beautypg.com

10 supplemental material, 1 conflicting software, Supplemental material – Acronis Access - Installation Guide User Manual

Page 110: Conflicting software

background image

110

Copyright © Acronis International GmbH, 2002-2014

10 Supplemental Material

In this section

Conflicting Software ............................................................................... 110
Using trusted server certificates with Acronis Access ........................... 110
Changing the Acronis Access Tomcat SSL Ciphers ................................. 112
How to support different Access Desktop Client versions ..................... 113
Customizing the web interface .............................................................. 113
Creating a Drop Folder ........................................................................... 114
Monitoring Acronis Access with New Relic ............................................ 115
Third-party Software for Acronis Access ................................................ 116

10.1 Conflicting Software

There are some software products that may cause problems with Acronis Access. The currently
known conflicts are listed below:

VMware View™ Persona Management - This application will cause issues with the Acronis
Access desktop client syncing process and issues with deleting files. Placing the Acronis Access
sync folder outside of the Persona Management user profile should avoid the known conflicts.

10.2 Using trusted server certificates with Acronis Access

This section explains how to configure Acronis Access with trusted server certificates. By default,
Acronis Access will use a self-generated SSL certificate. Using a certificate signed by a trusted
Certificate Authority will establish the identity of the server and allow browsers to connect without
displaying a warning message that the server is untrusted.

Note: Acronis Access ships and installs with self-signed certificates for testing purposes. Production
deployments should implement proper CA certificates.

Note: Certain web browsers will display warning messages when using self-signed certificates. Dismissing those
messages allows the system to be used without problems. Using self-signed certificates for production
conditions is not recommended.

Creating a certificate request

Note: Creating certificates is not and will never be a function of Acronis Access. This certificate request is in no
way necessary for the operation of Acronis Access but it is required by Certificate vendors.

Generating a certificate request via IIS:

For more information on this procedure, please refer to the following Microsoft Knowledge Base
article: http://technet.microsoft.com/en-us/library/cc732906(v=ws.10).aspx

Generating a certificate request via OpenSSL:

Note: For this guide you need to have OpenSSL installed.

This manual is related to the following products: