2023-06-23/02:33:38.386 [{}] [https-jsse-nio-443-exec-287] DEBUG intercept.FilterSecurityInterceptor - Previously Authenticated: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE 2023-06-23/02:33:38.386 [{}] [https-jsse-nio-443-exec-287] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:38.386 [{}] [https-jsse-nio-443-exec-287] DEBUG intercept.FilterSecurityInterceptor - Authorization successful 2023-06-23/02:33:38.386 [{}] [https-jsse-nio-443-exec-287] DEBUG intercept.FilterSecurityInterceptor - RunAsManager did not change Authentication object 2023-06-23/02:33:38.386 [{}] [https-jsse-nio-443-exec-287] DEBUG web.FilterChainProxy - /assets/img/hamburg-icon.png reached end of additional filter chain; proceeding with original chain 2023-06-23/02:33:38.386 [{}] [https-jsse-nio-443-exec-287] DEBUG access.ExceptionTranslationFilter - Chain processed normally 2023-06-23/02:33:38.386 [{}] [https-jsse-nio-443-exec-287] DEBUG context.SecurityContextPersistenceFilter - SecurityContextHolder now cleared, as request processing completed 2023-06-23/02:33:38.398 [{}] [https-jsse-nio-443-exec-293] DEBUG domain.FlatViewJobcontrolController - Configuration for Role Job to hinde 0 2023-06-23/02:33:38.398 [{}] [https-jsse-nio-443-exec-293] DEBUG domain.FlatViewJobcontrolController - ecmjobIdQuery .. select max(eij.JOBID) as 'JobId' from EcmImportJob eij where eij.TRIGGERNAME in (select qrt.TRIGGER_NAME from qrtz_triggers qrt) group by eij.TRIGGERNAME 2023-06-23/02:33:38.402 [{}] [https-jsse-nio-443-exec-245] DEBUG access.ExceptionTranslationFilter - Chain processed normally 2023-06-23/02:33:38.402 [{}] [https-jsse-nio-443-exec-245] DEBUG context.SecurityContextPersistenceFilter - SecurityContextHolder now cleared, as request processing completed 2023-06-23/02:33:38.813 [{}] [https-jsse-nio-443-exec-293] DEBUG domain.FlatViewJobcontrolController - jobIdList size = 92 2023-06-23/02:33:38.815 [{}] [https-jsse-nio-443-exec-293] DEBUG domain.FlatViewJobcontrolController - 2023-06-23/02:33:38.815 [{}] [https-jsse-nio-443-exec-293] DEBUG domain.FlatViewJobcontrolController - jobAndTriggerQuery .. select e.SAVRESPONSE, e.JOBENDDATE as prev_fire_time, qt.job_name, qt.job_group, qt.trigger_name,qt.trigger_group,qt.next_fire_time, qct.CRON_EXPRESSION from qrtz_triggers qt left join ecmimportjob e on e.TRIGGERNAME=qt.TRIGGER_NAME left join qrtz_cron_triggers qct on qct.TRIGGER_NAME = qt.TRIGGER_NAME where e.JOBID in(1327863,1418500,1398120,1277015,1380609,1380605,1418918,1418505,1419071,1418472,1419007,1418536,1419086,1409837,1365220,1264525,1264551,1264521,1418985,1419173,1419174,1418578,1418577,1396815,1371055,1371054,1283982,1414508,1419159,1294556,1418875,1343542,1412401,1272084,1353858,1419175,1335384,1278490,1406951,1413868,1409861,1418917,1418920,1418936,1411525,1414905,1383052,1418891,1353857,1353859,1305268,1289138,1288457,1419006,1418919,1417605,1386318,1397773,1311213,1311226,1418974,1418961,1383758,1395684,1418948,1418937,1414982,1414997,1415095,1414949,1414895,1418278,1282432,1310393,1383970,1385042,1379291,1371046,1410642,1407299,1408772,1283983,1412718,1407370,1385565,1268085,1362637,1353424,1342683,1358888,1358892,1358887) and qt.job_name != 'WSBlockingRetryJob' AND qt.job_group != 'BaseLine' and qt.job_name !='RoleAccessMismatchJob' Order by qt.next_fire_time desc 2023-06-23/02:33:38.815 [{}] [https-jsse-nio-443-exec-293] DEBUG domain.FlatViewJobcontrolController - 2023-06-23/02:33:38.815 [{}] [https-jsse-nio-443-exec-293] DEBUG domain.FlatViewJobcontrolController - onlyTriggerQuery .. select qt.job_name, qt.job_group, qt.trigger_name, qt.trigger_group, qt.next_fire_time, qct.CRON_EXPRESSION from qrtz_triggers qt left join qrtz_cron_triggers qct on qct.TRIGGER_NAME = qt.TRIGGER_NAME where 1=1 and qt.job_name not in ('AnalyticsJob','AnalyticsESJob') and qt.job_name not in ('TransportJob') and qt.job_name != 'WSBlockingRetryJob' AND qt.job_group != 'BaseLine' and qt.job_name !='RoleAccessMismatchJob' Order by qt.next_fire_time desc 2023-06-23/02:33:38.819 [{}] [https-jsse-nio-443-exec-293] DEBUG domain.FlatViewJobcontrolController - Before fetching jobEnddate and SavResponse from EcmImportJob first element from qrtzTriggerDataList : [job_name:CustomQueryJob, job_group:utility, trigger_name:Post_HR_Import_Processing, trigger_group:GRAILS_JOBS, next_fire_time:4102358400000, CRON_EXPRESSION:0 0 0 31 DEC ? 2099] 2023-06-23/02:33:38.819 [{}] [https-jsse-nio-443-exec-293] DEBUG domain.FlatViewJobcontrolController - After fetching jobEnddate and SavResponse from EcmImportJob first element from qrtzTriggerDataList : [job_name:CustomQueryJob, job_group:utility, trigger_name:Post_HR_Import_Processing, trigger_group:GRAILS_JOBS, next_fire_time:4102358400000, CRON_EXPRESSION:0 0 0 31 DEC ? 2099, SAVRESPONSE:Success, prev_fire_time:2023-01-23 20:34:00.0] 2023-06-23/02:33:38.819 [{}] [https-jsse-nio-443-exec-293] DEBUG domain.FlatViewJobcontrolController - totalData 147 2023-06-23/02:33:38.887 [{}] [https-jsse-nio-443-exec-293] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:38.887 [{}] [https-jsse-nio-443-exec-293] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:38.887 [{}] [https-jsse-nio-443-exec-293] DEBUG access.ExceptionTranslationFilter - Chain processed normally 2023-06-23/02:33:38.887 [{}] [https-jsse-nio-443-exec-293] DEBUG context.SecurityContextPersistenceFilter - SecurityContextHolder now cleared, as request processing completed 2023-06-23/02:33:41.911 [{}] [quartzScheduler_Worker-11] DEBUG services.JobManagementGuardRailService - Query to get current executing Job : select job_name,trigger_name,entry_id,fired_time,trigger_group from qrtz_fired_triggers 2023-06-23/02:33:41.912 [{}] [quartzScheduler_Worker-11] DEBUG services.JobManagementGuardRailService - Exit getCurrentlyExecutingJobs 2023-06-23/02:33:41.912 [{}] [quartzScheduler_Worker-11] DEBUG services.JobManagementGuardRailService - allExecutingJobs :[[job_name:SapImportJob, trigger_name:MT_2467ce2qmhcec, entry_id:NON_CLUSTERED1686324827786, fired_time:1687487616876, trigger_group:MANUAL_TRIGGER]] 2023-06-23/02:33:41.912 [{}] [quartzScheduler_Worker-11] DEBUG services.JobManagementGuardRailService - SapImportJob not available in the jobsConfig.samejobtype 2023-06-23/02:33:41.912 [{}] [quartzScheduler_Worker-11] DEBUG services.JobManagementGuardRailService - Only one instance is running.. Trigger Name : Cloudflare_accounts_Import 2023-06-23/02:33:41.912 [{}] [quartzScheduler_Worker-11] DEBUG services.JobManagementGuardRailService - Inside validateRunningJobOfDifferentType 2023-06-23/02:33:41.912 [{}] [quartzScheduler_Worker-11] DEBUG services.JobManagementGuardRailService - Conflicting Groups Map : [UserImportJob:UserImportFullJob,UserImportIncrementalJob,SchemaUserJob, UserImportIncrementalJob:UserImportJob,UserImportFullJob,SchemaUserJob, UserImportFullJob:UserImportJob,UserImportIncrementalJob,SchemaUserJob, SchemaUserJob:UserImportJob,UserImportFullJob,UserImportIncrementalJob, ApplicationDataImportJob:SapImportJob, SapImportJob:ApplicationDataImportJob] 2023-06-23/02:33:41.912 [{}] [quartzScheduler_Worker-11] DEBUG services.JobManagementGuardRailService - Conflicting job group found for SapImportJob 2023-06-23/02:33:41.912 [{}] [quartzScheduler_Worker-11] DEBUG services.JobManagementGuardRailService - Checking if any of the currently running Jobs belongs to conflicting Job Group of SapImportJob 2023-06-23/02:33:41.912 [{}] [quartzScheduler_Worker-11] DEBUG services.JobManagementGuardRailService - validateRunningJobOfDifferentType result : true 2023-06-23/02:33:41.912 [{}] [quartzScheduler_Worker-11] DEBUG services.JobManagementGuardRailService - The SapImportJob is not a part of userimportjobs 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG jobs.SapImportJob - Calling externalConnectionCallService 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG jobs.SapImportJob - SAP IMPORT Job ID - 1419176 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - START INVOKING EXTERNAL CONNECTION 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=tabDetail Value=cronexpression::0 15 10 * * ? 2099 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=UpdateUserJSON Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=SendOtpJSON Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=accessfilteraccount Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=ENDPOINTS_FILTER Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=startdate Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=ImportUserJSON Value={ "connection": "userAuth", "url": "https://api.cloudflare.com/client/v4/accounts/09fd3a16b2b05b606bff7d91b2b9a4d7", "httpMethod": "GET", "httpHeaders": { "Accept": "application/json" }, "userResponsePath": "results", "colsToPropsMap": { "accountName": "#CONST#${List responseList = response.results; int count = 0; int size = responseList.size(); Iterator iterator = responseList.iterator(); while (iterator.hasNext()){count++; Map dataMap = iterator.next(); if (dataMap.user != null){return dataMap.user.id;}}}~#~char", "customproperty15": "#CONST#${List responseList = response.results; int count = 0; int size = responseList.size(); Iterator iterator = responseList.iterator(); while (iterator.hasNext()){count++; Map dataMap = iterator.next(); if (dataMap.user != null){return dataMap.user.email;}}}~#~char" } } 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=EnableAccountJSON Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=PasswdPolicyJSON Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=accountsoraccess Value=accounts 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=importTables Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=TicketStatusJSON Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=ConfigJSON Value={ "showLogs": true, "connectionTimeoutConfig": { "timeout": 300, "retryWait": 500 } } 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=AddAccessJSON Value={ "call": [{ "name": "call1", "connection": "userAuth", "url": "https://api.cloudflare.com/client/v4/accounts/09fd3a16b2b05b606bff7d91b2b9a4d7/members/${account.accountID}", "httpMethod": "PUT", "httpParams": { "accounts": { "accountName": "${account.accountID}", "status": "pending", "roles": "${entitlementValue.entitlementID}" } }, "httpHeaders": { "Authorization": "${access_token}" }, "httpContentType": "application/json", "successResponses": { "statusCode": [ 200, 201 ] }, "unsuccessResponses": { "statusCode": [ 400, 401, 404, 405, 500 ] } }] } 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=RemoveFFIDAccessJSON Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=audittype Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=UpdateAccountJSON Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=maxfilesize Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=securitysystems Value=346 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=refreshendpoint Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=jobnamelabel Value=Application Data Import (Single Threaded) 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=ImportAccountEntJSON Value={ "accountParams": { "connection": "userAuth", "processingType": "SequentialAndIterative", "call": { "call1": { "callOrder": 0, "stageNumber": 0, "http": { "url": "https://api.cloudflare.com/client/v4/accounts/09fd3a16b2b05b606bff7d91b2b9a4d7/members", "httpHeaders": { "Authorization": "Bearer ${access_token}", "Accept": "application/json" }, "httpContentType": "application/json", "httpMethod": "GET" }, "listField": "result", "keyField": "name", "colsToPropsMap": { "name": "user.email~#~char", "accountID": "user.id~#~char", "customproperty2": "user.id~#~char", "customproperty7": "roles[0].id~#~char", "customproperty31": "STORE#ACC#ENT#MAPPINGINFO~#~char" } } }, "pagination": { "nextUrl": { "nextUrlPath": "${response.completeResponseMap.page_page < response.completeResponseMap.total_count ? 'https://api.cloudflare.com/client/v4/accounts/09fd3a16b2b05b606bff7d91b2b9a4d7/members?startIndex=' + (response.completeResponseMap.page_page + 1) : 'null'}" } }, "acctEntMappings": { "roles": { "listPath": "roles", "idPath": "id", "keyField": "entitlementID", "importAsEntitlement": false } } }, "entitlementParams": { "connection": "userAuth", "processingType": "SequentialAndIterative", "entTypes": { "roles": { "entTypeOrder": 0, "entTypeLabels": {}, "call": { "call1": { "callOrder": 0, "stageNumber": 0, "http": { "url": "https://api.cloudflare.com/client/v4/accounts/09fd3a16b2b05b606bff7d91b2b9a4d7/members", "httpHeaders": { "Authorization": "Bearer ${access_token}", "Accept": "application/json" }, "httpContentType": "application/json", "httpMethod": "GET" }, "listField": "result", "keyField": "entitlement_value", "colsToPropsMap": { "entitlementID": "roles.id~#~char", "entitlement_value": "roles.id~#~char", "displayname": "roles.name~#~char", "customproperty1": "deleted~#~char", "customproperty2": "created_at~#~char", "customproperty3": "updated_at~#~char" }, "disableDeletedEntitlements": true } } } } }, "acctEntParams": { "processingType": "acctToEntMapping" } } 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=AddFFIDAccessJSON Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=CreateAccountJSON Value={ "accountIdPath": "call1.message.email", "responseColsToPropsMap": {}, "call": [ { "name": "call1", "connection": "userAuth", "url": "https://api.cloudflare.com/client/v4/accounts/09fd3a16b2b05b606bff7d91b2b9a4d7/members", "httpMethod": "POST", "httpParams": "{ \"email\": \"${user.email}\", \"status\": \"pending\", \"roles\": [\"${entitlementValue.entitlementID}\"] } }", "httpHeaders": { "ContentType": "application/json", "Authorization": "1tA5dFqjOVAUxI_GLTSN6-4n3eko9i6zw9s6MQSt" }, "httpContentType": "application/json", "successResponses": { "statusCode": [200] } } ] } 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=connectionname Value=Cloudflare 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=CreateTicketJSON Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=jobGroup Value=DATA 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=selectedImportoption Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=refreshLinks Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=enddate Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=requestHostURL Value=ssm-devv5-stjude.saviyntcloud.com 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=cronexpression Value=0 15 10 * * ? 2099 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=registerwebhooksfilter Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=fireTime Value=1687487616876 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=ValidateOtpJSON Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=org.grails.plugins.quartz.grailsJobName Value=SapImportJob 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=STATUS_THRESHOLD_CONFIG Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=connectionid Value=65 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=connectiontype Value=REST 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=RemoveAccountJSON Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=ChangePassJSON Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=accountfilter Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=import_config Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=updateUser Value=mkumar86admin 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=incrementalstartdatetime Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=MODIFYUSERDATAJSON Value= 2023-06-23/02:33:41.925 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=RemoveAccessJSON Value= 2023-06-23/02:33:41.926 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=DisableAccountJSON Value= 2023-06-23/02:33:41.926 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=triggerType Value=MANUAL_TRIGGER 2023-06-23/02:33:41.926 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=jobtriggername Value=Cloudflare_accounts_Import 2023-06-23/02:33:41.926 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=fullorincremental Value=full 2023-06-23/02:33:41.926 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - Key=incrementalenddatetime Value= 2023-06-23/02:33:41.928 [{}] [quartzScheduler_Worker-11] DEBUG services.ImportUtilityService - Endpoint 'CloudFlare3' found for the Security System 'Cloudflare' with Endpointkey: 392 2023-06-23/02:33:41.928 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - *******endpoint=CloudFlare3 and secSystem=Cloudflare****************** 2023-06-23/02:33:41.929 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - Job Type : full 2023-06-23/02:33:41.929 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - Import-Type : accounts 2023-06-23/02:33:41.929 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - connectionid: 65 2023-06-23/02:33:41.929 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - Loading Start for Security System - Cloudflare 2023-06-23/02:33:41.929 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - Finding Endpoint for the security System - Cloudflare 2023-06-23/02:33:41.930 [{}] [quartzScheduler_Worker-11] DEBUG services.ImportUtilityService - Endpoint 'CloudFlare3' found for the Security System 'Cloudflare' with Endpointkey: 392 2023-06-23/02:33:41.962 [{}] [quartzScheduler_Worker-11] DEBUG services.ImportUtilityService - EntitlementType 'roles' for Endpoint 'CloudFlare3' found with EntitlementTypekey - 879 2023-06-23/02:33:41.963 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - processAccountsFullBySequentialAndIterative - params.origParams.stageNumber : null 2023-06-23/02:33:41.963 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - callStageNumber : 0 2023-06-23/02:33:41.963 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - callStageNumber: 0 2023-06-23/02:33:41.963 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - stageNumber: null 2023-06-23/02:33:41.963 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - processAccountsFullBySequentialAndIterative - Not Multitrigger call 2023-06-23/02:33:41.964 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - Inside processAccountsFinal. 2023-06-23/02:33:41.964 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - Inside processAccounts. 2023-06-23/02:33:42.035 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - Inside pullObjectsByRest 2023-06-23/02:33:42.036 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestUtilService - Got showLogs = true 2023-06-23/02:33:42.036 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - Calling Webservice Url - https://api.cloudflare.com/client/v4/accounts/09fd3a16b2b05b606bff7d91b2b9a4d7/members with httpParams - null 2023-06-23/02:33:42.036 [{}] [quartzScheduler_Worker-11] DEBUG services.HttpClientUtilityService - Enter getTimeOutConfig 2023-06-23/02:33:42.036 [{}] [quartzScheduler_Worker-11] DEBUG services.HttpClientUtilityService - connectionType: REST 2023-06-23/02:33:42.036 [{}] [quartzScheduler_Worker-11] DEBUG services.HttpClientUtilityService - connectionTimeoutConfig before guardRail validation: [timeout:300, retryWait:500] 2023-06-23/02:33:42.036 [{}] [quartzScheduler_Worker-11] DEBUG services.HttpClientUtilityService - validateAndGetTimeoutConfigVal - INFO: retryWait value (500) is more than guardRail max value, setting it to guardRail max value 100 seconds 2023-06-23/02:33:42.036 [{}] [quartzScheduler_Worker-11] DEBUG services.HttpClientUtilityService - validateAndGetTimeoutConfigVal - INFO: retryCount value is null, setting it to default value 3 2023-06-23/02:33:42.036 [{}] [quartzScheduler_Worker-11] DEBUG services.HttpClientUtilityService - Final connectionTimeoutConfig after guardRail validation: [connectionTimeout:300, readTimeout:300, retryCount:3, retryWait:100] 2023-06-23/02:33:42.036 [{}] [quartzScheduler_Worker-11] DEBUG services.HttpClientUtilityService - isFipsEnabled = false 2023-06-23/02:33:42.036 [{}] [quartzScheduler_Worker-11] DEBUG services.HttpClientUtilityService - getHttpClient - sslParams : null 2023-06-23/02:33:42.036 [{}] [quartzScheduler_Worker-11] DEBUG services.HttpClientUtilityService - getHttpClient - proxyParams : null 2023-06-23/02:33:42.036 [{}] [quartzScheduler_Worker-11] DEBUG services.HttpClientUtilityService - getHttpClient - sslSocketFactory : null 2023-06-23/02:33:42.040 [{}] [quartzScheduler_Worker-11] DEBUG services.HttpClientUtilityService - setting connection timeout to 300 seconds and request timeout to 300 seconds 2023-06-23/02:33:42.041 [{}] [quartzScheduler_Worker-11] DEBUG services.HttpClientUtilityService - getHttpClient - HttpClientBuilder.create().build() called. 