Hey,

Please find the attached core-connid.log and the snapshot of the error
message when I created a user named "google".

Also in core-rest.log I am getting this warning message
"09:54:38.989 WARN
org.apache.syncope.core.persistence.validation.entity.EntityValidationListener
- Bean validation errors found:
[ConstraintViolationImpl{interpolatedMessage='InvalidUsername;Username does
not match pattern', propertyPath=username, rootBeanClass=class
org.apache.syncope.core.persistence.beans.user.SyncopeUser,
messageTemplate='InvalidUsername;Username does not match pattern'}]
"

Regards,
Harsh Sharma

On Thu, Oct 23, 2014 at 12:34 PM, Fabio Martelli <fabio.marte...@gmail.com>
wrote:

>  Hi Harsh, your configuration seems good, btw provided info is not enough
> to make a complete diagnosis.
> Can you send core-connid.log file?
>
> Regards,
> F.
>
> Il 22/10/2014 23:48, Harsh Sharma ha scritto:
>
>    Hey Francesco,
>
>  Now when I am creating a user in Syncope it is reflecting in Active
> directory, but when I create user it always show error propagation failure
> in Active Directory(
>
> javax.naming.directory.SchemaViolationException: [LDAP: error code 65 - 
> 0000207D: UpdErr: DSID-0315166D, problem 6002 (OBJ_CLASS_VIOLATION), data 31
> �]; remaining name 'cn=Administrator,cn=Users,dc=testmnet,dc=com'
>
>  Cause: [LDAP: error code 65 - 0000207D: UpdErr: DSID-0315166D, problem 6002 
> (OBJ_CLASS_VIOLATION), data 31
>
>   ). The user is reflecting in Active directory but this error always
> appears.
>
>  Also when I am deleting user in Active directory it is not reflecting in
> syncope, I mean it is still present in syncope.(I have defined a
> synchronized task already).
>
>  Attaching log with this mail.
>
>  Also my syncope version is 1.2.0
>  AD connector version 1.1.3
>  Active directory version (objectVersion: 69; )
> AD connector configuration properties and * AD resource mapping are
> attached as snapshot
>
> On Mon, Oct 20, 2014 at 2:10 PM, Francesco Chicchiriccò <
> ilgro...@apache.org> wrote:
>
>>   On 19/10/2014 14:42, Harsh Sharma wrote:
>>
>> Hello,
>>
>> I am connecting apache syncope to active directory. I am able to
>> retrieve Users from Active directory. I can change password and other
>> attributes of the retrieved users, But I am not able to create user in
>> active directory. I mean whenever I am creating user in apache syncope
>> and saving it, it is giving me error read timeout and it is not saving
>> in active directory. I am using ssl connection, so no issue of
>> certificate.
>> I am stuck on it. Please help.
>>
>>
>>  Hi Harsh,
>> you need to provide some more information in order for someone to get any
>> insight of your problems:
>>
>>  * Syncope version?
>>  * AD connector version?
>>  * Active Directory version?
>>  * AD connector configuration properties?
>>  * AD resource mapping?
>>
>> Regards.
>>
>> --
>> Francesco Chicchiriccò
>>
>> Tirasa - Open Source Excellencehttp://www.tirasa.net/
>>
>> Involved at The Apache Software Foundation:
>> member, Syncope PMC chair, Cocoon PMC, Olingo 
>> PMChttp://people.apache.org/~ilgrosso/
>>
>>
>
> On Mon, Oct 20, 2014 at 2:10 PM, Francesco Chicchiriccò <
> ilgro...@apache.org> wrote:
>
>>   On 19/10/2014 14:42, Harsh Sharma wrote:
>>
>> Hello,
>>
>> I am connecting apache syncope to active directory. I am able to
>> retrieve Users from Active directory. I can change password and other
>> attributes of the retrieved users, But I am not able to create user in
>> active directory. I mean whenever I am creating user in apache syncope
>> and saving it, it is giving me error read timeout and it is not saving
>> in active directory. I am using ssl connection, so no issue of
>> certificate.
>> I am stuck on it. Please help.
>>
>>
>>  Hi Harsh,
>> you need to provide some more information in order for someone to get any
>> insight of your problems:
>>
>>  * Syncope version?
>>  * AD connector version?
>>  * Active Directory version?
>>  * AD connector configuration properties?
>>  * AD resource mapping?
>>
>> Regards.
