Protected Resource Authentication Trace

When a protected resource is configured to require authentication, both Identity Server and Embedded Service Provider of Access Gateway generate log entries for the process. The following sections explain how to correlate the entries from the logs: