Solved

Schema changes

Posted on 2009-05-14
4
236 Views
Last Modified: 2012-05-07
I had installed an application that will be modifying the schema.
Where should i look[folder or log files] to see if the schema has been successfully applied
0
Comment
Question by:madhurikv
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 3

Assisted Solution

by:a_ro_no
a_ro_no earned 350 total points
ID: 24382961
dump the schema using the ldifde tool.
or view it with adsiedit.msc
or with ldp.exe
0
 

Author Comment

by:madhurikv
ID: 24382973
Can you please explain me i n detail
0
 
LVL 3

Accepted Solution

by:
a_ro_no earned 350 total points
ID: 24383039
During the schema update some Attributes/Classes are being added.
If you know which attributes (Your application should have it somewhere documented) are being modified you can search for them in the schema.

the easiest way:
ldifde -f schema.txt -d CN=schema,CN=Configuration,DC=contoso,DC=com -p subtree

this will dump all objects of the schema in a text file
then search for the changed items-> verify the whencreated attribute.
0
 
LVL 7

Assisted Solution

by:ManicD
ManicD earned 150 total points
ID: 24383224
adsiedit.msc is the best way for just checking, its format is much like teh registry editor of a PC.

Download it, install it, then goto start > run > adsiedit.msc

you should then be able to navigate through all the parts of yoru active directory

BE CAREFULL: CHAGES MADE WITH THIS TOOL CAN SEVERLY AFFECT YOUR DOMAIN. DO NOT EDIT UNLESS YOU ARE REALLY SURE WHAT YOU ARE DOING.

What program are you installing that edits the schema?
0

Featured Post

Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article shows how to deploy dynamic backgrounds to computers depending on the aspect ratio of display
This article runs through the process of deploying a single EXE application selectively to a group of user.
This Micro Tutorial hows how you can integrate  Mac OSX to a Windows Active Directory Domain. Apple has made it easy to allow users to bind their macs to a windows domain with relative ease. The following video show how to bind OSX Mavericks to …
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …

731 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question