LogoLogo
GoodAccess WebsiteRequest Free TrialDownload App
  • Getting Started
    • 1. What is GoodAccess?
    • 2. Architecture Overview
    • 3. Sign up for Free Trial
    • 4. Download App & Connect
  • 🖥️Configuration guides
    • Features
      • Zero Trust Access Control
        • Access Cards
        • Device Posture Check
        • Device Approval
        • Geo Restrictions
      • API Integration
        • API Reference
          • Members
          • Groups
          • Systems
          • Access Cards
          • Relations
          • Gateways
          • Logs
        • Acronis Integration
      • SIEM Integration
      • SSO/SCIM
        • Auth0
        • Cisco Duo
        • Google Workspace
        • JumpCloud
        • Microsoft Entra ID
        • Okta
        • OneLogin
        • Ping Identity
        • Universal (SAML)
      • MFA
      • Passkeys
      • MSI deployment
      • Threat Blocker
      • Custom Domain Blocking
      • DNS Management
      • Split Tunneling
      • Port Forwarding
    • Branch Connector
      • Cisco
      • Cisco Meraki
      • FortiGate
      • MikroTik
      • SonicWall
      • UniFi USG
      • Zyxel Nebula Control Center
      • Other supported routers and firewalls
    • Cloud Connector
      • AWS
      • Google Cloud
      • Microsoft Azure
      • Other Public Cloud providers
    • IP whitelisting
      • APACHE Web Server
      • AWS VPC
      • Azure (Office 365)
      • Google Cloud
      • Google Workspace
      • Magento
      • Microsoft IIS
      • NGINX
        • Domain
        • Subdomain
        • URL
      • OpenCart
      • PHP
      • PHPMyAdmin
      • Pipedrive
      • SalesForce
      • SSH server
      • WordPress
      • Zoho CRM
    • Linux
      • DEB repository
      • RPM repository
      • Manual installation
      • Linux Troubleshooting
  • 🆘FAQ & Troubleshooting
    • FAQ
      • Business
      • Technical
    • Troubleshooting
  • 📓Product Changelog
    • Windows
    • macOS
Powered by GitBook
On this page
  • Key Aspects of the Integration
  • Configuration guide
  • Prerequisites
  • Step 1 - Creating an Account Token
  • Step 2 - Creating an integration with Acronis

Was this helpful?

  1. Configuration guides
  2. Features
  3. API Integration

Acronis Integration

This guide will show you how to set up an integration between GoodAccess and Acronis CyberApp.

PreviousLogsNextSIEM Integration

Last updated 8 months ago

Was this helpful?

Key Aspects of the Integration

  1. Threat Blocker Alerts: Whenever a user attempts to access a potentially harmful website or a site you've restricted for your team, you'll receive an alert through Acronis notifying you that the access attempt has been blocked.

  2. Device Posture Check Alerts: To prevent users with outdated or non-compliant devices from connecting to your network, you can configure in GoodAccess. If a user with a non-compliant device attempts to connect, their access will be denied, and you will receive an alert through Acronis.

  3. Overview of Managed Teams: The Acronis dashboard provides real-time status and activity updates for the teams you manage through GoodAccess.

Configuration guide

Prerequisites

  • Acronis Cyber Portal account

Step 1 - Creating an Account Token

Click + Create Token.

  • Name - Give the token a name

  • Expiration - The time period after which the token becomes invalid. If 'Unlimited Expiration' is selected, the token will not expire (not recommended).

  • Token - Immediately after being generated, you will see the token for a limited period. It is important to save the token in a secure place.

  • IP Addresses - Leave blank

Click Save.

Step 2 - Creating an integration with Acronis

Log in to the Acronis Portal, and go to Integrations.

Search for GoodAccess, and click Configure.

You have now successfully set up the integration between GoodAccess and Acronis.

Enter the token from , and click Enable.

If the token is valid, the integration will be enabled. If not, please .

🖥️
GoodAccess Partner account
Log in to the GoodAccess Control Panel, and go to Profile (top right corner) > Security > Account Tokens.
contact us
Step 1
Device Posture Check
Acronis alert for a Threat Blocker action
Acronis alert for a Device Posture Check action
Account Tokens section of the GoodAccess Account Panel
Integrations section of the Acronis Portal
Acronis alert for a Threat Blocker action blocking access to a restricted or harmful website.
Acronis alert for a Device Posture Check blocking access due to a non-compliant device.
Account Tokens section of the GoodAccess Account Panel.
Integrations section of the Acronis Portal.