Acronis Integration

This guide will show you how to set up an integration between GoodAccess and Acronis CyberApp.

Key Aspects of the Integration

  1. Threat Blocker Alerts: Whenever a user attempts to access a potentially harmful website or a site you've restricted for your team, you'll receive an alert through Acronis notifying you that the access attempt has been blocked.

  2. Device Posture Check Alerts: To prevent users with outdated or non-compliant devices from connecting to your network, you can configure Device Posture Check in GoodAccess. If a user with a non-compliant device attempts to connect, their access will be denied, and you will receive an alert through Acronis.

  3. Overview of Managed Teams: The Acronis dashboard provides real-time status and activity updates for the teams you manage through GoodAccess.

Configuration guide

Prerequisites

Step 1 - Creating an Account Token

Log in to the GoodAccess Control Panel, and go to Profile (top right corner) > Security > Account Tokens.

Click + Create Token.

  • Name - Give the token a name

  • Expiration - The time period after which the token becomes invalid. If 'Unlimited Expiration' is selected, the token will not expire (not recommended).

  • Token - Immediately after being generated, you will see the token for a limited period. It is important to save the token in a secure place.

  • IP Addresses - Leave blank

Click Save.

Step 2 - Creating an integration with Acronis

Log in to the Acronis Portal, and go to Integrations.

Search for GoodAccess, and click Configure.

Enter the token from Step 1, and click Enable.

If the token is valid, the integration will be enabled. If not, please contact us.

You have now successfully set up the integration between GoodAccess and Acronis.

Last updated