What is necessary for FIM to connect to an AD in another forest?

Hello
I have FIM 2010 R2 installed on fim1.fim1.local working happily provisioning users into fim1.local domain.
Now due to merger we have a second forest    additional.local  
What is necessary for the existing FIM install to manage users on the additional.local forest as I cannot connect without error?
I can access the additional.local DC from the FIM Server and read the directory. Port 389 is open. I have a domain account on additional.local.
When I try to make an AD MA. I get the error message:
"Failed to search on DN cn=Aggregate,cn=Schema,cn=Configuration,dc=additional,dc=local"
and error code is 0x34.
I tried these values:
Forest:   addDC.additional.local
User Name: Administrator
Password: ***
Domain: additional
Where am I going wrong?

Yes I can connect to the external forrest when the DCs have ports 389 88 53 and 464 listening.
However, just one oddity in this FIM. When I push the "Containers" button to select the containers. I must first  configure and Add the preferred domain controller  (as given on previous dialog form) before I get the list of OUs.
After configuring I can switch it off and all is Ok.
just a comment,just wondering why.
*HH

Similar Messages

  • What is necessary for MM in IDOC and ALE??

    hii
    What is ALE, EDI and IDOC in SAP??
    Explain the above things with example
    What i have to learn as MM consultant to work on support project ..
    Can some body explain me with their real time experience
    Thanks

    HI,
    Difference Between EDI and IDOC
    EDI is nothing but Electronic data interchange. SAP will support EDI through Intermediate documents (IDOCS).
    EDI (Electronic Document interchange) - EDI is the electronic exchange of business documents between the computer systems of business partners, using a standard format over a communication network. 
    EDI is also called paperless exchange. 
    Advantages: 
    Reduced Data entry errors
    Reduced processing time
    Availabilty of data in electonic form
    Reduced paperwork
    Reduced Cost
    Reduced inventories and better planning
    Standard means of communications
    Better business process
    EDI has two process
    1. Outbound process
    2. Inbound process
    OP:
    1.Application document is created.
    2.IDOC is generated
    3.IDoc is transferred from SAP to Operating system layer
    4.Idoc is converted into EDI standards
    5.Edi document is transmitted to the business partner
    6.The Edi Subsystem report status to SAP
    IP:
    1.EDI transmission received
    2.EDI document is converted into an IDOC
    3.IDOC is transferred to the SAP layer
    4.The application document is created
    5.The application document can be viewed.
    IDOC:
    IDOC is a container that can be used to exchange data between any two process.
    Each iDoc is assigned a unique number for tracking and future reference.
    iDoc Consist of several segments,and segments contain several fields.
    iDoc contains the following three type of records...
    1.One Control Record.
    2.One or many Data Record
    3.One or many Status record.
    PORT:
    Port is used in the outbound process to determine the name of the EDI subsystem program,the directory path where the idoc file will be created at the operating system level,the idoc file names and the rfc desinations.
    RFC Destination:
    Used to define the characteristics of communication links to a remote system on which a functions needs to be executed.
    Partner Profile:
    Partner profile specified the various componets used in an outbound process ( Partner number,IDoc type,message type,Port,Process code),the mode in which it communicates with the subsystem(batch or immediate) and the person to be notified in case of errors.
    Message Control
    Used in pricing,account determination,material determination,and output determination.The message control component enables you to encapsulate business rules with out having to write abap programs.
    Process:
    Setup RFC destinations SM59
    Port Destinations WE21
    Partner Profile WE20
    Message control NACE
    Purchase Order ME21
    Check IDOCs WE02,WE05
    Explain to me about Idoc?
    IDoc (for intermediate document) is a standard data structure for electronic data interchange (EDI) between application programs written for the popular SAP business system or between an SAP application and an external program. IDocs serve as the vehicle for data transfer in SAP's Application Link Enabling (ALE) system. 
    IDocs are used for asynchronous transactions:  Each IDoc generated exists as a self-contained text file that can then be transmitted to the requesting workstation without connecting to the central database. 
    Another SAP mechanism, the Business Application Programming Interface (BAPI) is used for synchronous transactions. 
    A large enterprise's networked computing environment is likely to connect many geographically distributed computers to the main database. These computers are likely to use different hardware and/or operating system platforms. An IDoc encapsulates data so that it can be exchanged between different systems without conversion from one format to another. 
    IDoc types define different categories of data, such as purchase orders or invoices, which may then be broken down into more specific categories called message types. Greater specificity means that an IDoc type is capable of storing only the data required for a particular transaction, which increases efficiency and decreases resource demands. 
    An IDoc can be generated at any point in a transaction process. For example, during a shipping transaction process, an IDoc may be generated that includes the data fields required to print a shipping manifest. After a user performs an SAP transaction, one or more IDocs are generated in the sending database and passed to the ALE communication layer. The communication
    layer performs a Remote Function Call (RFC), using the port definition and RFC destination specified by the customer model. 
    The IDoc is transmitted to the receiver, which may be an R/3, R/2, or some external system.

  • What is necessary for a web host in order to run Flex apps? How to configure?

    I did find a few past postings on the forum but none seemed
    to address the problem.
    Can somebody who had hands on experience share his/her
    knowledge about a migrating a Flex application to production
    environment? Do I need to modify any settings? When I transfer the
    bin folder contents the UI works fine but the data connection
    throws errors.
    Does the web host need to have any specific software
    installed? More specifically, my host has CF 7 but do not have Flex
    data services installed. All I use is RemoteObject so I guess this
    can be done without Flex data services. Is this correct?
    Finally, if you can refer me to a configuration guide that
    the web host would need to follow, it would be greatly appreciated.
    Thanks for your time in advance.
    Emre

    Thanks for the response, here is the error message that I am
    getting.
    (mx.rpc::Fault)#0
    errorID = 0
    faultCode = "Server.Processing"
    faultDetail = (null)
    faultString = "Permission denied"
    message = "faultCode:Server.Processing
    faultString:'Permission denied' faultDetail:'null'"
    name = "Error"
    rootCause = (Object)#1
    cause = (null)
    localizedMessage = "Permission denied"
    message = "Permission denied"
    Obviously some data connection is failing due to permissions.
    My host, however, does not know what permisson is causing it and
    what the fix would be. Thanks for the input in advance

  • HT1338 Is anti virus necessary for iMac? if so, what is the best software?

    Is anti virus necessary for iMac? if so, what is the best software?

