- Introduction
- Installation
- Getting Started
- Setup the Environment
- Setup the UKG Pro Connection
- Setup the Active Directory Connection
- Delegation of Control
- Setup Rules
- Link (Identity Match)
- Employee Filter
- Auto Provision
- Auto Provision Conditions
- User Logon Name
- User Logon Name Suffix
- Password
- Password Never Expires
- Setup Mappings
- Field Mappings
- Enable Account
- Container
- Network Access Permission
- Custom Attributes
- Group Mappings
- Working with Expressions
- String Expressions
- Bool Expressions
- Quick Expressions
- Working with Conditional Expressions
- Working with Constants
- Ignore Constant
- IsInsert Constant
- IsUpdate Constant
- IsDisable Constant
- Auto Constant
- Special Methods
- Supported Fields
- Person (UKG)
- Employment (UKG)
- Job (UKG)
- Location (UKG)
- Org Level 1 to 4 (UKG)
- Project (UKG)
- Platform Configuration (UKG)
- User (Active Directory)
- Sending Email to UKG Pro
- Notifications
- Detecting Changes
- SMTP Settings
- Scheduling
- Viewing the Logs
- Activate a License
- Security
- Introduction
- Installation
- Getting Started
- Setup the Environment
- Setup the UKG Pro Connection
- Setup the Active Directory Connection
- Delegation of Control
- Setup Rules
- Link (Identity Match)
- Employee Filter
- Auto Provision
- Auto Provision Conditions
- User Logon Name
- User Logon Name Suffix
- Password
- Password Never Expires
- Setup Mappings
- Field Mappings
- Enable Account
- Container
- Network Access Permission
- Custom Attributes
- Group Mappings
- Working with Expressions
- String Expressions
- Bool Expressions
- Quick Expressions
- Working with Conditional Expressions
- Working with Constants
- Ignore Constant
- IsInsert Constant
- IsUpdate Constant
- IsDisable Constant
- Auto Constant
- Special Methods
- Supported Fields
- Person (UKG)
- Employment (UKG)
- Job (UKG)
- Location (UKG)
- Org Level 1 to 4 (UKG)
- Project (UKG)
- Platform Configuration (UKG)
- User (Active Directory)
- Sending Email to UKG Pro
- Notifications
- Detecting Changes
- SMTP Settings
- Scheduling
- Viewing the Logs
- Activate a License
- Security
Viewing the Logs
Connect to AD is setup to log actions as it performs the synchronization process. The logs are a great way to monitor progress and troubleshoot issues.
Each environment has its own log and it can be viewed by selecting the Logs section.
The environment log file is always located in the C:\ConnectToADData folder. The log file does not include any sensitive security information.
Connect to AD supports 2 levels of logging.
Normal
Normal logging captures high level actions and failures. Normal logging should be used after you are satisfied with your implementation.
No Personal Identifiable Information (PII) is logged when using Normal logging.
Debug
Debug logging captures all actions and failures and provides details of each action performed by Connect to AD.
Debug logging should only be used when you are experiencing issues and you need to troubleshoot the cause.
Debug logging slows the synchronization process and uses a considerable amount of hard-drive space to store the detailed logs. Please be sure that you have sufficient hard-drive space to accommodate debug logging. You should switch to Normal logging when you are satisfied with your implementation, or you may find the the log file grows rapidly and your system may run out of storage .
Logging allows you to drill-down into details. You can double-click a log record to get additional information.
Next Activate a License