The Bitglass DirSync AD Agent is a program that syncs Active Directory users to the Forcepoint ONE user database. An AD user (typically an admin) would download the tool and install it on a local machine. The agent runs and automatically syncs every hour.
When one or more users are not syncing from AD, below are some common causes and remedies.
If these steps do not fully resolve the issue, please get in touch with Forcepoint ONE technical support and provide the Email / UPN of the user(s) who are not being synced successfully, and any troubleshooting steps already taken.
Start Sync - Will initiate on-demand sync for any changes made in Active Directory since the last agent synchronization. This sync occurs automatically every 3 hours.
Start Full Sync - Initiates a full synchronization rather than synchronizing only changes in AD.
User Flagged for Deactivation
AD Sync Agent Misconfiguration Issues
No Users Syned From a Particular Group
User’s AD Profile Is Missing a Required Attribute
User’s Domain Is Not Selected for Syncing
AD Agent Unable To Query Active Directory
Newly Added AD Users Not Synced to Forcepoint ONE
Authentication errors due to AD Agents' version mismatch
Advanced Troubleshooting in AD(LDAP)
Frequently Asked Questions
Example Log: Agent sync event recommends User BG User4 (bguser4@xxxx.xx) to be deactivated. Please confirm user deactivation under IAM > Users and Groups > All Users.
Analyze > Logs > Admin:
IAM > Users and Groups > All Users > Search for the user
You may choose to either click on Confirm Deactivation or investigate why the deactivation was flagged. The AD Sync Agent queries all LDAP objects/groups you configured every 3 hours. It then does a diff against the previous query. Anything that is different is sent to the frontend. The frontend then compares what it currently has versus the new information. If the ADSA diff file noted a user is no longer in a group, it will cause the frontend to flag the user as needing deactivation, hence, the notification is triggered. You can also configure the frontend to remove the user automatically (configured in AD Sync Agent)
All of these types of errors are user misconfigurations and can be corrected by updating the configuration settings either on the Agent or in the portal.
The group must be marked to sync and should show a count of users that have successfully synced. If the group is check marked and shows 0 users, either there are no users in that group, or the AD Sync Tool had an issue getting data from the AD server.
nslookup ad.example.com
Two or more AD Agents instances are recommended when using an AD Agent for authentication. When the major version of these AD Agents are mismatched, that is, one agent is 1.xx.x.x while the other is 2.xx.x.x, authentication fails even though the password from the user is accurate.
AD Agents retrieve Authentication task messages from Forcepoint ONE servers and responds with success or failure results for them. The format of these authentication messages differs depending on the AD Agent version installed. AD Agents with lower major versions (e.g. 1.xx.x.xxx) cannot decipher messages meant for higher major versions (e.g. 2.xx.x.xxx). This leads to authentication failures for end users even with accurate passwords when AD Agent major versions are mismatched in an environment.
How to Identify AD Agent version mismatch:
On the Forcepoint ONE portal, the status of the AD Agents installed can be viewed by navigating to IAM > Users and Groups > Active Directory User Source
The screenshot below shows AD Agent installations that have the problematic mismatched major versions:
Ensure all AD Agents have the same major version and that two or more AD Agents are running and healthy in your AD infrastructure.
The picture below shows two healthy AD Agents running the same major version and providing successful user authentication.
These are the two tools that can help you find the LDAP queries the Bitglass sync agent is sending to Forcepoint ONE servers.
Download these tools on the machine which is running the AD agent.
The AD agent makes a .Net (LDAP) request to the domain controller for the groups that the Admin/System Admin specified during setup. It records these in a snapshot file (snapshot-<date>). It then runs a Diff on the previous snapshot and any changes are sent to the frontend over REST HTTP calls. The frontend then compares the list against what it has and makes the necessary changes and notifications.
The AD Agent keeps these files in C:/programdata/bitglass/dirsync on the machine it is installed on. Keep in mind, this is a hidden folder. You can open up a system window and type in the exact location and it will open.
Start > Programs > Bitglass > Agent Console. The console is only a viewer, the service is running even after you close the console window. The console itself is used to start/stop the service manually and update LDAP or Bitglass login information.
You can look at event logging. Go to Start->run->eventvwr.msc and hit enter. This will launch the event viewer. Go into Windows Logs->Applications and you will see the Bitglass Agent logging. This article explains the different error codes and what they denote Directory Sync AD Agent Event Codes
Open the console and stop the service. Open up C:/programdata/bitglass/dirsync/config.xml and set 'false' to 'true' in the debug section of the config file. Go back to the console and start the service again. More logging will show up in the event viewer. Be sure to shut this off as soon as possible as it is very verbose.
Keepalives are sent every 60 seconds, periodic syncs are done every 3 hours. As part of the keepalive, the agent is actually querying if the frontend has anything for it to do. If the admin has triggered a full sync or partial sync by clicking the button in the portal, then the frontend will tell the next agent to start a sync through the keepalive response (over JSON).
The agent will check with the AD server every 3 hours for any changes and will update the frontend at the same time. So it may take up to 3 hours for AD changes to reflect on the Forcepoint ONE portal unless manual sync is done from the portal.
How to install Dirsync/ AD sync service on Windows Server
Deploying an AD Agent
Directory Sync AD Agent Event Codes
AD Agent - Using an upstream proxy to connect to Forcepoint ONE portal