2023-06-23/02:33:42.597 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestUtilService - Got showLogs = true 2023-06-23/02:33:42.598 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - Got Webservice API Response: [headers:[Date: Fri, 23 Jun 2023 02:33:42 GMT, Content-Type: application/json, Transfer-Encoding: chunked, Connection: keep-alive, CF-Ray: 7db953e5db2a12b7-IAD, CF-Cache-Status: DYNAMIC, Allow: GET, POST, Cache-Control: private,no-cache,no-store, Set-Cookie: __cflb=0H28vgHxwvgAQtjUGUFqYFDiSDreGJnUrLBFE6idGoo; SameSite=Lax; path=/; expires=Fri, 23-Jun-23 05:03:43 GMT; HttpOnly, Vary: Accept-Encoding, pragma: no-cache, x-envoy-upstream-service-time: 171, Set-Cookie: __cfruid=a6eca987163678caa6045c0b505bc42a17d5c89b-1687487622; path=/; domain=.api.cloudflare.com; HttpOnly; Secure; SameSite=None, Server: cloudflare], responseText:{"result":[{"id":"b207a793c9bf26622777038582c9692c","user":{"id":"14aaf9febdce4ef805a119fb7f682d84","first_name":null,"last_name":null,"email":"ddavenpo@stjude.org","two_factor_authentication_enabled":false},"status":"accepted","api_access_enabled":null,"policies":[{"id":"6aadbe933e6941a49fcfab127c1792d6","access":"allow","permission_groups":[{"id":"8e23b19e4e0d44c29d239c5688ba8cbb","name":"Super Administrator - All Privileges","meta":{"description":"Can edit any Cloudflare setting, make purchases, update billing, and manage memberships. Super Administrators can revoke the access of other Super Administrators.","editable":"false","label":"all_privileges","scopes":"com.cloudflare.api.account"}},{"id":"201e1f6a044241d9b27fe344e1baee06","name":"Administrator","meta":{"description":"Can access the full account, except for membership management and billing.","editable":"false","label":"admin","scopes":"com.cloudflare.api.account"}}],"resource_groups":[{"id":"5f9d7bdd31764dd1b29d43ff3ea59ae3","name":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","meta":{"editable":"false"},"scope":{"key":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","objects":[{"key":"*"}]}}]}],"roles":[{"id":"33666b9c79b9a5273fc7344ff42f953d","name":"Super Administrator - All Privileges","description":"Can edit any Cloudflare setting, make purchases, update billing, and manage memberships. Super Administrators can revoke the access of other Super Administrators.","permissions":{"access":{"edit":true,"read":true},"analytics":{"edit":false,"read":true},"app":{"edit":true,"read":false},"auditlogs":{"edit":false,"read":true},"billing":{"edit":true,"read":true},"blocks":{"edit":true,"read":true},"cache_purge":{"edit":true,"read":false},"dash_sso":{"edit":true,"read":true},"dex":{"edit":true,"read":true},"dns_records":{"edit":true,"read":true},"fbm":{"edit":true,"read":true},"fbm_acc":{"edit":true,"read":false},"healthchecks":{"edit":true,"read":true},"http_applications":{"edit":true,"read":true},"image":{"edit":true,"read":true},"integration":{"edit":true,"install":true,"read":true},"lb":{"edit":true,"read":true},"legal":{"edit":true,"read":true},"logs":{"edit":true,"read":true},"magic":{"edit":true,"read":true},"member":{"edit":true,"read":true},"organization":{"edit":true,"read":true},"ssl":{"edit":true,"read":true},"stream":{"edit":true,"read":true},"subscription":{"edit":true,"read":true},"teams":{"edit":true,"pii":true,"read":true,"report":true},"waf":{"edit":true,"read":true},"waitingroom":{"edit":true,"read":true},"web3":{"edit":true,"read":true},"worker":{"edit":true,"read":true},"zaraz":{"edit":true,"publish":true,"read":true},"zone":{"edit":true,"read":true},"zone_settings":{"edit":true,"read":true},"zone_versioning":{"edit":true,"read":true}}},{"id":"05784afa30c1afe1440e79d9351c7430","name":"Administrator","description":"Can access the full account, except for membership management and billing.","permissions":{"access":{"edit":true,"read":true},"analytics":{"edit":false,"read":true},"app":{"edit":true,"read":false},"auditlogs":{"edit":false,"read":true},"billing":{"edit":false,"read":true},"blocks":{"edit":true,"read":true},"cache_purge":{"edit":true,"read":false},"dex":{"edit":true,"read":true},"dns_records":{"edit":true,"read":true},"fbm":{"edit":true,"read":true},"healthchecks":{"edit":true,"read":true},"http_applications":{"edit":true,"read":true},"image":{"edit":true,"read":true},"integration":{"edit":true,"install":true,"read":true},"lb":{"edit":true,"read":true},"legal":{"edit":false,"read":true},"logs":{"edit":true,"read":true},"magic":{"edit":true,"read":true},"member":{"edit":false,"read":true},"organization":{"edit":true,"read":true},"ssl":{"edit":true,"read":true},"stream":{"edit":true,"read":true},"subscription":{"edit":true,"read":true},"teams":{"edit":true,"read":true,"report":true},"waf":{"edit":true,"read":true},"waitingroom":{"edit":true,"read":true},"web3":{"edit":true,"read":true},"worker":{"edit":true,"read":true},"zaraz":{"edit":true,"publish":true,"read":true},"zone":{"edit":true,"read":true},"zone_settings":{"edit":true,"read":true},"zone_versioning":{"edit":true,"read":true}}}]},{"id":"03dce88a6a63b01bfefffa082e54a550","user":{"id":"11bc2c3b645f214d20118ce460e3fb92","first_name":null,"last_name":null,"email":"jtaylor7@stjude.org","two_factor_authentication_enabled":false},"status":"accepted","api_access_enabled":null,"policies":[{"id":"d31131eefa1c4361b8beb6f866203030","access":"allow","permission_groups":[{"id":"8e23b19e4e0d44c29d239c5688ba8cbb","name":"Super Administrator - All Privileges","meta":{"description":"Can edit any Cloudflare setting, make purchases, update billing, and manage memberships. Super Administrators can revoke the access of other Super Administrators.","editable":"false","label":"all_privileges","scopes":"com.cloudflare.api.account"}},{"id":"201e1f6a044241d9b27fe344e1baee06","name":"Administrator","meta":{"description":"Can access the full account, except for membership management and billing.","editable":"false","label":"admin","scopes":"com.cloudflare.api.account"}}],"resource_groups":[{"id":"5f9d7bdd31764dd1b29d43ff3ea59ae3","name":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","meta":{"editable":"false"},"scope":{"key":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","objects":[{"key":"*"}]}}]}],"roles":[{"id":"33666b9c79b9a5273fc7344ff42f953d","name":"Super Administrator - All Privileges","description":"Can edit any Cloudflare setting, make purchases, update billing, and manage memberships. Super Administrators can revoke the access of other Super Administrators.","permissions":{"access":{"edit":true,"read":true},"analytics":{"edit":false,"read":true},"app":{"edit":true,"read":false},"auditlogs":{"edit":false,"read":true},"billing":{"edit":true,"read":true},"blocks":{"edit":true,"read":true},"cache_purge":{"edit":true,"read":false},"dash_sso":{"edit":true,"read":true},"dex":{"edit":true,"read":true},"dns_records":{"edit":true,"read":true},"fbm":{"edit":true,"read":true},"fbm_acc":{"edit":true,"read":false},"healthchecks":{"edit":true,"read":true},"http_applications":{"edit":true,"read":true},"image":{"edit":true,"read":true},"integration":{"edit":true,"install":true,"read":true},"lb":{"edit":true,"read":true},"legal":{"edit":true,"read":true},"logs":{"edit":true,"read":true},"magic":{"edit":true,"read":true},"member":{"edit":true,"read":true},"organization":{"edit":true,"read":true},"ssl":{"edit":true,"read":true},"stream":{"edit":true,"read":true},"subscription":{"edit":true,"read":true},"teams":{"edit":true,"pii":true,"read":true,"report":true},"waf":{"edit":true,"read":true},"waitingroom":{"edit":true,"read":true},"web3":{"edit":true,"read":true},"worker":{"edit":true,"read":true},"zaraz":{"edit":true,"publish":true,"read":true},"zone":{"edit":true,"read":true},"zone_settings":{"edit":true,"read":true},"zone_versioning":{"edit":true,"read":true}}},{"id":"05784afa30c1afe1440e79d9351c7430","name":"Administrator","description":"Can access the full account, except for membership management and billing.","permissions":{"access":{"edit":true,"read":true},"analytics":{"edit":false,"read":true},"app":{"edit":true,"read":false},"auditlogs":{"edit":false,"read":true},"billing":{"edit":false,"read":true},"blocks":{"edit":true,"read":true},"cache_purge":{"edit":true,"read":false},"dex":{"edit":true,"read":true},"dns_records":{"edit":true,"read":true},"fbm":{"edit":true,"read":true},"healthchecks":{"edit":true,"read":true},"http_applications":{"edit":true,"read":true},"image":{"edit":true,"read":true},"integration":{"edit":true,"install":true,"read":true},"lb":{"edit":true,"read":true},"legal":{"edit":false,"read":true},"logs":{"edit":true,"read":true},"magic":{"edit":true,"read":true},"member":{"edit":false,"read":true},"organization":{"edit":true,"read":true},"ssl":{"edit":true,"read":true},"stream":{"edit":true,"read":true},"subscription":{"edit":true,"read":true},"teams":{"edit":true,"read":true,"report":true},"waf":{"edit":true,"read":true},"waitingroom":{"edit":true,"read":true},"web3":{"edit":true,"read":true},"worker":{"edit":true,"read":true},"zaraz":{"edit":true,"publish":true,"read":true},"zone":{"edit":true,"read":true},"zone_settings":{"edit":true,"read":true},"zone_versioning":{"edit":true,"read":true}}}]},{"id":"18cc0b8f5641b4022eea5fb2acb74152","user":{"id":"babc6cf514bededcf9567b0261fc0fe8","first_name":null,"last_name":null,"email":"derek@davenport.cloud","two_factor_authentication_enabled":true},"status":"accepted","api_access_enabled":null,"policies":[{"id":"6952ec98634d408793269e284446f2fc","access":"allow","permission_groups":[{"id":"8e23b19e4e0d44c29d239c5688ba8cbb","name":"Super Administrator - All Privileges","meta":{"description":"Can edit any Cloudflare setting, make purchases, update billing, and manage memberships. Super Administrators can revoke the access of other Super Administrators.","editable":"false","label":"all_privileges","scopes":"com.cloudflare.api.account"}}],"resource_groups":[{"id":"5f9d7bdd31764dd1b29d43ff3ea59ae3","name":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","meta":{"editable":"false"},"scope":{"key":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","objects":[{"key":"*"}]}}]}],"roles":[{"id":"33666b9c79b9a5273fc7344ff42f953d","name":"Super Administrator - All Privileges","description":"Can edit any Cloudflare setting, make purchases, update billing, and manage memberships. Super Administrators can revoke the access of other Super Administrators.","permissions":{"access":{"edit":true,"read":true},"analytics":{"edit":false,"read":true},"app":{"edit":true,"read":false},"auditlogs":{"edit":false,"read":true},"billing":{"edit":true,"read":true},"blocks":{"edit":true,"read":true},"cache_purge":{"edit":true,"read":false},"dash_sso":{"edit":true,"read":true},"dex":{"edit":true,"read":true},"dns_records":{"edit":true,"read":true},"fbm":{"edit":true,"read":true},"fbm_acc":{"edit":true,"read":false},"healthchecks":{"edit":true,"read":true},"http_applications":{"edit":true,"read":true},"image":{"edit":true,"read":true},"integration":{"edit":true,"install":true,"read":true},"lb":{"edit":true,"read":true},"legal":{"edit":true,"read":true},"logs":{"edit":true,"read":true},"magic":{"edit":true,"read":true},"member":{"edit":true,"read":true},"organization":{"edit":true,"read":true},"ssl":{"edit":true,"read":true},"stream":{"edit":true,"read":true},"subscription":{"edit":true,"read":true},"teams":{"edit":true,"pii":true,"read":true,"report":true},"waf":{"edit":true,"read":true},"waitingroom":{"edit":true,"read":true},"web3":{"edit":true,"read":true},"worker":{"edit":true,"read":true},"zaraz":{"edit":true,"publish":true,"read":true},"zone":{"edit":true,"read":true},"zone_settings":{"edit":true,"read":true},"zone_versioning":{"edit":true,"read":true}}}]},{"id":"f7b78b38d7639b4f7ae4b01d58c19740","user":{"id":"8143e975fb3ed14b85458749ae5f26fe","first_name":null,"last_name":null,"email":"cmcleod@stjude.org","two_factor_authentication_enabled":false},"status":"accepted","api_access_enabled":null,"policies":[{"id":"4c565c66ad5e47e99bcdc51ba76db51e","access":"allow","permission_groups":[{"id":"132c52e7e6654b999c183cfcbafd37d7","name":"Domain DNS","meta":{"description":"Grants access to edit DNS settings for domains in an account.","editable":"false","label":"domain_dns_admin","scopes":"com.cloudflare.api.account.zone"}},{"id":"a5e5061418ea445fbba04aac57f359a8","name":"Domain Administrator","meta":{"description":"Grants full access to domains in an account, and read-only access to account-wide Firewall, Access, and Worker resources.","editable":"false","label":"domain_admin","scopes":"com.cloudflare.api.account.zone"}}],"resource_groups":[{"id":"83c1036b60fa44ee9a9aec047d7cd3c6","name":"St. Jude Cloud","scope":{"key":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","objects":[{"key":"com.cloudflare.api.account.zone.98fd0fce6bcb7198ba57832e29591b27"},{"key":"com.cloudflare.api.account.zone.fe280cd86eeba94b548458f3b66dc3e6"},{"key":"com.cloudflare.api.account.zone.fb3d62c3d780507bdb023e7e2e496638"},{"key":"com.cloudflare.api.account.zone.f20e0841acc46384f0c1192068fa9d75"},{"key":"com.cloudflare.api.account.zone.f00aa761f724efcb411dbe21f50df065"},{"key":"com.cloudflare.api.account.zone.e7e1e73a910d84ce0bfa1b201248ab11"},{"key":"com.cloudflare.api.account.zone.b82eed7d46cef9095c5d536c58150413"},{"key":"com.cloudflare.api.account.zone.a66827a7524a483af86bcf496feb8dfd"},{"key":"com.cloudflare.api.account.zone.865e871bba168bcd7a5d80e04628ee1a"},{"key":"com.cloudflare.api.account.zone.6e37039158c3f95dd29e2237305eb69a"},{"key":"com.cloudflare.api.account.zone.585ca59df699ba7698748de41c299b8c"},{"key":"com.cloudflare.api.account.zone.4b435bf5f96d1b7475bf803b6ef4100f"},{"key":"com.cloudflare.api.account.zone.4a7f18c114fd50b5bb1c48bddc745569"},{"key":"com.cloudflare.api.account.zone.242efd54f726adea92615d0d2022b239"},{"key":"com.cloudflare.api.account.zone.21a1d44d3fdd22b1fdc2e7a48926a853"},{"key":"com.cloudflare.api.account.zone.13fa5ddfca0c39f7f968005d3b7ae4e0"},{"key":"com.cloudflare.api.account.zone.0b79c64451c35e687b4522097826740e"}]}}]}],"roles":[{"id":"132c52e7e6654b999c183cfcbafd37d7","name":"Domain DNS","description":"Grants access to edit DNS settings for domains in an account.","permissions":{"analytics":{"edit":false,"read":true},"billing":{"edit":false,"read":true},"dns_records":{"edit":true,"read":true},"organization":{"edit":false,"read":true},"subscription":{"edit":false,"read":true},"zone":{"edit":false,"read":true},"zone_settings":{"edit":false,"read":true}}},{"id":"a5e5061418ea445fbba04aac57f359a8","name":"Domain Administrator","description":"Grants full access to domains in an account, and read-only access to account-wide Firewall, Access, and Worker resources.","permissions":{"access":{"edit":true,"read":true},"analytics":{"edit":false,"read":true},"app":{"edit":true,"read":false},"billing":{"edit":true,"read":true},"cache_purge":{"edit":true,"read":false},"dns_records":{"edit":true,"read":true},"healthchecks":{"edit":true,"read":true},"lb":{"edit":true,"read":true},"logs":{"edit":true,"read":true},"organization":{"edit":true,"read":true},"ssl":{"edit":true,"read":true},"subscription":{"edit":true,"read":true},"waf":{"edit":true,"read":true},"waitingroom":{"edit":true,"read":true},"web3":{"edit":true,"read":true},"worker":{"edit":true,"read":true},"zaraz":{"edit":true,"publish":true,"read":true},"zone":{"edit":true,"read":true},"zone_settings":{"edit":true,"read":true}}}]},{"id":"f74f8be8e7fef363de66a6f8b586059b","user":{"id":"b4e47765091698ee4085ae5b4ab6e5d2","first_name":null,"last_name":null,"email":"schapman@stjude.org","two_factor_authentication_enabled":false},"status":"accepted","api_access_enabled":null,"policies":[{"id":"a96a8081a6064126ad0eb00c8c1aaa9b","access":"allow","permission_groups":[{"id":"dbb7213ddb854cdc9d015febfebb290d","name":"Load Balancer","meta":{"description":"Can edit Load Balancers, Pools, Origins, and Health Checks.","editable":"false","label":"load_balancer_admin","scopes":"com.cloudflare.api.account"}},{"id":"49ce85367bae433b9f0717ed4fea5c74","name":"DNS","meta":{"description":"Can edit DNS records.","editable":"false","label":"dns_admin","scopes":"com.cloudflare.api.account"}},{"id":"f4df4017f4334b30a868883046a18a9d","name":"Administrator Read Only","meta":{"description":"Can access the full account in read-only mode.","editable":"false","label":"admin_readonly","scopes":"com.cloudflare.api.account"}}],"resource_groups":[{"id":"5f9d7bdd31764dd1b29d43ff3ea59ae3","name":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","meta":{"editable":"false"},"scope":{"key":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","objects":[{"key":"*"}]}}]}],"roles":[{"id":"c61d4237ab1c08a3d11feb6bd5e91c5a","name":"Load Balancer","description":"Can edit Load Balancers, Pools, Origins, and Health Checks.","permissions":{"auditlogs":{"edit":false,"read":true},"healthchecks":{"edit":true,"read":true},"lb":{"edit":true,"read":true},"legal":{"edit":false,"read":true},"organization":{"edit":false,"read":true},"subscription":{"edit":false,"read":true},"zone":{"edit":false,"read":true},"zone_settings":{"edit":false,"read":true}}},{"id":"069fe803647ed3609e93d041d5df6050","name":"DNS","description":"Can edit DNS records.","permissions":{"auditlogs":{"edit":false,"read":true},"dns_records":{"edit":true,"read":true},"legal":{"edit":false,"read":true},"organization":{"edit":false,"read":true},"subscription":{"edit":false,"read":true},"zone":{"edit":false,"read":true},"zone_settings":{"edit":false,"read":true}}},{"id":"f2b20eaa1a5d4af42b53ac16238c99c7","name":"Administrator Read Only","description":"Can access the full account in read-only mode.","permissions":{"access":{"edit":false,"read":true},"analytics":{"edit":false,"read":true},"auditlogs":{"edit":false,"read":true},"billing":{"edit":false,"read":true},"blocks":{"edit":false,"read":true},"dex":{"edit":false,"read":true},"dns_records":{"edit":false,"read":true},"fbm":{"edit":false,"read":true},"healthchecks":{"edit":false,"read":true},"http_applications":{"edit":false,"read":true},"image":{"edit":false,"read":true},"integration":{"edit":false,"read":true},"lb":{"edit":false,"read":true},"legal":{"edit":false,"read":true},"logs":{"edit":false,"read":true},"magic":{"edit":false,"read":true},"member":{"edit":false,"read":true},"organization":{"edit":false,"read":true},"ssl":{"edit":false,"read":true},"stream":{"edit":false,"read":true},"subscription":{"edit":false,"read":true},"teams":{"edit":false,"read":true,"report":true},"waf":{"edit":false,"read":true},"waitingroom":{"edit":false,"read":true},"web3":{"edit":false,"read":true},"worker":{"edit":false,"read":true},"zaraz":{"edit":false,"read":true},"zone":{"edit":false,"read":true},"zone_settings":{"edit":false,"read":true},"zone_versioning":{"edit":false,"read":true}}}]},{"id":"87bdea1cc854d5522ffe43e3c45ca7d9","user":{"id":"32f94740d405290b796b191c999c8160","first_name":null,"last_name":null,"email":"dalford@stjude.org","two_factor_authentication_enabled":false},"status":"accepted","api_access_enabled":null,"policies":[{"id":"353301c75bf64b4ebc2ba0f2a6310d61","access":"allow","permission_groups":[{"id":"132c52e7e6654b999c183cfcbafd37d7","name":"Domain DNS","meta":{"description":"Grants access to edit DNS settings for domains in an account.","editable":"false","label":"domain_dns_admin","scopes":"com.cloudflare.api.account.zone"}},{"id":"a5e5061418ea445fbba04aac57f359a8","name":"Domain Administrator","meta":{"description":"Grants full access to domains in an account, and read-only access to account-wide Firewall, Access, and Worker resources.","editable":"false","label":"domain_admin","scopes":"com.cloudflare.api.account.zone"}}],"resource_groups":[{"id":"69d2adb4324e407a902944f3d5d12f87","name":"RIS","scope":{"key":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","objects":[{"key":"com.cloudflare.api.account.zone.6412ad7869ec884d3ac1206093f2c033"},{"key":"com.cloudflare.api.account.zone.9bcc20c680ca9e4c9340506fe93c0a83"},{"key":"com.cloudflare.api.account.zone.f2b20d791b765fdae19e2f40b0618661"},{"key":"com.cloudflare.api.account.zone.f00aa761f724efcb411dbe21f50df065"},{"key":"com.cloudflare.api.account.zone.585ca59df699ba7698748de41c299b8c"},{"key":"com.cloudflare.api.account.zone.4a7f18c114fd50b5bb1c48bddc745569"},{"key":"com.cloudflare.api.account.zone.242efd54f726adea92615d0d2022b239"},{"key":"com.cloudflare.api.account.zone.1aec5da29b9fd505bf9f9e1e4ca98f46"}]}}]}],"roles":[{"id":"132c52e7e6654b999c183cfcbafd37d7","name":"Domain DNS","description":"Grants access to edit DNS settings for domains in an account.","permissions":{"analytics":{"edit":false,"read":true},"billing":{"edit":false,"read":true},"dns_records":{"edit":true,"read":true},"organization":{"edit":false,"read":true},"subscription":{"edit":false,"read":true},"zone":{"edit":false,"read":true},"zone_settings":{"edit":false,"read":true}}},{"id":"a5e5061418ea445fbba04aac57f359a8","name":"Domain Administrator","description":"Grants full access to domains in an account, and read-only access to account-wide Firewall, Access, and Worker resources.","permissions":{"access":{"edit":true,"read":true},"analytics":{"edit":false,"read":true},"app":{"edit":true,"read":false},"billing":{"edit":true,"read":true},"cache_purge":{"edit":true,"read":false},"dns_records":{"edit":true,"read":true},"healthchecks":{"edit":true,"read":true},"lb":{"edit":true,"read":true},"logs":{"edit":true,"read":true},"organization":{"edit":true,"read":true},"ssl":{"edit":true,"read":true},"subscription":{"edit":true,"read":true},"waf":{"edit":true,"read":true},"waitingroom":{"edit":true,"read":true},"web3":{"edit":true,"read":true},"worker":{"edit":true,"read":true},"zaraz":{"edit":true,"publish":true,"read":true},"zone":{"edit":true,"read":true},"zone_settings":{"edit":true,"read":true}}}]},{"id":"02208859f1c531346d67e0bb5cf096ec","user":{"id":"2e3f16b70e544c2c57a802486c5884c2","first_name":null,"last_name":null,"email":"awellman@stjude.org","two_factor_authentication_enabled":false},"status":"accepted","api_access_enabled":null,"policies":[{"id":"2bbf82ac37a243c49266b90e86a2879f","access":"allow","permission_groups":[{"id":"132c52e7e6654b999c183cfcbafd37d7","name":"Domain DNS","meta":{"description":"Grants access to edit DNS settings for domains in an account.","editable":"false","label":"domain_dns_admin","scopes":"com.cloudflare.api.account.zone"}},{"id":"a5e5061418ea445fbba04aac57f359a8","name":"Domain Administrator","meta":{"description":"Grants full access to domains in an account, and read-only access to account-wide Firewall, Access, and Worker resources.","editable":"false","label":"domain_admin","scopes":"com.cloudflare.api.account.zone"}}],"resource_groups":[{"id":"098a8d2d39a1474692925b5f750ea03b","name":"St. Jude Global","scope":{"key":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","objects":[{"key":"com.cloudflare.api.account.zone.eb0efa26c6d557544af0fd0e6e055ccd"}]}}]}],"roles":[{"id":"132c52e7e6654b999c183cfcbafd37d7","name":"Domain DNS","description":"Grants access to edit DNS settings for domains in an account.","permissions":{"analytics":{"edit":false,"read":true},"billing":{"edit":false,"read":true},"dns_records":{"edit":true,"read":true},"organization":{"edit":false,"read":true},"subscription":{"edit":false,"read":true},"zone":{"edit":false,"read":true},"zone_settings":{"edit":false,"read":true}}},{"id":"a5e5061418ea445fbba04aac57f359a8","name":"Domain