Skip to content

Commit 5cd06de

Browse files
committed
edits for Andy
1 parent 0033ea9 commit 5cd06de

File tree

1 file changed

+8
-4
lines changed

1 file changed

+8
-4
lines changed

articles/active-directory-domain-services/troubleshoot-alerts.md

Lines changed: 8 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: troubleshooting
13-
ms.date: 02/28/2023
13+
ms.date: 03/02/2023
1414
ms.author: justinha
1515

1616
---
@@ -245,14 +245,18 @@ To check for applied policies on the Azure AD DS components and update them, com
245245

246246
### Resolution
247247

248-
If a custom attribute's LDAPName conflicts with an existing AD built-in schema attribute, it can't be onboarded and results in an error. Contact Microsoft Support if your scenario is blocked. For more information, see [Onboarding Custom Attributes](https://aka.ms/aadds-customattr).
249-
Review the [Azure AD DS Health](check-health.md) alert to check which Azure AD extension properties failed to onboard successfully. Navigate to the Custom Attributes page to find the expected Azure AD DS LDAPName of the extension. Ensure that the LDAPName does not conflict with another AD schema attribute or is one of the allowed built-in AD attributes. Then retry onboarding the custom attribute by completing the following steps in the Custom Attributes page:
248+
>[!WARNING]
249+
>If a custom attribute's LDAPName conflicts with an existing AD built-in schema attribute, it can't be onboarded and results in an error. Contact Microsoft Support if your scenario is blocked. For more information, see [Onboarding Custom Attributes](https://aka.ms/aadds-customattr).
250+
251+
Review the [Azure AD DS Health](check-health.md) alert and see which Azure AD extension properties failed to onboard successfully. Navigate to the **Custom Attributes** page to find the expected Azure AD DS LDAPName of the extension. Make sure the LDAPName doesn't conflict with another AD schema attribute, or that it's one of the allowed built-in AD attributes.
252+
253+
Then follow these steps to retry onboarding the custom attribute in the **Custom Attributes** page:
250254

251255
1. Select the attributes that were unsuccessful, then click **Remove** and **Save**.
252256
1. Wait for the health alert to be removed, or verify that the corresponding attributes have been removed from the "AADDSCustomAttributes" OU from a domain-joined VM.
253257
1. Select **Add** and choose the desired attributes again, then click **Save**.
254258

255-
Upon successful onboarding, Azure AD DS will backfill all existing synced users and groups with the onboarded custom attribute values. You should gradually see the custom attribute values being populated in these objects, depending on the size of the tenant. To determine if the backfilling process has completed, go to Azure AD DS Health and verify the **Synchronization with Azure AD** monitor indicates an updated timestamp in the last hour since onboarding.
259+
Upon successful onboarding, Azure AD DS will back fill synchronized users and groups with the onboarded custom attribute values. The custom attribute values appear gradually, depending on the size of the tenant. To check the backfill status, go to [Azure AD DS Health](check-health.md) and verify the **Synchronization with Azure AD** monitor timestamp has updated within the last hour.
256260

257261
## AADDS500: Synchronization has not completed in a while
258262

0 commit comments

Comments
 (0)