Page created: 26 Jul 2021 |
Page updated: 14 Jan 2022
- Detect delete from the change log table on the source.
- Fetch the entry or table rows from affected tables on the source.
- Perform any mappings and compute the equivalent destination entry by constructing an equivalent LDAP entry or equivalent table row.
- Fetch the entry or table rows from affected tables on the destination.
- The entry or table row exists on the destination.
- Apply the delete on the destination.