Hello all,
I have a connector to a ldap and an internal directory with ldap configuration. The users that are created on the Jira delegated folder exists on the ldap.
I notice that some users have null external_id and some others are not on the delegate directory. On the connector all the users have external_id.
How can I add the missing external_id's?
Am I missing something?
Here is the configuration directories
=== Directories configured ===
Directory ID: 10300
Name: internal
Active: true
Type: DELEGATING
Created date: Tue Sep 15 15:33:33 EEST 2020
Updated date: Tue Sep 15 17:21:46 EEST 2020
Allowed operations: [UPDATE_ROLE_ATTRIBUTE, UPDATE_USER_ATTRIBUTE, CREATE_GROUP, CREATE_USER, UPDATE_ROLE, UPDATE_GROUP_ATTRIBUTE, DELETE_ROLE, CREATE_ROLE, UPDATE_USER, UPDATE_GROUP, DELETE_USER, DELETE_GROUP]
Implementation class: com.atlassian.crowd.directory.DelegatedAuthenticationDirectory
Encryption type: null
Attributes:
"autoAddGroups": ""
"crowd.delegated.directory.auto.create.user": "false"
"crowd.delegated.directory.auto.update.user": "false"
"crowd.delegated.directory.importGroups": "false"
"crowd.delegated.directory.type": "com.atlassian.crowd.directory.MicrosoftActiveDirectory"
"ldap.basedn": "DC=xxxx,DC=yyyy,DC=be"
"ldap.external.id": "objectGUID"
"ldap.group.description": "description"
"ldap.group.dn": ""
"ldap.group.filter": "(objectCategory=Group)"
"ldap.group.name": "cn"
"ldap.group.objectclass": "group"
"ldap.group.usernames": "member"
"ldap.nestedgroups.disabled": "false"
"ldap.pagedresults": "true"
"ldap.pagedresults.size": "1000"
"ldap.password": ********
"ldap.referral": "true"
"ldap.secure": "false"
"ldap.url": "ldap://192.168.1.1:389"
"ldap.user.displayname": "displayName"
"ldap.user.dn": ""
"ldap.user.email": "mail"
"ldap.user.filter": "(&(objectCategory=Person)(sAMAccountName=*))"
"ldap.user.firstname": "givenName"
"ldap.user.group": "memberOf"
"ldap.user.lastname": "sn"
"ldap.user.objectclass": "user"
"ldap.user.username": "sAMAccountName"
"ldap.user.username.rdn": "cn"
"ldap.userdn": "username-trg"
"ldap.usermembership.use": "false"
"ldap.usermembership.use.for.groups": "false"
Directory ID: 10000
Name: Active Directory (Connector)
Active: true
Type: CONNECTOR
Created date: Fri Dec 02 15:43:08 EET 2016
Updated date: Tue Sep 15 21:29:08 EEST 2020
Allowed operations: [UPDATE_GROUP_ATTRIBUTE, UPDATE_USER_ATTRIBUTE, CREATE_GROUP, UPDATE_GROUP, DELETE_GROUP]
Implementation class: com.atlassian.crowd.directory.MicrosoftActiveDirectory
Encryption type: sha
Attributes:
"autoAddGroups": ""
"com.atlassian.crowd.directory.sync.currentstartsynctime": "null"
"com.atlassian.crowd.directory.sync.issynchronising": "false"
"com.atlassian.crowd.directory.sync.lastdurationms": "1305"
"com.atlassian.crowd.directory.sync.laststartsynctime": "1600194547327"
"crowd.sync.group.membership.after.successful.user.auth.enabled": "true"
"crowd.sync.incremental.enabled": "true"
"directory.cache.synchronise.interval": "3600"
"ldap.basedn": "DC=xxxx,DC=yyyyy,DC=be"
"ldap.connection.timeout": "10000"
"ldap.external.id": "objectGUID"
"ldap.filter.expiredUsers": "false"
"ldap.group.description": "description"
"ldap.group.dn": ""
"ldap.group.filter": "(&(objectClass=group)(!(cn=*RDS Endpoint Servers*))(!(cn=*Exchange Trusted Subsystem*))(!(cn=*RDS Remote Access Servers*))(!(cn=*RDS Management Servers*))(!(cn=*Help Desk*)))"
"ldap.group.name": "cn"
"ldap.group.objectclass": "group"
"ldap.group.usernames": "member"
"ldap.local.groups": "true"
"ldap.nestedgroups.disabled": "false"
"ldap.pagedresults": "false"
"ldap.pagedresults.size": "1000"
"ldap.password": ********
"ldap.pool.initsize": "null"
"ldap.pool.maxsize": "null"
"ldap.pool.prefsize": "null"
"ldap.pool.timeout": "0"
"ldap.propogate.changes": "false"
"ldap.read.timeout": "120000"
"ldap.referral": "false"
"ldap.relaxed.dn.standardisation": "true"
"ldap.roles.disabled": "true"
"ldap.search.timelimit": "60000"
"ldap.secure": "false"
"ldap.url": "ldap://192.168.1.1:389"
"ldap.user.displayname": "displayName"
"ldap.user.dn": ""
"ldap.user.email": "mail"
"ldap.user.encryption": "sha"
"ldap.user.filter": "(&(objectCategory=Person)(sAMAccountName=*))"
"ldap.user.firstname": "givenName"
"ldap.user.group": "memberOf"
"ldap.user.lastname": "sn"
"ldap.user.objectclass": "user"
"ldap.user.password": "unicodePwd"
"ldap.user.username": "sAMAccountName"
"ldap.user.username.rdn": "cn"
"ldap.userdn": "username-trg"
"ldap.usermembership.use": "false"
"ldap.usermembership.use.for.groups": "false"
"localUserStatusEnabled": "false"
Thank you,
George