Hey, Please find the attached core-connid.log and the snapshot of the error message when I created a user named "google".
Also in core-rest.log I am getting this warning message "09:54:38.989 WARN org.apache.syncope.core.persistence.validation.entity.EntityValidationListener - Bean validation errors found: [ConstraintViolationImpl{interpolatedMessage='InvalidUsername;Username does not match pattern', propertyPath=username, rootBeanClass=class org.apache.syncope.core.persistence.beans.user.SyncopeUser, messageTemplate='InvalidUsername;Username does not match pattern'}] " Regards, Harsh Sharma On Thu, Oct 23, 2014 at 12:34 PM, Fabio Martelli <fabio.marte...@gmail.com> wrote: > Hi Harsh, your configuration seems good, btw provided info is not enough > to make a complete diagnosis. > Can you send core-connid.log file? > > Regards, > F. > > Il 22/10/2014 23:48, Harsh Sharma ha scritto: > > Hey Francesco, > > Now when I am creating a user in Syncope it is reflecting in Active > directory, but when I create user it always show error propagation failure > in Active Directory( > > javax.naming.directory.SchemaViolationException: [LDAP: error code 65 - > 0000207D: UpdErr: DSID-0315166D, problem 6002 (OBJ_CLASS_VIOLATION), data 31 > �]; remaining name 'cn=Administrator,cn=Users,dc=testmnet,dc=com' > > Cause: [LDAP: error code 65 - 0000207D: UpdErr: DSID-0315166D, problem 6002 > (OBJ_CLASS_VIOLATION), data 31 > > ). The user is reflecting in Active directory but this error always > appears. > > Also when I am deleting user in Active directory it is not reflecting in > syncope, I mean it is still present in syncope.(I have defined a > synchronized task already). > > Attaching log with this mail. > > Also my syncope version is 1.2.0 > AD connector version 1.1.3 > Active directory version (objectVersion: 69; ) > AD connector configuration properties and * AD resource mapping are > attached as snapshot > > On Mon, Oct 20, 2014 at 2:10 PM, Francesco Chicchiriccò < > ilgro...@apache.org> wrote: > >> On 19/10/2014 14:42, Harsh Sharma wrote: >> >> Hello, >> >> I am connecting apache syncope to active directory. I am able to >> retrieve Users from Active directory. I can change password and other >> attributes of the retrieved users, But I am not able to create user in >> active directory. I mean whenever I am creating user in apache syncope >> and saving it, it is giving me error read timeout and it is not saving >> in active directory. I am using ssl connection, so no issue of >> certificate. >> I am stuck on it. Please help. >> >> >> Hi Harsh, >> you need to provide some more information in order for someone to get any >> insight of your problems: >> >> * Syncope version? >> * AD connector version? >> * Active Directory version? >> * AD connector configuration properties? >> * AD resource mapping? >> >> Regards. >> >> -- >> Francesco Chicchiriccò >> >> Tirasa - Open Source Excellencehttp://www.tirasa.net/ >> >> Involved at The Apache Software Foundation: >> member, Syncope PMC chair, Cocoon PMC, Olingo >> PMChttp://people.apache.org/~ilgrosso/ >> >> > > On Mon, Oct 20, 2014 at 2:10 PM, Francesco Chicchiriccò < > ilgro...@apache.org> wrote: > >> On 19/10/2014 14:42, Harsh Sharma wrote: >> >> Hello, >> >> I am connecting apache syncope to active directory. I am able to >> retrieve Users from Active directory. I can change password and other >> attributes of the retrieved users, But I am not able to create user in >> active directory. I mean whenever I am creating user in apache syncope >> and saving it, it is giving me error read timeout and it is not saving >> in active directory. I am using ssl connection, so no issue of >> certificate. >> I am stuck on it. Please help. >> >> >> Hi Harsh, >> you need to provide some more information in order for someone to get any >> insight of your problems: >> >> * Syncope version? >> * AD connector version? >> * Active Directory version? >> * AD connector configuration properties? >> * AD resource mapping? >> >> Regards. >> >> -- >> Francesco Chicchiriccò >> >> Tirasa - Open Source Excellencehttp://www.tirasa.net/ >> >> Involved at The Apache Software Foundation: >> member, Syncope PMC chair, Cocoon PMC, Olingo >> PMChttp://people.apache.org/~ilgrosso/ >> >> > > > -- > Fabio Martelli > > Tirasa - Open Source Excellencehttp://www.tirasa.net/ > > Apache Syncope PMChttp://people.apache.org/~fmartelli/ > >
