IMPORTANT! By default, ADS Failover logic is disabled. If you decide to use Failover, you must be aware of the following Failover behaviors. Otherwise, you will encounter unexpected Failover behaviors. Please review this section carefully.
Note: ADS_FAILOVER should be set on the machine where the C++ Connector Server and ADS connector run, and on the machine where the Provisioning Manager runs.
If DNS is not available or you want to bypass DNS, you may supply a configuration file PS_HOME\data\ads\directory-name.DNS. (A sample DNS-configuration file is provided in the distribution of the file PS_HOME\data\ads\endpoint-name.dns.)
where endpoint-name is the name of the endpoint that you specified in the Name field on the ADS Server tab of the ADS Endpoint property sheet.
In order to view the list of domain controllers, select the Failover tab in the Endpoint property sheet. This page provides the list of domain controllers that ADS uses for failover. If there is only one item in the list (the primary server being managed), or failover was not enabled using the ADS_FAILOVER environment variable, then this page is disabled and failover is not operational.
Whether CA IdentityMinder can determine the list of backup controllers automatically from DNS is heavily dependent on your environment. If this attempt fails, try one of the following suggestions:
If all of your domain controllers in your enterprise are not listed on the Failover tab, then failover was unable to retrieve the list from DNS. You must manually provide the .dns config file.
You can run the ADSListSites servername diagnostic utility to determine what information DNS is returning. If a list of sites or servers is returned, then automatic failover is operational. If ADSListSites is not configured for automatic failover, you will have to manually supply the list of domain controllers.
If SSL is used, all the domain controllers associated with a single endpoint must be able to communicate with CA IdentityMinder using SSL. If an SSL connection cannot be established with any one of the domain controllers, then you should not use SSL, or you should omit that domain controller in the .dns configuration file.
For example, if the Provisioning server makes a change to a controller that subsequently goes down, and CA IdentityMinder automatically connects to a backup controller, any changes made earlier may not yet be reflected on the backup because of propagation delays. This can have adverse results.
That is, if Provisioning Server is communicating with the primary server and encounters a failure, it immediately switches to the secondary server. If the user subsequently creates accounts on the secondary server, and the primary comes back up, ADS reconnects to the primary.
If Active Directory has not propagated the new accounts from the secondary to the primary controller, you receive a not-found error when you attempt to view the new accounts from CA IdentityMinder. This occurs because the account does not yet exist on the primary server.
Even more serious is the case in which you proceed to do an Explore (executed on the primary, now that the connection is restored). When Explore fails to find the newly created accounts, it assumes they have been deleted from the target system. Consequently, CA IdentityMinder then deletes the accounts from the repository.
Note: You may also encounter a situation wherein conflicting changes made on different controllers could cause one of them to be lost.
For example, if the agent timeout value is one minute, and the Provisioning Manager timeout is 90 seconds, when CA IdentityMinder attempts to communicate with a particular controller, it takes a full minute before the agent gives up. If the secondary controller is also down, another minute lapses before the agent declares the backup as down and attempts the tertiary controller. In the meantime, the Provisioning Manager times out and the initial operation fails, although the (tertiary) controller was actually available.
Copyright © 2013 CA.
All rights reserved.
|
|