Attribute Sync - Access Denied by IQService

Hi all,
We are trying to sync accountExpires attribute of AD and the sync worked for most users except for some. We can’t find a common denominator among the failed users. (In the same OU, some users failed, and some passed). The error we get is this:
[“Error(s) reported back from the IQService - Failed to update attributes for identity CN\u003dLastName\, FirstName,OU\u003dBC_EnhancedLaptop,OU\u003dFCIB Users,DC\u003dWI,DC\u003dFCIB,DC\u003dcom. Access is denied.\n”]

Anyone knows the reason for this? We are currently checking permissions on the service account but the fact that the majority of users passed makes me think the problem lies elsewhere.

Thanks in advance!

Hi @ArefS,

Those failed users you are talking about, are they part of domain admins group? Or do they have adminCount - 1 as shown in the screenshot below?
image

If you don’t see the adminCount or if they are not part of the domain admins group, please go to IDN Search UI, find the account activity for identities with issues. When you click on account activity that failed provisioning, it will show you the details related to sync. For example, it will show previous value, new value its trying to sync, attribute name, etc. Could you please share that information as well.

Thanks,
Sachin

I don’t have access to our client’s AD but looking at some of those users, they are a mix of full-time employees, contractors, contingent workers, and third-party vendors, unlikely that all of them are admins.

Yeah, looking at the error message (Access is denied), it does look like the service account permission issue.

  1. I would not trust the error message, yes it is access denied but maybe for some other attribute. Check if any other attribute is trying to be updated as part of this operation.
  2. If you have access to IQ Service, see the Provisioning plan using Native Rules.
  3. If you have access to IQ Service, try to replicate the same operation using PowerShell, you will get exact error message.
  4. Maybe error is centric to some users, if yes then you need to find out what special about the failed users.
  5. You can ask your AD team, they will have more insights on why it is failing.

Thanks
Krish

Hi @ArefS

Are you able to fix this issue? We are getting the same error when trying to sync it for few users.

Thanks in advance

Hi @Sachin_Rajathadri,

We have a similar setup where adminCount was set as 1 for an account in AD and the attribute sync was failing with a reason “Access is denied”. The account was not part of any privileged group and hence we manually cleared the adminCount value.

The same issue continues to persist even after we removed the adminCount value. Any suggestions would be appreciated.

Thanks

Hi @siddharth931,
We asked our client to investigate the permissions on the AD Service Account. We still haven’t heard back from them.

Hi @siddharth931,

It does look like a permission issue on the Service account. Could you please check if it has all the required permissions?

Regards,
Sachin

Thanks for the suggestion @Sachin_Rajathadri

The service account is indeed part of Account Operators AD group and a local administrator on the server. It meets all expectations highlighted in the document. The attribute sync works on all normal users as expected.

The issue is - it throws out an insufficient permission issue when attribute sync is performed on users whose adminCount AD attribute has been manually changed from 1 to 0. Those set of users currently do not have any privileged groups associated with them.

I am still researching what action item needs to be taken so that those set of users can be considered as normal users again.

Thanks

@siddharth931 you mentioned that you reset the adminCount to 0 but attribute sync still did not work?

  1. Is this immediate or later? The code for AdminSdHolder will run and reset the value back to 1 if the user is still in an admin group. The default is one hour but it can be set to run as frequently as 5 minutes.

  2. There are some notes that indicate that resetting adminCount will not be sufficient as inheritance has been disabled by this same process and must be re-enabled.

You might find this article helpful: Five common questions about AdminSdHolder and SDProp - Microsoft Community Hub

Alicia

1 Like

Hello All,

We are able to figure out a solution for this. In addition to resetting adminCount to 0 In for those protected accounts which is not part of any privileged group currently, we need to have the User’s Object ACL permissions reset to default in AD

After the ACL permissions are reset, attribute sync started to work as expected

Thanks everyone for their inputs

Siddharth

1 Like

This topic was automatically closed 60 days after the last reply. New replies are no longer allowed.