The following sections provide information about how to use log files for troubleshooting problems:
Section 32.15.1, Sample Authentication Traces
Section 32.15.2, Understanding Policy Evaluation Traces
Section 32.15.3, Adding Hashed Cookies into Browsers