The following sections provide information about how to use log files for troubleshooting problems:
Section 31.16.1, Sample Authentication Traces
Section 31.16.2, Understanding Policy Evaluation Traces
Section 31.16.3, Adding Hashed Cookies into Browsers