Active Directory

Identity

9 sections
45 source tickets

Last synthesized: 2026-02-13 02:49 | Model: gpt-5-mini
Table of Contents

1. On-prem Active Directory authoritative attributes causing stale/incorrect cloud profile data

11 tickets

2. Creating AD security groups and configuring Identity Management access packages for AWS role mapping

12 tickets

3. Wireless authentication failures after account rename or missing AD wireless group membership (including BitLocker lockouts)

11 tickets

4. Okta ISO3166 country code conversion failure blocking AD/AAD provisioning

1 tickets

5. Mac local administrator rights restored via AD admin group membership and IU Self Service activation

1 tickets

6. Windows 11 device provisioning blocked by missing Okta/AD user group membership

5 tickets

7. Okta AD Agent production upgrade and post-update verification

1 tickets

8. Stale Okta group replaced by Azure AD/Entra group required removal from sync and AD/Okta

1 tickets

9. Provisioning Active Directory accounts via Okta Workday import

2 tickets

1. On-prem Active Directory authoritative attributes causing stale/incorrect cloud profile data
95% confidence
Problem Pattern

Cloud user profile attributes in Entra/Azure AD, Exchange, Teams and Outlook appeared stale, incorrect, or uneditable because objects were authoritative‑synchronized from on‑prem Active Directory or HR systems (e.g., Workday) via Azure AD Connect or Okta. Symptoms included persistent proxyAddresses/mail aliases, visible personal phone numbers (telephone/homePhone), missing or incorrect job titles (including academic prefixes), wrong manager/reporting‑line entries, and cloud‑side edits being blocked or subsequently overwritten. Affected areas included contact cards, Teams and Outlook, with display updates typically lagging from hours up to ~48 hours.

Solution

Issues were resolved by correcting attributes in the authoritative source (on‑prem Active Directory or the HR/Workday record) and allowing directory synchronization to propagate the changes. Mail‑alias leakage was resolved by removing unwanted values from users' proxyAddresses in the authoritative AD; personal numbers were removed or corrected in Telephones/HomePhone in the authoritative directory so Teams and contact cards no longer exposed them. Job titles (including academic prefixes) were updated in the authoritative directory or HR export; where HR import timing delayed display, administrators noted the HR record as the source of truth. Incorrect reporting lines were fixed by updating the manager attribute in the authoritative source. In environments where Workday authored directory entries and Okta pushed changes to AD, manual AD edits were temporary because the Okta/Workday synchronization overwrote them; affected users were routed to update the Workday record (Workday support) to prevent recurrence. Changes were observed in Entra/Azure AD, Teams, Outlook and contact cards after Azure AD Connect/Entra/Okta sync completed, typically within hours and up to 24–48 hours; in one case a phone number updated in AD became visible in Teams the following day.

2. Creating AD security groups and configuring Identity Management access packages for AWS role mapping
94% confidence
Problem Pattern

Requesters could not see or use AWS entitlements because the required Active Directory security groups and their Group IDs did not exist in the Identity Management system. Symptoms included missing AD GroupIDs needed for AWS role mapping, absence of group memberships visible in AWS (roles/entitlements such as RDS), and missing approver assignments on AccessPackages. Affected systems included Active Directory, Identity Management/AccessPackage entitlements, and multiple AWS accounts (Dev, Non-Prod, Prod).

Solution

Support created the requested Active Directory security groups and provisioned corresponding Access Packages in the Identity Management system. Each new AD group was registered for AWS use and assigned the requested user(s) as members so the roles/entitlements became visible in the target AWS accounts (Dev, Non-Prod, Prod); Group IDs were captured and provided for AWS role mapping. Approvers were configured per request (including handling approver changes when individuals were OOO). Examples of created groups included team- and project-scoped names such as AWSIDSSPerconaCare and a set of AWSConstructor roles (AWSConstructor, AWSConstructorAdministrator, AWSConstructorPowerDeveloper, AWSConstructorDeveloper, AWSConstructorReadOnly), in addition to earlier-created groups for marketing, AI Autonomous, IDSS Simovative, and CPIT MarTech. The combination of AD group creation, Identity Management AccessPackage provisioning, member assignment, approver assignment, and delivery of Group IDs resolved the visibility and entitlement issues in AWS.

3. Wireless authentication failures after account rename or missing AD wireless group membership (including BitLocker lockouts)
89% confidence
Problem Pattern

Windows endpoints failed domain or corporate wireless authentication after username renames, missing Active Directory wireless-group membership, workstation relocation, or transient site/network changes. Symptoms included corporate SSID authentication rejected, wireless logs showing the old username, saved/cached credentials treated as incorrect, intermittent 'password incorrect' despite entering the correct password, and domain errors such as 'The security database on the server does not contain a computer account for this workstation' or 'workstation trust relationship' failures. Some users experienced repeated failed sign-ins that triggered a BitLocker recovery prompt; affected systems included Windows 10/11 notebooks, Active Directory domain controllers, corporate wireless (CPG/CPG-Net), and CPG-VPN/Meraki VPN.

