{"id":591,"date":"2018-09-07T12:18:26","date_gmt":"2018-09-07T07:48:26","guid":{"rendered":"http:\/\/www.enhisecure.com\/isecureblog\/?p=591"},"modified":"2019-05-21T12:34:12","modified_gmt":"2019-05-21T08:04:12","slug":"active-directory-application-configuration-test-connection-failure-in-identityiq-7-2","status":"publish","type":"post","link":"https:\/\/www.enhisecure.com\/isecureblog\/2018\/09\/07\/active-directory-application-configuration-test-connection-failure-in-identityiq-7-2\/","title":{"rendered":"Active Directory Application Configuration &#8211; Test Connection Failure in IdentityIQ 7.2"},"content":{"rendered":"<h1>Issue Description:<\/h1>\n<p>As part of <a href=\"https:\/\/docs.microsoft.com\/en-us\/windows-server\/identity\/ad-ds\/get-started\/virtual-dc\/active-directory-domain-services-overview\">Active Directory<\/a> Application Configuration\u00a0in <a href=\"https:\/\/www.sailpoint.com\/news\/sailpoint-propels-the-identity-aware-enterprise-with-new-version-of-identityiq\/?elqct=Website&amp;elqchannel=OrganicDirect\">IdentityIQ 7.2<\/a>, &#8220;Test Connection&#8221;\u00a0 failing with below error message.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-630\" src=\"http:\/\/www.enhisecure.com\/isecureblog\/wp-content\/uploads\/2018\/09\/Issue2-300x27.png\" alt=\"\" width=\"389\" height=\"35\" srcset=\"https:\/\/www.enhisecure.com\/isecureblog\/wp-content\/uploads\/2018\/09\/Issue2-300x27.png 300w, https:\/\/www.enhisecure.com\/isecureblog\/wp-content\/uploads\/2018\/09\/Issue2-1024x93.png 1024w, https:\/\/www.enhisecure.com\/isecureblog\/wp-content\/uploads\/2018\/09\/Issue2.png 1160w\" sizes=\"auto, (max-width: 389px) 100vw, 389px\" \/><\/p>\n<p>In IdentityIQ 7.2, the Active Directory connector supports multiple Active Directory (AD) forests through one application definition.<br \/>\nWhile defining the Active Directory application through the IdentityIQ user interface in version 7.2, we do not have the option to mention the server details in Domain configuration settings.<\/p>\n<p>Even though we do not specify any server details, the default configuration tries to connect to &#8220;<strong>localhost<\/strong>&#8220;, similar to the default port configuration which is &#8220;<strong>389<\/strong>&#8220;.<\/p>\n<p>We see the below error message when we click on the &#8220;Test Connection&#8221;<\/p>\n<p>2018-09-04 05:05:12,551 ERROR http-nio-8080-exec-6 sailpoint.web.ApplicationObjectBean:2701 &#8211; Connector failed.sailpoint.connector.ConnectorException: Failed to connect to &#8211; dc=enhcorp,dc=com : <strong>Failed to connect to server<\/strong>:ldap<br \/>\ndc=enhcorp,dc=com <strong>localhost:389<\/strong><\/p>\n<h1>Resolution:<\/h1>\n<p>&nbsp;<\/p>\n<p>Modify the Application xml file to include the DC servers details.<br \/>\nBelow is the example modification.<\/p>\n<p><strong>From<\/strong><\/p>\n<p>&lt;entry key=&#8221;domainSettings&#8221;&gt;<br \/>\n&lt;value&gt;<br \/>\n&lt;List&gt;<br \/>\n&lt;Map&gt;<br \/>\n&lt;entry key=&#8221;authorizationType&#8221; value=&#8221;simple&#8221;\/&gt;<br \/>\n&lt;entry key=&#8221;domainDN&#8221; value=&#8221;DC=enhcorp,DC=com&#8221;\/&gt;<br \/>\n&lt;entry key=&#8221;password&#8221; value=&#8221;1:iIopEeOL5KrLoSjYKvh\/Ww==&#8221;\/&gt;<br \/>\n&lt;entry key=&#8221;port&#8221; value=&#8221;389&#8243;\/&gt;<br \/>\n<em><strong>&lt;entry key=&#8221;servers&#8221;\/&gt;<\/strong><\/em><br \/>\n&lt;entry key=&#8221;useSSL&#8221;&gt;<br \/>\n&lt;value&gt;<br \/>\n&lt;Boolean&gt;&lt;\/Boolean&gt;<br \/>\n&lt;\/value&gt;<br \/>\n&lt;\/entry&gt;<br \/>\n&lt;entry key=&#8221;user&#8221; value=&#8221;ENHCORP\\Administrator&#8221;\/&gt;<br \/>\n&lt;\/Map&gt;<br \/>\n&lt;\/List&gt;<br \/>\n&lt;\/value&gt;<br \/>\n&lt;\/entry&gt;<br \/>\n<strong>To<\/strong><br \/>\n&lt;entry key=&#8221;domainSettings&#8221;&gt;<br \/>\n&lt;value&gt;<br \/>\n&lt;List&gt;<br \/>\n&lt;Map&gt;<br \/>\n&lt;entry key=&#8221;authorizationType&#8221; value=&#8221;simple&#8221;\/&gt;<br \/>\n&lt;entry key=&#8221;domainDN&#8221; value=&#8221;DC=enhcorp,DC=com&#8221;\/&gt;<br \/>\n&lt;entry key=&#8221;password&#8221; value=&#8221;1:iIopEeOL5KrLoSjYKvh\/Ww==&#8221;\/&gt;<br \/>\n&lt;entry key=&#8221;port&#8221; value=&#8221;389&#8243;\/&gt;<br \/>\n<em><strong>&lt;entry key=&#8221;servers&#8221;&gt;<\/strong><\/em><br \/>\n<em><strong>&lt;value&gt;<\/strong><\/em><br \/>\n<em><strong>&lt;List&gt;<\/strong><\/em><br \/>\n<em><strong>&lt;String&gt;172.16.153.185&lt;\/String&gt;<\/strong><\/em><br \/>\n<em><strong>&lt;\/List&gt;<\/strong><\/em><br \/>\n<em><strong>&lt;\/value&gt;<\/strong><\/em><br \/>\n&lt;entry key=&#8221;useSSL&#8221;&gt;<br \/>\n&lt;value&gt;<br \/>\n&lt;Boolean&gt;&lt;\/Boolean&gt;<br \/>\n&lt;\/value&gt;<br \/>\n&lt;\/entry&gt;<br \/>\n&lt;entry key=&#8221;user&#8221; value=&#8221;ENHCORP\\Administrator&#8221;\/&gt;<br \/>\n&lt;\/Map&gt;<br \/>\n&lt;\/List&gt;<br \/>\n&lt;\/value&gt;<br \/>\n&lt;\/entry&gt;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Issue Description: As part of Active Directory Application Configuration\u00a0in IdentityIQ 7.2, &#8220;Test Connection&#8221;\u00a0 failing with below error message. In IdentityIQ 7.2, the Active Directory connector supports multiple Active Directory (AD) forests through one application definition. While defining the Active Directory application through the IdentityIQ user interface in version 7.2, we do not have the option [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,14,16],"tags":[40,10,11],"class_list":["post-591","post","type-post","status-publish","format-standard","hentry","category-identity-governance","category-sailpoint","category-technology","tag-active-directory","tag-identity-iq","tag-sailpoint"],"_links":{"self":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/591","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/comments?post=591"}],"version-history":[{"count":10,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/591\/revisions"}],"predecessor-version":[{"id":639,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/591\/revisions\/639"}],"wp:attachment":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/media?parent=591"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/categories?post=591"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/tags?post=591"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}