Administrator","description":"Grants full access to domains in an account, and read-only access to account-wide Firewall, Access, and Worker resources.","permissions":{"access":{"edit":true,"read":true},"analytics":{"edit":false,"read":true},"app":{"edit":true,"read":false},"billing":{"edit":true,"read":true},"cache_purge":{"edit":true,"read":false},"dns_records":{"edit":true,"read":true},"healthchecks":{"edit":true,"read":true},"lb":{"edit":true,"read":true},"logs":{"edit":true,"read":true},"organization":{"edit":true,"read":true},"ssl":{"edit":true,"read":true},"subscription":{"edit":true,"read":true},"waf":{"edit":true,"read":true},"waitingroom":{"edit":true,"read":true},"web3":{"edit":true,"read":true},"worker":{"edit":true,"read":true},"zaraz":{"edit":true,"publish":true,"read":true},"zone":{"edit":true,"read":true},"zone_settings":{"edit":true,"read":true}}}]},{"id":"bbb4e307f9bce07871a9368a6e05e512","user":{"id":"3918b7dd0a066f013edcf8f18f0f3408","first_name":null,"last_name":null,"email":"cpacheco@stjude.org","two_factor_authentication_enabled":false},"status":"accepted","api_access_enabled":null,"policies":[{"id":"f5011909a6774b0398e4bed2f9074e8b","access":"allow","permission_groups":[{"id":"0a5ddcbf92a5430599aeec18d2a88ce0","name":"Audit Logs Viewer","meta":{"description":"Can view Audit Logs.","editable":"false","label":"audit_logs_viewer","scopes":"com.cloudflare.api.account"}}],"resource_groups":[{"id":"5f9d7bdd31764dd1b29d43ff3ea59ae3","name":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","meta":{"editable":"false"},"scope":{"key":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","objects":[{"key":"*"}]}}]}],"roles":[{"id":"9dfa4d1b73034f70ad896bf1c26d78f3","name":"Audit Logs Viewer","description":"Can view Audit Logs.","permissions":{"access":{"edit":false,"read":true},"auditlogs":{"edit":false,"read":true},"organization":{"edit":false,"read":true},"zone":{"edit":false,"read":true}}}]},{"id":"f7e7ec2bff71f0151e54f6d48827094b","user":{"id":"6dcf61974a6fe49559cb000b85751d4a","first_name":null,"last_name":null,"email":"mkumar86@stjude.org","two_factor_authentication_enabled":false},"status":"accepted","api_access_enabled":null,"policies":[{"id":"54d31cf1dbbb483fb178dc5187a8ddef","access":"allow","permission_groups":[{"id":"f4df4017f4334b30a868883046a18a9d","name":"Administrator Read Only","meta":{"description":"Can access the full account in read-only mode.","editable":"false","label":"admin_readonly","scopes":"com.cloudflare.api.account"}}],"resource_groups":[{"id":"5f9d7bdd31764dd1b29d43ff3ea59ae3","name":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","meta":{"editable":"false"},"scope":{"key":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","objects":[{"key":"*"}]}}]}],"roles":[{"id":"f2b20eaa1a5d4af42b53ac16238c99c7","name":"Administrator Read Only","description":"Can access the full account in read-only mode.","permissions":{"access":{"edit":false,"read":true},"analytics":{"edit":false,"read":true},"auditlogs":{"edit":false,"read":true},"billing":{"edit":false,"read":true},"blocks":{"edit":false,"read":true},"dex":{"edit":false,"read":true},"dns_records":{"edit":false,"read":true},"fbm":{"edit":false,"read":true},"healthchecks":{"edit":false,"read":true},"http_applications":{"edit":false,"read":true},"image":{"edit":false,"read":true},"integration":{"edit":false,"read":true},"lb":{"edit":false,"read":true},"legal":{"edit":false,"read":true},"logs":{"edit":false,"read":true},"magic":{"edit":false,"read":true},"member":{"edit":false,"read":true},"organization":{"edit":false,"read":true},"ssl":{"edit":false,"read":true},"stream":{"edit":false,"read":true},"subscription":{"edit":false,"read":true},"teams":{"edit":false,"read":true,"report":true},"waf":{"edit":false,"read":true},"waitingroom":{"edit":false,"read":true},"web3":{"edit":false,"read":true},"worker":{"edit":false,"read":true},"zaraz":{"edit":false,"read":true},"zone":{"edit":false,"read":true},"zone_settings":{"edit":false,"read":true},"zone_versioning":{"edit":false,"read":true}}}]},{"id":"186f5f9379098973c0c276341e2e90e1","user":{"id":"d7aed3e56baa0e324cfd46875c6041d9","first_name":null,"last_name":null,"email":"sharris@stjude.org","two_factor_authentication_enabled":false},"status":"accepted","api_access_enabled":null,"policies":[{"id":"6eb100b3fc844e3083e407a592ab925a","access":"allow","permission_groups":[{"id":"132c52e7e6654b999c183cfcbafd37d7","name":"Domain DNS","meta":{"description":"Grants access to edit DNS settings for domains in an account.","editable":"false","label":"domain_dns_admin","scopes":"com.cloudflare.api.account.zone"}},{"id":"a5e5061418ea445fbba04aac57f359a8","name":"Domain Administrator","meta":{"description":"Grants full access to domains in an account, and read-only access to account-wide Firewall, Access, and Worker resources.","editable":"false","label":"domain_admin","scopes":"com.cloudflare.api.account.zone"}}],"resource_groups":[{"id":"0b49b3e6107344889fe8ab4e0d192975","name":"IS Software Development","scope":{"key":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","objects":[{"key":"com.cloudflare.api.account.zone.f3966339e5ff067f2060cdb0fec68aa0"}]}}]}],"roles":[{"id":"132c52e7e6654b999c183cfcbafd37d7","name":"Domain DNS","description":"Grants access to edit DNS settings for domains in an account.","permissions":{"analytics":{"edit":false,"read":true},"billing":{"edit":false,"read":true},"dns_records":{"edit":true,"read":true},"organization":{"edit":false,"read":true},"subscription":{"edit":false,"read":true},"zone":{"edit":false,"read":true},"zone_settings":{"edit":false,"read":true}}},{"id":"a5e5061418ea445fbba04aac57f359a8","name":"Domain Administrator","description":"Grants full access to domains in an account, and read-only access to account-wide Firewall, Access, and Worker resources.","permissions":{"access":{"edit":true,"read":true},"analytics":{"edit":false,"read":true},"app":{"edit":true,"read":false},"billing":{"edit":true,"read":true},"cache_purge":{"edit":true,"read":false},"dns_records":{"edit":true,"read":true},"healthchecks":{"edit":true,"read":true},"lb":{"edit":true,"read":true},"logs":{"edit":true,"read":true},"organization":{"edit":true,"read":true},"ssl":{"edit":true,"read":true},"subscription":{"edit":true,"read":true},"waf":{"edit":true,"read":true},"waitingroom":{"edit":true,"read":true},"web3":{"edit":true,"read":true},"worker":{"edit":true,"read":true},"zaraz":{"edit":true,"publish":true,"read":true},"zone":{"edit":true,"read":true},"zone_settings":{"edit":true,"read":true}}}]},{"id":"427a243c4cf80600c99a0ce53e14de02","user":{"id":"653e322e613bf86a9b0ddddc8c90dd38","first_name":null,"last_name":null,"email":"adedmon@stjude.org","two_factor_authentication_enabled":false},"status":"accepted","api_access_enabled":null,"policies":[{"id":"f113ce84fde4423cb9bf5540a207a0dd","access":"allow","permission_groups":[{"id":"f4df4017f4334b30a868883046a18a9d","name":"Administrator Read Only","meta":{"description":"Can access the full account in read-only mode.","editable":"false","label":"admin_readonly","scopes":"com.cloudflare.api.account"}}],"resource_groups":[{"id":"5f9d7bdd31764dd1b29d43ff3ea59ae3","name":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","meta":{"editable":"false"},"scope":{"key":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","objects":[{"key":"*"}]}}]}],"roles":[{"id":"f2b20eaa1a5d4af42b53ac16238c99c7","name":"Administrator Read Only","description":"Can access the full account in read-only mode.","permissions":{"access":{"edit":false,"read":true},"analytics":{"edit":false,"read":true},"auditlogs":{"edit":false,"read":true},"billing":{"edit":false,"read":true},"blocks":{"edit":false,"read":true},"dex":{"edit":false,"read":true},"dns_records":{"edit":false,"read":true},"fbm":{"edit":false,"read":true},"healthchecks":{"edit":false,"read":true},"http_applications":{"edit":false,"read":true},"image":{"edit":false,"read":true},"integration":{"edit":false,"read":true},"lb":{"edit":false,"read":true},"legal":{"edit":false,"read":true},"logs":{"edit":false,"read":true},"magic":{"edit":false,"read":true},"member":{"edit":false,"read":true},"organization":{"edit":false,"read":true},"ssl":{"edit":false,"read":true},"stream":{"edit":false,"read":true},"subscription":{"edit":false,"read":true},"teams":{"edit":false,"read":true,"report":true},"waf":{"edit":false,"read":true},"waitingroom":{"edit":false,"read":true},"web3":{"edit":false,"read":true},"worker":{"edit":false,"read":true},"zaraz":{"edit":false,"read":true},"zone":{"edit":false,"read":true},"zone_settings":{"edit":false,"read":true},"zone_versioning":{"edit":false,"read":true}}}]},{"id":"6eb6074506ff0cdae5bfc08edd93a995","user":{"id":"b4aad3019fd4468d765aaffbeaf13c52","first_name":null,"last_name":null,"email":"anegatu@stjude.org","two_factor_authentication_enabled":false},"status":"accepted","api_access_enabled":null,"policies":[{"id":"79a3b1d99c734517b099171a0063db17","access":"allow","permission_groups":[{"id":"132c52e7e6654b999c183cfcbafd37d7","name":"Domain DNS","meta":{"description":"Grants access to edit DNS settings for domains in an account.","editable":"false","label":"domain_dns_admin","scopes":"com.cloudflare.api.account.zone"}},{"id":"a5e5061418ea445fbba04aac57f359a8","name":"Domain Administrator","meta":{"description":"Grants full access to domains in an account, and read-only access to account-wide Firewall, Access, and Worker resources.","editable":"false","label":"domain_admin","scopes":"com.cloudflare.api.account.zone"}}],"resource_groups":[{"id":"e58f3a1734b74610860778b2cc2d5139","name":"Biostatistics","scope":{"key":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","objects":[{"key":"com.cloudflare.api.account.zone.6f51809f90be9da0c3f6a40c5bbfd118"},{"key":"com.cloudflare.api.account.zone.4fbe6218ce5332ca774925d1d7e16a3a"}]}}]}],"roles":[{"id":"132c52e7e6654b999c183cfcbafd37d7","name":"Domain DNS","description":"Grants access to edit DNS settings for domains in an account.","permissions":{"analytics":{"edit":false,"read":true},"billing":{"edit":false,"read":true},"dns_records":{"edit":true,"read":true},"organization":{"edit":false,"read":true},"subscription":{"edit":false,"read":true},"zone":{"edit":false,"read":true},"zone_settings":{"edit":false,"read":true}}},{"id":"a5e5061418ea445fbba04aac57f359a8","name":"Domain Administrator","description":"Grants full access to domains in an account, and read-only access to account-wide Firewall, Access, and Worker resources.","permissions":{"access":{"edit":true,"read":true},"analytics":{"edit":false,"read":true},"app":{"edit":true,"read":false},"billing":{"edit":true,"read":true},"cache_purge":{"edit":true,"read":false},"dns_records":{"edit":true,"read":true},"healthchecks":{"edit":true,"read":true},"lb":{"edit":true,"read":true},"logs":{"edit":true,"read":true},"organization":{"edit":true,"read":true},"ssl":{"edit":true,"read":true},"subscription":{"edit":true,"read":true},"waf":{"edit":true,"read":true},"waitingroom":{"edit":true,"read":true},"web3":{"edit":true,"read":true},"worker":{"edit":true,"read":true},"zaraz":{"edit":true,"publish":true,"read":true},"zone":{"edit":true,"read":true},"zone_settings":{"edit":true,"read":true}}}]},{"id":"1667b469fdf967c0b453c7ffa600c92b","user":{"id":"67d73cd62406fd78da21b05d8d6739e4","first_name":null,"last_name":null,"email":"esioson@stjude.org","two_factor_authentication_enabled":false},"status":"accepted","api_access_enabled":null,"policies":[{"id":"6a6355de25e74f4d89c1a0aa4a36286f","access":"allow","permission_groups":[{"id":"132c52e7e6654b999c183cfcbafd37d7","name":"Domain DNS","meta":{"description":"Grants access to edit DNS settings for domains in an account.","editable":"false","label":"domain_dns_admin","scopes":"com.cloudflare.api.account.zone"}},{"id":"a5e5061418ea445fbba04aac57f359a8","name":"Domain Administrator","meta":{"description":"Grants full access to domains in an account, and read-only access to account-wide Firewall, Access, and Worker resources.","editable":"false","label":"domain_admin","scopes":"com.cloudflare.api.account.zone"}}],"resource_groups":[{"id":"e802c245bf344f4aa2c88c142d3461c9","name":"Proteinpaint","scope":{"key":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","objects":[{"key":"com.cloudflare.api.account.zone.16fc57cfbf37e36af6c14a97c16bbcbb"}]}}]}],"roles":[{"id":"132c52e7e6654b999c183cfcbafd37d7","name":"Domain DNS","description":"Grants access to edit DNS settings for domains in an account.","permissions":{"analytics":{"edit":false,"read":true},"billing":{"edit":false,"read":true},"dns_records":{"edit":true,"read":true},"organization":{"edit":false,"read":true},"subscription":{"edit":false,"read":true},"zone":{"edit":false,"read":true},"zone_settings":{"edit":false,"read":true}}},{"id":"a5e5061418ea445fbba04aac57f359a8","name":"Domain Administrator","description":"Grants full access to domains in an account, and read-only access to account-wide Firewall, Access, and Worker resources.","permissions":{"access":{"edit":true,"read":true},"analytics":{"edit":false,"read":true},"app":{"edit":true,"read":false},"billing":{"edit":true,"read":true},"cache_purge":{"edit":true,"read":false},"dns_records":{"edit":true,"read":true},"healthchecks":{"edit":true,"read":true},"lb":{"edit":true,"read":true},"logs":{"edit":true,"read":true},"organization":{"edit":true,"read":true},"ssl":{"edit":true,"read":true},"subscription":{"edit":true,"read":true},"waf":{"edit":true,"read":true},"waitingroom":{"edit":true,"read":true},"web3":{"edit":true,"read":true},"worker":{"edit":true,"read":true},"zaraz":{"edit":true,"publish":true,"read":true},"zone":{"edit":true,"read":true},"zone_settings":{"edit":true,"read":true}}}]},{"id":"fd83d0bf29d26b818560ff6f6ff5dfc2","user":{"id":"02ce66f211166d0a65e846314272064e","first_name":null,"last_name":null,"email":"jrayburn@stjude.org","two_factor_authentication_enabled":false},"status":"accepted","api_access_enabled":null,"policies":[{"id":"549d66415bed44a69b9258e7a710e65a","access":"allow","permission_groups":[{"id":"8e23b19e4e0d44c29d239c5688ba8cbb","name":"Super Administrator - All Privileges","meta":{"description":"Can edit any Cloudflare setting, make purchases, update billing, and manage memberships. Super Administrators can revoke the access of other Super Administrators.","editable":"false","label":"all_privileges","scopes":"com.cloudflare.api.account"}}],"resource_groups":[{"id":"5f9d7bdd31764dd1b29d43ff3ea59ae3","name":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","meta":{"editable":"false"},"scope":{"key":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","objects":[{"key":"*"}]}}]}],"roles":[{"id":"33666b9c79b9a5273fc7344ff42f953d","name":"Super Administrator - All Privileges","description":"Can edit any Cloudflare setting, make purchases, update billing, and manage memberships. Super Administrators can revoke the access of other Super Administrators.","permissions":{"access":{"edit":true,"read":true},"analytics":{"edit":false,"read":true},"app":{"edit":true,"read":false},"auditlogs":{"edit":false,"read":true},"billing":{"edit":true,"read":true},"blocks":{"edit":true,"read":true},"cache_purge":{"edit":true,"read":false},"dash_sso":{"edit":true,"read":true},"dex":{"edit":true,"read":true},"dns_records":{"edit":true,"read":true},"fbm":{"edit":true,"read":true},"fbm_acc":{"edit":true,"read":false},"healthchecks":{"edit":true,"read":true},"http_applications":{"edit":true,"read":true},"image":{"edit":true,"read":true},"integration":{"edit":true,"install":true,"read":true},"lb":{"edit":true,"read":true},"legal":{"edit":true,"read":true},"logs":{"edit":true,"read":true},"magic":{"edit":true,"read":true},"member":{"edit":true,"read":true},"organization":{"edit":true,"read":true},"ssl":{"edit":true,"read":true},"stream":{"edit":true,"read":true},"subscription":{"edit":true,"read":true},"teams":{"edit":true,"pii":true,"read":true,"report":true},"waf":{"edit":true,"read":true},"waitingroom":{"edit":true,"read":true},"web3":{"edit":true,"read":true},"worker":{"edit":true,"read":true},"zaraz":{"edit":true,"publish":true,"read":true},"zone":{"edit":true,"read":true},"zone_settings":{"edit":true,"read":true},"zone_versioning":{"edit":true,"read":true}}}]},{"id":"50b37e248e98e356f13f35d4ff1594a3","user":{"id":"da077722f75f73b5ceb21c7bb86a61cf","first_name":null,"last_name":null,"email":"awoodard@stjude.org","two_factor_authentication_enabled":false},"status":"accepted","api_access_enabled":null,"policies":[{"id":"d371156ce1b942bca5d9989430fe4134","access":"allow","permission_groups":[{"id":"132c52e7e6654b999c183cfcbafd37d7","name":"Domain DNS","meta":{"description":"Grants access to edit DNS settings for domains in an account.","editable":"false","label":"domain_dns_admin","scopes":"com.cloudflare.api.account.zone"}},{"id":"98d2b0c4bd3b4a2c842fcd2a81273ee9","name":"Domain Administrator Read Only","meta":{"description":"Grants read-only access to domains in an account, as well as account-wide Firewall, Access, and Worker resources.","editable":"false","label":"domain_admin_readonly","scopes":"com.cloudflare.api.account.zone"}}],"resource_groups":[{"id":"69d2adb4324e407a902944f3d5d12f87","name":"RIS","scope":{"key":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","objects":[{"key":"com.cloudflare.api.account.zone.6412ad7869ec884d3ac1206093f2c033"},{"key":"com.cloudflare.api.account.zone.9bcc20c680ca9e4c9340506fe93c0a83"},{"key":"com.cloudflare.api.account.zone.f2b20d791b765fdae19e2f40b0618661"},{"key":"com.cloudflare.api.account.zone.f00aa761f724efcb411dbe21f50df065"},{"key":"com.cloudflare.api.account.zone.585ca59df699ba7698748de41c299b8c"},{"key":"com.cloudflare.api.account.zone.4a7f18c114fd50b5bb1c48bddc745569"},{"key":"com.cloudflare.api.account.zone.242efd54f726adea92615d0d2022b239"},{"key":"com.cloudflare.api.account.zone.1aec5da29b9fd505bf9f9e1e4ca98f46"}]}}]}],"roles":[{"id":"132c52e7e6654b999c183cfcbafd37d7","name":"Domain DNS","description":"Grants access to edit DNS settings for domains in an account.","permissions":{"analytics":{"edit":false,"read":true},"billing":{"edit":false,"read":true},"dns_records":{"edit":true,"read":true},"organization":{"edit":false,"read":true},"subscription":{"edit":false,"read":true},"zone":{"edit":false,"read":true},"zone_settings":{"edit":false,"read":true}}},{"id":"98d2b0c4bd3b4a2c842fcd2a81273ee9","name":"Domain Administrator Read Only","description":"Grants read-only access to domains in an account, as well as account-wide Firewall, Access, and Worker resources.","permissions":{"access":{"edit":false,"read":true},"analytics":{"edit":false,"read":true},"billing":{"edit":false,"read":true},"dns_records":{"edit":false,"read":true},"healthchecks":{"edit":false,"read":true},"lb":{"edit":false,"read":true},"logs":{"edit":false,"read":true},"organization":{"edit":false,"read":true},"ssl":{"edit":false,"read":true},"subscription":{"edit":false,"read":true},"waf":{"edit":false,"read":true},"waitingroom":{"edit":false,"read":true},"web3":{"edit":false,"read":true},"worker":{"edit":false,"read":true},"zaraz":{"edit":false,"read":true},"zone":{"edit":false,"read":true},"zone_settings":{"edit":false,"read":true}}}]},{"id":"b730aa6d602c6afc3ab5b370e35176bf","user":{"id":"1b4b9658ef4dda2edc3b520cc5cf2c72","first_name":null,"last_name":null,"email":"ahasty@stjude.org","two_factor_authentication_enabled":false},"status":"accepted","api_access_enabled":null,"policies":[{"id":"e4027bc96db34c77aba3bccadc4182d2","access":"allow","permission_groups":[{"id":"8e23b19e4e0d44c29d239c5688ba8cbb","name":"Super Administrator - All Privileges","meta":{"description":"Can edit any Cloudflare setting, make purchases, update billing, and manage memberships. Super Administrators can revoke the access of other Super Administrators.","editable":"false","label":"all_privileges","scopes":"com.cloudflare.api.account"}}],"resource_groups":[{"id":"5f9d7bdd31764dd1b29d43ff3ea59ae3","name":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","meta":{"editable":"false"},"scope":{"key":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","objects":[{"key":"*"}]}}]}],"roles":[{"id":"33666b9c79b9a5273fc7344ff42f953d","name":"Super Administrator - All Privileges","description":"Can edit any Cloudflare setting, make purchases, update billing, and manage memberships. Super Administrators can revoke the access of other Super Administrators.","permissions":{"access":{"edit":true,"read":true},"analytics":{"edit":false,"read":true},"app":{"edit":true,"read":false},"auditlogs":{"edit":false,"read":true},"billing":{"edit":true,"read":true},"blocks":{"edit":true,"read":true},"cache_purge":{"edit":true,"read":false},"dash_sso":{"edit":true,"read":true},"dex":{"edit":true,"read":true},"dns_records":{"edit":true,"read":true},"fbm":{"edit":true,"read":true},"fbm_acc":{"edit":true,"read":false},"healthchecks":{"edit":true,"read":true},"http_applications":{"edit":true,"read":true},"image":{"edit":true,"read":true},"integration":{"edit":true,"install":true,"read":true},"lb":{"edit":true,"read":true},"legal":{"edit":true,"read":true},"logs":{"edit":true,"read":true},"magic":{"edit":true,"read":true},"member":{"edit":true,"read":true},"organization":{"edit":true,"read":true},"ssl":{"edit":true,"read":true},"stream":{"edit":true,"read":true},"subscription":{"edit":true,"read":true},"teams":{"edit":true,"pii":true,"read":true,"report":true},"waf":{"edit":true,"read":true},"waitingroom":{"edit":true,"read":true},"web3":{"edit":true,"read":true},"worker":{"edit":true,"read":true},"zaraz":{"edit":true,"publish":true,"read":true},"zone":{"edit":true,"read":true},"zone_settings":{"edit":true,"read":true},"zone_versioning":{"edit":true,"read":true}}}]},{"id":"098326753a4d6929d4ca9a745c87ec1f","user":{"id":"b95084df18191aee90b79fa977e0ba1e","first_name":null,"last_name":null,"email":"nrobles@stjude.org","two_factor_authentication_enabled":false},"status":"accepted","api_access_enabled":null,"policies":[{"id":"56734880deb74cc79d204f05f765b6f5","access":"allow","permission_groups":[{"id":"f4df4017f4334b30a868883046a18a9d","name":"Administrator