You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/app-provisioning/on-premises-ecma-troubleshoot.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -153,7 +153,7 @@ The ECMA Host has a cache of users in your application that is updated according
153
153
## Target attribute is missing
154
154
The provisioning service automatically discovers attributes in your target application. If you see that a target attribute is missing in the target attribute list in the Azure portal, perform the following troubleshooting step:
155
155
156
-
1. Review the **Select Attributes** page of your ECMA host configuration to check that the attribute has been selected, so that it will exposed to the Azure portal.
156
+
1. Review the **Select Attributes** page of your ECMA host configuration to check that the attribute has been selected, so that it will be exposed to the Azure portal.
157
157
1. Ensure that the ECMA host service is running.
158
158
1. Review the ECMA host logs to check that a /schemas request was made, and review the attributes in the response. This information will be valuable for support to troubleshoot the issue.
159
159
@@ -186,7 +186,7 @@ After the ECMA Connector Host schema mapping has been configured, start the serv
186
186
187
187
Requests made by Azure AD to the provisioning agent and connector host use the SCIM protocol. Requests made from the host to apps use the protocol the app supports. The requests from the host to the agent to Azure AD rely on SCIM. You can learn more about the SCIM implementation in [Tutorial: Develop and plan provisioning for a SCIM endpoint in Azure Active Directory](use-scim-to-provision-users-and-groups.md).
188
188
189
-
The Azure AD provisioning service generally makes a get-user call to check for a [dummy user](use-scim-to-provision-users-and-groups.md#request-3) in three situations: at the beginning of each provisioning cycle, before performing on-demand provisioning and when **test connection** is selected. This check ensure the target endpoint is available and returning SCIM-compliant responses to the Azure AD provisioning service.
189
+
The Azure AD provisioning service generally makes a get-user call to check for a [dummy user](use-scim-to-provision-users-and-groups.md#request-3) in three situations: at the beginning of each provisioning cycle, before performing on-demand provisioning and when **test connection** is selected. This check ensures the target endpoint is available and returning SCIM-compliant responses to the Azure AD provisioning service.
190
190
191
191
192
192
## How do I troubleshoot the provisioning agent?
@@ -272,7 +272,7 @@ By using Azure AD, you can monitor the provisioning service in the cloud and col
272
272
### I am getting an Invalid LDAP style DN error when trying to configure the ECMA Connector Host with SQL
273
273
By default, the generic SQL connector expects the DN to be populated using the LDAP style (when the 'DN is anchor' attribute is left unchecked in the first connectivity page). In the error message `Invalid LDAP style DN` or `Target Site: ValidByLdapStyle`, you may see that the DN field contains a user principal name (UPN), rather than an LDAP style DN that the connector expects.
274
274
275
-
To resolve this, ensure that **Autogenerated** is selected on the object types page when you configure the connector.
275
+
To resolve this error message, ensure that **Autogenerated** is selected on the object types page when you configure the connector.
276
276
277
277
For more information, see [About anchor attributes and distinguished names](on-premises-application-provisioning-architecture.md#about-anchor-attributes-and-distinguished-names).
0 commit comments