beautypg.com

Acronis Access - Installation Guide User Manual

Page 3

background image

3

Copyright © Acronis International GmbH, 2002-2014

9

Server Administration .................................................................................................... 94

9.1

Administering a Server.............................................................................................................94

9.2

Administrators and Privileges ..................................................................................................95

9.3

Audit Log ..................................................................................................................................97

9.3.1

Log .................................................................................................................................................................. 97

9.3.2

Settings ........................................................................................................................................................... 98

9.4

Server .......................................................................................................................................99

9.5

SMTP ......................................................................................................................................101

9.6

LDAP .......................................................................................................................................102

9.7

Email Templates .....................................................................................................................104

9.8

Licensing ................................................................................................................................106

9.9

Debug Logging .......................................................................................................................107

9.10

Monitoring .............................................................................................................................108

10

Supplemental Material ........................................................................................... 110

10.1

Conflicting Software ..............................................................................................................110

10.2

Using trusted server certificates with Acronis Access ...........................................................110

10.3

Changing the Acronis Access Tomcat SSL Ciphers .................................................................112

10.4

How to support different Access Desktop Client versions ....................................................113

10.5

Customizing the web interface ..............................................................................................113

10.6

Creating a Drop Folder ...........................................................................................................114

10.7

Monitoring Acronis Access with New Relic ...........................................................................115

10.8

Third-party Software for Acronis Access ...............................................................................116

10.8.1 PostgreSQL ................................................................................................................................................... 116
10.8.2 Apache Tomcat ............................................................................................................................................ 117
10.8.3 New Relic ..................................................................................................................................................... 117

11

Sync & Share .......................................................................................................... 118

11.1

Sharing Restrictions ...............................................................................................................118

11.2

LDAP Provisioning ..................................................................................................................118

11.3

Quotas ....................................................................................................................................119

11.4

File Purging Policies ...............................................................................................................119

11.5

User Expiration Policies .........................................................................................................121

11.6

File Repository .......................................................................................................................122

11.7

Acronis Access Client .............................................................................................................123

12

Upgrading .............................................................................................................. 125

12.1

Upgrading from Acronis Access to a newer version ..............................................................125

13

Users&Devices ....................................................................................................... 127

13.1

Managing Mobile Devices ......................................................................................................127

13.1.1 Performing Remote Application Password Resets ................................................................................... 128
13.1.2 Performing Remote Wipes ......................................................................................................................... 129

13.2

Managing Users .....................................................................................................................130

This manual is related to the following products: