1. Detect change from the change log table on the source.
  2. Fetch the entry or table rows from affected tables on the source.
  3. Perform any mappings and compute the equivalent destination entry by constructing an equivalent LDAP entry or equivalent table row.
  4. Fetch the entry or table rows from affected tables on the destination.
  5. The entry or table row does not exist on the destination.
  6. Create the entry or table row.