When starting work with the OIM/AD connector and following the step by step processes on and updated (yet incomplete) OIM/AD integrated documentation,
I noticed I was getting the following error:
When starting work with the OIM/AD connector and following the step by step processes on and updated (yet incomplete) OIM/AD integrated documentation,
I noticed I was getting the following error:
When setting up the connector server key, I would receive an 'access denied' with a System.UnauthorizedAccessException trace
System.UnauthorizedAccessException: Access to the path 'C:\Program Files (x86)\Identity Connectors\Connector Server\r2dadszy.tmp' is denied.
Once reviewed within the connector server logs, I would see the following error: ConnectorServer.exe Error: 0 : Exception occured starting connector server
During the reconcilation from OpenIDM to the ICF google apps connector, the following
error response would occur. ERROR Caused by com.google.api.client.auth.oauth2.TokenResponseException 400 Bad Request - invalid_grant
In the past, the similar error occurred though for the Oracle Identity Management solution. invalidcredentialexception remote framework key is invalid
Because they all share the ICF connector framework, the error/solution would be the same.
In the past, the similar error occurred though for the Oracle Identity Management solution. invalidcredentialexception remote framework key is invalid
Because they all share the ICF connector framework, the error/solution would be the same.
For what I see, there's not too many supportive documentations out there that will demonstrate how provision AD group membership with the ICF connector using OpenIDM.
The use of the special ldapGroups attribute is not explained anywhere in the Integrators guides to to the date of this blog. This quick blog identifies the tasks required to provision AD group membership from OpenIDM to AD using the LDAP ICF connector.
However this doesn't really explain what ldapGroups actually does and there's no real worked example of how to go from an Assignment to ldapGroups to an assigned group in AD. I wrote up a wiki article for my own reference: AD group memberships automatically to users
This is just my view, others may disagree, but I think the implementation experience could be improved with some more documentation and a more detailed example here.