232 Copyright © Acronis International GmbH, 2002-2014
A new Advanced Setting for Gateway Servers has been added that, if enabled, users will
authenticate with their UPN (example: username@domain.com). Otherwise, users will
authenticate with their separate domain and usernames (example: domain\username). This is
sometimes needed when authenticating to some federated scenarios, i.e., SharePoint 365.
BUG FIXES
The Default Language setting in Server Settings has been renamed to be clear that it is the
default audit log language.
If a data source for an Active Directory home folder cannot be resolved, the Mobile Clients will
no longer see the home folder, instead of getting an error accessing the !HOME_DIR_SERVER.
Miscellaneous bug fixes in the Acronis Access Desktop Client.
Miscellaneous localization improvements.
Acronis Access 5.1.0
ENHANCEMENTS
The Configuration Utility now provides the ability to control whether the Access Server should
bind to HTTP port 80 and redirect automatically to the configured HTTPS port. Previously this
was enabled by default, but now the administrator must enable it on clean installations.
When editing email templates a new option allows the administrator to view the default value
for the email subject.
Users with mobilEcho 5.1 or later on iOS can now create their data sources directly from the
application to access any file share or SharePoint location. Users enter UNC paths or SharePoint
URLs from the client. New policy settings have been introduced on the management server to
control whether clients are allowed to create these data sources, and which Gateway Servers are
used for these requests.
Multiple Gateway Servers can now share a common configuration via a Cluster Group. Changes
to the settings and policies assigned to the Cluster Group are automatically pushed to all
members of the Group. This will typically be used when multiple Gateway Servers are placed
behind a load balancer for high availability.
Gateway Servers now support authentication using Kerberos. This can be used to in scenarios
using Kerberos Constrained Delegation to authenticate mobilEcho iOS clients through a reverse
proxy using client certificates. It also can be used to authenticate mobile devices with client
certificates using MobileIron AppTunnel. Note that when using this form of authentication,
mobile clients cannot access activEcho shares.
The required data sources are now automatically created when assigning home folders to a user
or group policy. Previously administrators needed to manually create a data source for the
server hosting the home directory.
The address of a legacy Gateway Server can now be modified
The policy exceptions for Android have been updated to reflect the functionality of the
mobilEcho Android 3.1 client
BUG FIXES
Exporting a large set of records from the audit log now completes significantly faster.