10:44:33.581 DEBUG Enter: getObject(ObjectClass: __ACCOUNT__, Attribute: {Name=__UID__, Value=[google]}, OperationOptions: {ATTRS_TO_GET:[mail,sn,userAccountControl,objectClass,givenName,__ENABLE__,userPrincipalName,cn,__UID__,description...]}) Method: getObject 10:44:33.649 WARN Reading passwords not supported Method: getAttributesToGet 10:44:33.650 WARN Attribute __ENABLE__ of object class __ACCOUNT__ is not mapped to an LDAP attribute Method: getLdapAttribute 10:44:33.651 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter (&(&(objectClass=top)(objectClass=person)(objectClass=organizationalPerson)(objectClass=user))(sAMAccountName=google)) and SearchControls: {returningAttributes=[cn, description, displayName, entryDN, givenName, mail, objectClass, sAMAccountName, sn, telephoneNumber, unicodePwd, userAccountControl, userPrincipalName], scope=SUBTREE} Method: doSearch 10:44:33.711 DEBUG Return: null Method: getObject 10:44:33.739 DEBUG Enter: create(ObjectClass: __ACCOUNT__, [Attribute: {Name=description, Value=[google]}, Attribute: {Name=sn, Value=[google]}, Attribute: {Name=mail, Value=[goo...@gmail.com]}, Attribute: {Name=sAMAccountName, Value=[google]}, Attribute: {Name=userAccountControl, Value=[544]}, Attribute: {Name=displayName, Value=[google]}, Attribute: {Name=givenName, Value=[google]}, Attribute: {Name=userPrincipalName, Value=[goo...@testmnet.com]}, Attribute: {Name=__NAME__, Value=[cn=google,ou=Tapestry,dc=testmnet,dc=com]}, Attribute: {Name=__PASSWORD__, Value=[org.identityconnectors.common.security.GuardedString@f0b270c2]}, Attribute: {Name=cn, Value=[google]}, Attribute: {Name=telephoneNumber, Value=[9737733637]}, Attribute: {Name=objectClass, Value=[top]}], null) Method: create 10:44:33.805 DEBUG Creating LDAP subcontext cn=google,ou=Tapestry,dc=testmnet,dc=com with attributes {sn=sn: google, unicodePwd=unicodePwd: [B@b5a29d4, userAccountControl=userAccountControl: 544, objectClass=objectClass: organizationalPerson, person, top, user, mail=mail: goo...@gmail.com, telephoneNumber=telephoneNumber: 9737733637, givenName=givenName: google, userPrincipalName=userPrincipalName: goo...@testmnet.com, displayName=displayName: google, description=description: google, sAMAccountName=sAMAccountName: google} Method: create 10:44:33.950 DEBUG Adding cn=google,ou=Tapestry,dc=testmnet,dc=com to LDAP groups [cn=Administrator,cn=Users,dc=testmnet,dc=com] Method: addLdapGroupMemberships 10:44:34.031 DEBUG Exception: Method: create org.identityconnectors.framework.common.exceptions.ConnectorException: javax.naming.directory.SchemaViolationException: [LDAP: error code 65 - 0000207D: UpdErr: DSID-0315166D, problem 6002 (OBJ_CLASS_VIOLATION), data 31 ]; remaining name 'cn=Administrator,cn=Users,dc=testmnet,dc=com' at org.connid.bundles.ldap.commons.GroupHelper.addMemberToGroup(GroupHelper.java:228) ~[?:?] at org.connid.bundles.ldap.commons.GroupHelper.addLdapGroupMemberships(GroupHelper.java:101) ~[?:?] at org.connid.bundles.ad.crud.ADCreate.executeImpl(ADCreate.java:208) ~[?:?] at org.connid.bundles.ad.crud.ADCreate.create(ADCreate.java:80) ~[?:?] at org.connid.bundles.ad.ADConnector.create(ADConnector.java:170) ~[?:?] at org.identityconnectors.framework.impl.api.local.operations.CreateImpl.create(CreateImpl.java:89) ~[connector-framework-internal-1.4.0.0.jar:?] at sun.reflect.GeneratedMethodAccessor1159.invoke(Unknown Source) ~[?:?] at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:1.6.0_24] at java.lang.reflect.Method.invoke(Method.java:616) ~[?:1.6.0_24] at org.identityconnectors.framework.impl.api.local.operations.ConnectorAPIOperationRunnerProxy.invoke(ConnectorAPIOperationRunnerProxy.java:98) ~[connector-framework-internal-1.4.0.0.jar:?] at sun.proxy.$Proxy250.create(Unknown Source) ~[?:?] at sun.reflect.GeneratedMethodAccessor1159.invoke(Unknown Source) ~[?:?] at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:1.6.0_24] at java.lang.reflect.Method.invoke(Method.java:616) ~[?:1.6.0_24] at org.identityconnectors.framework.impl.api.local.operations.ThreadClassLoaderManagerProxy.invoke(ThreadClassLoaderManagerProxy.java:98) ~[connector-framework-internal-1.4.0.0.jar:?] at sun.proxy.$Proxy250.create(Unknown Source) ~[?:?] at sun.reflect.GeneratedMethodAccessor1159.invoke(Unknown Source) ~[?:?] at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:1.6.0_24] at java.lang.reflect.Method.invoke(Method.java:616) ~[?:1.6.0_24] at org.identityconnectors.framework.impl.api.DelegatingTimeoutProxy.invoke(DelegatingTimeoutProxy.java:99) ~[connector-framework-internal-1.4.0.0.jar:?] at sun.proxy.$Proxy250.create(Unknown Source) ~[?:?] at sun.reflect.GeneratedMethodAccessor1159.invoke(Unknown Source) ~[?:?] at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:1.6.0_24] at java.lang.reflect.Method.invoke(Method.java:616) ~[?:1.6.0_24] at org.identityconnectors.framework.impl.api.LoggingProxy.invoke(LoggingProxy.java:77) ~[connector-framework-internal-1.4.0.0.jar:?] at sun.proxy.