Page created: 4 Feb 2020 |
Page updated: 22 Jul 2020
- Detect delete from the change log table on the source.
- Fetch the entry or table rows from affected tables on the source.
- Perform any mappings and compute the equivalent destination entry by constructing an equivalent LDAP entry or equivalent table row.
- Fetch the entry or table rows from affected tables on the destination.
- The entry or table row exists on the destination.
- Apply the delete on the destination.