Read Only","meta":{"description":"Can access the full account in read-only mode.","editable":"false","label":"admin_readonly","scopes":"com.cloudflare.api.account"}}],"resource_groups":[{"id":"5f9d7bdd31764dd1b29d43ff3ea59ae3","name":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","meta":{"editable":"false"},"scope":{"key":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","objects":[{"key":"*"}]}}]}],"roles":[{"id":"f2b20eaa1a5d4af42b53ac16238c99c7","name":"Administrator Read Only","description":"Can access the full account in read-only mode.","permissions":{"access":{"edit":false,"read":true},"analytics":{"edit":false,"read":true},"auditlogs":{"edit":false,"read":true},"billing":{"edit":false,"read":true},"blocks":{"edit":false,"read":true},"dex":{"edit":false,"read":true},"dns_records":{"edit":false,"read":true},"fbm":{"edit":false,"read":true},"healthchecks":{"edit":false,"read":true},"http_applications":{"edit":false,"read":true},"image":{"edit":false,"read":true},"integration":{"edit":false,"read":true},"lb":{"edit":false,"read":true},"legal":{"edit":false,"read":true},"logs":{"edit":false,"read":true},"magic":{"edit":false,"read":true},"member":{"edit":false,"read":true},"organization":{"edit":false,"read":true},"ssl":{"edit":false,"read":true},"stream":{"edit":false,"read":true},"subscription":{"edit":false,"read":true},"teams":{"edit":false,"read":true,"report":true},"waf":{"edit":false,"read":true},"waitingroom":{"edit":false,"read":true},"web3":{"edit":false,"read":true},"worker":{"edit":false,"read":true},"zaraz":{"edit":false,"read":true},"zone":{"edit":false,"read":true},"zone_settings":{"edit":false,"read":true},"zone_versioning":{"edit":false,"read":true}}}]},{"id":"716e48ef9e1715e699bc31d8c0c7234f","user":{"id":"a508f33397c27672230e18bad0a43df9","first_name":null,"last_name":null,"email":"mmalinos@stjude.org","two_factor_authentication_enabled":false},"status":"accepted","api_access_enabled":null,"policies":[{"id":"6633e4bf819645b4b4b28193dfb39965","access":"allow","permission_groups":[{"id":"f4df4017f4334b30a868883046a18a9d","name":"Administrator Read Only","meta":{"description":"Can access the full account in read-only mode.","editable":"false","label":"admin_readonly","scopes":"com.cloudflare.api.account"}}],"resource_groups":[{"id":"5f9d7bdd31764dd1b29d43ff3ea59ae3","name":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","meta":{"editable":"false"},"scope":{"key":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","objects":[{"key":"*"}]}}]}],"roles":[{"id":"f2b20eaa1a5d4af42b53ac16238c99c7","name":"Administrator Read Only","description":"Can access the full account in read-only mode.","permissions":{"access":{"edit":false,"read":true},"analytics":{"edit":false,"read":true},"auditlogs":{"edit":false,"read":true},"billing":{"edit":false,"read":true},"blocks":{"edit":false,"read":true},"dex":{"edit":false,"read":true},"dns_records":{"edit":false,"read":true},"fbm":{"edit":false,"read":true},"healthchecks":{"edit":false,"read":true},"http_applications":{"edit":false,"read":true},"image":{"edit":false,"read":true},"integration":{"edit":false,"read":true},"lb":{"edit":false,"read":true},"legal":{"edit":false,"read":true},"logs":{"edit":false,"read":true},"magic":{"edit":false,"read":true},"member":{"edit":false,"read":true},"organization":{"edit":false,"read":true},"ssl":{"edit":false,"read":true},"stream":{"edit":false,"read":true},"subscription":{"edit":false,"read":true},"teams":{"edit":false,"read":true,"report":true},"waf":{"edit":false,"read":true},"waitingroom":{"edit":false,"read":true},"web3":{"edit":false,"read":true},"worker":{"edit":false,"read":true},"zaraz":{"edit":false,"read":true},"zone":{"edit":false,"read":true},"zone_settings":{"edit":false,"read":true},"zone_versioning":{"edit":false,"read":true}}}]},{"id":"a7f64e3565ee3467ecd0514a28ce9a42","user":{"id":"9af4022c8cc7caf8a919dabe15f38150","first_name":null,"last_name":null,"email":"rgandla@stjude.org","two_factor_authentication_enabled":false},"status":"accepted","api_access_enabled":null,"policies":[{"id":"347b56bee2b64b249879f7c717b80b3e","access":"allow","permission_groups":[{"id":"dbb7213ddb854cdc9d015febfebb290d","name":"Load Balancer","meta":{"description":"Can edit Load Balancers, Pools, Origins, and Health Checks.","editable":"false","label":"load_balancer_admin","scopes":"com.cloudflare.api.account"}},{"id":"49ce85367bae433b9f0717ed4fea5c74","name":"DNS","meta":{"description":"Can edit DNS records.","editable":"false","label":"dns_admin","scopes":"com.cloudflare.api.account"}},{"id":"f4df4017f4334b30a868883046a18a9d","name":"Administrator Read Only","meta":{"description":"Can access the full account in read-only mode.","editable":"false","label":"admin_readonly","scopes":"com.cloudflare.api.account"}}],"resource_groups":[{"id":"5f9d7bdd31764dd1b29d43ff3ea59ae3","name":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","meta":{"editable":"false"},"scope":{"key":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","objects":[{"key":"*"}]}}]}],"roles":[{"id":"c61d4237ab1c08a3d11feb6bd5e91c5a","name":"Load Balancer","description":"Can edit Load Balancers, Pools, Origins, and Health Checks.","permissions":{"auditlogs":{"edit":false,"read":true},"healthchecks":{"edit":true,"read":true},"lb":{"edit":true,"read":true},"legal":{"edit":false,"read":true},"organization":{"edit":false,"read":true},"subscription":{"edit":false,"read":true},"zone":{"edit":false,"read":true},"zone_settings":{"edit":false,"read":true}}},{"id":"069fe803647ed3609e93d041d5df6050","name":"DNS","description":"Can edit DNS records.","permissions":{"auditlogs":{"edit":false,"read":true},"dns_records":{"edit":true,"read":true},"legal":{"edit":false,"read":true},"organization":{"edit":false,"read":true},"subscription":{"edit":false,"read":true},"zone":{"edit":false,"read":true},"zone_settings":{"edit":false,"read":true}}},{"id":"f2b20eaa1a5d4af42b53ac16238c99c7","name":"Administrator Read Only","description":"Can access the full account in read-only mode.","permissions":{"access":{"edit":false,"read":true},"analytics":{"edit":false,"read":true},"auditlogs":{"edit":false,"read":true},"billing":{"edit":false,"read":true},"blocks":{"edit":false,"read":true},"dex":{"edit":false,"read":true},"dns_records":{"edit":false,"read":true},"fbm":{"edit":false,"read":true},"healthchecks":{"edit":false,"read":true},"http_applications":{"edit":false,"read":true},"image":{"edit":false,"read":true},"integration":{"edit":false,"read":true},"lb":{"edit":false,"read":true},"legal":{"edit":false,"read":true},"logs":{"edit":false,"read":true},"magic":{"edit":false,"read":true},"member":{"edit":false,"read":true},"organization":{"edit":false,"read":true},"ssl":{"edit":false,"read":true},"stream":{"edit":false,"read":true},"subscription":{"edit":false,"read":true},"teams":{"edit":false,"read":true,"report":true},"waf":{"edit":false,"read":true},"waitingroom":{"edit":false,"read":true},"web3":{"edit":false,"read":true},"worker":{"edit":false,"read":true},"zaraz":{"edit":false,"read":true},"zone":{"edit":false,"read":true},"zone_settings":{"edit":false,"read":true},"zone_versioning":{"edit":false,"read":true}}}]},{"id":"ddcf30e7e94436902247c6df63091032","user":{"id":"00cb25b773a53c4b2b48be346b7552d5","first_name":null,"last_name":null,"email":"dmunger@stjude.org","two_factor_authentication_enabled":false},"status":"accepted","api_access_enabled":null,"policies":[{"id":"839f720098b14b3c850e416d1c59691b","access":"allow","permission_groups":[{"id":"f4df4017f4334b30a868883046a18a9d","name":"Administrator Read Only","meta":{"description":"Can access the full account in read-only mode.","editable":"false","label":"admin_readonly","scopes":"com.cloudflare.api.account"}}],"resource_groups":[{"id":"5f9d7bdd31764dd1b29d43ff3ea59ae3","name":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","meta":{"editable":"false"},"scope":{"key":"com.cloudflare.api.account.09fd3a16b2b05b606bff7d91b2b9a4d7","objects":[{"key":"*"}]}}]}],"roles":[{"id":"f2b20eaa1a5d4af42b53ac16238c99c7","name":"Administrator Read Only","description":"Can access the full account in read-only mode.","permissions":{"access":{"edit":false,"read":true},"analytics":{"edit":false,"read":true},"auditlogs":{"edit":false,"read":true},"billing":{"edit":false,"read":true},"blocks":{"edit":false,"read":true},"dex":{"edit":false,"read":true},"dns_records":{"edit":false,"read":true},"fbm":{"edit":false,"read":true},"healthchecks":{"edit":false,"read":true},"http_applications":{"edit":false,"read":true},"image":{"edit":false,"read":true},"integration":{"edit":false,"read":true},"lb":{"edit":false,"read":true},"legal":{"edit":false,"read":true},"logs":{"edit":false,"read":true},"magic":{"edit":false,"read":true},"member":{"edit":false,"read":true},"organization":{"edit":false,"read":true},"ssl":{"edit":false,"read":true},"stream":{"edit":false,"read":true},"subscription":{"edit":false,"read":true},"teams":{"edit":false,"read":true,"report":true},"waf":{"edit":false,"read":true},"waitingroom":{"edit":false,"read":true},"web3":{"edit":false,"read":true},"worker":{"edit":false,"read":true},"zaraz":{"edit":false,"read":true},"zone":{"edit":false,"read":true},"zone_settings":{"edit":false,"read":true},"zone_versioning":{"edit":false,"read":true}}}]}],"result_info":{"page":1,"per_page":20,"total_pages":2,"count":20,"total_count":26},"success":true,"errors":[],"messages":[]} , cookies:[__cflb=0H28vgHxwvgAQtjUGUFqYFDiSDreGJnUrLBFE6idGoo; SameSite=Lax; path=/; expires=Fri, 23-Jun-23 05:03:43 GMT; HttpOnly, __cfruid=a6eca987163678caa6045c0b505bc42a17d5c89b-1687487622; path=/; domain=.api.cloudflare.com; HttpOnly; Secure; SameSite=None], statusCode:200] 2023-06-23/02:33:42.598 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestUtilService - pullObjectsByRest - responseStatusCode ::200 2023-06-23/02:33:42.599 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - Entered getResponseHeaders method 2023-06-23/02:33:42.599 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - responseError : [] 2023-06-23/02:33:42.599 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - isAuthError: false 2023-06-23/02:33:42.599 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - pullObjectsByRest - responseMap.size : 5 2023-06-23/02:33:42.599 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - pullObjectsByRest - objectList.size : 20 2023-06-23/02:33:42.599 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - Inside importAccountsFull:persistAccounts, pptTypeSep : ~#~ 2023-06-23/02:33:42.600 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - associated entitlement : roles with account is not for import. 2023-06-23/02:33:42.600 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - associated entitlement : roles with account is not for import. 2023-06-23/02:33:42.600 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - associated entitlement : roles with account is not for import. 2023-06-23/02:33:42.600 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - associated entitlement : roles with account is not for import. 2023-06-23/02:33:42.601 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - associated entitlement : roles with account is not for import. 2023-06-23/02:33:42.601 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - associated entitlement : roles with account is not for import. 2023-06-23/02:33:42.601 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - associated entitlement : roles with account is not for import. 2023-06-23/02:33:42.601 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - associated entitlement : roles with account is not for import. 2023-06-23/02:33:42.601 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - associated entitlement : roles with account is not for import. 2023-06-23/02:33:42.602 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - associated entitlement : roles with account is not for import. 2023-06-23/02:33:42.602 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - associated entitlement : roles with account is not for import. 2023-06-23/02:33:42.602 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - associated entitlement : roles with account is not for import. 2023-06-23/02:33:42.602 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - associated entitlement : roles with account is not for import. 2023-06-23/02:33:42.603 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - associated entitlement : roles with account is not for import. 2023-06-23/02:33:42.603 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - associated entitlement : roles with account is not for import. 2023-06-23/02:33:42.603 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - associated entitlement : roles with account is not for import. 2023-06-23/02:33:42.603 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - associated entitlement : roles with account is not for import. 2023-06-23/02:33:42.603 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - associated entitlement : roles with account is not for import. 2023-06-23/02:33:42.604 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - associated entitlement : roles with account is not for import. 2023-06-23/02:33:42.604 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - associated entitlement : roles with account is not for import. 2023-06-23/02:33:42.616 [{}] [quartzScheduler_Worker-11] DEBUG services.ImportUtilityService - isImportSuccess: true 2023-06-23/02:33:42.616 [{}] [quartzScheduler_Worker-11] DEBUG services.ImportUtilityService - Entered markStatusBasedOnThreshold 2023-06-23/02:33:42.616 [{}] [quartzScheduler_Worker-11] DEBUG services.ImportUtilityService - statusAndThresholdConfig is empty 2023-06-23/02:33:42.616 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - Mapping Users to accounts. 2023-06-23/02:33:42.616 [{}] [quartzScheduler_Worker-11] DEBUG saviynt.ImportExternalDbService - Associating Users and Accounts 2023-06-23/02:33:42.625 [{}] [quartzScheduler_Worker-11] DEBUG saviynt.ImportExternalDbService - Orphan Accounts- 19 2023-06-23/02:33:42.625 [{}] [quartzScheduler_Worker-11] DEBUG saviynt.ImportExternalDbService - Rule: (users.email) = accounts.name 2023-06-23/02:33:42.625 [{}] [quartzScheduler_Worker-11] DEBUG saviynt.ImportExternalDbService - sql = SELECT USERS.USERKEY AS USERKEY, ACCOUNTS.ACCOUNTKEY AS ACCOUNTKEY FROM ACCOUNTS ACCOUNTS LEFT JOIN USER_ACCOUNTS UA ON ACCOUNTS.ACCOUNTKEY = UA.ACCOUNTKEY LEFT JOIN USERS USERS ON (users.email) = accounts.name WHERE ACCOUNTS.ENDPOINTKEY = 392 AND ACCOUNTS.STATUS IN ('Active','1','Manually Provisioned') AND ACCOUNTS.ACCOUNTKEY IS NOT NULL AND UA.ACCOUNTKEY IS NULL AND ACCOUNTS.NAME IS NOT NULL AND USERS.USERNAME IS NOT NULL 2023-06-23/02:33:42.626 [{}] [quartzScheduler_Worker-11] DEBUG saviynt.ImportExternalDbService - Total accounts to be correlated = 0 2023-06-23/02:33:42.626 [{}] [quartzScheduler_Worker-11] DEBUG saviynt.ImportExternalDbService - User-accounts correlated: 0 2023-06-23/02:33:42.626 [{}] [quartzScheduler_Worker-11] DEBUG saviynt.ImportExternalDbService - Orphan Accounts remaining- 19 2023-06-23/02:33:42.626 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestProvisioningService - Mapping of Users to Accounts is Completed. 2023-06-23/02:33:42.627 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestUtilService - Writing job history to import logs. 2023-06-23/02:33:42.627 [{}] [quartzScheduler_Worker-11] DEBUG rest.RestUtilService - Number of log entries to be written : 4 2023-06-23/02:33:42.634 [{}] [quartzScheduler_Worker-11] DEBUG integration.ExternalConnectionCallService - END INVOKING EXTERNAL CONNECTION 2023-06-23/02:33:42.634 [{}] [quartzScheduler_Worker-11] DEBUG jobs.SapImportJob - FINISH externalConnectionCallService 2023-06-23/02:33:42.640 [{}] [quartzScheduler_Worker-11] DEBUG jobs.SapImportJob - Setting the value of import status 2023-06-23/02:33:42.640 [{}] [quartzScheduler_Worker-11] DEBUG jobs.SapImportJob - Import status :: Success 2023-06-23/02:33:42.640 [{}] [quartzScheduler_Worker-11] DEBUG jobs.SapImportJob - END SapImportJob 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG matcher.AntPathRequestMatcher - Checking match of request : '/logs/showlogs'; against '/api/**' 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG matcher.AntPathRequestMatcher - Request '/logs/showlogs' matched by universal pattern '/**' 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG web.FilterChainProxy - /logs/showLogs at position 1 of 15 in additional filter chain; firing Filter: 'SecurityRequestHolderFilter' 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG web.FilterChainProxy - /logs/showLogs at position 2 of 15 in additional filter chain; firing Filter: 'SecurityContextPersistenceFilter' 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository - Obtained a valid SecurityContext from SPRING_SECURITY_CONTEXT: 'org.springframework.security.core.context.SecurityContextImpl@fdf8eccf: Authentication: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE' 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG web.FilterChainProxy - /logs/showLogs at position 3 of 15 in additional filter chain; firing Filter: 'SAMLEntryPoint' 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG web.FilterChainProxy - /logs/showLogs at position 4 of 15 in additional filter chain; firing Filter: 'MetadataDisplayFilter' 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG web.FilterChainProxy - /logs/showLogs at position 5 of 15 in additional filter chain; firing Filter: 'SAMLProcessingFilter' 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG web.FilterChainProxy - /logs/showLogs at position 6 of 15 in additional filter chain; firing Filter: 'SAMLLogoutFilter' 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG web.FilterChainProxy - /logs/showLogs at position 7 of 15 in additional filter chain; firing Filter: 'SAMLLogoutProcessingFilter' 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG web.FilterChainProxy - /logs/showLogs at position 8 of 15 in additional filter chain; firing Filter: 'MutableLogoutFilter' 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG web.FilterChainProxy - /logs/showLogs at position 9 of 15 in additional filter chain; firing Filter: 'GrailsUsernamePasswordAuthenticationFilter' 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG web.FilterChainProxy - /logs/showLogs at position 10 of 15 in additional filter chain; firing Filter: 'SaviyntRestAuthenticationFilter' 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG web.FilterChainProxy - /logs/showLogs at position 11 of 15 in additional filter chain; firing Filter: 'SecurityContextHolderAwareRequestFilter' 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG web.FilterChainProxy - /logs/showLogs at position 12 of 15 in additional filter chain; firing Filter: 'GrailsRememberMeAuthenticationFilter' 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG web.FilterChainProxy - /logs/showLogs at position 13 of 15 in additional filter chain; firing Filter: 'GrailsAnonymousAuthenticationFilter' 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG web.FilterChainProxy - /logs/showLogs at position 14 of 15 in additional filter chain; firing Filter: 'ExceptionTranslationFilter' 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG web.FilterChainProxy - /logs/showLogs at position 15 of 15 in additional filter chain; firing Filter: 'FilterSecurityInterceptor' 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG intercept.FilterSecurityInterceptor - Secure object: FilterInvocation: URL: /logs/showLogs; Attributes: [ROLE_ADMIN, ROLE_ADMIN_SAVIYNTSUPPORT, ROLE_UIADMIN, ROLE_SUPPORT_V1, ROLE_APP_ADMIN_ACTIVE_DIRECTORY, ROLE_AADMIN_OLD, ROLE_AADMIN, ROLE_ADMIN_SUPPORT, ROLE_SUPPORT_V1_REQ, ROLE_ADMIN -COPY] 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG intercept.FilterSecurityInterceptor - Previously Authenticated: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG intercept.FilterSecurityInterceptor - Authorization successful 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG intercept.FilterSecurityInterceptor - RunAsManager did not change Authentication object 2023-06-23/02:33:44.453 [{}] [https-jsse-nio-443-exec-294] DEBUG web.FilterChainProxy - /logs/showLogs reached end of additional filter chain; proceeding with original chain 2023-06-23/02:33:44.497 [{}] [https-jsse-nio-443-exec-294] DEBUG log.LoggerService - logFileAndPath: /opt/sharedappdrive/saviynt/logs/error-10.244.230.52.log 2023-06-23/02:33:44.499 [{}] [https-jsse-nio-443-exec-294] DEBUG log.LoggerService - Entered getLogFiles 2023-06-23/02:33:44.526 [{}] [https-jsse-nio-443-exec-294] DEBUG log.LoggerService - logFiles before sorting : 2023-06-23/02:33:44.526 [{}] [https-jsse-nio-443-exec-294] DEBUG log.LoggerService - logFiles after sorting : 2023-06-23/02:33:44.528 [{}] [https-jsse-nio-443-exec-294] DEBUG log.LoggerService - Enter getFileName 2023-06-23/02:33:44.529 [{}] [https-jsse-nio-443-exec-294] DEBUG log.LoggerService - finalFileName = error.log 2023-06-23/02:33:44.529 [{}] [https-jsse-nio-443-exec-294] DEBUG log.LoggerService - Exit getFileName 2023-06-23/02:33:44.531 [{}] [https-jsse-nio-443-exec-294] DEBUG log.LoggerService - Get 100 lines for error.log 2023-06-23/02:33:44.550 [{}] [https-jsse-nio-443-exec-294] DEBUG log.LoggerService - File not found error.log 2023-06-23/02:33:44.558 [{}] [https-jsse-nio-443-exec-294] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.559 [{}] [https-jsse-nio-443-exec-294] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.562 [{}] [https-jsse-nio-443-exec-294] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.563 [{}] [https-jsse-nio-443-exec-294] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.563 [{}] [https-jsse-nio-443-exec-294] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.563 [{}] [https-jsse-nio-443-exec-294] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.563 [{}] [https-jsse-nio-443-exec-294] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.563 [{}] [https-jsse-nio-443-exec-294] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.563 [{}] [https-jsse-nio-443-exec-294] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.563 [{}] [https-jsse-nio-443-exec-294] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.563 [{}] [https-jsse-nio-443-exec-294] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.594 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.594 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.594 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.594 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.594 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.594 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.594 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.595 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.595 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.595 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.595 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.595 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.595 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.595 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.595 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.595 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.595 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.595 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.595 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.595 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.595 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.595 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.595 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.596 [{}] [https-jsse-nio-443-exec-294] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.596 [{}] [https-jsse-nio-443-exec-294] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.596 [{}] [https-jsse-nio-443-exec-294] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.596 [{}] [https-jsse-nio-443-exec-294] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.596 [{}] [https-jsse-nio-443-exec-294] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.596 [{}] [https-jsse-nio-443-exec-294] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.596 [{}] [https-jsse-nio-443-exec-294] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.598 [{}] [https-jsse-nio-443-exec-294] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.598 [{}] [https-jsse-nio-443-exec-294] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.598 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.598 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.598 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.598 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.598 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.598 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.598 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.598 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.598 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.598 [{}] [https-jsse-nio-443-exec-294] DEBUG context.HttpSessionSecurityContextRepository$SaveToSessionResponseWrapper - Skip invoking on 2023-06-23/02:33:44.598 [{}] [https-jsse-nio-443-exec-294] DEBUG access.ExceptionTranslationFilter - Chain processed normally 2023-06-23/02:33:44.598 [{}] [https-jsse-nio-443-exec-294] DEBUG context.SecurityContextPersistenceFilter - SecurityContextHolder now cleared, as request processing completed 2023-06-23/02:33:44.738 [{}] [https-jsse-nio-443-exec-273] DEBUG matcher.AntPathRequestMatcher - Checking match of request : '/assets/plugins/font-awesome/css/font-awesome.min.css'; against '/api/**' 2023-06-23/02:33:44.738 [{}] [https-jsse-nio-443-exec-273] DEBUG matcher.AntPathRequestMatcher - Request '/assets/plugins/font-awesome/css/font-awesome.min.css' matched by universal pattern '/**' 2023-06-23/02:33:44.738 [{}] [https-jsse-nio-443-exec-273] DEBUG web.FilterChainProxy - /assets/plugins/font-awesome/css/font-awesome.min.css at position 1 of 15 in additional filter chain; firing Filter: 'SecurityRequestHolderFilter' 2023-06-23/02:33:44.738 [{}] [https-jsse-nio-443-exec-273] DEBUG web.FilterChainProxy - /assets/plugins/font-awesome/css/font-awesome.min.css at position 2 of 15 in additional filter chain; firing Filter: 'SecurityContextPersistenceFilter' 2023-06-23/02:33:44.738 [{}] [https-jsse-nio-443-exec-273] DEBUG context.HttpSessionSecurityContextRepository - Obtained a valid SecurityContext from SPRING_SECURITY_CONTEXT: 'org.springframework.security.core.context.SecurityContextImpl@fdf8eccf: Authentication: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE' 2023-06-23/02:33:44.738 [{}] [https-jsse-nio-443-exec-273] DEBUG web.FilterChainProxy - /assets/plugins/font-awesome/css/font-awesome.min.css at position 3 of 15 in additional filter chain; firing Filter: 'SAMLEntryPoint' 2023-06-23/02:33:44.738 [{}] [https-jsse-nio-443-exec-273] DEBUG web.FilterChainProxy - /assets/plugins/font-awesome/css/font-awesome.min.css at position 4 of 15 in additional filter chain; firing Filter: 'MetadataDisplayFilter' 2023-06-23/02:33:44.738 [{}] [https-jsse-nio-443-exec-273] DEBUG web.FilterChainProxy - /assets/plugins/font-awesome/css/font-awesome.min.css at position 5 of 15 in additional filter chain; firing Filter: 'SAMLProcessingFilter' 2023-06-23/02:33:44.738 [{}] [https-jsse-nio-443-exec-273] DEBUG web.FilterChainProxy - /assets/plugins/font-awesome/css/font-awesome.min.css at position 6 of 15 in additional filter chain; firing Filter: 'SAMLLogoutFilter' 2023-06-23/02:33:44.738 [{}] [https-jsse-nio-443-exec-273] DEBUG web.FilterChainProxy - /assets/plugins/font-awesome/css/font-awesome.min.css at position 7 of 15 in additional filter chain; firing Filter: 'SAMLLogoutProcessingFilter' 2023-06-23/02:33:44.738 [{}] [https-jsse-nio-443-exec-273] DEBUG web.FilterChainProxy - /assets/plugins/font-awesome/css/font-awesome.min.css at position 8 of 15 in additional filter chain; firing Filter: 'MutableLogoutFilter' 2023-06-23/02:33:44.738 [{}] [https-jsse-nio-443-exec-273] DEBUG web.FilterChainProxy - /assets/plugins/font-awesome/css/font-awesome.min.css at position 9 of 15 in additional filter chain; firing Filter: 'GrailsUsernamePasswordAuthenticationFilter' 2023-06-23/02:33:44.738 [{}] [https-jsse-nio-443-exec-273] DEBUG web.FilterChainProxy - /assets/plugins/font-awesome/css/font-awesome.min.css at position 10 of 15 in additional filter chain; firing Filter: 'SaviyntRestAuthenticationFilter' 2023-06-23/02:33:44.738 [{}] [https-jsse-nio-443-exec-273] DEBUG web.FilterChainProxy - /assets/plugins/font-awesome/css/font-awesome.min.css at position 11 of 15 in additional filter chain; firing Filter: 'SecurityContextHolderAwareRequestFilter' 2023-06-23/02:33:44.738 [{}] [https-jsse-nio-443-exec-273] DEBUG web.FilterChainProxy - /assets/plugins/font-awesome/css/font-awesome.min.css at position 12 of 15 in additional filter chain; firing Filter: 'GrailsRememberMeAuthenticationFilter' 2023-06-23/02:33:44.738 [{}] [https-jsse-nio-443-exec-273] DEBUG web.FilterChainProxy - /assets/plugins/font-awesome/css/font-awesome.min.css at position 13 of 15 in additional filter chain; firing Filter: 'GrailsAnonymousAuthenticationFilter' 2023-06-23/02:33:44.738 [{}] [https-jsse-nio-443-exec-273] DEBUG web.FilterChainProxy - /assets/plugins/font-awesome/css/font-awesome.min.css at position 14 of 15 in additional filter chain; firing Filter: 'ExceptionTranslationFilter' 2023-06-23/02:33:44.738 [{}] [https-jsse-nio-443-exec-273] DEBUG web.FilterChainProxy - /assets/plugins/font-awesome/css/font-awesome.min.css at position 15 of 15 in additional filter chain; firing Filter: 'FilterSecurityInterceptor' 2023-06-23/02:33:44.738 [{}] [https-jsse-nio-443-exec-273] DEBUG intercept.FilterSecurityInterceptor - Secure object: FilterInvocation: URL: /assets/plugins/font-awesome/css/font-awesome.min.css; Attributes: [permitAll] 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-273] DEBUG intercept.FilterSecurityInterceptor - Previously Authenticated: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-273] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-273] DEBUG intercept.FilterSecurityInterceptor - Authorization successful 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-273] DEBUG intercept.FilterSecurityInterceptor - RunAsManager did not change Authentication object 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-273] DEBUG web.FilterChainProxy - /assets/plugins/font-awesome/css/font-awesome.min.css reached end of additional filter chain; proceeding with original chain 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-273] DEBUG access.ExceptionTranslationFilter - Chain processed normally 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-273] DEBUG context.SecurityContextPersistenceFilter - SecurityContextHolder now cleared, as request processing completed 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-283] DEBUG matcher.AntPathRequestMatcher - Checking match of request : '/assets/plugins/fontello/css/fontello.css'; against '/api/**' 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-283] DEBUG matcher.AntPathRequestMatcher - Request '/assets/plugins/fontello/css/fontello.css' matched by universal pattern '/**' 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-283] DEBUG web.FilterChainProxy - /assets/plugins/fontello/css/fontello.css at position 1 of 15 in additional filter chain; firing Filter: 'SecurityRequestHolderFilter' 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-283] DEBUG web.FilterChainProxy - /assets/plugins/fontello/css/fontello.css at position 2 of 15 in additional filter chain; firing Filter: 'SecurityContextPersistenceFilter' 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-283] DEBUG context.HttpSessionSecurityContextRepository - Obtained a valid SecurityContext from SPRING_SECURITY_CONTEXT: 'org.springframework.security.core.context.SecurityContextImpl@fdf8eccf: Authentication: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE' 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-283] DEBUG web.FilterChainProxy - /assets/plugins/fontello/css/fontello.css at position 3 of 15 in additional filter chain; firing Filter: 'SAMLEntryPoint' 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-283] DEBUG web.FilterChainProxy - /assets/plugins/fontello/css/fontello.css at position 4 of 15 in additional filter chain; firing Filter: 'MetadataDisplayFilter' 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-283] DEBUG web.FilterChainProxy - /assets/plugins/fontello/css/fontello.css at position 5 of 15 in additional filter chain; firing Filter: 'SAMLProcessingFilter' 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-283] DEBUG web.FilterChainProxy - /assets/plugins/fontello/css/fontello.css at position 6 of 15 in additional filter chain; firing Filter: 'SAMLLogoutFilter' 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-283] DEBUG web.FilterChainProxy - /assets/plugins/fontello/css/fontello.css at position 7 of 15 in additional filter chain; firing Filter: 'SAMLLogoutProcessingFilter' 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-283] DEBUG web.FilterChainProxy - /assets/plugins/fontello/css/fontello.css at position 8 of 15 in additional filter chain; firing Filter: 'MutableLogoutFilter' 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-283] DEBUG web.FilterChainProxy - /assets/plugins/fontello/css/fontello.css at position 9 of 15 in additional filter chain; firing Filter: 'GrailsUsernamePasswordAuthenticationFilter' 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-283] DEBUG web.FilterChainProxy - /assets/plugins/fontello/css/fontello.css at position 10 of 15 in additional filter chain; firing Filter: 'SaviyntRestAuthenticationFilter' 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-283] DEBUG web.FilterChainProxy - /assets/plugins/fontello/css/fontello.css at position 11 of 15 in additional filter chain; firing Filter: 'SecurityContextHolderAwareRequestFilter' 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-283] DEBUG web.FilterChainProxy - /assets/plugins/fontello/css/fontello.css at position 12 of 15 in additional filter chain; firing Filter: 'GrailsRememberMeAuthenticationFilter' 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-283] DEBUG web.FilterChainProxy - /assets/plugins/fontello/css/fontello.css at position 13 of 15 in additional filter chain; firing Filter: 'GrailsAnonymousAuthenticationFilter' 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-283] DEBUG web.FilterChainProxy - /assets/plugins/fontello/css/fontello.css at position 14 of 15 in additional filter chain; firing Filter: 'ExceptionTranslationFilter' 2023-06-23/02:33:44.739 [{}] [https-jsse-nio-443-exec-283] DEBUG web.FilterChainProxy - /assets/plugins/fontello/css/fontello.css at position 15 of 15 in additional filter chain; firing Filter: 'FilterSecurityInterceptor' 2023-06-23/02:33:44.740 [{}] [https-jsse-nio-443-exec-283] DEBUG intercept.FilterSecurityInterceptor - Secure object: FilterInvocation: URL: /assets/plugins/fontello/css/fontello.css; Attributes: [permitAll] 2023-06-23/02:33:44.740 [{}] [https-jsse-nio-443-exec-283] DEBUG intercept.FilterSecurityInterceptor - Previously Authenticated: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE 2023-06-23/02:33:44.740 [{}] [https-jsse-nio-443-exec-283] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.740 [{}] [https-jsse-nio-443-exec-283] DEBUG intercept.FilterSecurityInterceptor - Authorization successful 2023-06-23/02:33:44.740 [{}] [https-jsse-nio-443-exec-283] DEBUG intercept.FilterSecurityInterceptor - RunAsManager did not change Authentication object 2023-06-23/02:33:44.740 [{}] [https-jsse-nio-443-exec-283] DEBUG web.FilterChainProxy - /assets/plugins/fontello/css/fontello.css reached end of additional filter chain; proceeding with original chain 2023-06-23/02:33:44.740 [{}] [https-jsse-nio-443-exec-283] DEBUG access.ExceptionTranslationFilter - Chain processed normally 2023-06-23/02:33:44.740 [{}] [https-jsse-nio-443-exec-283] DEBUG context.SecurityContextPersistenceFilter - SecurityContextHolder now cleared, as request processing completed 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG matcher.AntPathRequestMatcher - Checking match of request : '/assets/plugins/uniform/css/uniform.default.css'; against '/api/**' 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG matcher.AntPathRequestMatcher - Request '/assets/plugins/uniform/css/uniform.default.css' matched by universal pattern '/**' 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG web.FilterChainProxy - /assets/plugins/uniform/css/uniform.default.css at position 1 of 15 in additional filter chain; firing Filter: 'SecurityRequestHolderFilter' 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG web.FilterChainProxy - /assets/plugins/uniform/css/uniform.default.css at position 2 of 15 in additional filter chain; firing Filter: 'SecurityContextPersistenceFilter' 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG context.HttpSessionSecurityContextRepository - Obtained a valid SecurityContext from SPRING_SECURITY_CONTEXT: 'org.springframework.security.core.context.SecurityContextImpl@fdf8eccf: Authentication: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE' 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG web.FilterChainProxy - /assets/plugins/uniform/css/uniform.default.css at position 3 of 15 in additional filter chain; firing Filter: 'SAMLEntryPoint' 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG web.FilterChainProxy - /assets/plugins/uniform/css/uniform.default.css at position 4 of 15 in additional filter chain; firing Filter: 'MetadataDisplayFilter' 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG web.FilterChainProxy - /assets/plugins/uniform/css/uniform.default.css at position 5 of 15 in additional filter chain; firing Filter: 'SAMLProcessingFilter' 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG web.FilterChainProxy - /assets/plugins/uniform/css/uniform.default.css at position 6 of 15 in additional filter chain; firing Filter: 'SAMLLogoutFilter' 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG web.FilterChainProxy - /assets/plugins/uniform/css/uniform.default.css at position 7 of 15 in additional filter chain; firing Filter: 'SAMLLogoutProcessingFilter' 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG web.FilterChainProxy - /assets/plugins/uniform/css/uniform.default.css at position 8 of 15 in additional filter chain; firing Filter: 'MutableLogoutFilter' 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG web.FilterChainProxy - /assets/plugins/uniform/css/uniform.default.css at position 9 of 15 in additional filter chain; firing Filter: 'GrailsUsernamePasswordAuthenticationFilter' 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG web.FilterChainProxy - /assets/plugins/uniform/css/uniform.default.css at position 10 of 15 in additional filter chain; firing Filter: 'SaviyntRestAuthenticationFilter' 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG web.FilterChainProxy - /assets/plugins/uniform/css/uniform.default.css at position 11 of 15 in additional filter chain; firing Filter: 'SecurityContextHolderAwareRequestFilter' 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG web.FilterChainProxy - /assets/plugins/uniform/css/uniform.default.css at position 12 of 15 in additional filter chain; firing Filter: 'GrailsRememberMeAuthenticationFilter' 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG web.FilterChainProxy - /assets/plugins/uniform/css/uniform.default.css at position 13 of 15 in additional filter chain; firing Filter: 'GrailsAnonymousAuthenticationFilter' 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG web.FilterChainProxy - /assets/plugins/uniform/css/uniform.default.css at position 14 of 15 in additional filter chain; firing Filter: 'ExceptionTranslationFilter' 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG web.FilterChainProxy - /assets/plugins/uniform/css/uniform.default.css at position 15 of 15 in additional filter chain; firing Filter: 'FilterSecurityInterceptor' 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG intercept.FilterSecurityInterceptor - Secure object: FilterInvocation: URL: /assets/plugins/uniform/css/uniform.default.css; Attributes: [permitAll] 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG intercept.FilterSecurityInterceptor - Previously Authenticated: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG intercept.FilterSecurityInterceptor - Authorization successful 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG intercept.FilterSecurityInterceptor - RunAsManager did not change Authentication object 2023-06-23/02:33:44.744 [{}] [https-jsse-nio-443-exec-238] DEBUG web.FilterChainProxy - /assets/plugins/uniform/css/uniform.default.css reached end of additional filter chain; proceeding with original chain 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-238] DEBUG access.ExceptionTranslationFilter - Chain processed normally 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-238] DEBUG context.SecurityContextPersistenceFilter - SecurityContextHolder now cleared, as request processing completed 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG matcher.AntPathRequestMatcher - Checking match of request : '/assets/plugins/bootstrap/css/bootstrap.min.css'; against '/api/**' 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG matcher.AntPathRequestMatcher - Request '/assets/plugins/bootstrap/css/bootstrap.min.css' matched by universal pattern '/**' 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG web.FilterChainProxy - /assets/plugins/bootstrap/css/bootstrap.min.css at position 1 of 15 in additional filter chain; firing Filter: 'SecurityRequestHolderFilter' 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG web.FilterChainProxy - /assets/plugins/bootstrap/css/bootstrap.min.css at position 2 of 15 in additional filter chain; firing Filter: 'SecurityContextPersistenceFilter' 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG context.HttpSessionSecurityContextRepository - Obtained a valid SecurityContext from SPRING_SECURITY_CONTEXT: 'org.springframework.security.core.context.SecurityContextImpl@fdf8eccf: Authentication: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE' 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG web.FilterChainProxy - /assets/plugins/bootstrap/css/bootstrap.min.css at position 3 of 15 in additional filter chain; firing Filter: 'SAMLEntryPoint' 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG web.FilterChainProxy - /assets/plugins/bootstrap/css/bootstrap.min.css at position 4 of 15 in additional filter chain; firing Filter: 'MetadataDisplayFilter' 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG web.FilterChainProxy - /assets/plugins/bootstrap/css/bootstrap.min.css at position 5 of 15 in additional filter chain; firing Filter: 'SAMLProcessingFilter' 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG web.FilterChainProxy - /assets/plugins/bootstrap/css/bootstrap.min.css at position 6 of 15 in additional filter chain; firing Filter: 'SAMLLogoutFilter' 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG web.FilterChainProxy - /assets/plugins/bootstrap/css/bootstrap.min.css at position 7 of 15 in additional filter chain; firing Filter: 'SAMLLogoutProcessingFilter' 