$Proxy250.create(Unknown Source) ~[?:?] at org.identityconnectors.framework.impl.api.AbstractConnectorFacade.create(AbstractConnectorFacade.java:153) ~[connector-framework-internal-1.4.0.0.jar:?] at org.apache.syncope.core.propagation.impl.AsyncConnectorFacade.create(AsyncConnectorFacade.java:69) ~[AsyncConnectorFacade.class:?] at org.apache.syncope.core.propagation.impl.AsyncConnectorFacade$$FastClassBySpringCGLIB$$5578eaa3.invoke(<generated>) ~[spring-core-4.0.7.RELEASE.jar:?] at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:204) ~[spring-core-4.0.7.RELEASE.jar:4.0.7.RELEASE] at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:708) ~[spring-aop-4.0.7.RELEASE.jar:4.0.7.RELEASE] at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:157) ~[spring-aop-4.0.7.RELEASE.jar:4.0.7.RELEASE] at org.springframework.aop.interceptor.AsyncExecutionInterceptor$1.call(AsyncExecutionInterceptor.java:97) ~[spring-aop-4.0.7.RELEASE.jar:4.0.7.RELEASE] at java.util.concurrent.FutureTask$Sync.innerRun(FutureTask.java:334) ~[?:1.6.0_24] at java.util.concurrent.FutureTask.run(FutureTask.java:166) ~[?:1.6.0_24] at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1146) [?:1.6.0_24] at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615) [?:1.6.0_24] at java.lang.Thread.run(Thread.java:679) [?:1.6.0_24] Caused by: javax.naming.directory.SchemaViolationException: [LDAP: error code 65 - 0000207D: UpdErr: DSID-0315166D, problem 6002 (OBJ_CLASS_VIOLATION), data 31 ] at com.sun.jndi.ldap.LdapCtx.mapErrorCode(LdapCtx.java:3063) ~[?:1.6.0_24] at com.sun.jndi.ldap.LdapCtx.processReturnCode(LdapCtx.java:2978) ~[?:1.6.0_24] at com.sun.jndi.ldap.LdapCtx.processReturnCode(LdapCtx.java:2785) ~[?:1.6.0_24] at com.sun.jndi.ldap.LdapCtx.c_modifyAttributes(LdapCtx.java:1468) ~[?:1.6.0_24] at com.sun.jndi.toolkit.ctx.ComponentDirContext.p_modifyAttributes(ComponentDirContext.java:273) ~[?:1.6.0_24] at com.sun.jndi.toolkit.ctx.PartialCompositeDirContext.modifyAttributes(PartialCompositeDirContext.java:190) ~[?:1.6.0_24] at com.sun.jndi.toolkit.ctx.PartialCompositeDirContext.modifyAttributes(PartialCompositeDirContext.java:179) ~[?:1.6.0_24] at javax.naming.directory.InitialDirContext.modifyAttributes(InitialDirContext.java:165) ~[?:1.6.0_24] at org.connid.bundles.ldap.commons.GroupHelper.addMemberToGroup(GroupHelper.java:224) ~[?:?] ... 37 more 10:44:34.210 DEBUG Enter: getObject(ObjectClass: __ACCOUNT__, Attribute: {Name=__UID__, Value=[google]}, OperationOptions: {ATTRS_TO_GET:[mail,sn,userAccountControl,objectClass,givenName,__ENABLE__,userPrincipalName,cn,__UID__,description...]}) Method: getObject 10:44:34.274 WARN Reading passwords not supported Method: getAttributesToGet 10:44:34.275 WARN Attribute __ENABLE__ of object class __ACCOUNT__ is not mapped to an LDAP attribute Method: getLdapAttribute 10:44:34.276 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter (&(&(objectClass=top)(objectClass=person)(objectClass=organizationalPerson)(objectClass=user))(sAMAccountName=google)) and SearchControls: {returningAttributes=[cn, description, displayName, entryDN, givenName, mail, objectClass, sAMAccountName, sn, telephoneNumber, unicodePwd, userAccountControl, userPrincipalName], scope=SUBTREE} Method: doSearch 10:44:34.337 DEBUG User Account Control: 544 Method: createConnectorObject 10:44:34.338 DEBUG Return: {Name=Attribute: {Name=__NAME__, Value=[CN=google,OU=Tapestry,DC=testmnet,DC=com]}, Attributes=[Attribute: {Name=description, Value=[google]}, Attribute: {Name=sn, Value=[google]}, Attribute: {Name=mail, Value=[goo...@gmail.com]}, Attribute: {Name=__ENABLE__, Value=[true]}, Attribute: {Name=sAMAccountName, Value=[google]}, Attribute: {Name=userAccountControl, Value=[544]}, Attribute: {Name=displayName, Value=[google]}, Attribute: {Name=givenName, Value=[google]}, Attribute: {Name=__UID__, Value=[google]}, Attribute: {Name=userPrincipalName, Value=[goo...@testmnet.com]}, Attribute: {Name=__NAME__, Value=[CN=google,OU=Tapestry,DC=testmnet,DC=com]}, Attribute: {Name=__PASSWORD__, Value=[org.identityconnectors.common.security.GuardedString@204e249b]}, Attribute: {Name=cn, Value=[google]}, Attribute: {Name=telephoneNumber, Value=[9737733637]}, Attribute: {Name=objectClass, Value=[top, person, organizationalPerson, user]}], ObjectClass=ObjectClass: __ACCOUNT__, Uid=Attribute: {Name=__UID__, Value=[google]}} Method: getObject 10:46:08.231 DEBUG Return: null Method: search 10:46:08.232 DEBUG Enter: search(ObjectClass: __GROUP__, null, org.apache.syncope.core.propagation.impl.ConnectorFacadeProxy$2@7140f4fb, OperationOptions: {ATTRS_TO_GET:[__UID__,__NAME__,memberOf,__ENABLE__]}) Method: search 10:46:08.288 WARN Attribute __ENABLE__ of object class __GROUP__ is not mapped to an LDAP attribute Method: getLdapAttribute 10:46:08.289 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter (&(objectClass=top)(objectClass=group)) and SearchControls: {returningAttributes=[entryDN, memberOf, sAMAccountName], scope=SUBTREE} Method: doSearch 10:46:09.835 DEBUG Return: null Method: search 10:46:14.884 DEBUG Enter: search(ObjectClass: __ACCOUNT__, null, org.apache.syncope.core.propagation.impl.ConnectorFacadeProxy$2@3ef45fc8, OperationOptions: {ATTRS_TO_GET:[mail,sn,userAccountControl,objectClass,givenName,__ENABLE__,userPrincipalName,cn,__UID__,description...]}) Method: search 10:46:14.944 WARN Reading passwords not supported Method: getAttributesToGet 10:46:14.944 WARN Attribute __ENABLE__ of object class __ACCOUNT__ is not mapped to an LDAP attribute Method: getLdapAttribute 10:46:14.945 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter (&(objectClass=top)(objectClass=person)(objectClass=organizationalPerson)(objectClass=user)) and SearchControls: {returningAttributes=[cn, description, displayName, entryDN, givenName, mail, objectClass, sAMAccountName, sn, telephoneNumber, unicodePwd, userAccountControl, userPrincipalName], scope=SUBTREE} Method: doSearch 10:46:15.013 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.014 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.015 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.016 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.017 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.018 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.019 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.020 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.021 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.022 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.023 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.025 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.026 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.027 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.028 DEBUG User Account Control: 66048 Method: createConnectorObject 10:46:15.029 DEBUG User Account Control: 66048 Method: createConnectorObject 10:46:15.030 DEBUG User Account Control: 66048 Method: createConnectorObject 10:46:15.032 DEBUG User Account Control: 66048 Method: createConnectorObject 10:46:15.033 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.034 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.036 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.037 DEBUG User Account Control: 66048 Method: createConnectorObject 10:46:15.038 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.039 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.041 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.042 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.043 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.044 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.046 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.047 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:49.267 DEBUG Return: null Method: search 10:47:49.293 DEBUG Enter: search(ObjectClass: __GROUP__, null, org.apache.syncope.core.propagation.impl.ConnectorFacadeProxy$2@70fbfe7, OperationOptions: {ATTRS_TO_GET:[__UID__,__NAME__,memberOf,__ENABLE__]}) Method: search 10:47:49.348 WARN Attribute __ENABLE__ of object class __GROUP__ is not mapped to an LDAP attribute Method: getLdapAttribute 10:47:49.349 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter (&(objectClass=top)(objectClass=group)) and SearchControls: {returningAttributes=[entryDN, memberOf, sAMAccountName], scope=SUBTREE} Method: doSearch 10:47:50.961 DEBUG Return: null Method: search 10:47:55.890 DEBUG Enter: search(ObjectClass: __ACCOUNT__, null, org.apache.syncope.core.propagation.impl.ConnectorFacadeProxy$2@3f94be86, OperationOptions: {ATTRS_TO_GET:[mail,sn,userAccountControl,objectClass,givenName,__ENABLE__,userPrincipalName,cn,__UID__,description...]