    1. This comment applies to malicious software ("malware") that's installed unwittingly by the victim of a network attack. It does not apply to software, such as keystroke loggers, that may be installed deliberately by an intruder who has hands-on access to the victim's computer. That threat is in a different category, and there's no easy way to defend against it. If you have reason to suspect that you're the target of such an attack, you need expert help.
    OS X now implements three layers of built-in protection specifically against malware, not counting runtime protections such as execute disable, sandboxing, system library randomization, and address space layout randomization that may also guard against other kinds of exploits.
    2. All versions of OS X since 10.6.7 have been able to detect known Mac malware in downloaded files, and to block insecure web plugins. This feature is transparent to the user, but internally Apple calls it "XProtect." The malware recognition database is automatically checked for updates once a day; however, you shouldn't rely on it, because the attackers are always at least a day ahead of the defenders.
    The following caveats apply to XProtect:
    It can be bypassed by some third-party networking software, such as BitTorrent clients and Java applets.
    It only applies to software downloaded from the network. Software installed from a CD or other media is not checked.
    3. Starting with OS X 10.7.5, there has been a second layer of built-in malware protection, designated "Gatekeeper" by Apple. By default, applications and Installer packages downloaded from the network will only run if they're digitally signed by a developer with a certificate issued by Apple. Software certified in this way hasn't necessarily been tested by Apple, but you can be reasonably sure that it hasn't been modified by anyone other than the developer. His identity is known to Apple, so he could be held legally responsible if he distributed malware. That may not mean much if the developer lives in a country with a weak legal system (see below.)
    Gatekeeper doesn't depend on a database of known malware. It has, however, the same limitations as XProtect, and in addition the following:
    It can easily be disabled or overridden by the user.
    A malware attacker could get control of a code-signing certificate under false pretenses, or could simply ignore the consequences of distributing codesigned malware.
    An App Store developer could find a way to bypass Apple's oversight, or the oversight could fail due to human error.
    For the reasons given above, App Store products, and other applications recognized by Gatekeeper as signed, are safer than others, but they can't be considered absolutely safe. "Sandboxed" applications may prompt for access to private data, such as your contacts, or for access to the network. Think before granting that access. OS X security is based on user input. Never click through any request for authorization without thinking.
    4. Starting with OS X 10.8.3, a third layer of protection has been added: a "Malware Removal Tool" (MRT). MRT runs automatically in the background when you update the OS. It checks for, and removes, malware that may have evaded the other protections via a Java exploit (see below.) MRT also runs when you install or update the Apple-supplied Java runtime (but not the Oracle runtime.) Like XProtect, MRT is presumably effective against known attacks, but maybe not against unknown attacks. It notifies you if it finds malware, but otherwise there's no user interface to MRT.
    5. XProtect, Gatekeeper, and MRT reduce the risk of malware attack, but they're not absolute protection. The first and best line of defense is always your own intelligence. With the possible exception of Java exploits, all known malware circulating on the Internet that affects a fully-updated installation of OS X 10.6 or later takes the form of so-called "trojan horses," which can only have an effect if the victim is duped into running them. The threat therefore amounts to a battle of wits between you and the malware attacker. If you're smarter than he thinks you are, you'll win.
    That means, in practice, that you never use software that comes from an untrustworthy source, or that does something inherently untrustworthy. How do you know what is trustworthy?
    Any website that prompts you to install a “codec,” “plug-in,” "player," "extractor," or “certificate” that comes from that same site, or an unknown one, is untrustworthy.
    A web operator who tells you that you have a “virus,” or that anything else is wrong with your computer, or that you have won a prize in a contest you never entered, is trying to commit a crime with you as the victim. (Some reputable websites did legitimately warn visitors who were infected with the "DNSChanger" malware. That exception to this rule no longer applies.)
    Pirated copies or "cracks" of commercial software, no matter where they come from, are unsafe.
    Software of any kind downloaded from a BitTorrent or from a Usenet binary newsgroup is unsafe.
    Software that purports to help you do something that's illegal or that infringes copyright, such as saving streamed audio or video for reuse without permission, is unsafe. All YouTube "downloaders" are in this category, though not all are necessarily harmful.
