4 Copyright © Acronis International GmbH, 2003-2020
12.2 Best Practices .........................................................................................................................139
12.3 Backing up and Restoring Acronis Cyber Files .......................................................................140
12.4 Tomcat Log Management on Windows .................................................................................143
12.5 Automated Database Backup ................................................................................................149
12.6 Automated Database Vacuum ...............................................................................................150
12.7 Increasing the Acronis Cyber Files Tomcat Java Maximum Memory Pool ............................154
12.8 Migrating Acronis Cyber Files to another server ...................................................................155
12.8.1 Before you begin ......................................................................................................................................... 155
12.8.2 Migrating the Acronis Cyber Files Web Server and Gateway databases ................................................ 156
12.8.3 Testing your new configuration ................................................................................................................. 159
12.8.4 Cleanup of the original server .................................................................................................................... 159
12.9 Upgrading PostgreSQL to a newer Major version .................................................................160
13 Supplemental Material ................................................................................................ 166
13.1 Conflicting Software ..............................................................................................................166
13.2 For the Acronis Cyber Files Server .........................................................................................166
13.2.1 Load balancing Acronis Cyber Files ............................................................................................................ 166
13.2.2 Installing Acronis Cyber Files in a Load Balanced setup ........................................................................... 173
13.2.3 Migrating to a load balanced configuration .............................................................................................. 177
13.2.4 Customizing the Web Interface through the API ...................................................................................... 184
13.2.5 Unattended desktop client configuration ................................................................................................. 186
13.2.6 Configuring Single Sign-On ......................................................................................................................... 189
13.2.7 Using trusted server certificates with Acronis Cyber Files ....................................................................... 214
13.2.8 Supporting different Desktop Client versions ........................................................................................... 217
13.2.9 Moving the FileStore to a non-default location ........................................................................................ 217
13.2.10 Monitoring Acronis Cyber Files with New Relic ........................................................................................ 218
13.2.11 Running Acronis Cyber Files Tomcat on multiple ports ........................................................................... 219
13.2.12 Multi-homing Acronis Cyber Files .............................................................................................................. 220
13.2.13 Deploy separate Web Preview servlets ..................................................................................................... 221
13.2.14 PostgreSQL Streaming Replication............................................................................................................. 225
13.2.15 Configuring PostgreSQL for remote access ............................................................................................... 230
13.2.16 Running Acronis Cyber Files in HTTP mode ............................................................................................... 230
13.2.17 Upgrading Acronis Cyber Files on a Microsoft Failover Cluster ............................................................... 232
13.2.18 Installing Acronis Cyber Files on a Microsoft Failover Cluster ................................................................. 232
13.3 For the Mobile Clients ...........................................................................................................237
13.3.1 Using iOS Managed App Configuration features ...................................................................................... 237
13.3.2 MobileIron AppConnect support ............................................................................................................... 238
14 Configuring an AppConnect tunnel between the Acronis Cyber Files mobile and the
Acronis Cyber Files server via username/password authentication ............................................. 247
15 Adding Kerberos Constrained Delegation Authentication .............................................. 258
15.1.1 Acronis Cyber Files for BlackBerry Dynamics ............................................................................................ 267
15.1.2 Microsoft Intune .......................................................................................................................................... 278
16 What's New ................................................................................................................. 282
16.1 Cyber Files Server ..................................................................................................................282
16.2 Previous Releases ..................................................................................................................316
17 Documentation for older versions ................................................................................ 317