>>
>> --
>> Francesco Chicchiriccò
>>
>> Tirasa - Open Source Excellencehttp://www.tirasa.net/
>>
>> Involved at The Apache Software Foundation:
>> member, Syncope PMC chair, Cocoon PMC, Olingo 
>> PMChttp://people.apache.org/~ilgrosso/
>>
>>
>
>
> --
> Fabio Martelli
>
> Tirasa - Open Source Excellencehttp://www.tirasa.net/
>
> Apache Syncope PMChttp://people.apache.org/~fmartelli/
>
>
10:44:33.581 DEBUG Enter: getObject(ObjectClass: __ACCOUNT__, Attribute: 
{Name=__UID__, Value=[google]}, OperationOptions: 
{ATTRS_TO_GET:[mail,sn,userAccountControl,objectClass,givenName,__ENABLE__,userPrincipalName,cn,__UID__,description...]})
    Method: getObject
10:44:33.649 WARN  Reading passwords not supported      Method: 
getAttributesToGet
10:44:33.650 WARN  Attribute __ENABLE__ of object class __ACCOUNT__ is not 
mapped to an LDAP attribute  Method: getLdapAttribute
10:44:33.651 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter 
(&(&(objectClass=top)(objectClass=person)(objectClass=organizationalPerson)(objectClass=user))(sAMAccountName=google))
 and SearchControls: {returningAttributes=[cn, description, displayName, 
entryDN, givenName, mail, objectClass, sAMAccountName, sn, telephoneNumber, 
unicodePwd, userAccountControl, userPrincipalName], scope=SUBTREE}      Method: 
doSearch
10:44:33.711 DEBUG Return: null Method: getObject
10:44:33.739 DEBUG Enter: create(ObjectClass: __ACCOUNT__, [Attribute: 
{Name=description, Value=[google]}, Attribute: {Name=sn, Value=[google]}, 
Attribute: {Name=mail, Value=[goo...@gmail.com]}, Attribute: 
{Name=sAMAccountName, Value=[google]}, Attribute: {Name=userAccountControl, 
Value=[544]}, Attribute: {Name=displayName, Value=[google]}, Attribute: 
{Name=givenName, Value=[google]}, Attribute: {Name=userPrincipalName, 
Value=[goo...@testmnet.com]}, Attribute: {Name=__NAME__, 
Value=[cn=google,ou=Tapestry,dc=testmnet,dc=com]}, Attribute: 
{Name=__PASSWORD__, 
Value=[org.identityconnectors.common.security.GuardedString@f0b270c2]}, 
Attribute: {Name=cn, Value=[google]}, Attribute: {Name=telephoneNumber, 
Value=[9737733637]}, Attribute: {Name=objectClass, Value=[top]}], null)      
Method: create
10:44:33.805 DEBUG Creating LDAP subcontext 
cn=google,ou=Tapestry,dc=testmnet,dc=com with attributes {sn=sn: google, 
unicodePwd=unicodePwd: [B@b5a29d4, userAccountControl=userAccountControl: 544, 
objectClass=objectClass: organizationalPerson, person, top, user, mail=mail: 
goo...@gmail.com, telephoneNumber=telephoneNumber: 9737733637, 
givenName=givenName: google, userPrincipalName=userPrincipalName: 
goo...@testmnet.com, displayName=displayName: google, description=description: 
google, sAMAccountName=sAMAccountName: google} Method: create
10:44:33.950 DEBUG Adding cn=google,ou=Tapestry,dc=testmnet,dc=com to LDAP 
groups [cn=Administrator,cn=Users,dc=testmnet,dc=com]        Method: 
addLdapGroupMemberships
10:44:34.031 DEBUG Exception:   Method: create
org.identityconnectors.framework.common.exceptions.ConnectorException: 
javax.naming.directory.SchemaViolationException: [LDAP: error code 65 - 
0000207D: UpdErr: DSID-0315166D, problem 6002 (OBJ_CLASS_VIOLATION), data 31
]; remaining name 'cn=Administrator,cn=Users,dc=testmnet,dc=com'
        at 
org.connid.bundles.ldap.commons.GroupHelper.addMemberToGroup(GroupHelper.java:228)
 ~[?:?]
        at 
org.connid.bundles.ldap.commons.GroupHelper.addLdapGroupMemberships(GroupHelper.java:101)
 ~[?:?]
        at org.connid.bundles.ad.crud.ADCreate.executeImpl(ADCreate.java:208) 
~[?:?]
        at org.connid.bundles.ad.crud.ADCreate.create(ADCreate.java:80) ~[?:?]
        at org.connid.bundles.ad.ADConnector.create(ADConnector.java:170) ~[?:?]
        at 
org.identityconnectors.framework.impl.api.local.operations.CreateImpl.create(CreateImpl.java:89)
 ~[connector-framework-internal-1.4.0.0.jar:?]
        at sun.reflect.GeneratedMethodAccessor1159.invoke(Unknown Source) ~[?:?]
        at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
 ~[?:1.6.0_24]
        at java.lang.reflect.Method.invoke(Method.java:616) ~[?:1.6.0_24]
        at 
org.identityconnectors.framework.impl.api.local.operations.ConnectorAPIOperationRunnerProxy.invoke(ConnectorAPIOperationRunnerProxy.java:98)
 ~[connector-framework-internal-1.4.0.0.jar:?]
        at sun.proxy.$Proxy250.create(Unknown Source) ~[?:?]
        at sun.reflect.GeneratedMethodAccessor1159.invoke(Unknown Source) ~[?:?]
