9.12 Troubleshooting Access Control

When a user requests access to a resource protected by the J2EE Agent, the request flows through the policy enforcement points illustrated in Figure 9-1.

Figure 9-1 Access Control Flow

If users are not getting access to a resource when they should, you need to enable tracing (see Section 9.11, Viewing Log Files) and view the log files to determine where the error is occurring.