August 2022
The LDAPLDS Extraction tool has an issue where the WaspUtilities.ini file is not properly read, and errors are logged relating to the inability to contact https://localhost:44313/. Wasp is correcting this issue, and an updated Extraction tool will be released when ready.
In the meantime, another file can be edited to allow the tool to work correctly:
C:\Program Files (x86)\Wasp Barcode Technologies\UtilityInstaller\UtilityTools\ActiveDirectoryLDSExtractionTool.exe.config
original lines:
<add key="PublicApiToken" value="" />
<add key="PublicApiBaseAddress" value="https://localhost:44313/" />
In the PublicApiToken line, copy/paste the user's generated API token (the same one entered in WaspUtililties.ini) inside the double quotes toward the end.
In the PublicApiBaseAddress line, replace the value with the user's tenant URL. This can be for AssetCloud or InventoryCloud, web or On-Premise
Example of properly configured lines:
<add key="PublicApiToken" value="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" />
<add key="PublicApiBaseAddress" value="https://example.waspassetcloud.com/" />
Assuming everything else is properly configured per the Help documentation, the Extraction tool should now work.