        at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
 ~[?:1.6.0_24]
        at java.lang.reflect.Method.invoke(Method.java:616) ~[?:1.6.0_24]
        at 
org.identityconnectors.framework.impl.api.local.operations.ThreadClassLoaderManagerProxy.invoke(ThreadClassLoaderManagerProxy.java:98)
 ~[connector-framework-internal-1.4.0.0.jar:?]
        at sun.proxy.$Proxy250.create(Unknown Source) ~[?:?]
        at sun.reflect.GeneratedMethodAccessor1159.invoke(Unknown Source) ~[?:?]
        at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
 ~[?:1.6.0_24]
        at java.lang.reflect.Method.invoke(Method.java:616) ~[?:1.6.0_24]
        at 
org.identityconnectors.framework.impl.api.DelegatingTimeoutProxy.invoke(DelegatingTimeoutProxy.java:99)
 ~[connector-framework-internal-1.4.0.0.jar:?]
        at sun.proxy.$Proxy250.create(Unknown Source) ~[?:?]
        at sun.reflect.GeneratedMethodAccessor1159.invoke(Unknown Source) ~[?:?]
        at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
 ~[?:1.6.0_24]
        at java.lang.reflect.Method.invoke(Method.java:616) ~[?:1.6.0_24]
        at 
org.identityconnectors.framework.impl.api.LoggingProxy.invoke(LoggingProxy.java:77)
 ~[connector-framework-internal-1.4.0.0.jar:?]
        at sun.proxy.$Proxy250.create(Unknown Source) ~[?:?]
        at 
org.identityconnectors.framework.impl.api.AbstractConnectorFacade.create(AbstractConnectorFacade.java:153)
 ~[connector-framework-internal-1.4.0.0.jar:?]
        at 
org.apache.syncope.core.propagation.impl.AsyncConnectorFacade.create(AsyncConnectorFacade.java:69)
 ~[AsyncConnectorFacade.class:?]
        at 
org.apache.syncope.core.propagation.impl.AsyncConnectorFacade$$FastClassBySpringCGLIB$$5578eaa3.invoke(<generated>)
 ~[spring-core-4.0.7.RELEASE.jar:?]
        at 
org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:204) 
~[spring-core-4.0.7.RELEASE.jar:4.0.7.RELEASE]
        at 
org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:708)
 ~[spring-aop-4.0.7.RELEASE.jar:4.0.7.RELEASE]
        at 
org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:157)
 ~[spring-aop-4.0.7.RELEASE.jar:4.0.7.RELEASE]
        at 
org.springframework.aop.interceptor.AsyncExecutionInterceptor$1.call(AsyncExecutionInterceptor.java:97)
 ~[spring-aop-4.0.7.RELEASE.jar:4.0.7.RELEASE]
        at java.util.concurrent.FutureTask$Sync.innerRun(FutureTask.java:334) 
~[?:1.6.0_24]
        at java.util.concurrent.FutureTask.run(FutureTask.java:166) 
~[?:1.6.0_24]
        at 
java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1146) 
[?:1.6.0_24]
        at 
java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615) 
[?:1.6.0_24]
        at java.lang.Thread.run(Thread.java:679) [?:1.6.0_24]
Caused by: javax.naming.directory.SchemaViolationException: [LDAP: error code 
65 - 0000207D: UpdErr: DSID-0315166D, problem 6002 (OBJ_CLASS_VIOLATION), data 
31
]
        at com.sun.jndi.ldap.LdapCtx.mapErrorCode(LdapCtx.java:3063) 
~[?:1.6.0_24]
        at com.sun.jndi.ldap.LdapCtx.processReturnCode(LdapCtx.java:2978) 
~[?:1.6.0_24]
        at com.sun.jndi.ldap.LdapCtx.processReturnCode(LdapCtx.java:2785) 
~[?:1.6.0_24]
        at com.sun.jndi.ldap.LdapCtx.c_modifyAttributes(LdapCtx.java:1468) 
~[?:1.6.0_24]
        at 
com.sun.jndi.toolkit.ctx.ComponentDirContext.p_modifyAttributes(ComponentDirContext.java:273)
 ~[?:1.6.0_24]
        at 
com.sun.jndi.toolkit.ctx.PartialCompositeDirContext.modifyAttributes(PartialCompositeDirContext.java:190)
 ~[?:1.6.0_24]
        at 
com.sun.jndi.toolkit.ctx.PartialCompositeDirContext.modifyAttributes(PartialCompositeDirContext.java:179)
 ~[?:1.6.0_24]
        at 
javax.naming.directory.InitialDirContext.modifyAttributes(InitialDirContext.java:165)
 ~[?:1.6.0_24]
        at 
org.connid.bundles.ldap.commons.GroupHelper.addMemberToGroup(GroupHelper.java:224)
 ~[?:?]