Solution

Support resolved multiple incidents where Windows devices could not authenticate to corporate wireless or sign in at the Windows lock screen by reconciling AD group state, repairing stale client credentials, and addressing workstation-domain account issues. Recorded corrective actions included: - Restoring or re-creating the AD Wireless/WirelessCPG group and re-adding users; assigning the Wireless group to newly created Windows 11 objects when it had been omitted. - Copying AD group memberships from a reference user and populating missing attributes (Employee ID) to restore expected domain and service access; example groups assigned in one case included Client-VPN-Meraki, CPG-AD-Domainmember, IUG-Intune-App-AdobeCC, WirelessUserAccess-CPG-Corp, and Mac-LocalAdmin-Shortterm. - Restoring domain group membership for relocated or long-absent users who had not been using Okta credentials on-device. - Clearing stale wireless profiles and saved/cached credentials (removing the CP wireless profile) or synchronizing the PC’s cached/local password with the user’s AD password when cached credentials were out of sync (notably correlated with CPG-Net presence at some sites). - Addressing computer-account/trust failures that blocked first-time or relocated-workstation logons; in one record the technician confirmed device identity (serial number) and the user was subsequently able to log in (no further changes were documented). - Resolving BitLocker lockouts by performing a password reset and providing the BitLocker recovery key so the device was unlocked; restoring AD group membership then re-established network access and group-based policies. Several intermittent login failures were recorded as resolving without active remediation, consistent with transient communication issues between the workstation and AD/authentication servers.

4. Okta ISO3166 country code conversion failure blocking AD/AAD provisioning
95% confidence
Problem Pattern

User provisioning into AD/Azure AD failed because an Okta Iso3166Convert expression did not produce a valid numeric country code for the user's country (e.g., Kosovo), causing sync/provisioning errors and provisioning to fail or fallback to incorrect values.

Solution

Support corrected the authoritative value in Okta by setting the numeric countryCode (906 for Kosovo) in the user's Okta profile and then re-ran the synchronization. After the manual numeric countryCode was applied and the sync executed the user was provisioned into Active Directory and Azure AD successfully.

Source Tickets (1)
5. Mac local administrator rights restored via AD admin group membership and IU Self Service activation
92% confidence
Problem Pattern

After a macOS update the Mac user was repeatedly prompted for administrator credentials and could not update apps; the user had previously held local admin rights but lost the ability to install/update software. Symptoms included repeated admin credential prompts for iTerm and other apps.

Solution

Support restored the user's long-term administrator entitlement by adding the user to the AD group 'MAC-LocalAdmin-longterm' and to the Mac's longtime-admin local group. The user then used the IU Self Service app on the Mac to activate the long-term admin role; once activated the user regained the ability to install and update applications without repeated admin prompts.

Source Tickets (1)
6. Windows 11 device provisioning blocked by missing Okta/AD user group membership
95% confidence
Problem Pattern

Windows 11 device provisioning or sign-in failed when required Active Directory group memberships were absent. Affected systems included Windows 11 endpoints, Okta-based device provisioning flows, and endpoint client deployments (for example Meraki). Symptoms included inability to complete the Okta sign-in/setup step despite correct credentials and MFA, stalled sign-in sessions, or missing client provisioning. In one case an incorrect Microsoft 365 license assignment coincided with the missing provisioning.

Solution

The incidents were resolved by restoring required Active Directory group memberships and correcting an incorrect license assignment where applicable. Affected accounts were added to the Windows 11 provisioning/user group and other required AD groups (examples observed: Win11 Usergroup, Okta MFA Group, CPG-AD-Domainmember, Wireless group, Meraki Client). In one incident the user's Microsoft 365 license was changed from A1 Plus to A5 and the Intranet assignment was set as externally assigned; after these changes the Meraki client and device provisioning completed and Okta sign-in/setup proceeded successfully. Group assignments and memberships were verified after remediation.

7. Okta AD Agent production upgrade and post-update verification
90% confidence
Problem Pattern

Request to upgrade the Okta AD Agent in production from v3.16 to v3.19 after a successful staging deployment; no operational errors were reported but the change required coordination and verification in production.

Solution

The Okta AD Agent in production was upgraded from version 3.16 to 3.19. The update was performed (noted in change control discussions) and post-update verification was conducted by reviewing the agent log files, which showed normal operation after the upgrade. The ticket workflow and approval were recorded in Automation for Jira.

Source Tickets (1)
8. Stale Okta group replaced by Azure AD/Entra group required removal from sync and AD/Okta
88% confidence
Problem Pattern

An Okta group that had been replaced by an Azure AD/Entra group remained present in Okta and Active Directory, causing duplication and preventing AD cleanup; Azure AD sync was still bringing the group into the environment.

Solution

The group was removed from the Azure AD sync scope so it was no longer re-synced from Entra. Administrators reviewed membership, then deleted the group from Okta and Active Directory. Deletion and sync configuration changes were confirmed complete.

Source Tickets (1)
9. Provisioning Active Directory accounts via Okta Workday import
90% confidence
Problem Pattern

Requests to provision or create on-prem Active Directory user accounts from HR source data in Workday using Okta. Users required creation of AD accounts and correct AD group memberships; tickets referenced Okta, Workday, and AD and reported the need to import Workday data into Okta to drive AD provisioning. No specific error messages were documented, and the primary symptom was that an AD account did not exist until the import was performed.

Solution

Operators located and used the Okta Workday connector/interface to perform an import from Workday into Okta. The import triggered Okta's provisioning workflow which created the AD account and applied group memberships according to the provided reference. The import completion was confirmed and the tickets were closed.

Source Tickets (2)
Back to Summaries
An unhandled error has occurred. Reload X