Skip to content

Commit f675f5c

Browse files
Merge pull request #228959 from Justinha/aadds120
added AADDS120
2 parents 5b0cd07 + e8d8db8 commit f675f5c

File tree

1 file changed

+22
-1
lines changed

1 file changed

+22
-1
lines changed

articles/active-directory-domain-services/troubleshoot-alerts.md

Lines changed: 22 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ ms.service: active-directory
1010
ms.subservice: domain-services
1111
ms.workload: identity
1212
ms.topic: troubleshooting
13-
ms.date: 01/29/2023
13+
ms.date: 03/02/2023
1414
ms.author: justinha
1515

1616
---
@@ -237,6 +237,27 @@ To check for applied policies on the Azure AD DS components and update them, com
237237
1. For each of the managed domain's network components in your resource group, such as virtual network, NIC, or public IP address, check the operation logs in the Azure portal. These operation logs should indicate why an operation is failing and where a restrictive policy is applied.
238238
1. Select the resource where a policy is applied, then under **Policies**, select and edit the policy so it's less restrictive.
239239

240+
## AADDS120: The managed domain has encountered an error onboarding one or more custom attributes
241+
242+
### Alert message
243+
244+
*The following Azure AD extension properties have not successfully onboarded as a custom attribute for synchronization. This may happen if a property conflicts with the built-in schema: \[extensions]*
245+
246+
### Resolution
247+
248+
>[!WARNING]
249+
>If a custom attribute's LDAPName conflicts with an existing AD built-in schema attribute, it can't be onboarded and results in an error. Contact Microsoft Support if your scenario is blocked. For more information, see [Onboarding Custom Attributes](https://aka.ms/aadds-customattr).
250+
251+
Review the [Azure AD DS Health](check-health.md) alert and see which Azure AD extension properties failed to onboard successfully. Navigate to the **Custom Attributes** page to find the expected Azure AD DS LDAPName of the extension. Make sure the LDAPName doesn't conflict with another AD schema attribute, or that it's one of the allowed built-in AD attributes.
252+
253+
Then follow these steps to retry onboarding the custom attribute in the **Custom Attributes** page:
254+
255+
1. Select the attributes that were unsuccessful, then click **Remove** and **Save**.
256+
1. Wait for the health alert to be removed, or verify that the corresponding attributes have been removed from the **AADDSCustomAttributes** OU from a domain-joined VM.
257+
1. Select **Add** and choose the desired attributes again, then click **Save**.
258+
259+
Upon successful onboarding, Azure AD DS will back fill synchronized users and groups with the onboarded custom attribute values. The custom attribute values appear gradually, depending on the size of the tenant. To check the backfill status, go to [Azure AD DS Health](check-health.md) and verify the **Synchronization with Azure AD** monitor timestamp has updated within the last hour.
260+
240261
## AADDS500: Synchronization has not completed in a while
241262

242263
### Alert message

0 commit comments

Comments
 (0)