Page created: 6 Nov 2019
|
Page updated: 25 Mar 2020
- Detect delete from the change log table on the source.
- Fetch the entry or table rows from affected tables on the source.
- Perform any mappings and compute the equivalent destination entry by constructing an equivalent LDAP entry or equivalent table row.
- Fetch the entry or table rows from affected tables on the destination.
- The entry or table row exists on the destination.
- Apply the delete on the destination.