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG web.FilterChainProxy - /assets/plugins/bootstrap/css/bootstrap.min.css at position 8 of 15 in additional filter chain; firing Filter: 'MutableLogoutFilter' 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG web.FilterChainProxy - /assets/plugins/bootstrap/css/bootstrap.min.css at position 9 of 15 in additional filter chain; firing Filter: 'GrailsUsernamePasswordAuthenticationFilter' 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG web.FilterChainProxy - /assets/plugins/bootstrap/css/bootstrap.min.css at position 10 of 15 in additional filter chain; firing Filter: 'SaviyntRestAuthenticationFilter' 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG web.FilterChainProxy - /assets/plugins/bootstrap/css/bootstrap.min.css at position 11 of 15 in additional filter chain; firing Filter: 'SecurityContextHolderAwareRequestFilter' 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG web.FilterChainProxy - /assets/plugins/bootstrap/css/bootstrap.min.css at position 12 of 15 in additional filter chain; firing Filter: 'GrailsRememberMeAuthenticationFilter' 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG web.FilterChainProxy - /assets/plugins/bootstrap/css/bootstrap.min.css at position 13 of 15 in additional filter chain; firing Filter: 'GrailsAnonymousAuthenticationFilter' 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG web.FilterChainProxy - /assets/plugins/bootstrap/css/bootstrap.min.css at position 14 of 15 in additional filter chain; firing Filter: 'ExceptionTranslationFilter' 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG web.FilterChainProxy - /assets/plugins/bootstrap/css/bootstrap.min.css at position 15 of 15 in additional filter chain; firing Filter: 'FilterSecurityInterceptor' 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG intercept.FilterSecurityInterceptor - Secure object: FilterInvocation: URL: /assets/plugins/bootstrap/css/bootstrap.min.css; Attributes: [permitAll] 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG intercept.FilterSecurityInterceptor - Previously Authenticated: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG intercept.FilterSecurityInterceptor - Authorization successful 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG intercept.FilterSecurityInterceptor - RunAsManager did not change Authentication object 2023-06-23/02:33:44.745 [{}] [https-jsse-nio-443-exec-262] DEBUG web.FilterChainProxy - /assets/plugins/bootstrap/css/bootstrap.min.css reached end of additional filter chain; proceeding with original chain 2023-06-23/02:33:44.746 [{}] [https-jsse-nio-443-exec-262] DEBUG access.ExceptionTranslationFilter - Chain processed normally 2023-06-23/02:33:44.746 [{}] [https-jsse-nio-443-exec-262] DEBUG context.SecurityContextPersistenceFilter - SecurityContextHolder now cleared, as request processing completed 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG matcher.AntPathRequestMatcher - Checking match of request : '/assets/css/style-metronic.css'; against '/api/**' 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG matcher.AntPathRequestMatcher - Request '/assets/css/style-metronic.css' matched by universal pattern '/**' 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG web.FilterChainProxy - /assets/css/style-metronic.css at position 1 of 15 in additional filter chain; firing Filter: 'SecurityRequestHolderFilter' 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG web.FilterChainProxy - /assets/css/style-metronic.css at position 2 of 15 in additional filter chain; firing Filter: 'SecurityContextPersistenceFilter' 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG context.HttpSessionSecurityContextRepository - Obtained a valid SecurityContext from SPRING_SECURITY_CONTEXT: 'org.springframework.security.core.context.SecurityContextImpl@fdf8eccf: Authentication: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE' 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG web.FilterChainProxy - /assets/css/style-metronic.css at position 3 of 15 in additional filter chain; firing Filter: 'SAMLEntryPoint' 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG web.FilterChainProxy - /assets/css/style-metronic.css at position 4 of 15 in additional filter chain; firing Filter: 'MetadataDisplayFilter' 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG web.FilterChainProxy - /assets/css/style-metronic.css at position 5 of 15 in additional filter chain; firing Filter: 'SAMLProcessingFilter' 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG web.FilterChainProxy - /assets/css/style-metronic.css at position 6 of 15 in additional filter chain; firing Filter: 'SAMLLogoutFilter' 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG web.FilterChainProxy - /assets/css/style-metronic.css at position 7 of 15 in additional filter chain; firing Filter: 'SAMLLogoutProcessingFilter' 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG web.FilterChainProxy - /assets/css/style-metronic.css at position 8 of 15 in additional filter chain; firing Filter: 'MutableLogoutFilter' 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG web.FilterChainProxy - /assets/css/style-metronic.css at position 9 of 15 in additional filter chain; firing Filter: 'GrailsUsernamePasswordAuthenticationFilter' 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG web.FilterChainProxy - /assets/css/style-metronic.css at position 10 of 15 in additional filter chain; firing Filter: 'SaviyntRestAuthenticationFilter' 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG web.FilterChainProxy - /assets/css/style-metronic.css at position 11 of 15 in additional filter chain; firing Filter: 'SecurityContextHolderAwareRequestFilter' 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG web.FilterChainProxy - /assets/css/style-metronic.css at position 12 of 15 in additional filter chain; firing Filter: 'GrailsRememberMeAuthenticationFilter' 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG web.FilterChainProxy - /assets/css/style-metronic.css at position 13 of 15 in additional filter chain; firing Filter: 'GrailsAnonymousAuthenticationFilter' 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG web.FilterChainProxy - /assets/css/style-metronic.css at position 14 of 15 in additional filter chain; firing Filter: 'ExceptionTranslationFilter' 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG web.FilterChainProxy - /assets/css/style-metronic.css at position 15 of 15 in additional filter chain; firing Filter: 'FilterSecurityInterceptor' 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG intercept.FilterSecurityInterceptor - Secure object: FilterInvocation: URL: /assets/css/style-metronic.css; Attributes: [permitAll] 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG intercept.FilterSecurityInterceptor - Previously Authenticated: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG intercept.FilterSecurityInterceptor - Authorization successful 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG intercept.FilterSecurityInterceptor - RunAsManager did not change Authentication object 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG web.FilterChainProxy - /assets/css/style-metronic.css reached end of additional filter chain; proceeding with original chain 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG access.ExceptionTranslationFilter - Chain processed normally 2023-06-23/02:33:44.749 [{}] [https-jsse-nio-443-exec-258] DEBUG context.SecurityContextPersistenceFilter - SecurityContextHolder now cleared, as request processing completed 2023-06-23/02:33:44.754 [{}] [https-jsse-nio-443-exec-221] DEBUG matcher.AntPathRequestMatcher - Checking match of request : '/assets/css/style-responsive.css'; against '/api/**' 2023-06-23/02:33:44.754 [{}] [https-jsse-nio-443-exec-221] DEBUG matcher.AntPathRequestMatcher - Request '/assets/css/style-responsive.css' matched by universal pattern '/**' 2023-06-23/02:33:44.754 [{}] [https-jsse-nio-443-exec-221] DEBUG web.FilterChainProxy - /assets/css/style-responsive.css at position 1 of 15 in additional filter chain; firing Filter: 'SecurityRequestHolderFilter' 2023-06-23/02:33:44.754 [{}] [https-jsse-nio-443-exec-221] DEBUG web.FilterChainProxy - /assets/css/style-responsive.css at position 2 of 15 in additional filter chain; firing Filter: 'SecurityContextPersistenceFilter' 2023-06-23/02:33:44.754 [{}] [https-jsse-nio-443-exec-221] DEBUG context.HttpSessionSecurityContextRepository - Obtained a valid SecurityContext from SPRING_SECURITY_CONTEXT: 'org.springframework.security.core.context.SecurityContextImpl@fdf8eccf: Authentication: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE' 2023-06-23/02:33:44.754 [{}] [https-jsse-nio-443-exec-221] DEBUG web.FilterChainProxy - /assets/css/style-responsive.css at position 3 of 15 in additional filter chain; firing Filter: 'SAMLEntryPoint' 2023-06-23/02:33:44.754 [{}] [https-jsse-nio-443-exec-221] DEBUG web.FilterChainProxy - /assets/css/style-responsive.css at position 4 of 15 in additional filter chain; firing Filter: 'MetadataDisplayFilter' 2023-06-23/02:33:44.754 [{}] [https-jsse-nio-443-exec-221] DEBUG web.FilterChainProxy - /assets/css/style-responsive.css at position 5 of 15 in additional filter chain; firing Filter: 'SAMLProcessingFilter' 2023-06-23/02:33:44.754 [{}] [https-jsse-nio-443-exec-221] DEBUG web.FilterChainProxy - /assets/css/style-responsive.css at position 6 of 15 in additional filter chain; firing Filter: 'SAMLLogoutFilter' 2023-06-23/02:33:44.754 [{}] [https-jsse-nio-443-exec-221] DEBUG web.FilterChainProxy - /assets/css/style-responsive.css at position 7 of 15 in additional filter chain; firing Filter: 'SAMLLogoutProcessingFilter' 2023-06-23/02:33:44.754 [{}] [https-jsse-nio-443-exec-221] DEBUG web.FilterChainProxy - /assets/css/style-responsive.css at position 8 of 15 in additional filter chain; firing Filter: 'MutableLogoutFilter' 2023-06-23/02:33:44.754 [{}] [https-jsse-nio-443-exec-221] DEBUG web.FilterChainProxy - /assets/css/style-responsive.css at position 9 of 15 in additional filter chain; firing Filter: 'GrailsUsernamePasswordAuthenticationFilter' 2023-06-23/02:33:44.754 [{}] [https-jsse-nio-443-exec-221] DEBUG web.FilterChainProxy - /assets/css/style-responsive.css at position 10 of 15 in additional filter chain; firing Filter: 'SaviyntRestAuthenticationFilter' 2023-06-23/02:33:44.754 [{}] [https-jsse-nio-443-exec-221] DEBUG web.FilterChainProxy - /assets/css/style-responsive.css at position 11 of 15 in additional filter chain; firing Filter: 'SecurityContextHolderAwareRequestFilter' 2023-06-23/02:33:44.754 [{}] [https-jsse-nio-443-exec-221] DEBUG web.FilterChainProxy - /assets/css/style-responsive.css at position 12 of 15 in additional filter chain; firing Filter: 'GrailsRememberMeAuthenticationFilter' 2023-06-23/02:33:44.754 [{}] [https-jsse-nio-443-exec-221] DEBUG web.FilterChainProxy - /assets/css/style-responsive.css at position 13 of 15 in additional filter chain; firing Filter: 'GrailsAnonymousAuthenticationFilter' 2023-06-23/02:33:44.754 [{}] [https-jsse-nio-443-exec-221] DEBUG web.FilterChainProxy - /assets/css/style-responsive.css at position 14 of 15 in additional filter chain; firing Filter: 'ExceptionTranslationFilter' 2023-06-23/02:33:44.754 [{}] [https-jsse-nio-443-exec-221] DEBUG web.FilterChainProxy - /assets/css/style-responsive.css at position 15 of 15 in additional filter chain; firing Filter: 'FilterSecurityInterceptor' 2023-06-23/02:33:44.755 [{}] [https-jsse-nio-443-exec-221] DEBUG intercept.FilterSecurityInterceptor - Secure object: FilterInvocation: URL: /assets/css/style-responsive.css; Attributes: [permitAll] 2023-06-23/02:33:44.755 [{}] [https-jsse-nio-443-exec-221] DEBUG intercept.FilterSecurityInterceptor - Previously Authenticated: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE 2023-06-23/02:33:44.755 [{}] [https-jsse-nio-443-exec-221] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.755 [{}] [https-jsse-nio-443-exec-221] DEBUG intercept.FilterSecurityInterceptor - Authorization successful 2023-06-23/02:33:44.755 [{}] [https-jsse-nio-443-exec-221] DEBUG intercept.FilterSecurityInterceptor - RunAsManager did not change Authentication object 2023-06-23/02:33:44.755 [{}] [https-jsse-nio-443-exec-221] DEBUG web.FilterChainProxy - /assets/css/style-responsive.css reached end of additional filter chain; proceeding with original chain 2023-06-23/02:33:44.755 [{}] [https-jsse-nio-443-exec-221] DEBUG access.ExceptionTranslationFilter - Chain processed normally 2023-06-23/02:33:44.755 [{}] [https-jsse-nio-443-exec-221] DEBUG context.SecurityContextPersistenceFilter - SecurityContextHolder now cleared, as request processing completed 2023-06-23/02:33:44.788 [{}] [https-jsse-nio-443-exec-271] DEBUG matcher.AntPathRequestMatcher - Checking match of request : '/assets/css/themes/light.css'; against '/api/**' 2023-06-23/02:33:44.788 [{}] [https-jsse-nio-443-exec-271] DEBUG matcher.AntPathRequestMatcher - Request '/assets/css/themes/light.css' matched by universal pattern '/**' 2023-06-23/02:33:44.788 [{}] [https-jsse-nio-443-exec-271] DEBUG web.FilterChainProxy - /assets/css/themes/light.css at position 1 of 15 in additional filter chain; firing Filter: 'SecurityRequestHolderFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG web.FilterChainProxy - /assets/css/themes/light.css at position 2 of 15 in additional filter chain; firing Filter: 'SecurityContextPersistenceFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG context.HttpSessionSecurityContextRepository - Obtained a valid SecurityContext from SPRING_SECURITY_CONTEXT: 'org.springframework.security.core.context.SecurityContextImpl@fdf8eccf: Authentication: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG web.FilterChainProxy - /assets/css/themes/light.css at position 3 of 15 in additional filter chain; firing Filter: 'SAMLEntryPoint' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG web.FilterChainProxy - /assets/css/themes/light.css at position 4 of 15 in additional filter chain; firing Filter: 'MetadataDisplayFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG web.FilterChainProxy - /assets/css/themes/light.css at position 5 of 15 in additional filter chain; firing Filter: 'SAMLProcessingFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG web.FilterChainProxy - /assets/css/themes/light.css at position 6 of 15 in additional filter chain; firing Filter: 'SAMLLogoutFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG web.FilterChainProxy - /assets/css/themes/light.css at position 7 of 15 in additional filter chain; firing Filter: 'SAMLLogoutProcessingFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG web.FilterChainProxy - /assets/css/themes/light.css at position 8 of 15 in additional filter chain; firing Filter: 'MutableLogoutFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG web.FilterChainProxy - /assets/css/themes/light.css at position 9 of 15 in additional filter chain; firing Filter: 'GrailsUsernamePasswordAuthenticationFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG web.FilterChainProxy - /assets/css/themes/light.css at position 10 of 15 in additional filter chain; firing Filter: 'SaviyntRestAuthenticationFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG web.FilterChainProxy - /assets/css/themes/light.css at position 11 of 15 in additional filter chain; firing Filter: 'SecurityContextHolderAwareRequestFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG web.FilterChainProxy - /assets/css/themes/light.css at position 12 of 15 in additional filter chain; firing Filter: 'GrailsRememberMeAuthenticationFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG web.FilterChainProxy - /assets/css/themes/light.css at position 13 of 15 in additional filter chain; firing Filter: 'GrailsAnonymousAuthenticationFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG web.FilterChainProxy - /assets/css/themes/light.css at position 14 of 15 in additional filter chain; firing Filter: 'ExceptionTranslationFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG web.FilterChainProxy - /assets/css/themes/light.css at position 15 of 15 in additional filter chain; firing Filter: 'FilterSecurityInterceptor' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG intercept.FilterSecurityInterceptor - Secure object: FilterInvocation: URL: /assets/css/themes/light.css; Attributes: [permitAll] 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG intercept.FilterSecurityInterceptor - Previously Authenticated: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG intercept.FilterSecurityInterceptor - Authorization successful 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG intercept.FilterSecurityInterceptor - RunAsManager did not change Authentication object 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG web.FilterChainProxy - /assets/css/themes/light.css reached end of additional filter chain; proceeding with original chain 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG access.ExceptionTranslationFilter - Chain processed normally 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-271] DEBUG context.SecurityContextPersistenceFilter - SecurityContextHolder now cleared, as request processing completed 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-296] DEBUG matcher.AntPathRequestMatcher - Checking match of request : '/assets/css/plugins.css'; against '/api/**' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-296] DEBUG matcher.AntPathRequestMatcher - Request '/assets/css/plugins.css' matched by universal pattern '/**' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-296] DEBUG web.FilterChainProxy - /assets/css/plugins.css at position 1 of 15 in additional filter chain; firing Filter: 'SecurityRequestHolderFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-296] DEBUG web.FilterChainProxy - /assets/css/plugins.css at position 2 of 15 in additional filter chain; firing Filter: 'SecurityContextPersistenceFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-296] DEBUG context.HttpSessionSecurityContextRepository - Obtained a valid SecurityContext from SPRING_SECURITY_CONTEXT: 'org.springframework.security.core.context.SecurityContextImpl@fdf8eccf: Authentication: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-296] DEBUG web.FilterChainProxy - /assets/css/plugins.css at position 3 of 15 in additional filter chain; firing Filter: 'SAMLEntryPoint' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-296] DEBUG web.FilterChainProxy - /assets/css/plugins.css at position 4 of 15 in additional filter chain; firing Filter: 'MetadataDisplayFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-296] DEBUG web.FilterChainProxy - /assets/css/plugins.css at position 5 of 15 in additional filter chain; firing Filter: 'SAMLProcessingFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-296] DEBUG web.FilterChainProxy - /assets/css/plugins.css at position 6 of 15 in additional filter chain; firing Filter: 'SAMLLogoutFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-296] DEBUG web.FilterChainProxy - /assets/css/plugins.css at position 7 of 15 in additional filter chain; firing Filter: 'SAMLLogoutProcessingFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-296] DEBUG web.FilterChainProxy - /assets/css/plugins.css at position 8 of 15 in additional filter chain; firing Filter: 'MutableLogoutFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-296] DEBUG web.FilterChainProxy - /assets/css/plugins.css at position 9 of 15 in additional filter chain; firing Filter: 'GrailsUsernamePasswordAuthenticationFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-296] DEBUG web.FilterChainProxy - /assets/css/plugins.css at position 10 of 15 in additional filter chain; firing Filter: 'SaviyntRestAuthenticationFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-296] DEBUG web.FilterChainProxy - /assets/css/plugins.css at position 11 of 15 in additional filter chain; firing Filter: 'SecurityContextHolderAwareRequestFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-296] DEBUG web.FilterChainProxy - /assets/css/plugins.css at position 12 of 15 in additional filter chain; firing Filter: 'GrailsRememberMeAuthenticationFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-296] DEBUG web.FilterChainProxy - /assets/css/plugins.css at position 13 of 15 in additional filter chain; firing Filter: 'GrailsAnonymousAuthenticationFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-296] DEBUG web.FilterChainProxy - /assets/css/plugins.css at position 14 of 15 in additional filter chain; firing Filter: 'ExceptionTranslationFilter' 2023-06-23/02:33:44.789 [{}] [https-jsse-nio-443-exec-296] DEBUG web.FilterChainProxy - /assets/css/plugins.css at position 15 of 15 in additional filter chain; firing Filter: 'FilterSecurityInterceptor' 2023-06-23/02:33:44.790 [{}] [https-jsse-nio-443-exec-296] DEBUG intercept.FilterSecurityInterceptor - Secure object: FilterInvocation: URL: /assets/css/plugins.css; Attributes: [permitAll] 2023-06-23/02:33:44.790 [{}] [https-jsse-nio-443-exec-296] DEBUG intercept.FilterSecurityInterceptor - Previously Authenticated: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE 2023-06-23/02:33:44.790 [{}] [https-jsse-nio-443-exec-296] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.790 [{}] [https-jsse-nio-443-exec-296] DEBUG intercept.FilterSecurityInterceptor - Authorization successful 2023-06-23/02:33:44.790 [{}] [https-jsse-nio-443-exec-296] DEBUG intercept.FilterSecurityInterceptor - RunAsManager did not change Authentication object 2023-06-23/02:33:44.790 [{}] [https-jsse-nio-443-exec-296] DEBUG web.FilterChainProxy - /assets/css/plugins.css reached end of additional filter chain; proceeding with original chain 2023-06-23/02:33:44.790 [{}] [https-jsse-nio-443-exec-296] DEBUG access.ExceptionTranslationFilter - Chain processed normally 