PingDirectory

Delete operation example

About this task

A process flow diagram that is described in detail in the following steps

Steps

  1. Detect delete from the change log table on the source.

  2. Fetch the entry or table rows from affected tables on the source.

  3. Perform any mappings and compute the equivalent destination entry by constructing an equivalent LDAP entry or equivalent table row.

  4. Fetch the entry or table rows from affected tables on the destination.

  5. The entry or table row exists on the destination.

  6. Apply the delete on the destination.