Active Directory Account Data Collection fails to retrieve Active Directory attributes when connecting to Active Directory Global Catalog port 3268 in RSA Identity Governance & Lifecycle
Originally Published: 2019-03-12
Article Number
Applies To
Issue
Active Directory Account Data Collection fails to populate Active Directory attributes such as accountExpires, etc. during account collection. The issue happens when connecting to Active Directory Global Catalog on port 3268 instead of on port 636 (SSL) or plain (389).
The following error is also observed in the aveksaServer.log:
10/17/2018 16:37:29.808 ERROR (ApplyChangesRegularThread-31460) [com.aveksa.collector.accountdata.ADAccountDataReader] Problem listing attributes:
java.lang.NullPointerException
at com.aveksa.collector.accountdata.ADAccountDataReader.getADDomainAttributes(ADAccountDataReader.java:894)
at com.aveksa.collector.accountdata.ADAccountDataReader$ADAccountDataDirectoryIterator.<init>(ADAccountDataReader.java:922)
at com.aveksa.collector.accountdata.ADAccountDataReader.createAccountDataDirectoryIterator(ADAccountDataReader.java:641)
at com.aveksa.collector.accountdata.ADAccountDataReader.createAccountDataDirectoryIterator(ADAccountDataReader.java:62)
at com.aveksa.collector.accountdata.LdapAccountDataReader.getAccountIterator(LdapAccountDataReader.java:172)
at com.aveksa.client.datacollector.collectors.accountdatacollectors.AccountDataCollector.collectData(AccountDataCollector.java:393)
at com.aveksa.client.datacollector.collectors.accountdatacollectors.AccountDataCollector.collect(AccountDataCollector.java:302)
at com.aveksa.client.datacollector.collectors.accountdatacollectors.AccountDataCollector.collect(AccountDataCollector.java:269)
at com.aveksa.client.datacollector.framework.DataCollectorManager.collect(DataCollectorManager.java:536)
at com.aveksa.client.component.collector.DefaultCollectorManager.actUpon(DefaultCollectorManager.java:204)
at com.aveksa.client.component.collector.DefaultCollectorManager.handle(DefaultCollectorManager.java:102)
at com.aveksa.client.component.event.DefaultEventManager.handle(DefaultEventManager.java:60)
at com.aveksa.client.datacollector.framework.SimpleEventSource.notifyListeners(SimpleEventSource.java:67)
at com.aveksa.client.component.communication.DefaultCommunicationManager.notifyEvent(DefaultCommunicationManager.java:377)
at com.aveksa.client.component.communication.ChangeListHandler.applyChanges(ChangeListHandler.java:364)
at com.aveksa.client.component.communication.ChangeListHandler.access$300(ChangeListHandler.java:58)
at com.aveksa.client.component.communication.ChangeListHandler$ChangeApplyingRunnable.run(ChangeListHandler.java:275)
at java.lang.Thread.run(Thread.java:748)Cause
Resolution
Prerequisites
- Login as an Administrator into the Active Directory server and make sure that the Active Directory Schema is listed in the Microsoft Management Console (MMC).
- If the Active Directory Schema is not available in the console then configure using the steps in the section below entitled Add Active Directory Schema to MMC. Otherwise skip to the section on Add Attribute to Global Catalog.
Add Active Directory Schema to MMC
We need to make a change to the registry on the AD Server, so that we can modify the AD Schema.
- From a command prompt open the registry using regedt32.exe or regedit.exe.
- Locate the HKEY_LOCAL_MACHINE \SYSTEM\CurrentControlSet\Services\NTDS\Parameters key.
- Create a new REG_DWORD value called Schema Update Allowed and set the value to 1.
- Register the schema management MMC snap-in, register the schmmgmt.dll.
- Open a command prompt as an administrator and execute the command regsvr32.exe schmmgmt.dll.
- Open the windows Run box and type mmc to open the Microsoft Management Console.
- From the menu select File > Add/Remove Snap-In.
- Select Active Directory Schema then click Add.
- Click OK. The Active Directory schema should be listed in the console now.
Note: If the AD schema is not available, restart the Windows server and try again.
Add Attribute to Global Catalog
In the Active Directory schema, enable the required attribute to update in the global catalog of AD.
- Open the MMC console and select “Active Directory Schema” in the directory
- Select the Attributes folder, it will display the list of attributes in the pane on the right.
- Select the required attribute, right click and open the Properties window. For exmaple, use accountExpires
- In the Properties dialog, enable the Replicate this attribute to the Global Catalog option and click OK to save the changes.
- The selected attribute will be added to the global catalog
Related Articles
Active Directory Global Catalog Identity Sources 79Number of Views Active Directory Account Collector fails with 'Naming Exception happened' in RSA Identity Governance & Lifecycle 258Number of Views Active Directory Account Data Collectors are failing in pre-processing in RSA Identity Governance & Lifecycle 52Number of Views Virtual Attributes in Access Policies (Active Directory Only) 80Number of Views How to identify the source of a workflow email in RSA Identity Governance and Lifecycle 74Number of Views
Trending Articles
How to recover the Application and AFX after an unexpected database failure in RSA Identity Governance & Lifecycle Troubleshooting AFX Connector issues in RSA Identity Governance & Lifecycle RSA MFA Agent 2.3.6 for Microsoft Windows Installation and Administration Guide RSA Release Notes for RSA Authentication Manager 8.8 RSA Authentication Manager 8.9 Release Notes (January 2026)
Don't see what you're looking for?