10 supplemental material, 1 conflicting software, Supplemental material – Acronis Access - Installation Guide User Manual
Page 110: Conflicting software

110
Copyright © Acronis International GmbH, 2002-2014
10 Supplemental Material
In this section
Conflicting Software ............................................................................... 110
Using trusted server certificates with Acronis Access ........................... 110
Changing the Acronis Access Tomcat SSL Ciphers ................................. 112
How to support different Access Desktop Client versions ..................... 113
Customizing the web interface .............................................................. 113
Creating a Drop Folder ........................................................................... 114
Monitoring Acronis Access with New Relic ............................................ 115
Third-party Software for Acronis Access ................................................ 116
10.1 Conflicting Software
There are some software products that may cause problems with Acronis Access. The currently
known conflicts are listed below:
VMware View™ Persona Management - This application will cause issues with the Acronis
Access desktop client syncing process and issues with deleting files. Placing the Acronis Access
sync folder outside of the Persona Management user profile should avoid the known conflicts.
10.2 Using trusted server certificates with Acronis Access
This section explains how to configure Acronis Access with trusted server certificates. By default,
Acronis Access will use a self-generated SSL certificate. Using a certificate signed by a trusted
Certificate Authority will establish the identity of the server and allow browsers to connect without
displaying a warning message that the server is untrusted.
Note: Acronis Access ships and installs with self-signed certificates for testing purposes. Production
deployments should implement proper CA certificates.
Note: Certain web browsers will display warning messages when using self-signed certificates. Dismissing those
messages allows the system to be used without problems. Using self-signed certificates for production
conditions is not recommended.
Creating a certificate request
Note: Creating certificates is not and will never be a function of Acronis Access. This certificate request is in no
way necessary for the operation of Acronis Access but it is required by Certificate vendors.
Generating a certificate request via IIS:
For more information on this procedure, please refer to the following Microsoft Knowledge Base
article: http://technet.microsoft.com/en-us/library/cc732906(v=ws.10).aspx
Generating a certificate request via OpenSSL:
Note: For this guide you need to have OpenSSL installed.