The following sections provide information about how to use log files for troubleshooting problems:
Section 31.15.1, Sample Authentication Traces
Section 31.15.2, Understanding Policy Evaluation Traces
Section 31.15.3, Adding Hashed Cookies into Browsers