        ... 37 more
10:44:34.210 DEBUG Enter: getObject(ObjectClass: __ACCOUNT__, Attribute: 
{Name=__UID__, Value=[google]}, OperationOptions: 
{ATTRS_TO_GET:[mail,sn,userAccountControl,objectClass,givenName,__ENABLE__,userPrincipalName,cn,__UID__,description...]})
    Method: getObject
10:44:34.274 WARN  Reading passwords not supported      Method: 
getAttributesToGet
10:44:34.275 WARN  Attribute __ENABLE__ of object class __ACCOUNT__ is not 
mapped to an LDAP attribute  Method: getLdapAttribute
10:44:34.276 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter 
(&(&(objectClass=top)(objectClass=person)(objectClass=organizationalPerson)(objectClass=user))(sAMAccountName=google))
 and SearchControls: {returningAttributes=[cn, description, displayName, 
entryDN, givenName, mail, objectClass, sAMAccountName, sn, telephoneNumber, 
unicodePwd, userAccountControl, userPrincipalName], scope=SUBTREE}      Method: 
doSearch
10:44:34.337 DEBUG User Account Control: 544    Method: createConnectorObject
10:44:34.338 DEBUG Return: {Name=Attribute: {Name=__NAME__, 
Value=[CN=google,OU=Tapestry,DC=testmnet,DC=com]}, Attributes=[Attribute: 
{Name=description, Value=[google]}, Attribute: {Name=sn, Value=[google]}, 
Attribute: {Name=mail, Value=[goo...@gmail.com]}, Attribute: {Name=__ENABLE__, 
Value=[true]}, Attribute: {Name=sAMAccountName, Value=[google]}, Attribute: 
{Name=userAccountControl, Value=[544]}, Attribute: {Name=displayName, 
Value=[google]}, Attribute: {Name=givenName, Value=[google]}, Attribute: 
{Name=__UID__, Value=[google]}, Attribute: {Name=userPrincipalName, 
Value=[goo...@testmnet.com]}, Attribute: {Name=__NAME__, 
Value=[CN=google,OU=Tapestry,DC=testmnet,DC=com]}, Attribute: 
{Name=__PASSWORD__, 
Value=[org.identityconnectors.common.security.GuardedString@204e249b]}, 
Attribute: {Name=cn, Value=[google]}, Attribute: {Name=telephoneNumber, 
Value=[9737733637]}, Attribute: {Name=objectClass, Value=[top, person, 
organizationalPerson, user]}], ObjectClass=ObjectClass: __ACCOUNT__, 
Uid=Attribute: {Name=__UID__, Value=[google]}}     Method: getObject
10:46:08.231 DEBUG Return: null Method: search
10:46:08.232 DEBUG Enter: search(ObjectClass: __GROUP__, null, 
org.apache.syncope.core.propagation.impl.ConnectorFacadeProxy$2@7140f4fb, 
OperationOptions: {ATTRS_TO_GET:[__UID__,__NAME__,memberOf,__ENABLE__]})       
Method: search
10:46:08.288 WARN  Attribute __ENABLE__ of object class __GROUP__ is not mapped 
to an LDAP attribute    Method: getLdapAttribute
10:46:08.289 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter 
(&(objectClass=top)(objectClass=group)) and SearchControls: 
{returningAttributes=[entryDN, memberOf, sAMAccountName], scope=SUBTREE}       
Method: doSearch
10:46:09.835 DEBUG Return: null Method: search
10:46:14.884 DEBUG Enter: search(ObjectClass: __ACCOUNT__, null, 
org.apache.syncope.core.propagation.impl.ConnectorFacadeProxy$2@3ef45fc8, 
OperationOptions: 
{ATTRS_TO_GET:[mail,sn,userAccountControl,objectClass,givenName,__ENABLE__,userPrincipalName,cn,__UID__,description...]})
  Method: search
10:46:14.944 WARN  Reading passwords not supported      Method: 
getAttributesToGet
10:46:14.944 WARN  Attribute __ENABLE__ of object class __ACCOUNT__ is not 
mapped to an LDAP attribute  Method: getLdapAttribute
10:46:14.945 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter 
(&(objectClass=top)(objectClass=person)(objectClass=organizationalPerson)(objectClass=user))
 and SearchControls: {returningAttributes=[cn, description, displayName, 
entryDN, givenName, mail, objectClass, sAMAccountName, sn, telephoneNumber, 
unicodePwd, userAccountControl, userPrincipalName], scope=SUBTREE}        
Method: doSearch
10:46:15.013 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.014 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.015 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.016 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.017 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.018 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.019 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.020 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.021 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.022 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.023 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.025 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.026 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.027 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.028 DEBUG User Account Control: 66048  Method: createConnectorObject
10:46:15.029 DEBUG User Account Control: 66048  Method: createConnectorObject
10:46:15.030 DEBUG User Account Control: 66048  Method: createConnectorObject
10:46:15.032 DEBUG User Account Control: 66048  Method: createConnectorObject
10:46:15.033 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.034 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.036 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.037 DEBUG User Account Control: 66048  Method: createConnectorObject
10:46:15.038 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.039 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.041 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.042 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.043 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.044 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.046 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.047 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:49.267 DEBUG Return: null Method: search
10:47:49.293 DEBUG Enter: search(ObjectClass: __GROUP__, null, 
org.apache.syncope.core.propagation.impl.ConnectorFacadeProxy$2@70fbfe7, 
OperationOptions: {ATTRS_TO_GET:[__UID__,__NAME__,memberOf,__ENABLE__]})        
Method: search
10:47:49.348 WARN  Attribute __ENABLE__ of object class __GROUP__ is not mapped 
to an LDAP attribute    Method: getLdapAttribute
10:47:49.349 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter 
(&(objectClass=top)(objectClass=group)) and SearchControls: 
{returningAttributes=[entryDN, memberOf, sAMAccountName], scope=SUBTREE}       
Method: doSearch
10:47:50.961 DEBUG Return: null Method: search
10:47:55.890 DEBUG Enter: search(ObjectClass: __ACCOUNT__, null, 
org.apache.syncope.core.propagation.impl.ConnectorFacadeProxy$2@3f94be86, 
OperationOptions: 
{ATTRS_TO_GET:[mail,sn,userAccountControl,objectClass,givenName,__ENABLE__,userPrincipalName,cn,__UID__,description...]})
  Method: search
10:47:55.943 WARN  Reading passwords not supported      Method: 
getAttributesToGet
10:47:55.944 WARN  Attribute __ENABLE__ of object class __ACCOUNT__ is not 
mapped to an LDAP attribute  Method: getLdapAttribute
10:47:55.944 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter 
(&(objectClass=top)(objectClass=person)(objectClass=organizationalPerson)(objectClass=user))
 and SearchControls: {returningAttributes=[cn, description, displayName, 
entryDN, givenName, mail, objectClass, sAMAccountName, sn, telephoneNumber, 
unicodePwd, userAccountControl, userPrincipalName], scope=SUBTREE}        
Method: doSearch
10:47:56.011 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.014 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.015 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.016 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.017 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.018 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.018 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.019 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.020 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.021 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.022 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.023 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.023 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.024 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.025 DEBUG User Account Control: 66048  Method: createConnectorObject
10:47:56.026 DEBUG User Account Control: 66048  Method: createConnectorObject
10:47:56.027 DEBUG User Account Control: 66048  Method: createConnectorObject
10:47:56.028 DEBUG User Account Control: 66048  Method: createConnectorObject
10:47:56.029 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.029 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.030 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.031 DEBUG User Account Control: 66048  Method: createConnectorObject
10:47:56.032 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.033 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.034 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.035 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.036 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.036 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.037 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.038 DEBUG User Account Control: 544    Method: createConnectorObject
10:44:33.581 DEBUG Enter: getObject(ObjectClass: __ACCOUNT__, Attribute: 
{Name=__UID__, Value=[google]}, OperationOptions: 
{ATTRS_TO_GET:[mail,sn,userAccountControl,objectClass,givenName,__ENABLE__,userPrincipalName,cn,__UID__,description...]})
    Method: getObject
10:44:33.649 WARN  Reading passwords not supported      Method: 
getAttributesToGet
10:44:33.650 WARN  Attribute __ENABLE__ of object class __ACCOUNT__ is not 
mapped to an LDAP attribute  Method: getLdapAttribute
10:44:33.651 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter 
(&(&(objectClass=top)(objectClass=person)(objectClass=organizationalPerson)(objectClass=user))(sAMAccountName=google))
 and SearchControls: {returningAttributes=[cn, description, displayName, 
entryDN, givenName, mail, objectClass, sAMAccountName, sn, telephoneNumber, 
unicodePwd, userAccountControl, userPrincipalName], scope=SUBTREE}      Method: 
doSearch
10:44:33.711 DEBUG Return: null Method: getObject
10:44:33.739 DEBUG Enter: create(ObjectClass: __ACCOUNT__, [Attribute: 
{Name=description, Value=[google]}, Attribute: {Name=sn, Value=[google]}, 
Attribute: {Name=mail, Value=[goo...@gmail.com]}, Attribute: 
{Name=sAMAccountName, Value=[google]}, Attribute: {Name=userAccountControl, 
Value=[544]}, Attribute: {Name=displayName, Value=[google]}, Attribute: 
{Name=givenName, Value=[google]}, Attribute: {Name=userPrincipalName, 
Value=[goo...@testmnet.com]}, Attribute: {Name=__NAME__, 
Value=[cn=google,ou=Tapestry,dc=testmnet,dc=com]}, Attribute: 
{Name=__PASSWORD__, 
Value=[org.identityconnectors.common.security.GuardedString@f0b270c2]}, 
Attribute: {Name=cn, Value=[google]}, Attribute: {Name=telephoneNumber, 
Value=[9737733637]}, Attribute: {Name=objectClass, Value=[top]}], null)      
Method: create
10:44:33.805 DEBUG Creating LDAP subcontext 
cn=google,ou=Tapestry,dc=testmnet,dc=com with attributes {sn=sn: google, 
unicodePwd=unicodePwd: [B@b5a29d4, userAccountControl=userAccountControl: 544, 
objectClass=objectClass: organizationalPerson, person, top, user, mail=mail: 
goo...@gmail.com, telephoneNumber=telephoneNumber: 9737733637, 
givenName=givenName: google, userPrincipalName=userPrincipalName: 
goo...@testmnet.com, displayName=displayName: google, description=description: 
google, sAMAccountName=sAMAccountName: google} Method: create
10:44:33.950 DEBUG Adding cn=google,ou=Tapestry,dc=testmnet,dc=com to LDAP 
groups [cn=Administrator,cn=Users,dc=testmnet,dc=com]        Method: 
addLdapGroupMemberships
10:44:34.031 DEBUG Exception:   Method: create
org.identityconnectors.framework.common.exceptions.ConnectorException: 
javax.naming.directory.SchemaViolationException: [LDAP: error code 65 - 
0000207D: UpdErr: DSID-0315166D, problem 6002 (OBJ_CLASS_VIOLATION), data 31
]; remaining name 'cn=Administrator,cn=Users,dc=testmnet,dc=com'
        at 
org.connid.bundles.ldap.commons.GroupHelper.addMemberToGroup(GroupHelper.java:228)
 ~[?:?]
        at 
org.connid.bundles.ldap.commons.GroupHelper.addLdapGroupMemberships(GroupHelper.java:101)
 ~[?:?]
        at org.connid.bundles.ad.crud.ADCreate.executeImpl(ADCreate.java:208) 
~[?:?]
        at org.connid.bundles.ad.crud.ADCreate.create(ADCreate.java:80) ~[?:?]
        at org.connid.bundles.ad.ADConnector.create(ADConnector.java:170) ~[?:?]
        at 
org.identityconnectors.framework.impl.api.local.operations.CreateImpl.create(CreateImpl.java:89)
 ~[connector-framework-internal-1.4.0.0.jar:?]
        at sun.reflect.GeneratedMethodAccessor1159.invoke(Unknown Source) ~[?:?]
        at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
 ~[?:1.6.0_24]
        at java.lang.reflect.Method.invoke(Method.java:616) ~[?:1.6.0_24]
        at 
org.identityconnectors.framework.impl.api.local.operations.ConnectorAPIOperationRunnerProxy.invoke(ConnectorAPIOperationRunnerProxy.java:98)
 ~[connector-framework-internal-1.4.0.0.jar:?]
        at sun.proxy.$Proxy250.create(Unknown Source) ~[?:?]
        at sun.reflect.GeneratedMethodAccessor1159.invoke(Unknown Source) ~[?:?]
        at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
 ~[?:1.6.0_24]
        at java.lang.reflect.Method.invoke(Method.java:616) ~[?:1.6.0_24]
        at 
org.identityconnectors.framework.impl.api.local.operations.ThreadClassLoaderManagerProxy.invoke(ThreadClassLoaderManagerProxy.java:98)
 ~[connector-framework-internal-1.4.0.0.jar:?]
        at sun.proxy.$Proxy250.create(Unknown Source) ~[?:?]
        at sun.reflect.GeneratedMethodAccessor1159.invoke(Unknown Source) ~[?:?]
        at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
 ~[?:1.6.0_24]
        at java.lang.reflect.Method.invoke(Method.java:616) ~[?:1.6.0_24]
        at 
org.identityconnectors.framework.impl.api.DelegatingTimeoutProxy.invoke(DelegatingTimeoutProxy.java:99)
 ~[connector-framework-internal-1.4.0.0.jar:?]
        at sun.proxy.$Proxy250.create(Unknown Source) ~[?:?]
        at sun.reflect.GeneratedMethodAccessor1159.invoke(Unknown Source) ~[?:?]
        at 
sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
 ~[?:1.6.0_24]
        at java.lang.reflect.Method.invoke(Method.java:616) ~[?:1.6.0_24]
        at 
org.identityconnectors.framework.impl.api.LoggingProxy.invoke(LoggingProxy.java:77)
 ~[connector-framework-internal-1.4.0.0.jar:?]
        at sun.proxy.$Proxy250.create(Unknown Source) ~[?:?]
        at 
org.identityconnectors.framework.impl.api.AbstractConnectorFacade.create(AbstractConnectorFacade.java:153)
 ~[connector-framework-internal-1.4.0.0.jar:?]
        at 
org.apache.syncope.core.propagation.impl.AsyncConnectorFacade.create(AsyncConnectorFacade.java:69)
 ~[AsyncConnectorFacade.class:?]
        at 
org.apache.syncope.core.propagation.impl.AsyncConnectorFacade$$FastClassBySpringCGLIB$$5578eaa3.invoke(<generated>)
 ~[spring-core-4.0.7.RELEASE.jar:?]