    Software with a corporate brand, such as Adobe Flash Player, must be downloaded directly from the developer’s website. If it comes from any other source, it's unsafe.
    Even signed applications, no matter what the source, should not be trusted if they do something unexpected, such as asking for permission to access your contacts, your location, or the Internet for no obvious reason.
    6. Java on the Web (not to be confused with JavaScript, to which it's not related, despite the similarity of the names) is a weak point in the security of any system. Java is, among other things, a platform for running complex applications in a web page, on the client. That was always a bad idea, and Java's developers have proven themselves incapable of implementing it without also creating a portal for malware to enter. Past Java exploits are the closest thing there has ever been to a Windows-style virus affecting OS X. Merely loading a page with malicious Java content could be harmful.
    Fortunately, client-side Java on the Web is obsolete and mostly extinct. Only a few outmoded sites still use it. Try to hasten the process of extinction by avoiding those sites, if you have a choice. Forget about playing games or other non-essential uses of Java.
    Java is not included in OS X 10.7 and later. Discrete Java installers are distributed by Apple and by Oracle (the developer of Java.) Don't use either one unless you need it. Most people don't. If Java is installed, disable it — not JavaScript — in your browsers.
    Regardless of version, experience has shown that Java on the Web can't be trusted. If you must use a Java applet for a task on a specific site, enable Java only for that site in Safari. Never enable Java for a public website that carries third-party advertising. Use it only on well-known, login-protected, secure websites without ads. In Safari 6 or later, you'll see a lock icon in the address bar with the abbreviation "https" when visiting a secure site.
    Follow the above guidelines, and you’ll be as safe from malware as you can practically be. The rest of this comment concerns what you should not do to protect yourself from malware.
    7. Never install any commercial "anti-virus" or "Internet security" products for the Mac, as they all do more harm than good, if they do any good at all. Any database of known threats is always going to be out of date. Most of the danger is from unknown threats. If you need to be able to detect Windows malware in your files, use the free software  ClamXav— nothing else.
    Why shouldn't you use commercial "anti-virus" products?
    Their design is predicated on the nonexistent threat that malware may be injected at any time, anywhere in the file system. Malware is downloaded from the network; it doesn't materialize from nowhere.
    In order to meet that nonexistent threat, the software modifies or duplicates low-level functions of the operating system, which is a waste of resources and a common cause of instability, bugs, and poor performance.
    By modifying the operating system, the software itself may create weaknesses that could be exploited by malware attackers.
    8. ClamXav doesn't have these drawbacks. That doesn't mean it's entirely safe. It may report email messages that have "phishing" links in the body, or Windows malware in attachments, as infected files, and offer to delete or move them. Doing so will corrupt the Mail database. The messages should be deleted from within the Mail application.
    ClamXav is not needed, and should not be relied upon, for protection against OS X malware. It's useful only for detecting Windows malware. Windows malware can't harm you directly (unless, of course, you use Windows.) Just don't pass it on to anyone else.
    A Windows malware attachment in email is usually easy to recognize. The file name will often be targeted at people who aren't very bright; for example:
    ♥♥♥♥♥♥♥♥♥♥♥♥♥♥!!!!!!!H0TBABEZ4U!!!!!!!.AVI♥♥♥♥♥♥♥♥♥♥♥♥♥♥.exe
    ClamXav may be able to tell you which particular virus or trojan it is, but do you care? In practice, there's seldom a reason to use ClamXav unless a network administrator requires you to run an anti-virus application.
    9. The greatest harm done by security software, in my opinion, is in its effect on human behavior. It does little or nothing to protect people from emerging "zero-day" threats, but if they get a false sense of security from it, they may feel free to do things that expose them to higher risk. Nothing can lessen the need for safe computing practices.
    10. It seems to be a common belief that the built-in Application Firewall acts as a barrier to infection, or prevents malware from functioning. It does neither. It blocks inbound connections to certain network services you're running, such as file sharing. It's disabled by default and you should leave it that way if you're behind a router on a private home or office network. Activate it only when you're on an untrusted network, for instance a public Wi-Fi hotspot, where you don't want to provide services. Disable any services you don't use in the Sharing preference pane. All are disabled by default.