2023-06-23/02:33:44.790 [{}] [https-jsse-nio-443-exec-296] DEBUG context.SecurityContextPersistenceFilter - SecurityContextHolder now cleared, as request processing completed 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG matcher.AntPathRequestMatcher - Checking match of request : '/assets/css/sv-icon.css'; against '/api/**' 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG matcher.AntPathRequestMatcher - Request '/assets/css/sv-icon.css' matched by universal pattern '/**' 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG web.FilterChainProxy - /assets/css/sv-icon.css at position 1 of 15 in additional filter chain; firing Filter: 'SecurityRequestHolderFilter' 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG web.FilterChainProxy - /assets/css/sv-icon.css at position 2 of 15 in additional filter chain; firing Filter: 'SecurityContextPersistenceFilter' 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG context.HttpSessionSecurityContextRepository - Obtained a valid SecurityContext from SPRING_SECURITY_CONTEXT: 'org.springframework.security.core.context.SecurityContextImpl@fdf8eccf: Authentication: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE' 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG web.FilterChainProxy - /assets/css/sv-icon.css at position 3 of 15 in additional filter chain; firing Filter: 'SAMLEntryPoint' 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG web.FilterChainProxy - /assets/css/sv-icon.css at position 4 of 15 in additional filter chain; firing Filter: 'MetadataDisplayFilter' 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG web.FilterChainProxy - /assets/css/sv-icon.css at position 5 of 15 in additional filter chain; firing Filter: 'SAMLProcessingFilter' 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG web.FilterChainProxy - /assets/css/sv-icon.css at position 6 of 15 in additional filter chain; firing Filter: 'SAMLLogoutFilter' 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG web.FilterChainProxy - /assets/css/sv-icon.css at position 7 of 15 in additional filter chain; firing Filter: 'SAMLLogoutProcessingFilter' 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG web.FilterChainProxy - /assets/css/sv-icon.css at position 8 of 15 in additional filter chain; firing Filter: 'MutableLogoutFilter' 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG web.FilterChainProxy - /assets/css/sv-icon.css at position 9 of 15 in additional filter chain; firing Filter: 'GrailsUsernamePasswordAuthenticationFilter' 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG web.FilterChainProxy - /assets/css/sv-icon.css at position 10 of 15 in additional filter chain; firing Filter: 'SaviyntRestAuthenticationFilter' 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG web.FilterChainProxy - /assets/css/sv-icon.css at position 11 of 15 in additional filter chain; firing Filter: 'SecurityContextHolderAwareRequestFilter' 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG web.FilterChainProxy - /assets/css/sv-icon.css at position 12 of 15 in additional filter chain; firing Filter: 'GrailsRememberMeAuthenticationFilter' 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG web.FilterChainProxy - /assets/css/sv-icon.css at position 13 of 15 in additional filter chain; firing Filter: 'GrailsAnonymousAuthenticationFilter' 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG web.FilterChainProxy - /assets/css/sv-icon.css at position 14 of 15 in additional filter chain; firing Filter: 'ExceptionTranslationFilter' 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG web.FilterChainProxy - /assets/css/sv-icon.css at position 15 of 15 in additional filter chain; firing Filter: 'FilterSecurityInterceptor' 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG intercept.FilterSecurityInterceptor - Secure object: FilterInvocation: URL: /assets/css/sv-icon.css; Attributes: [permitAll] 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG intercept.FilterSecurityInterceptor - Previously Authenticated: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG intercept.FilterSecurityInterceptor - Authorization successful 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG intercept.FilterSecurityInterceptor - RunAsManager did not change Authentication object 2023-06-23/02:33:44.793 [{}] [https-jsse-nio-443-exec-264] DEBUG web.FilterChainProxy - /assets/css/sv-icon.css reached end of additional filter chain; proceeding with original chain 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG matcher.AntPathRequestMatcher - Checking match of request : '/assets/css/sv_pam_icons.css'; against '/api/**' 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG matcher.AntPathRequestMatcher - Request '/assets/css/sv_pam_icons.css' matched by universal pattern '/**' 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG web.FilterChainProxy - /assets/css/SV_PAM_icons.css at position 1 of 15 in additional filter chain; firing Filter: 'SecurityRequestHolderFilter' 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG web.FilterChainProxy - /assets/css/SV_PAM_icons.css at position 2 of 15 in additional filter chain; firing Filter: 'SecurityContextPersistenceFilter' 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG context.HttpSessionSecurityContextRepository - Obtained a valid SecurityContext from SPRING_SECURITY_CONTEXT: 'org.springframework.security.core.context.SecurityContextImpl@fdf8eccf: Authentication: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE' 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG web.FilterChainProxy - /assets/css/SV_PAM_icons.css at position 3 of 15 in additional filter chain; firing Filter: 'SAMLEntryPoint' 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-264] DEBUG access.ExceptionTranslationFilter - Chain processed normally 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-264] DEBUG context.SecurityContextPersistenceFilter - SecurityContextHolder now cleared, as request processing completed 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG web.FilterChainProxy - /assets/css/SV_PAM_icons.css at position 4 of 15 in additional filter chain; firing Filter: 'MetadataDisplayFilter' 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG web.FilterChainProxy - /assets/css/SV_PAM_icons.css at position 5 of 15 in additional filter chain; firing Filter: 'SAMLProcessingFilter' 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG web.FilterChainProxy - /assets/css/SV_PAM_icons.css at position 6 of 15 in additional filter chain; firing Filter: 'SAMLLogoutFilter' 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG web.FilterChainProxy - /assets/css/SV_PAM_icons.css at position 7 of 15 in additional filter chain; firing Filter: 'SAMLLogoutProcessingFilter' 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG web.FilterChainProxy - /assets/css/SV_PAM_icons.css at position 8 of 15 in additional filter chain; firing Filter: 'MutableLogoutFilter' 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG web.FilterChainProxy - /assets/css/SV_PAM_icons.css at position 9 of 15 in additional filter chain; firing Filter: 'GrailsUsernamePasswordAuthenticationFilter' 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG web.FilterChainProxy - /assets/css/SV_PAM_icons.css at position 10 of 15 in additional filter chain; firing Filter: 'SaviyntRestAuthenticationFilter' 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG web.FilterChainProxy - /assets/css/SV_PAM_icons.css at position 11 of 15 in additional filter chain; firing Filter: 'SecurityContextHolderAwareRequestFilter' 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG web.FilterChainProxy - /assets/css/SV_PAM_icons.css at position 12 of 15 in additional filter chain; firing Filter: 'GrailsRememberMeAuthenticationFilter' 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG web.FilterChainProxy - /assets/css/SV_PAM_icons.css at position 13 of 15 in additional filter chain; firing Filter: 'GrailsAnonymousAuthenticationFilter' 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG web.FilterChainProxy - /assets/css/SV_PAM_icons.css at position 14 of 15 in additional filter chain; firing Filter: 'ExceptionTranslationFilter' 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG web.FilterChainProxy - /assets/css/SV_PAM_icons.css at position 15 of 15 in additional filter chain; firing Filter: 'FilterSecurityInterceptor' 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG intercept.FilterSecurityInterceptor - Secure object: FilterInvocation: URL: /assets/css/SV_PAM_icons.css; Attributes: [permitAll] 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG intercept.FilterSecurityInterceptor - Previously Authenticated: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG intercept.FilterSecurityInterceptor - Authorization successful 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG intercept.FilterSecurityInterceptor - RunAsManager did not change Authentication object 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG web.FilterChainProxy - /assets/css/SV_PAM_icons.css reached end of additional filter chain; proceeding with original chain 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG access.ExceptionTranslationFilter - Chain processed normally 2023-06-23/02:33:44.794 [{}] [https-jsse-nio-443-exec-253] DEBUG context.SecurityContextPersistenceFilter - SecurityContextHolder now cleared, as request processing completed 2023-06-23/02:33:44.803 [{}] [https-jsse-nio-443-exec-292] DEBUG matcher.AntPathRequestMatcher - Checking match of request : '/assets/css/svcl-icon.css'; against '/api/**' 2023-06-23/02:33:44.803 [{}] [https-jsse-nio-443-exec-292] DEBUG matcher.AntPathRequestMatcher - Request '/assets/css/svcl-icon.css' matched by universal pattern '/**' 2023-06-23/02:33:44.803 [{}] [https-jsse-nio-443-exec-292] DEBUG web.FilterChainProxy - /assets/css/svcl-icon.css at position 1 of 15 in additional filter chain; firing Filter: 'SecurityRequestHolderFilter' 2023-06-23/02:33:44.803 [{}] [https-jsse-nio-443-exec-292] DEBUG web.FilterChainProxy - /assets/css/svcl-icon.css at position 2 of 15 in additional filter chain; firing Filter: 'SecurityContextPersistenceFilter' 2023-06-23/02:33:44.803 [{}] [https-jsse-nio-443-exec-292] DEBUG context.HttpSessionSecurityContextRepository - Obtained a valid SecurityContext from SPRING_SECURITY_CONTEXT: 'org.springframework.security.core.context.SecurityContextImpl@fdf8eccf: Authentication: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE' 2023-06-23/02:33:44.803 [{}] [https-jsse-nio-443-exec-292] DEBUG web.FilterChainProxy - /assets/css/svcl-icon.css at position 3 of 15 in additional filter chain; firing Filter: 'SAMLEntryPoint' 2023-06-23/02:33:44.803 [{}] [https-jsse-nio-443-exec-292] DEBUG web.FilterChainProxy - /assets/css/svcl-icon.css at position 4 of 15 in additional filter chain; firing Filter: 'MetadataDisplayFilter' 2023-06-23/02:33:44.803 [{}] [https-jsse-nio-443-exec-292] DEBUG web.FilterChainProxy - /assets/css/svcl-icon.css at position 5 of 15 in additional filter chain; firing Filter: 'SAMLProcessingFilter' 2023-06-23/02:33:44.803 [{}] [https-jsse-nio-443-exec-292] DEBUG web.FilterChainProxy - /assets/css/svcl-icon.css at position 6 of 15 in additional filter chain; firing Filter: 'SAMLLogoutFilter' 2023-06-23/02:33:44.803 [{}] [https-jsse-nio-443-exec-292] DEBUG web.FilterChainProxy - /assets/css/svcl-icon.css at position 7 of 15 in additional filter chain; firing Filter: 'SAMLLogoutProcessingFilter' 2023-06-23/02:33:44.803 [{}] [https-jsse-nio-443-exec-292] DEBUG web.FilterChainProxy - /assets/css/svcl-icon.css at position 8 of 15 in additional filter chain; firing Filter: 'MutableLogoutFilter' 2023-06-23/02:33:44.803 [{}] [https-jsse-nio-443-exec-292] DEBUG web.FilterChainProxy - /assets/css/svcl-icon.css at position 9 of 15 in additional filter chain; firing Filter: 'GrailsUsernamePasswordAuthenticationFilter' 2023-06-23/02:33:44.803 [{}] [https-jsse-nio-443-exec-292] DEBUG web.FilterChainProxy - /assets/css/svcl-icon.css at position 10 of 15 in additional filter chain; firing Filter: 'SaviyntRestAuthenticationFilter' 2023-06-23/02:33:44.803 [{}] [https-jsse-nio-443-exec-292] DEBUG web.FilterChainProxy - /assets/css/svcl-icon.css at position 11 of 15 in additional filter chain; firing Filter: 'SecurityContextHolderAwareRequestFilter' 2023-06-23/02:33:44.803 [{}] [https-jsse-nio-443-exec-292] DEBUG web.FilterChainProxy - /assets/css/svcl-icon.css at position 12 of 15 in additional filter chain; firing Filter: 'GrailsRememberMeAuthenticationFilter' 2023-06-23/02:33:44.803 [{}] [https-jsse-nio-443-exec-292] DEBUG web.FilterChainProxy - /assets/css/svcl-icon.css at position 13 of 15 in additional filter chain; firing Filter: 'GrailsAnonymousAuthenticationFilter' 2023-06-23/02:33:44.803 [{}] [https-jsse-nio-443-exec-292] DEBUG web.FilterChainProxy - /assets/css/svcl-icon.css at position 14 of 15 in additional filter chain; firing Filter: 'ExceptionTranslationFilter' 2023-06-23/02:33:44.803 [{}] [https-jsse-nio-443-exec-292] DEBUG web.FilterChainProxy - /assets/css/svcl-icon.css at position 15 of 15 in additional filter chain; firing Filter: 'FilterSecurityInterceptor' 2023-06-23/02:33:44.804 [{}] [https-jsse-nio-443-exec-292] DEBUG intercept.FilterSecurityInterceptor - Secure object: FilterInvocation: URL: /assets/css/svcl-icon.css; Attributes: [permitAll] 2023-06-23/02:33:44.804 [{}] [https-jsse-nio-443-exec-292] DEBUG intercept.FilterSecurityInterceptor - Previously Authenticated: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE 2023-06-23/02:33:44.804 [{}] [https-jsse-nio-443-exec-292] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.804 [{}] [https-jsse-nio-443-exec-292] DEBUG intercept.FilterSecurityInterceptor - Authorization successful 2023-06-23/02:33:44.804 [{}] [https-jsse-nio-443-exec-292] DEBUG intercept.FilterSecurityInterceptor - RunAsManager did not change Authentication object 2023-06-23/02:33:44.804 [{}] [https-jsse-nio-443-exec-292] DEBUG web.FilterChainProxy - /assets/css/svcl-icon.css reached end of additional filter chain; proceeding with original chain 2023-06-23/02:33:44.804 [{}] [https-jsse-nio-443-exec-292] DEBUG access.ExceptionTranslationFilter - Chain processed normally 2023-06-23/02:33:44.804 [{}] [https-jsse-nio-443-exec-292] DEBUG context.SecurityContextPersistenceFilter - SecurityContextHolder now cleared, as request processing completed 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG matcher.AntPathRequestMatcher - Checking match of request : '/assets/css/style.css'; against '/api/**' 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG matcher.AntPathRequestMatcher - Request '/assets/css/style.css' matched by universal pattern '/**' 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG web.FilterChainProxy - /assets/css/style.css at position 1 of 15 in additional filter chain; firing Filter: 'SecurityRequestHolderFilter' 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG web.FilterChainProxy - /assets/css/style.css at position 2 of 15 in additional filter chain; firing Filter: 'SecurityContextPersistenceFilter' 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG context.HttpSessionSecurityContextRepository - Obtained a valid SecurityContext from SPRING_SECURITY_CONTEXT: 'org.springframework.security.core.context.SecurityContextImpl@fdf8eccf: Authentication: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE' 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG web.FilterChainProxy - /assets/css/style.css at position 3 of 15 in additional filter chain; firing Filter: 'SAMLEntryPoint' 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG web.FilterChainProxy - /assets/css/style.css at position 4 of 15 in additional filter chain; firing Filter: 'MetadataDisplayFilter' 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG web.FilterChainProxy - /assets/css/style.css at position 5 of 15 in additional filter chain; firing Filter: 'SAMLProcessingFilter' 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG web.FilterChainProxy - /assets/css/style.css at position 6 of 15 in additional filter chain; firing Filter: 'SAMLLogoutFilter' 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG web.FilterChainProxy - /assets/css/style.css at position 7 of 15 in additional filter chain; firing Filter: 'SAMLLogoutProcessingFilter' 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG web.FilterChainProxy - /assets/css/style.css at position 8 of 15 in additional filter chain; firing Filter: 'MutableLogoutFilter' 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG web.FilterChainProxy - /assets/css/style.css at position 9 of 15 in additional filter chain; firing Filter: 'GrailsUsernamePasswordAuthenticationFilter' 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG web.FilterChainProxy - /assets/css/style.css at position 10 of 15 in additional filter chain; firing Filter: 'SaviyntRestAuthenticationFilter' 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG web.FilterChainProxy - /assets/css/style.css at position 11 of 15 in additional filter chain; firing Filter: 'SecurityContextHolderAwareRequestFilter' 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG web.FilterChainProxy - /assets/css/style.css at position 12 of 15 in additional filter chain; firing Filter: 'GrailsRememberMeAuthenticationFilter' 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG web.FilterChainProxy - /assets/css/style.css at position 13 of 15 in additional filter chain; firing Filter: 'GrailsAnonymousAuthenticationFilter' 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG web.FilterChainProxy - /assets/css/style.css at position 14 of 15 in additional filter chain; firing Filter: 'ExceptionTranslationFilter' 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG web.FilterChainProxy - /assets/css/style.css at position 15 of 15 in additional filter chain; firing Filter: 'FilterSecurityInterceptor' 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG intercept.FilterSecurityInterceptor - Secure object: FilterInvocation: URL: /assets/css/style.css; Attributes: [permitAll] 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG intercept.FilterSecurityInterceptor - Previously Authenticated: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG intercept.FilterSecurityInterceptor - Authorization successful 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG intercept.FilterSecurityInterceptor - RunAsManager did not change Authentication object 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG web.FilterChainProxy - /assets/css/style.css reached end of additional filter chain; proceeding with original chain 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG access.ExceptionTranslationFilter - Chain processed normally 2023-06-23/02:33:44.818 [{}] [https-jsse-nio-443-exec-251] DEBUG context.SecurityContextPersistenceFilter - SecurityContextHolder now cleared, as request processing completed 2023-06-23/02:33:44.829 [{}] [https-jsse-nio-443-exec-208] DEBUG matcher.AntPathRequestMatcher - Checking match of request : '/assets/css/custom.css'; against '/api/**' 2023-06-23/02:33:44.829 [{}] [https-jsse-nio-443-exec-208] DEBUG matcher.AntPathRequestMatcher - Request '/assets/css/custom.css' matched by universal pattern '/**' 2023-06-23/02:33:44.829 [{}] [https-jsse-nio-443-exec-208] DEBUG web.FilterChainProxy - /assets/css/custom.css at position 1 of 15 in additional filter chain; firing Filter: 'SecurityRequestHolderFilter' 2023-06-23/02:33:44.829 [{}] [https-jsse-nio-443-exec-208] DEBUG web.FilterChainProxy - /assets/css/custom.css at position 2 of 15 in additional filter chain; firing Filter: 'SecurityContextPersistenceFilter' 2023-06-23/02:33:44.829 [{}] [https-jsse-nio-443-exec-208] DEBUG context.HttpSessionSecurityContextRepository - Obtained a valid SecurityContext from SPRING_SECURITY_CONTEXT: 'org.springframework.security.core.context.SecurityContextImpl@fdf8eccf: Authentication: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE' 2023-06-23/02:33:44.829 [{}] [https-jsse-nio-443-exec-208] DEBUG web.FilterChainProxy - /assets/css/custom.css at position 3 of 15 in additional filter chain; firing Filter: 'SAMLEntryPoint' 2023-06-23/02:33:44.829 [{}] [https-jsse-nio-443-exec-208] DEBUG web.FilterChainProxy - /assets/css/custom.css at position 4 of 15 in additional filter chain; firing Filter: 'MetadataDisplayFilter' 2023-06-23/02:33:44.829 [{}] [https-jsse-nio-443-exec-208] DEBUG web.FilterChainProxy - /assets/css/custom.css at position 5 of 15 in additional filter chain; firing Filter: 'SAMLProcessingFilter' 2023-06-23/02:33:44.829 [{}] [https-jsse-nio-443-exec-208] DEBUG web.FilterChainProxy - /assets/css/custom.css at position 6 of 15 in additional filter chain; firing Filter: 'SAMLLogoutFilter' 2023-06-23/02:33:44.829 [{}] [https-jsse-nio-443-exec-208] DEBUG web.FilterChainProxy - /assets/css/custom.css at position 7 of 15 in additional filter chain; firing Filter: 'SAMLLogoutProcessingFilter' 2023-06-23/02:33:44.829 [{}] [https-jsse-nio-443-exec-208] DEBUG web.FilterChainProxy - /assets/css/custom.css at position 8 of 15 in additional filter chain; firing Filter: 'MutableLogoutFilter' 2023-06-23/02:33:44.830 [{}] [https-jsse-nio-443-exec-208] DEBUG web.FilterChainProxy - /assets/css/custom.css at position 9 of 15 in additional filter chain; firing Filter: 'GrailsUsernamePasswordAuthenticationFilter' 2023-06-23/02:33:44.830 [{}] [https-jsse-nio-443-exec-208] DEBUG web.FilterChainProxy - /assets/css/custom.css at position 10 of 15 in additional filter chain; firing Filter: 'SaviyntRestAuthenticationFilter' 2023-06-23/02:33:44.830 [{}] [https-jsse-nio-443-exec-208] DEBUG web.FilterChainProxy - /assets/css/custom.css at position 11 of 15 in additional filter chain; firing Filter: 'SecurityContextHolderAwareRequestFilter' 2023-06-23/02:33:44.830 [{}] [https-jsse-nio-443-exec-208] DEBUG