        at 
org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:204) 
~[spring-core-4.0.7.RELEASE.jar:4.0.7.RELEASE]
        at 
org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:708)
 ~[spring-aop-4.0.7.RELEASE.jar:4.0.7.RELEASE]
        at 
org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:157)
 ~[spring-aop-4.0.7.RELEASE.jar:4.0.7.RELEASE]
        at 
org.springframework.aop.interceptor.AsyncExecutionInterceptor$1.call(AsyncExecutionInterceptor.java:97)
 ~[spring-aop-4.0.7.RELEASE.jar:4.0.7.RELEASE]
        at java.util.concurrent.FutureTask$Sync.innerRun(FutureTask.java:334) 
~[?:1.6.0_24]
        at java.util.concurrent.FutureTask.run(FutureTask.java:166) 
~[?:1.6.0_24]
        at 
java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1146) 
[?:1.6.0_24]
        at 
java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615) 
[?:1.6.0_24]
        at java.lang.Thread.run(Thread.java:679) [?:1.6.0_24]
Caused by: javax.naming.directory.SchemaViolationException: [LDAP: error code 
65 - 0000207D: UpdErr: DSID-0315166D, problem 6002 (OBJ_CLASS_VIOLATION), data 
31
]
        at com.sun.jndi.ldap.LdapCtx.mapErrorCode(LdapCtx.java:3063) 
~[?:1.6.0_24]
        at com.sun.jndi.ldap.LdapCtx.processReturnCode(LdapCtx.java:2978) 
~[?:1.6.0_24]
        at com.sun.jndi.ldap.LdapCtx.processReturnCode(LdapCtx.java:2785) 
~[?:1.6.0_24]
        at com.sun.jndi.ldap.LdapCtx.c_modifyAttributes(LdapCtx.java:1468) 
~[?:1.6.0_24]
        at 
com.sun.jndi.toolkit.ctx.ComponentDirContext.p_modifyAttributes(ComponentDirContext.java:273)
 ~[?:1.6.0_24]
        at 
com.sun.jndi.toolkit.ctx.PartialCompositeDirContext.modifyAttributes(PartialCompositeDirContext.java:190)
 ~[?:1.6.0_24]
        at 
com.sun.jndi.toolkit.ctx.PartialCompositeDirContext.modifyAttributes(PartialCompositeDirContext.java:179)
 ~[?:1.6.0_24]
        at 
javax.naming.directory.InitialDirContext.modifyAttributes(InitialDirContext.java:165)
 ~[?:1.6.0_24]
        at 
org.connid.bundles.ldap.commons.GroupHelper.addMemberToGroup(GroupHelper.java:224)
 ~[?:?]
        ... 37 more
10:44:34.210 DEBUG Enter: getObject(ObjectClass: __ACCOUNT__, Attribute: 
{Name=__UID__, Value=[google]}, OperationOptions: 
{ATTRS_TO_GET:[mail,sn,userAccountControl,objectClass,givenName,__ENABLE__,userPrincipalName,cn,__UID__,description...]})
    Method: getObject
10:44:34.274 WARN  Reading passwords not supported      Method: 
getAttributesToGet
10:44:34.275 WARN  Attribute __ENABLE__ of object class __ACCOUNT__ is not 
mapped to an LDAP attribute  Method: getLdapAttribute
10:44:34.276 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter 
(&(&(objectClass=top)(objectClass=person)(objectClass=organizationalPerson)(objectClass=user))(sAMAccountName=google))
 and SearchControls: {returningAttributes=[cn, description, displayName, 
entryDN, givenName, mail, objectClass, sAMAccountName, sn, telephoneNumber, 
unicodePwd, userAccountControl, userPrincipalName], scope=SUBTREE}      Method: 
doSearch
10:44:34.337 DEBUG User Account Control: 544    Method: createConnectorObject
10:44:34.338 DEBUG Return: {Name=Attribute: {Name=__NAME__, 
Value=[CN=google,OU=Tapestry,DC=testmnet,DC=com]}, Attributes=[Attribute: 
{Name=description, Value=[google]}, Attribute: {Name=sn, Value=[google]}, 
Attribute: {Name=mail, Value=[goo...@gmail.com]}, Attribute: {Name=__ENABLE__, 
Value=[true]}, Attribute: {Name=sAMAccountName, Value=[google]}, Attribute: 
{Name=userAccountControl, Value=[544]}, Attribute: {Name=displayName, 
Value=[google]}, Attribute: {Name=givenName, Value=[google]}, Attribute: 
{Name=__UID__, Value=[google]}, Attribute: {Name=userPrincipalName, 
Value=[goo...@testmnet.com]}, Attribute: {Name=__NAME__, 
Value=[CN=google,OU=Tapestry,DC=testmnet,DC=com]}, Attribute: 
{Name=__PASSWORD__, 
Value=[org.identityconnectors.common.security.GuardedString@204e249b]}, 
Attribute: {Name=cn, Value=[google]}, Attribute: {Name=telephoneNumber, 
Value=[9737733637]}, Attribute: {Name=objectClass, Value=[top, person, 
organizationalPerson, user]}], ObjectClass=ObjectClass: __ACCOUNT__, 
Uid=Attribute: {Name=__UID__, Value=[google]}}     Method: getObject
10:46:08.231 DEBUG Return: null Method: search
10:46:08.232 DEBUG Enter: search(ObjectClass: __GROUP__, null, 
org.apache.syncope.core.propagation.impl.ConnectorFacadeProxy$2@7140f4fb, 
OperationOptions: {ATTRS_TO_GET:[__UID__,__NAME__,memberOf,__ENABLE__]})       
Method: search
10:46:08.288 WARN  Attribute __ENABLE__ of object class __GROUP__ is not mapped 
to an LDAP attribute    Method: getLdapAttribute
10:46:08.289 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter 
(&(objectClass=top)(objectClass=group)) and SearchControls: 
{returningAttributes=[entryDN, memberOf, sAMAccountName], scope=SUBTREE}       
Method: doSearch
10:46:09.835 DEBUG Return: null Method: search
10:46:14.884 DEBUG Enter: search(ObjectClass: __ACCOUNT__, null, 
org.apache.syncope.core.propagation.impl.ConnectorFacadeProxy$2@3ef45fc8, 
OperationOptions: 
{ATTRS_TO_GET:[mail,sn,userAccountControl,objectClass,givenName,__ENABLE__,userPrincipalName,cn,__UID__,description...]})
  Method: search
10:46:14.944 WARN  Reading passwords not supported      Method: 
getAttributesToGet
10:46:14.944 WARN  Attribute __ENABLE__ of object class __ACCOUNT__ is not 
mapped to an LDAP attribute  Method: getLdapAttribute
10:46:14.945 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter 
(&(objectClass=top)(objectClass=person)(objectClass=organizationalPerson)(objectClass=user))
 and SearchControls: {returningAttributes=[cn, description, displayName, 