}) Method: search 10:47:55.943 WARN Reading passwords not supported Method: getAttributesToGet 10:47:55.944 WARN Attribute __ENABLE__ of object class __ACCOUNT__ is not mapped to an LDAP attribute Method: getLdapAttribute 10:47:55.944 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter (&(objectClass=top)(objectClass=person)(objectClass=organizationalPerson)(objectClass=user)) and SearchControls: {returningAttributes=[cn, description, displayName, entryDN, givenName, mail, objectClass, sAMAccountName, sn, telephoneNumber, unicodePwd, userAccountControl, userPrincipalName], scope=SUBTREE} Method: doSearch 10:47:56.011 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.014 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.015 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.016 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.017 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.018 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.018 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.019 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.020 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.021 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.022 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.023 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.023 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.024 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.025 DEBUG User Account Control: 66048 Method: createConnectorObject 10:47:56.026 DEBUG User Account Control: 66048 Method: createConnectorObject 10:47:56.027 DEBUG User Account Control: 66048 Method: createConnectorObject 10:47:56.028 DEBUG User Account Control: 66048 Method: createConnectorObject 10:47:56.029 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.029 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.030 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.031 DEBUG User Account Control: 66048 Method: createConnectorObject 10:47:56.032 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.033 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.034 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.035 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.036 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.036 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.037 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.038 DEBUG User Account Control: 544 Method: createConnectorObject
10:44:33.581 DEBUG Enter: getObject(ObjectClass: __ACCOUNT__, Attribute: {Name=__UID__, Value=[google]}, OperationOptions: {ATTRS_TO_GET:[mail,sn,userAccountControl,objectClass,givenName,__ENABLE__,userPrincipalName,cn,__UID__,description...]}) Method: getObject 10:44:33.649 WARN Reading passwords not supported Method: getAttributesToGet 10:44:33.650 WARN Attribute __ENABLE__ of object class __ACCOUNT__ is not mapped to an LDAP attribute Method: getLdapAttribute 10:44:33.651 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter (&(&(objectClass=top)(objectClass=person)(objectClass=organizationalPerson)(objectClass=user))(sAMAccountName=google)) and SearchControls: {returningAttributes=[cn, description, displayName, entryDN, givenName, mail, objectClass, sAMAccountName, sn, telephoneNumber, unicodePwd, userAccountControl, userPrincipalName], scope=SUBTREE} Method: doSearch 10:44:33.711 DEBUG Return: null Method: getObject 10:44:33.739 DEBUG Enter: create(ObjectClass: __ACCOUNT__, [Attribute: {Name=description, Value=[google]}, Attribute: {Name=sn, Value=[google]}, Attribute: {Name=mail, Value=[goo...@gmail.com]}, Attribute: {Name=sAMAccountName, Value=[google]}, Attribute: {Name=userAccountControl, Value=[544]}, Attribute: {Name=displayName, Value=[google]}, Attribute: {Name=givenName, Value=[google]}, Attribute: {Name=userPrincipalName, Value=[goo...@testmnet.com]}, Attribute: {Name=__NAME__, Value=[cn=google,ou=Tapestry,dc=testmnet,dc=com]}, Attribute: {Name=__PASSWORD__, Value=[org.identityconnectors.common.security.GuardedString@f0b270c2]}, Attribute: {Name=cn, Value=[google]}, Attribute: {Name=telephoneNumber, Value=[9737733637]}, Attribute: {Name=objectClass, Value=[top]}], null) Method: create 10:44:33.805 DEBUG Creating LDAP subcontext cn=google,ou=Tapestry,dc=testmnet,dc=com with attributes {sn=sn: google, unicodePwd=unicodePwd: [B@b5a29d4, userAccountControl=userAccountControl: 544, objectClass=objectClass: organizationalPerson, person, top, user, mail=mail: goo...@gmail.com, telephoneNumber=telephoneNumber: 9737733637, givenName=givenName: google, userPrincipalName=userPrincipalName: goo...@testmnet.com, displayName=displayName: google, description=description: google, sAMAccountName=sAMAccountName: google} Method: create 10:44:33.950 DEBUG Adding cn=google,ou=Tapestry,dc=testmnet,dc=com to LDAP groups [cn=Administrator,cn=Users,dc=testmnet,dc=com] Method: addLdapGroupMemberships 10:44:34.031 DEBUG Exception: Method: create org.identityconnectors.framework.common.exceptions.ConnectorException: javax.naming.directory.SchemaViolationException: [LDAP: error code 65 - 0000207D: UpdErr: DSID-0315166D, problem 6002 (OBJ_CLASS_VIOLATION), data 31 ]; remaining name 'cn=Administrator,cn=Users,dc=testmnet,dc=com' at org.connid.bundles.ldap.commons.GroupHelper.addMemberToGroup(GroupHelper.java:228) ~[?:?] at org.connid.bundles.ldap.commons.GroupHelper.addLdapGroupMemberships(GroupHelper.java:101) ~[?:?] at org.connid.bundles.ad.crud.ADCreate.executeImpl(ADCreate.java:208) ~[?:?] at org.connid.bundles.ad.crud.ADCreate.create(ADCreate.java:80) ~[?:?] at org.connid.bundles.ad.ADConnector.create(ADConnector.java:170) ~[?:?] at org.identityconnectors.framework.impl.api.local.operations.CreateImpl.create(CreateImpl.java:89) ~[connector-framework-internal-1.4.0.0.jar:?] at sun.reflect.GeneratedMethodAccessor1159.invoke(Unknown Source) ~[?:?] at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:1.6.0_24] at java.lang.reflect.Method.invoke(Method.java:616) ~[?:1.6.0_24] at org.identityconnectors.framework.impl.api.local.operations.ConnectorAPIOperationRunnerProxy.invoke(ConnectorAPIOperationRunnerProxy.java:98) ~[connector-framework-internal-1.4.0.0.jar:?] at sun.proxy.$Proxy250.create(Unknown Source) ~[?:?] at sun.reflect.GeneratedMethodAccessor1159.invoke(Unknown Source) ~[?:?] at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:1.6.0_24] at java.lang.reflect.Method.invoke(Method.java:616) ~[?:1.6.0_24] at org.identityconnectors.framework.impl.api.local.operations.ThreadClassLoaderManagerProxy.invoke(ThreadClassLoaderManagerProxy.java:98) ~[connector-framework-internal-1.4.0.0.jar:?] at sun.proxy.$Proxy250.create(Unknown Source) ~[?:?] at sun.reflect.GeneratedMethodAccessor1159.invoke(Unknown Source) ~[?:?] at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:1.6.0_24] at java.lang.reflect.Method.invoke(Method.java:616) ~[?:1.6.0_24] at org.identityconnectors.framework.impl.api.DelegatingTimeoutProxy.invoke(DelegatingTimeoutProxy.java:99) ~[connector-framework-internal-1.4.0.0.jar:?] at sun.proxy.$Proxy250.create(Unknown Source) ~[?:?] at sun.reflect.GeneratedMethodAccessor1159.invoke(Unknown Source) ~[?:?] at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43) ~[?:1.6.0_24] at java.lang.reflect.Method.invoke(Method.java:616) ~[?:1.6.0_24] at org.identityconnectors.framework.impl.api.LoggingProxy.invoke(LoggingProxy.java:77) ~[connector-framework-internal-1.4.0.0.jar:?] at sun.proxy.$Proxy250.create(Unknown Source) ~[?:?] at org.identityconnectors.framework.impl.api.AbstractConnectorFacade.create(AbstractConnectorFacade.java:153) ~[connector-framework-internal-1.4.0.0.jar:?] at org.apache.syncope.core.propagation.impl.AsyncConnectorFacade.create(AsyncConnectorFacade.java:69) ~[AsyncConnectorFacade.class:?] at org.apache.syncope.core.propagation.impl.AsyncConnectorFacade$$FastClassBySpringCGLIB$$5578eaa3.invoke(<generated>) ~[spring-core-4.0.7.RELEASE.jar:?] at org.springframework.cglib.proxy.MethodProxy.invoke(MethodProxy.java:204) ~[spring-core-4.0.7.RELEASE.jar:4.0.7.RELEASE] at org.springframework.aop.framework.CglibAopProxy$CglibMethodInvocation.invokeJoinpoint(CglibAopProxy.java:708) ~[spring-aop-4.0.7.RELEASE.jar:4.0.7.RELEASE] at org.springframework.aop.framework.ReflectiveMethodInvocation.proceed(ReflectiveMethodInvocation.java:157) ~[spring-aop-4.0.7.RELEASE.jar:4.0.7.RELEASE] at org.springframework.aop.interceptor.AsyncExecutionInterceptor$1.call(AsyncExecutionInterceptor.java:97) ~[spring-aop-4.0.7.RELEASE.jar:4.0.7.RELEASE] at java.util.concurrent.FutureTask$Sync.innerRun(FutureTask.java:334) ~[?:1.6.0_24] at java.util.concurrent.FutureTask.run(FutureTask.java:166) ~[?:1.6.0_24] at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1146) [?:1.6.0_24] at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615) [?:1.6.0_24] at java.lang.Thread.run(Thread.java:679) [?:1.6.0_24] Caused by: javax.naming.directory.SchemaViolationException: [LDAP: error code 65 - 0000207D: UpdErr: DSID-0315166D, problem 6002 (OBJ_CLASS_VIOLATION), data 31 ] at com.sun.jndi.ldap.LdapCtx.mapErrorCode(LdapCtx.java:3063) ~[?:1.6.0_24] at com.sun.jndi.ldap.LdapCtx.processReturnCode(LdapCtx.java:2978) ~[?:1.6.0_24] at com.sun.jndi.ldap.LdapCtx.processReturnCode(LdapCtx.java:2785) ~[?:1.6.0_24] at com.sun.jndi.ldap.LdapCtx.c_modifyAttributes(LdapCtx.java:1468) ~[?:1.6.0_24] at com.sun.jndi.toolkit.ctx.ComponentDirContext.p_modifyAttributes(ComponentDirContext.java:273) ~[?:1.6.0_24] at com.sun.jndi.toolkit.ctx.PartialCompositeDirContext.modifyAttributes(PartialCompositeDirContext.java:190) ~[?:1.6.0_24] at com.sun.jndi.toolkit.ctx.PartialCompositeDirContext.modifyAttributes(PartialCompositeDirContext.java:179) ~[?:1.6.0_24] at javax.naming.directory.InitialDirContext.modifyAttributes(InitialDirContext.java:165) ~[?:1.6.0_24] at org.connid.bundles.ldap.commons.GroupHelper.addMemberToGroup(GroupHelper.java:224) ~[?:?] ... 37 more 10:44:34.210 DEBUG Enter: getObject(ObjectClass: __ACCOUNT__, Attribute: {Name=__UID__, Value=[google]}, OperationOptions: {ATTRS_TO_GET:[mail,sn,userAccountControl,objectClass,givenName,__ENABLE__,userPrincipalName,cn,__UID__,description...]}) Method: getObject 10:44:34.274 WARN Reading passwords not supported Method: getAttributesToGet 10:44:34.275 WARN Attribute __ENABLE__ of object class __ACCOUNT__ is not mapped to an LDAP attribute Method: getLdapAttribute 10:44:34.276 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter (&(&(objectClass=top)(objectClass=person)(objectClass=organizationalPerson)(objectClass=user))(sAMAccountName=google)) and SearchControls: {returningAttributes=[cn, description, displayName, entryDN, givenName, mail, objectClass, sAMAccountName, sn, telephoneNumber, unicodePwd, userAccountControl, userPrincipalName], scope=SUBTREE} Method: doSearch 10:44:34.337 DEBUG User Account Control: 544 Method: createConnectorObject 10:44:34.338 DEBUG Return: {Name=Attribute: {Name=__NAME__, Value=[CN=google,OU=Tapestry,DC=testmnet,DC=com]}, Attributes=[Attribute: {Name=description, Value=[google]}, Attribute: {Name=sn, Value=[google]}, Attribute: {Name=mail, Value=[goo...@gmail.com]}, Attribute: {Name=__ENABLE__, Value=[true]}, Attribute: {Name=sAMAccountName, Value=[google]}, Attribute: {Name=userAccountControl, Value=[544]}, Attribute: {Name=displayName, Value=[google]}, Attribute: {Name=givenName, Value=[google]}, Attribute: {Name=__UID__, Value=[google]}, Attribute: {Name=userPrincipalName, Value=[goo...@testmnet.com]}, Attribute: {Name=__NAME__, Value=[CN=google,OU=Tapestry,DC=testmnet,DC=com]}, Attribute: {Name=__PASSWORD__, Value=[org.identityconnectors.common.security.GuardedString@204e249b]}, Attribute: {Name=cn, Value=[google]}, Attribute: {Name=telephoneNumber, Value=[9737733637]}, Attribute: {Name=objectClass, Value=[top, person, organizationalPerson, user]}], ObjectClass=ObjectClass: __ACCOUNT__, Uid=Attribute: {Name=__UID__, Value=[google]}} Method: getObject 10:46:08.231 DEBUG Return: null Method: search 10:46:08.232 DEBUG Enter: search(ObjectClass: __GROUP__, null, org.apache.syncope.core.propagation.impl.ConnectorFacadeProxy$2@7140f4fb, OperationOptions: {ATTRS_TO_GET:[__UID__,__NAME__,memberOf,__ENABLE__]}) Method: search 10:46:08.288 WARN Attribute __ENABLE__ of object class __GROUP__ is not mapped to an LDAP attribute Method: getLdapAttribute 10:46:08.289 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter (&(objectClass=top)(objectClass=group)) and SearchControls: {returningAttributes=[entryDN, memberOf, sAMAccountName], scope=SUBTREE} Method: doSearch 10:46:09.835 DEBUG Return: null Method: search 10:46:14.884 DEBUG Enter: search(ObjectClass: __ACCOUNT__, null, org.apache.syncope.core.propagation.impl.ConnectorFacadeProxy$2@3ef45fc8, OperationOptions: {ATTRS_TO_GET:[mail,sn,userAccountControl,objectClass,givenName,__ENABLE__,userPrincipalName,cn,__UID__,description...]}) Method: search 10:46:14.944 WARN Reading passwords not supported Method: getAttributesToGet 10:46:14.944 WARN Attribute __ENABLE__ of object class __ACCOUNT__ is not mapped to an LDAP attribute Method: getLdapAttribute 10:46:14.945 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter (&(objectClass=top)(objectClass=person)(objectClass=organizationalPerson)(objectClass=user)) and SearchControls: {returningAttributes=[cn, description, displayName, entryDN, givenName, mail, objectClass, sAMAccountName, sn, telephoneNumber, unicodePwd, userAccountControl, userPrincipalName], scope=SUBTREE} Method: doSearch 10:46:15.013 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.014 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.015 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.016 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.017 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.018 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.019 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.020 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.021 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.022 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.023 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.025 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.026 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.027 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.028 DEBUG User Account Control: 66048 Method: createConnectorObject 10:46:15.029 DEBUG User Account Control: 66048 Method: createConnectorObject 10:46:15.030 DEBUG User Account Control: 66048 Method: createConnectorObject 10:46:15.032 DEBUG User Account Control: 66048 Method: createConnectorObject 10:46:15.033 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.034 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.036 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.037 DEBUG User Account Control: 66048 Method: createConnectorObject 10:46:15.038 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.039 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.041 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.042 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.043 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.044 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.046 DEBUG User Account Control: 544 Method: createConnectorObject 10:46:15.047 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:49.267 DEBUG Return: null Method: search 10:47:49.293 DEBUG Enter: search(ObjectClass: __GROUP__, null, org.apache.syncope.core.propagation.impl.ConnectorFacadeProxy$2@70fbfe7, OperationOptions: {ATTRS_TO_GET:[__UID__,__NAME__,memberOf,__ENABLE__]}) Method: search 10:47:49.348 WARN Attribute __ENABLE__ of object class __GROUP__ is not mapped to an LDAP attribute Method: getLdapAttribute 10:47:49.349 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter (&(objectClass=top)(objectClass=group)) and SearchControls: {returningAttributes=[entryDN, memberOf, sAMAccountName], scope=SUBTREE} Method: doSearch 10:47:50.961 DEBUG Return: null Method: search 10:47:55.890 DEBUG Enter: search(ObjectClass: __ACCOUNT__, null, org.apache.syncope.core.propagation.impl.ConnectorFacadeProxy$2@3f94be86, OperationOptions: {ATTRS_TO_GET:[mail,sn,userAccountControl,objectClass,givenName,__ENABLE__,userPrincipalName,cn,__UID__,description...]}) Method: search 10:47:55.943 WARN Reading passwords not supported Method: getAttributesToGet 10:47:55.944 WARN Attribute __ENABLE__ of object class __ACCOUNT__ is not mapped to an LDAP attribute Method: getLdapAttribute 10:47:55.944 DEBUG Searching in [ou=Tapestry,dc=testmnet,dc=com] with filter (&(objectClass=top)(objectClass=person)(objectClass=organizationalPerson)(objectClass=user)) and SearchControls: {returningAttributes=[cn, description, displayName, entryDN, givenName, mail, objectClass, sAMAccountName, sn, telephoneNumber, unicodePwd, userAccountControl, userPrincipalName], scope=SUBTREE} Method: doSearch 10:47:56.011 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.014 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.015 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.016 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.017 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.018 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.018 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.019 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.020 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.021 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.022 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.023 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.023 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.024 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.025 DEBUG User Account Control: 66048 Method: createConnectorObject 10:47:56.026 DEBUG User Account Control: 66048 Method: createConnectorObject 10:47:56.027 DEBUG User Account Control: 66048 Method: createConnectorObject 10:47:56.028 DEBUG User Account Control: 66048 Method: createConnectorObject 10:47:56.029 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.029 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.030 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.031 DEBUG User Account Control: 66048 Method: createConnectorObject 10:47:56.032 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.033 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.034 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.035 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.036 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.036 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.037 DEBUG User Account Control: 544 Method: createConnectorObject 10:47:56.038 DEBUG User Account Control: 544 Method: createConnectorObject