1. Detect change from the change log table on the source.
  2. Perform any mappings and compute the equivalent destination entry by constructing an equivalent LDAP entry or equivalent table row.
  3. Reconstruct changed entries.
  4. Push notification with change details to the destination.