  • Is it necessary to install FIM language packs for FIM Client Add ins ?

    Hi All ,
    Is it necessary to install FIM language packs for FIM Client Add ins, if I want it to use in different languages for different countries.
    And also , I would like to know the order in which the Client Add In and language packs should be installed , like what should be installed first ?
    Regards,
    Anil Kumar 

    Hello,
    Yes, it's necessary to install language packs if you want to use it.
    You need to install the client and then the language packs.
    Regards,
    Sylvain

  • ITunes Store for Windows. Everytime I try an access the iTunes Store it takes really long to connect and then it says iTunes store cannot be access. I think I am up to date with iTunes Verizon 11.0.2.26 but no matter what I try it does not connect. HELP P

    iTunes Store for Windows. Everytime I try an access the iTunes Store it takes really long to connect and then it says iTunes store cannot be access. I think I am up to date with iTunes Verison, I Have 11.0.2.26 but no matter what I try it does not connect. HELP Please???

    With those symptoms, I'd try the following document:
    Apple software on Windows: May see performance issues and blank iTunes Store
    (If there's a SpeedBit LSP showing up in Autoruns, it's usually best to just uninstall your SpeedBit Video Accelerator.)

  • What cables do I need to connect my 2013 macbook pro to my HD tv? I know I need mini display to HDMI, but male? female HDMI??? and also, do I need a separate cable for sound?

    what cables do I need to connect my 2013 macbook pro to my HD tv? I know I need mini display to HDMI, but male? female HDMI??? and also, do I need a separate cable for sound?

    Actually you need a Thunderbolt to HDMI adapter. It will carry both audio and video.
    This one will work: Mini DisplayPort | Thunderbolt® to HDMI® Adapter w/ Audio Support

  • HT3014 my mac has the VGA port and I need a newer monitor for it. what do I use that will connect it. I had a new dell monitor and none of the things that dell said worked. so I am going to get a mac monitor for a second unit.

    my mac has the VGA port and I need a newer monitor for it. what do I use that will connect it. I had a new dell monitor and none of the things that dell said worked. so I am going to get a mac monitor for a second unit.
    my laptop is a 2008 model

    Hmmm... 2008 MBP has...
    Video (Monitor):     1 (DVI)
    Details:     Supports external display in dual display and mirroring modes. VGA output provided by included Apple DVI-to-VGA adapter, S-video output provided by optional adapter (sold separately).
    http://www.everymac.com/systems/apple/macbook_pro/specs/macbook-pro-core-2-duo-2 .5-15-early-2008-penryn-specs.html

  • HT3231 What cables are necessary for the fastest transfer of data from MacBook Pro to MacBook Air

    What cables are necessary for the fastest transfer of data from MacBook Pro to MacBook Air

    As I posted "it is an Unknown", at least to me, what type FW port is on the OPs older Mac.
    LowLuster
    HT3231 Re: What cables are necessary for the fastest transfer of data from MacBook Pro to MacBook Air 
    Dec 26, 2013 8:04 PM (in response to OGELTHORPE)
    But the newest Mac notebooks do not have a firewire port.
    So he may need a TB to FW adapter, $29, a FW 400 or 800 cable, $??, and then a FW 400 to 800 cable/port adapter (If the old Mac only has a FW 400 port), $??.
    It is unknown if the old Mac has a FW 400 or 800 port.

  • HT204003 if i open passbook on iphone 5, it always say cannot connect to itunes, any fix from apple tech support? and whats the reason for this problem? why do we have to figure it out and not even apple can give answer??

    if i open passbook on iphone 5, it always say cannot connect to itunes, any fix from apple tech support? and whats the reason for this problem? why do we have to figure it out and not even apple can give answer??

    actually i found out how to fix it
    1 sign out of apple account
    2 close down passbook app
    3 change year to 2013
    4 reopen passbook and sign in at the button with your apple ID
    5 change the time to auto update and it should work from now on.
    this worked for me let me know if it work for you:)

  • I have just updated my plug in & add ons, but they are several that say to research. How do I know what plug ins are necessary for mozilla to run properly. I really don't want a bunch of unnecessary downloads on my computer

    I have just updated my plug in & add ons, but they are several that say to research. How do I know what plug ins are necessary for firefox to run properly. I really don't want a bunch of unnecessary downloads on my computer

    None are '''''necessary''''' to use Firefox, but some parts of some web pages aren't going to work without a specific plugin being installed.

  • URGENT: What else is necessary for me and why?

    Hi All!
    I am desiging a socket based data transmission system, and our messages, Connection Logs, Application Configuration Data will be stored in xml format. I have also designed dtd for them.
    I NEED TO KNOW WHY AND WHICH OF (XSL, XSLT, XPATH, DOM, SAX, etc. ) SHOULD I USE TO PARSE THE XML DATA FOR JAVA APPLICATION. AND IS ALL THIS NECESSARY FOR THIS OR NOT?
    Plz specify one sentence for each!
    Thanks in Advance
    Kashif

    - XSL, XSLT: used for transforming XML in something else (XML, XHTML, text...)
    - XPATH: used for querying nodes content, XSL relies heavily on this
    - DOM: a parsing technique that will produce a hierarchy of objects (nodes) representing your XML doc,
    - SAX: a parsing technique that will raise events for each specific part (nodes) of your XML doc.

