shared_documents\this_is_a_folder\ the max file name length of that subdirectory would
be 260 - 40 - 1 = 219 characters. The Mac OS X limit is 1024 characters.
If you are an administrator logging in to the web interface takes you directly to into Administration
mode. After you log in you can switch between Administration and User modes.
To switch between modes, do the following:
1. Open the web interface and log in as an administrator.
To exit administration, press the Leave Administration button at the top-right. This takes you to
the user side of the web interface.
To go back into administration, press the Administration button at the top-right. This will take
you back into administration mode.
Note: Administrators have access to the API documentation. You can find the link in the footer of the Access
web interface.
2. Mark if the group should have Sync & Share functionality.
3. Find the group.
4. Click on the group name.
5. Press Save.
Administrative Users
This section lists all your Users with administrative rights, their authentication type (Ad-Hoc or LDAP),
whether they have Sync & Share rights and their status (Disabled or Enabled).
You can invite a new user with full using the Add Administrator button. Using the Actions button you
can delete or edit the user. You can edit his administrative rights, status, email address and
password.
Inviting a single administrator
1. Open the Acronis Access Web Interface.
2. Log in with an administator account.
3. Expand the General Settings tab and open the Administrators page.
4. Press the Add Administrator button under Administrative Users.
5. Select either the Active Directory/LDAP or Invite by Email tab depending on what type of user
you are inviting and what you want them to administer. LDAP users without emails cannot be
given Sync & Share functionality.
a)To invite via Active Directory/LDAP do the following:
1. Search for the user you want to add in the Active Directory and then click on their Common
Name to select a user.
Note: The LDAP User and Email fields will fill in automatically.
2. Enable/Disable the Sync & Share functionality.
3. Select which administrative rights the user should have.
4. Press Add.
b)To invite by Email do the following:
1. Enter the email address of the user you want to add as an administrator.
Note: Ad-hoc users invited by email will always have Sync & Share functionality.
2. Select whether this user should be licensed.
3. Select the language of the Invitation email.
4. Press Add.
To give a user administrative rights:
1. Open the Sync & Share tab
2. Open the Users tab
3. Press the Actions button for the User you want to edit.
4. Press Edit.
5. Mark all Full Administrative Rights?.
6. Press Save.
9.3 Audit Log
9.3.1 Log
Here you can see all of the recent events (depending on your purging policy, the time limit might be
different), the users from which the log originated and a message explaining the action.
Filter by User – filters the logs by User. You can select All, No user or choose one of the available
users.
Filter by Shared Projects – filters the logs by Shared Project. You can select All, Not shared or
choose one of the available Shared Projects.
Filter by Severity – filters the logs by type. The types are All, Info, Warning, Error and Fatal.
From/To – filter by date and time.
Search for Text – filter by log message contents.
Timestamp – shows the date and time of the event.
Type – shows the level of severity of the event.
User – shows the user account responsible for the event.
Message – shows information on what happened.
If you have enabled Audit logging on a Gateway Server, you will also see the activity of your mobile
clients. If you have allowed Desktop and Web clients to access mobile Data Sources, they will also be
reflected in the log.
Device Name – name of the connected device.
Device IP – shows the IP address of the connected device.
Gateway Server – shows the name of the Gateway Server to which the device is connected.
Gateway Server Path – shows the path to the data source on that Gateway Server.
To enable Audit Logging for a specific gateway server:
1. Open the web interface.
2. Log in as an administrator.
3. Open the Mobile Access tab.
4. Open the Gateway Servers tab.
5. Find the server for which you want to enable Audit Logging.
6. Press the Details button.
7. In the Logging section check Audit Logging.
8. Press the Save button.
To enable Debug Logging for a specific gateway server:
Note: The default location for the debug logs is: C:\Program Files (x86)\Acronis\Access\Gateway
Server\Logs\AcronisAccessGateway
1. Open the web interface.
2. Log in as an administrator.
3. Open the Mobile Access tab.
4. Open the Gateway Servers tab.
5. Find the server for which you want to enable Debug Logging.
6. Press the Details button.
7. In the Logging section check Debug Logging.
8. Press the Save button.
9.3.2 Settings
Acronis Access can automatically purge old logs and export them to files based on certain policies.
Automatically purge log entries more than X Y old - When enabled, logs older than a number of
days/weeks/months will be automatically purged.
Export log entries to file as X before purging - When enabled, exports a copy of the logs
before purging them in either CSV, TXT or XML.
Export file path - Sets the folder where the exported logs will go.
9.4 Server
Server Settings
Server Name – cosmetic server name used as the title of the web site as well as identifying this
server in admin notification email messages.
Web Address – specify the root DNS name or IP address where users can access the website
(starting with http:// or https://). Do not use 'localhost' here; this address will also be used in
email invitation links.
Audit Log Language – select the default language for the Audit Log. The current options are
English, German, French and Japanese. The default is English.
Session timeout in minutes – sets the length of the user session.
Enable Sync and Share Support - this checkbox enables/disables the Sync and Share features.
Email administrator a summary of errors? – If enabled, a summary of errors will be sent to
specified email addresses.
Email Addresses – one or more email addresses which will receive a summary of errors.
Notification Frequency – frequency for sending error summaries. Sends emails only if errors