web.FilterChainProxy - /assets/css/custom.css at position 12 of 15 in additional filter chain; firing Filter: 'GrailsRememberMeAuthenticationFilter' 2023-06-23/02:33:44.830 [{}] [https-jsse-nio-443-exec-208] DEBUG web.FilterChainProxy - /assets/css/custom.css at position 13 of 15 in additional filter chain; firing Filter: 'GrailsAnonymousAuthenticationFilter' 2023-06-23/02:33:44.830 [{}] [https-jsse-nio-443-exec-208] DEBUG web.FilterChainProxy - /assets/css/custom.css at position 14 of 15 in additional filter chain; firing Filter: 'ExceptionTranslationFilter' 2023-06-23/02:33:44.830 [{}] [https-jsse-nio-443-exec-208] DEBUG web.FilterChainProxy - /assets/css/custom.css at position 15 of 15 in additional filter chain; firing Filter: 'FilterSecurityInterceptor' 2023-06-23/02:33:44.830 [{}] [https-jsse-nio-443-exec-208] DEBUG intercept.FilterSecurityInterceptor - Secure object: FilterInvocation: URL: /assets/css/custom.css; Attributes: [permitAll] 2023-06-23/02:33:44.830 [{}] [https-jsse-nio-443-exec-208] DEBUG intercept.FilterSecurityInterceptor - Previously Authenticated: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE 2023-06-23/02:33:44.830 [{}] [https-jsse-nio-443-exec-208] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.830 [{}] [https-jsse-nio-443-exec-208] DEBUG intercept.FilterSecurityInterceptor - Authorization successful 2023-06-23/02:33:44.830 [{}] [https-jsse-nio-443-exec-208] DEBUG intercept.FilterSecurityInterceptor - RunAsManager did not change Authentication object 2023-06-23/02:33:44.830 [{}] [https-jsse-nio-443-exec-208] DEBUG web.FilterChainProxy - /assets/css/custom.css reached end of additional filter chain; proceeding with original chain 2023-06-23/02:33:44.830 [{}] [https-jsse-nio-443-exec-208] DEBUG access.ExceptionTranslationFilter - Chain processed normally 2023-06-23/02:33:44.830 [{}] [https-jsse-nio-443-exec-208] DEBUG context.SecurityContextPersistenceFilter - SecurityContextHolder now cleared, as request processing completed 2023-06-23/02:33:44.836 [{}] [https-jsse-nio-443-exec-286] DEBUG matcher.AntPathRequestMatcher - Checking match of request : '/assets/css/saviyntskin.css'; against '/api/**' 2023-06-23/02:33:44.836 [{}] [https-jsse-nio-443-exec-286] DEBUG matcher.AntPathRequestMatcher - Request '/assets/css/saviyntskin.css' matched by universal pattern '/**' 2023-06-23/02:33:44.836 [{}] [https-jsse-nio-443-exec-286] DEBUG web.FilterChainProxy - /assets/css/saviyntskin.css at position 1 of 15 in additional filter chain; firing Filter: 'SecurityRequestHolderFilter' 2023-06-23/02:33:44.836 [{}] [https-jsse-nio-443-exec-286] DEBUG web.FilterChainProxy - /assets/css/saviyntskin.css at position 2 of 15 in additional filter chain; firing Filter: 'SecurityContextPersistenceFilter' 2023-06-23/02:33:44.836 [{}] [https-jsse-nio-443-exec-286] DEBUG context.HttpSessionSecurityContextRepository - Obtained a valid SecurityContext from SPRING_SECURITY_CONTEXT: 'org.springframework.security.core.context.SecurityContextImpl@fdf8eccf: Authentication: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE' 2023-06-23/02:33:44.836 [{}] [https-jsse-nio-443-exec-286] DEBUG web.FilterChainProxy - /assets/css/saviyntskin.css at position 3 of 15 in additional filter chain; firing Filter: 'SAMLEntryPoint' 2023-06-23/02:33:44.836 [{}] [https-jsse-nio-443-exec-286] DEBUG web.FilterChainProxy - /assets/css/saviyntskin.css at position 4 of 15 in additional filter chain; firing Filter: 'MetadataDisplayFilter' 2023-06-23/02:33:44.836 [{}] [https-jsse-nio-443-exec-286] DEBUG web.FilterChainProxy - /assets/css/saviyntskin.css at position 5 of 15 in additional filter chain; firing Filter: 'SAMLProcessingFilter' 2023-06-23/02:33:44.836 [{}] [https-jsse-nio-443-exec-286] DEBUG web.FilterChainProxy - /assets/css/saviyntskin.css at position 6 of 15 in additional filter chain; firing Filter: 'SAMLLogoutFilter' 2023-06-23/02:33:44.836 [{}] [https-jsse-nio-443-exec-286] DEBUG web.FilterChainProxy - /assets/css/saviyntskin.css at position 7 of 15 in additional filter chain; firing Filter: 'SAMLLogoutProcessingFilter' 2023-06-23/02:33:44.836 [{}] [https-jsse-nio-443-exec-286] DEBUG web.FilterChainProxy - /assets/css/saviyntskin.css at position 8 of 15 in additional filter chain; firing Filter: 'MutableLogoutFilter' 2023-06-23/02:33:44.836 [{}] [https-jsse-nio-443-exec-286] DEBUG web.FilterChainProxy - /assets/css/saviyntskin.css at position 9 of 15 in additional filter chain; firing Filter: 'GrailsUsernamePasswordAuthenticationFilter' 2023-06-23/02:33:44.836 [{}] [https-jsse-nio-443-exec-286] DEBUG web.FilterChainProxy - /assets/css/saviyntskin.css at position 10 of 15 in additional filter chain; firing Filter: 'SaviyntRestAuthenticationFilter' 2023-06-23/02:33:44.836 [{}] [https-jsse-nio-443-exec-286] DEBUG web.FilterChainProxy - /assets/css/saviyntskin.css at position 11 of 15 in additional filter chain; firing Filter: 'SecurityContextHolderAwareRequestFilter' 2023-06-23/02:33:44.836 [{}] [https-jsse-nio-443-exec-286] DEBUG web.FilterChainProxy - /assets/css/saviyntskin.css at position 12 of 15 in additional filter chain; firing Filter: 'GrailsRememberMeAuthenticationFilter' 2023-06-23/02:33:44.836 [{}] [https-jsse-nio-443-exec-286] DEBUG web.FilterChainProxy - /assets/css/saviyntskin.css at position 13 of 15 in additional filter chain; firing Filter: 'GrailsAnonymousAuthenticationFilter' 2023-06-23/02:33:44.836 [{}] [https-jsse-nio-443-exec-286] DEBUG web.FilterChainProxy - /assets/css/saviyntskin.css at position 14 of 15 in additional filter chain; firing Filter: 'ExceptionTranslationFilter' 2023-06-23/02:33:44.836 [{}] [https-jsse-nio-443-exec-286] DEBUG web.FilterChainProxy - /assets/css/saviyntskin.css at position 15 of 15 in additional filter chain; firing Filter: 'FilterSecurityInterceptor' 2023-06-23/02:33:44.836 [{}] [https-jsse-nio-443-exec-286] DEBUG intercept.FilterSecurityInterceptor - Secure object: FilterInvocation: URL: /assets/css/saviyntskin.css; Attributes: [permitAll] 2023-06-23/02:33:44.837 [{}] [https-jsse-nio-443-exec-286] DEBUG intercept.FilterSecurityInterceptor - Previously Authenticated: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE 2023-06-23/02:33:44.837 [{}] [https-jsse-nio-443-exec-286] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.837 [{}] [https-jsse-nio-443-exec-286] DEBUG intercept.FilterSecurityInterceptor - Authorization successful 2023-06-23/02:33:44.837 [{}] [https-jsse-nio-443-exec-286] DEBUG intercept.FilterSecurityInterceptor - RunAsManager did not change Authentication object 2023-06-23/02:33:44.837 [{}] [https-jsse-nio-443-exec-286] DEBUG web.FilterChainProxy - /assets/css/saviyntskin.css reached end of additional filter chain; proceeding with original chain 2023-06-23/02:33:44.837 [{}] [https-jsse-nio-443-exec-286] DEBUG access.ExceptionTranslationFilter - Chain processed normally 2023-06-23/02:33:44.837 [{}] [https-jsse-nio-443-exec-286] DEBUG context.SecurityContextPersistenceFilter - SecurityContextHolder now cleared, as request processing completed 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-182] DEBUG matcher.AntPathRequestMatcher - Checking match of request : '/assets/css/sv2020-icon.css'; against '/api/**' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-182] DEBUG matcher.AntPathRequestMatcher - Request '/assets/css/sv2020-icon.css' matched by universal pattern '/**' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-182] DEBUG web.FilterChainProxy - /assets/css/sv2020-icon.css at position 1 of 15 in additional filter chain; firing Filter: 'SecurityRequestHolderFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-182] DEBUG web.FilterChainProxy - /assets/css/sv2020-icon.css at position 2 of 15 in additional filter chain; firing Filter: 'SecurityContextPersistenceFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-182] DEBUG context.HttpSessionSecurityContextRepository - Obtained a valid SecurityContext from SPRING_SECURITY_CONTEXT: 'org.springframework.security.core.context.SecurityContextImpl@fdf8eccf: Authentication: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-182] DEBUG web.FilterChainProxy - /assets/css/sv2020-icon.css at position 3 of 15 in additional filter chain; firing Filter: 'SAMLEntryPoint' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-182] DEBUG web.FilterChainProxy - /assets/css/sv2020-icon.css at position 4 of 15 in additional filter chain; firing Filter: 'MetadataDisplayFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-182] DEBUG web.FilterChainProxy - /assets/css/sv2020-icon.css at position 5 of 15 in additional filter chain; firing Filter: 'SAMLProcessingFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-182] DEBUG web.FilterChainProxy - /assets/css/sv2020-icon.css at position 6 of 15 in additional filter chain; firing Filter: 'SAMLLogoutFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-173] DEBUG matcher.AntPathRequestMatcher - Checking match of request : '/assets/css/modern-skin_customtemplatecss.css'; against '/api/**' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-173] DEBUG matcher.AntPathRequestMatcher - Request '/assets/css/modern-skin_customtemplatecss.css' matched by universal pattern '/**' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-173] DEBUG web.FilterChainProxy - /assets/css/modern-skin_customTemplateCSS.css at position 1 of 15 in additional filter chain; firing Filter: 'SecurityRequestHolderFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-173] DEBUG web.FilterChainProxy - /assets/css/modern-skin_customTemplateCSS.css at position 2 of 15 in additional filter chain; firing Filter: 'SecurityContextPersistenceFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-182] DEBUG web.FilterChainProxy - /assets/css/sv2020-icon.css at position 7 of 15 in additional filter chain; firing Filter: 'SAMLLogoutProcessingFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-182] DEBUG web.FilterChainProxy - /assets/css/sv2020-icon.css at position 8 of 15 in additional filter chain; firing Filter: 'MutableLogoutFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-173] DEBUG context.HttpSessionSecurityContextRepository - Obtained a valid SecurityContext from SPRING_SECURITY_CONTEXT: 'org.springframework.security.core.context.SecurityContextImpl@fdf8eccf: Authentication: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-173] DEBUG web.FilterChainProxy - /assets/css/modern-skin_customTemplateCSS.css at position 3 of 15 in additional filter chain; firing Filter: 'SAMLEntryPoint' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-173] DEBUG web.FilterChainProxy - /assets/css/modern-skin_customTemplateCSS.css at position 4 of 15 in additional filter chain; firing Filter: 'MetadataDisplayFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-173] DEBUG web.FilterChainProxy - /assets/css/modern-skin_customTemplateCSS.css at position 5 of 15 in additional filter chain; firing Filter: 'SAMLProcessingFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-173] DEBUG web.FilterChainProxy - /assets/css/modern-skin_customTemplateCSS.css at position 6 of 15 in additional filter chain; firing Filter: 'SAMLLogoutFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-173] DEBUG web.FilterChainProxy - /assets/css/modern-skin_customTemplateCSS.css at position 7 of 15 in additional filter chain; firing Filter: 'SAMLLogoutProcessingFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-173] DEBUG web.FilterChainProxy - /assets/css/modern-skin_customTemplateCSS.css at position 8 of 15 in additional filter chain; firing Filter: 'MutableLogoutFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-173] DEBUG web.FilterChainProxy - /assets/css/modern-skin_customTemplateCSS.css at position 9 of 15 in additional filter chain; firing Filter: 'GrailsUsernamePasswordAuthenticationFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-173] DEBUG web.FilterChainProxy - /assets/css/modern-skin_customTemplateCSS.css at position 10 of 15 in additional filter chain; firing Filter: 'SaviyntRestAuthenticationFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-182] DEBUG web.FilterChainProxy - /assets/css/sv2020-icon.css at position 9 of 15 in additional filter chain; firing Filter: 'GrailsUsernamePasswordAuthenticationFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-182] DEBUG web.FilterChainProxy - /assets/css/sv2020-icon.css at position 10 of 15 in additional filter chain; firing Filter: 'SaviyntRestAuthenticationFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-173] DEBUG web.FilterChainProxy - /assets/css/modern-skin_customTemplateCSS.css at position 11 of 15 in additional filter chain; firing Filter: 'SecurityContextHolderAwareRequestFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-173] DEBUG web.FilterChainProxy - /assets/css/modern-skin_customTemplateCSS.css at position 12 of 15 in additional filter chain; firing Filter: 'GrailsRememberMeAuthenticationFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-173] DEBUG web.FilterChainProxy - /assets/css/modern-skin_customTemplateCSS.css at position 13 of 15 in additional filter chain; firing Filter: 'GrailsAnonymousAuthenticationFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-182] DEBUG web.FilterChainProxy - /assets/css/sv2020-icon.css at position 11 of 15 in additional filter chain; firing Filter: 'SecurityContextHolderAwareRequestFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-182] DEBUG web.FilterChainProxy - /assets/css/sv2020-icon.css at position 12 of 15 in additional filter chain; firing Filter: 'GrailsRememberMeAuthenticationFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-182] DEBUG web.FilterChainProxy - /assets/css/sv2020-icon.css at position 13 of 15 in additional filter chain; firing Filter: 'GrailsAnonymousAuthenticationFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-182] DEBUG web.FilterChainProxy - /assets/css/sv2020-icon.css at position 14 of 15 in additional filter chain; firing Filter: 'ExceptionTranslationFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-182] DEBUG web.FilterChainProxy - /assets/css/sv2020-icon.css at position 15 of 15 in additional filter chain; firing Filter: 'FilterSecurityInterceptor' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-173] DEBUG web.FilterChainProxy - /assets/css/modern-skin_customTemplateCSS.css at position 14 of 15 in additional filter chain; firing Filter: 'ExceptionTranslationFilter' 2023-06-23/02:33:44.842 [{}] [https-jsse-nio-443-exec-173] DEBUG web.FilterChainProxy - /assets/css/modern-skin_customTemplateCSS.css at position 15 of 15 in additional filter chain; firing Filter: 'FilterSecurityInterceptor' 2023-06-23/02:33:44.843 [{}] [https-jsse-nio-443-exec-182] DEBUG intercept.FilterSecurityInterceptor - Secure object: FilterInvocation: URL: /assets/css/sv2020-icon.css; Attributes: [permitAll] 2023-06-23/02:33:44.843 [{}] [https-jsse-nio-443-exec-182] DEBUG intercept.FilterSecurityInterceptor - Previously Authenticated: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE 2023-06-23/02:33:44.843 [{}] [https-jsse-nio-443-exec-182] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.843 [{}] [https-jsse-nio-443-exec-182] DEBUG intercept.FilterSecurityInterceptor - Authorization successful 2023-06-23/02:33:44.843 [{}] [https-jsse-nio-443-exec-182] DEBUG intercept.FilterSecurityInterceptor - RunAsManager did not change Authentication object 2023-06-23/02:33:44.843 [{}] [https-jsse-nio-443-exec-173] DEBUG intercept.FilterSecurityInterceptor - Secure object: FilterInvocation: URL: /assets/css/modern-skin_customTemplateCSS.css; Attributes: [permitAll] 2023-06-23/02:33:44.843 [{}] [https-jsse-nio-443-exec-182] DEBUG web.FilterChainProxy - /assets/css/sv2020-icon.css reached end of additional filter chain; proceeding with original chain 2023-06-23/02:33:44.843 [{}] [https-jsse-nio-443-exec-173] DEBUG intercept.FilterSecurityInterceptor - Previously Authenticated: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE 2023-06-23/02:33:44.843 [{}] [https-jsse-nio-443-exec-173] DEBUG hierarchicalroles.RoleHierarchyImpl - getReachableGrantedAuthorities() - From the roles [ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE] one can reach [ROLE_MANAGER, ROLE_ADMIN, ROLE_ENDUSER, ROLE_ONE_CLICK_DISABLE] in zero or more steps. 2023-06-23/02:33:44.843 [{}] [https-jsse-nio-443-exec-173] DEBUG intercept.FilterSecurityInterceptor - Authorization successful 2023-06-23/02:33:44.843 [{}] [https-jsse-nio-443-exec-173] DEBUG intercept.FilterSecurityInterceptor - RunAsManager did not change Authentication object 2023-06-23/02:33:44.843 [{}] [https-jsse-nio-443-exec-173] DEBUG web.FilterChainProxy - /assets/css/modern-skin_customTemplateCSS.css reached end of additional filter chain; proceeding with original chain 2023-06-23/02:33:44.843 [{}] [https-jsse-nio-443-exec-182] DEBUG access.ExceptionTranslationFilter - Chain processed normally 2023-06-23/02:33:44.843 [{}] [https-jsse-nio-443-exec-182] DEBUG context.SecurityContextPersistenceFilter - SecurityContextHolder now cleared, as request processing completed 2023-06-23/02:33:44.843 [{}] [https-jsse-nio-443-exec-173] DEBUG access.ExceptionTranslationFilter - Chain processed normally 2023-06-23/02:33:44.843 [{}] [https-jsse-nio-443-exec-173] DEBUG context.SecurityContextPersistenceFilter - SecurityContextHolder now cleared, as request processing completed 2023-06-23/02:33:44.843 [{}] [https-jsse-nio-443-exec-222] DEBUG matcher.AntPathRequestMatcher - Checking match of request : '/assets/css/svicon2.css'; against '/api/**' 2023-06-23/02:33:44.843 [{}] [https-jsse-nio-443-exec-222] DEBUG matcher.AntPathRequestMatcher - Request '/assets/css/svicon2.css' matched by universal pattern '/**' 2023-06-23/02:33:44.843 [{}] [https-jsse-nio-443-exec-222] DEBUG web.FilterChainProxy - /assets/css/svicon2.css at position 1 of 15 in additional filter chain; firing Filter: 'SecurityRequestHolderFilter' 2023-06-23/02:33:44.844 [{}] [https-jsse-nio-443-exec-222] DEBUG web.FilterChainProxy - /assets/css/svicon2.css at position 2 of 15 in additional filter chain; firing Filter: 'SecurityContextPersistenceFilter' 2023-06-23/02:33:44.844 [{}] [https-jsse-nio-443-exec-222] DEBUG context.HttpSessionSecurityContextRepository - Obtained a valid SecurityContext from SPRING_SECURITY_CONTEXT: 'org.springframework.security.core.context.SecurityContextImpl@fdf8eccf: Authentication: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Granted Authorities: ROLE_ADMIN, ROLE_ENDUSER, ROLE_MANAGER, ROLE_ONE_CLICK_DISABLE' 2023-06-23/02:33:44.844 [{}] [https-jsse-nio-443-exec-222] DEBUG web.FilterChainProxy - /assets/css/svicon2.css at position 3 of 15 in additional filter chain; firing Filter: 'SAMLEntryPoint' 2023-06-23/02:33:44.844 [{}] [https-jsse-nio-443-exec-222] DEBUG web.FilterChainProxy - /assets/css/svicon2.css at position 4 of 15 in additional filter chain; firing Filter: 'MetadataDisplayFilter' 2023-06-23/02:33:44.844 [{}] [https-jsse-nio-443-exec-222] DEBUG web.FilterChainProxy - /assets/css/svicon2.css at position 5 of 15 in additional filter chain; firing Filter: 'SAMLProcessingFilter' 2023-06-23/02:33:44.844 [{}] [https-jsse-nio-443-exec-222] DEBUG web.FilterChainProxy - /assets/css/svicon2.css at position 6 of 15 in additional filter chain; firing Filter: 'SAMLLogoutFilter' 2023-06-23/02:33:44.844 [{}] [https-jsse-nio-443-exec-222] DEBUG web.FilterChainProxy - /assets/css/svicon2.css at position 7 of 15 in additional filter chain; firing Filter: 'SAMLLogoutProcessingFilter' 2023-06-23/02:33:44.844 [{}] [https-jsse-nio-443-exec-222] DEBUG web.FilterChainProxy - /assets/css/svicon2.css at position 8 of 15 in additional filter chain; firing Filter: 'MutableLogoutFilter' 2023-06-23/02:33:44.844 [{}] [https-jsse-nio-443-exec-222] DEBUG web.FilterChainProxy - /assets/css/svicon2.css at position 9 of 15 in additional filter chain; firing Filter: 'GrailsUsernamePasswordAuthenticationFilter' 2023-06-23/02:33:44.844 [{}] [https-jsse-nio-443-exec-222] DEBUG web.FilterChainProxy - /assets/css/svicon2.css at position 10 of 15 in additional filter chain; firing Filter: 'SaviyntRestAuthenticationFilter' 2023-06-23/02:33:44.844 [{}] [https-jsse-nio-443-exec-222] DEBUG web.FilterChainProxy - /assets/css/svicon2.css at position 11 of 15 in additional filter chain; firing Filter: 'SecurityContextHolderAwareRequestFilter' 2023-06-23/02:33:44.844 [{}] [https-jsse-nio-443-exec-222] DEBUG web.FilterChainProxy - /assets/css/svicon2.css at position 12 of 15 in additional filter chain; firing Filter: 'GrailsRememberMeAuthenticationFilter' 2023-06-23/02:33:44.844 [{}] [https-jsse-nio-443-exec-222] DEBUG web.FilterChainProxy - /assets/css/svicon2.css at position 13 of 15 in additional filter chain; firing Filter: 'GrailsAnonymousAuthenticationFilter' 2023-06-23/02:33:44.844 [{}] [https-jsse-nio-443-exec-222] DEBUG web.FilterChainProxy - /assets/css/svicon2.css at position 14 of 15 in additional filter chain; firing Filter: 'ExceptionTranslationFilter' 2023-06-23/02:33:44.844 [{}] [https-jsse-nio-443-exec-222] DEBUG web.FilterChainProxy - /assets/css/svicon2.css at position 15 of 15 in additional filter chain; firing Filter: 'FilterSecurityInterceptor' 2023-06-23/02:33:44.844 [{}] [https-jsse-nio-443-exec-222] DEBUG intercept.FilterSecurityInterceptor - Secure object: FilterInvocation: URL: /assets/css/svicon2.css; Attributes: [permitAll] 2023-06-23/02:33:44.844 [{}] [https-jsse-nio-443-exec-222] DEBUG intercept.FilterSecurityInterceptor - Previously Authenticated: org.springframework.security.providers.ExpiringUsernameAuthenticationToken@fdf8eccf: Principal: grails.plugin.springsecurity.userdetails.GrailsUser@24efaca5: Username: mkumar86; Password: [PROTECTED]; Enabled: true; AccountNonExpired: true; credentialsNonExpired: true; AccountNonLocked: true; Granted Authorities: ROLE_ADMIN,ROLE_ENDUSER,ROLE_MANAGER,ROLE_ONE_CLICK_DISABLE; Credentials: [PROTECTED]; Authenticated: true; Details: