On Oct 31, 2011, at 6:42 PM, "Clément OUDOT" <[email protected]> wrote:

> Le 30 octobre 2011 22:29, Rohler, Brian L <[email protected]> a écrit :
>> Thanks for the tip but I did get entries going into AD now by making the 
>> following change:
>> 
>> Before
>> lsc.tasks.user.dstService.filterAll = 
>> (&(sAMAccountName=*)(&(objectClass=user))
>> 
>> After
>> lsc.tasks.user.dstService.filterAll = 
>> (&(sAMAccountName=*)(&(objectClass=user)(!(objectClass=computer))))
>> 
>> 
>> Now I do have a couple other questions.
>> 
>> 1 - I'm trying to use the "uid" from my ldap (src) as the CN for the DN  but 
>> then then the script fails.
>> 
>> uid from ldap = msmith
>> cn = Marc Smith
>> 
>> For example:
>> ------------
>> Oct 30 17:15:05 - INFO  - # Adding new entry CN=Marc 
>> Smith,CN=Users,DC=nees36,DC=local for user
>> dn: CN=Marc Smith,CN=Users,DC=nees36,DC=local
>> changetype: add
>> sn: Smith
>> cn: Marc smith
>> givenName: smith
>> sAMAccountName: smith
>> objectClass: organizationalPerson
>> objectClass: person
>> objectClass: user
>> objectClass: top
>> 
>> Here's what I prefer the entry go in as:
>> ----------------------------------------
>> Oct 30 17:15:05 - INFO  - # Adding new entry 
>> CN=msmith,CN=Users,DC=nees36,DC=local for user
>> dn: CN=msmith,CN=Users,DC=nees36,DC=local
>> changetype: add
>> cn: Marc Smith
>> sAMAccountName: msmith
>> givenName: Marc
>> sn: Smith
>> objectClass: organizationalPerson
>> objectClass: person
>> objectClass: user
>> objectClass: top
>> 
>> What does it take to get this format to come out correctly.
> 
> You have to set the dest cn value to the source uid value too (not
> only for the DN).

I'll try that tonight. 


> 
>> It also has the "User must change password at next logon" set which I do not 
>> want set.
>> 
>> 2 - I can't seem to get the userAccountControl value set. It is always 546
>>      512 - normal_account
>>       32 - password_notreqd
>>        2 - accountdiabled
>>    ----------------------------
>>      546
>> 
>>    This is what I would like for it to be set to.
>>    65536 - dont_expire_password
>>      512 - normal_account
>>       64 - passwd_cant_change
>>       32 - password_notreqd
>>        2 - accountdiabled
>>    -----------------------------
>>    66144
>> 
>> lsc.syncoptions.user.userAccountControl.create_value = 
>> AD.userAccountControlSet( "0", "66144")
> 
> If this does not work, you maybe have to use another account with more
> privileges to bind to AD.

I don't have ssl/636 working yet. I'm wondering if that isn't the problem. 

I've also been told there might be a registry change so new user accounts don't 
default to disabled. 


_______________________________________________________________
Ldap Synchronization Connector (LSC) - http://lsc-project.org

lsc-users mailing list
[email protected]
http://lists.lsc-project.org/listinfo/lsc-users

Reply via email to