  • What do I have  to buy for a wireless connection?

    I have got a ADSL Broadband connection to the Internet from my ISP, [UK Online] that has a Cable to my DrayTek, Vigor2500v Router.
    My router is not wireless. I have a Ethernet cable connected from the router to my G4 iBook, 800MHz. My iBook is AirPort Extreme ready and is without the AirPort Extreme Card. What is the different between AirPort Express and AirPort Extreme?
    How can I make my G4 iBook have a wireless connection to the Internet? What do I have to buy for a wireless connection?
    G4 iBook   Mac OS X (10.3.9)   800MHz; AirPort Extreme ready; 256Mb;

    Thanks for your Info, I do understand that I need to buy a “AirPort Extreme card” & “AirPort Express/Extreme base station”.
    I have my current Router wired by a Ethernet cable to my G4 Desktop, also have a VoIP connection from my router. So, I want to keep this router and add the “AirPort Express/Extreme base station” to have the wireless connection to a iBook only.
    If I understand you correctly, I can disabled the DHCP server on the “AirPort Express/Extreme base station” only, Because I need the DHCP for the connection to my G4 Desktop. Is this what you mean?

  • I have to constantly keep restarting my computer for it to connect to the internet, what can be done to correct this problem?

    I have to constantly keep restarting my computer for it to connect to the internet, what can be done to correct this problem?

    Hi, this has worked for a few...
    Make a New Location, Using network locations in Mac OS X ...
    http://support.apple.com/kb/HT2712
    10.7…
    System Preferences>Network, top of window>Locations>Edit Locations, little plus icon, give it a name.
    10.5.x/10.6.x/10.7.x instructions...
    System Preferences>Network, click on the little gear at the bottom next to the + & - icons, (unlock lock first if locked), choose Set Service Order.
    The interface that connects to the Internet should be dragged to the top of the list.
    Instead of joining your Network from the list, click the WiFi icon at the top, and click join other network. Fill in everything as needed.
    For 10.5/10.6, System Preferences>Network, unlock the lock if need be, highlight the Interface you use to connect to Internet, click on the advanced button, click on the DNS tab, click on the little plus icon, then add these numbers...
    208.67.222.222
    208.67.220.220
    Click OK.
    Also, turn off IPv6:
    System Preferences » Network » AirPort » TCP/IP tab » Configure IPv6
    Or whatever Interface you use.

Maybe you are looking for

  • After firmware update wifi no longer works on ipad mini

    wifi worked fine before upgrade to ios6.02 it sees networks but cannot join them? 4G works fine

  • Partial submit in a jsf fragment is not working

    Hi, i have a jsf page that is hosting a jsf fragment (using workflow), inside the jsf fragment i have a button that has partial submit = true, and an output text that has partial triggers pointing to the button. the button on the fragment page has a

  • Replacement battery MB pro 15 will not charge

    The MacBook pro 15 part number is MB487LL/A charges the old battery but it only lasts about an hour. But the replacement battery will not charge. It only had two lights green when I installed I think it might be a defective battery. Would running a r

  • How to display MANDT field in ALV Grid display?

    CALL FUNCTION 'REUSE_ALV_GRID_DISPLAY' EXPORTING    I_CALLBACK_PROGRAM                = LV_REPID    I_STRUCTURE_NAME                  = 'ZSTR_TRAIL'    I_SAVE                            = 'A'   TABLES     T_OUTTAB                          = it_output

  • What is mysql_prep in oracle php functions?  I can't find it

    I have looked at several functions and read about each of them. What would be the same function in oracle as mysql_prep. I am using it for this. $password = trim(mysql_prep($_POST['password']));