entryDN, givenName, mail, objectClass, sAMAccountName, sn, telephoneNumber, 
unicodePwd, userAccountControl, userPrincipalName], scope=SUBTREE}        
Method: doSearch
10:46:15.013 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.014 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.015 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.016 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.017 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.018 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.019 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.020 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.021 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.022 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.023 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.025 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.026 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.027 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.028 DEBUG User Account Control: 66048  Method: createConnectorObject
10:46:15.029 DEBUG User Account Control: 66048  Method: createConnectorObject
10:46:15.030 DEBUG User Account Control: 66048  Method: createConnectorObject
10:46:15.032 DEBUG User Account Control: 66048  Method: createConnectorObject
10:46:15.033 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.034 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.036 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.037 DEBUG User Account Control: 66048  Method: createConnectorObject
10:46:15.038 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.039 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.041 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.042 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.043 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.044 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.046 DEBUG User Account Control: 544    Method: createConnectorObject
10:46:15.047 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:49.267 DEBUG Return: null Method: search
10:47:49.293 DEBUG Enter: search(ObjectClass: __GROUP__, null, 
org.apache.syncope.core.propagation.impl.ConnectorFacadeProxy$2@70fbfe7, 
OperationOptions: {ATTRS_TO_GET:[__UID__,__NAME__,memberOf,__ENABLE__]})        
Method: search
10:47:49.348 WARN  Attribute __ENABLE__ of object class __GROUP__ is not mapped 
to an LDAP attribute    Method: getLdapAttribute
10:47:49.349 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter 
(&(objectClass=top)(objectClass=group)) and SearchControls: 
{returningAttributes=[entryDN, memberOf, sAMAccountName], scope=SUBTREE}       
Method: doSearch
10:47:50.961 DEBUG Return: null Method: search
10:47:55.890 DEBUG Enter: search(ObjectClass: __ACCOUNT__, null, 
org.apache.syncope.core.propagation.impl.ConnectorFacadeProxy$2@3f94be86, 
OperationOptions: 
{ATTRS_TO_GET:[mail,sn,userAccountControl,objectClass,givenName,__ENABLE__,userPrincipalName,cn,__UID__,description...]})
  Method: search
10:47:55.943 WARN  Reading passwords not supported      Method: 
getAttributesToGet
10:47:55.944 WARN  Attribute __ENABLE__ of object class __ACCOUNT__ is not 
mapped to an LDAP attribute  Method: getLdapAttribute
10:47:55.944 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter 
(&(objectClass=top)(objectClass=person)(objectClass=organizationalPerson)(objectClass=user))
 and SearchControls: {returningAttributes=[cn, description, displayName, 
entryDN, givenName, mail, objectClass, sAMAccountName, sn, telephoneNumber, 
unicodePwd, userAccountControl, userPrincipalName], scope=SUBTREE}        
Method: doSearch
10:47:56.011 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.014 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.015 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.016 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.017 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.018 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.018 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.019 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.020 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.021 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.022 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.023 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.023 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.024 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.025 DEBUG User Account Control: 66048  Method: createConnectorObject
10:47:56.026 DEBUG User Account Control: 66048  Method: createConnectorObject
10:47:56.027 DEBUG User Account Control: 66048  Method: createConnectorObject
10:47:56.028 DEBUG User Account Control: 66048  Method: createConnectorObject
10:47:56.029 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.029 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.030 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.031 DEBUG User Account Control: 66048  Method: createConnectorObject
10:47:56.032 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.033 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.034 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.035 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.036 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.036 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.037 DEBUG User Account Control: 544    Method: createConnectorObject
10:47:56.038 DEBUG User Account Control: 544    Method: createConnectorObject

Reply via email to