Published Business Services Security Log Information
The log file provides administrators with information that you can use for troubleshooting business service security without revealing details that could possibly create a gap in the security.
When a web service attempts to access a published business service in JD Edwards EnterpriseOne, the system records the authorization information in the log file. If the logging level is set to "Debug," the log file records whether authorization was granted or denied. If the log level is set to "Severe," the system only logs information if the attempt to access a web service fails. This is an example of the information provided in the log file:
Access to <method name> in <published business service name> is <granted/denied>⇒ for <user name> with <role name>.
See Also
JD Edwards EnterpriseOne Tools Server Manager Guide for information on how to view business service security log file information.
JD Edwards EnterpriseOne Tools Business Services Server Reference Guide for information on how to configure JD Edwards EnterpriseOne to authenticate users of published business services.