IAM: Exception while invoke service method deleteIdP

classic Classic list List threaded Threaded
4 messages Options
Reply | Threaded
Open this post in threaded view
|

IAM: Exception while invoke service method deleteIdP

Achini Jayasena
Hi All,

In Jmeter, I'm trying to delete the Idp from API call. Even though the IDP delete ,I'm getting following error in the response. And also there are no errors available in the logs

Request:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:mgt="http://mgt.idp.carbon.wso2.org">
   <soapenv:Header/>
   <soapenv:Body>
      <mgt:deleteIdP>
         <!--Optional:-->
         <mgt:idPName>${IdentityProviderName}</mgt:idPName>
      </mgt:deleteIdP>
   </soapenv:Body>
</soapenv:Envelope>

Response:
<?xml version="1.0" encoding="UTF-8"?>
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/">
   <soapenv:Body>
      <soapenv:Fault>
         <faultcode>soapenv:Server</faultcode>
         <faultstring>Exception occurred while trying to invoke service method deleteIdP</faultstring>
         <detail />
      </soapenv:Fault>
   </soapenv:Body>
</soapenv:Envelope>

Jmeter version: 3.3

Endpoint: htttps://localhost:9443/services/IdentityProviderMgtService.IdentityProviderMgtServiceHttpsSoap11Endpoint

Anyone have an idea why I'm getting this exception ? 


Thanks & Best Regards!
Achini Jayasena
Software Engineer - QA | WSO2

Email: [hidden email]
Mobile: +943 882 897

http://wso2.com/signature

_______________________________________________
Dev mailing list
[hidden email]
http://wso2.org/cgi-bin/mailman/listinfo/dev
Reply | Threaded
Open this post in threaded view
|

Re: IAM: Exception while invoke service method deleteIdP

Omindu Rathnaweera
Hi Achini,

What's the IS version you've tried this on ? Also noted that there's an error in the endpoint url, hope that's a typo htttps://localhost:9443/services/IdentityProviderMgtService

Regards,
Omindu.

On Mon, Jul 30, 2018 at 4:21 PM Achini Jayasena <[hidden email]> wrote:
Hi All,

In Jmeter, I'm trying to delete the Idp from API call. Even though the IDP delete ,I'm getting following error in the response. And also there are no errors available in the logs

Request:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:mgt="http://mgt.idp.carbon.wso2.org">
   <soapenv:Header/>
   <soapenv:Body>
      <mgt:deleteIdP>
         <!--Optional:-->
         <mgt:idPName>${IdentityProviderName}</mgt:idPName>
      </mgt:deleteIdP>
   </soapenv:Body>
</soapenv:Envelope>

Response:
<?xml version="1.0" encoding="UTF-8"?>
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/">
   <soapenv:Body>
      <soapenv:Fault>
         <faultcode>soapenv:Server</faultcode>
         <faultstring>Exception occurred while trying to invoke service method deleteIdP</faultstring>
         <detail />
      </soapenv:Fault>
   </soapenv:Body>
</soapenv:Envelope>

Jmeter version: 3.3

Endpoint: htttps://localhost:9443/services/IdentityProviderMgtService.IdentityProviderMgtServiceHttpsSoap11Endpoint

Anyone have an idea why I'm getting this exception ? 


Thanks & Best Regards!
Achini Jayasena
Software Engineer - QA | WSO2

Email: [hidden email]
Mobile: +943 882 897

http://wso2.com/signature


--
Omindu Rathnaweera
Senior Software Engineer, WSO2 Inc.
Mobile: +94 771 197 211

_______________________________________________
Dev mailing list
[hidden email]
http://wso2.org/cgi-bin/mailman/listinfo/dev
Reply | Threaded
Open this post in threaded view
|

Re: IAM: Exception while invoke service method deleteIdP

Hasintha Indrajee
In reply to this post by Achini Jayasena
Can you please enable debug logs for carbon.identity level and see whether you observe any stack trace or any useful clue on this ?

On Mon, Jul 30, 2018 at 4:21 PM Achini Jayasena <[hidden email]> wrote:
Hi All,

In Jmeter, I'm trying to delete the Idp from API call. Even though the IDP delete ,I'm getting following error in the response. And also there are no errors available in the logs

Request:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:mgt="http://mgt.idp.carbon.wso2.org">
   <soapenv:Header/>
   <soapenv:Body>
      <mgt:deleteIdP>
         <!--Optional:-->
         <mgt:idPName>${IdentityProviderName}</mgt:idPName>
      </mgt:deleteIdP>
   </soapenv:Body>
</soapenv:Envelope>

Response:
<?xml version="1.0" encoding="UTF-8"?>
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/">
   <soapenv:Body>
      <soapenv:Fault>
         <faultcode>soapenv:Server</faultcode>
         <faultstring>Exception occurred while trying to invoke service method deleteIdP</faultstring>
         <detail />
      </soapenv:Fault>
   </soapenv:Body>
</soapenv:Envelope>

Jmeter version: 3.3

Endpoint: htttps://localhost:9443/services/IdentityProviderMgtService.IdentityProviderMgtServiceHttpsSoap11Endpoint

Anyone have an idea why I'm getting this exception ? 


Thanks & Best Regards!
Achini Jayasena
Software Engineer - QA | WSO2

Email: [hidden email]
Mobile: +943 882 897

http://wso2.com/signature


--
Hasintha Indrajee
WSO2, Inc.
Mobile:+94 771892453


_______________________________________________
Dev mailing list
[hidden email]
http://wso2.org/cgi-bin/mailman/listinfo/dev
Reply | Threaded
Open this post in threaded view
|

Re: IAM: Exception while invoke service method deleteIdP

Achini Jayasena
Hi Hasitha/Omindu,

The error occurred while deleting the IDP who assigned with a SP(SP multi factor authentication). But before deleting the IDP I deleted the IDP assigned SP too. here are my test steps. 

Step 01 - Add IDP (Linkedin)
Step 02 - Add SP (Travelocity)
Step 03 - Configure SP with SAML configurations and multi factor authentication . (Step 01: basic authetication/Step 02 :Linkedin IDP as federate authenticator )  
Step 04 -  Delete SP
Step 05 -  Delete IDP (Linkedin)

In step 05 the IDP get deleted but I received the response with an error as mentioned. 

@ Omindu, Product version 5.5 and incorrect end point is a mistake at the the time I type the email. 
@ Hasintha, Please find the error log in the debug mode.

Logs: 

[2018-07-31 11:33:16,291] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Created singleton instance for org.wso2.carbon.identity.auth.service.handler.HandlerManager
[2018-07-31 11:33:16,292] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler for the given handler list.
[2018-07-31 11:33:16,292] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler : DefaultAuthenticationManager(org.wso2.carbon.identity.auth.service.AuthenticationManager)
[2018-07-31 11:33:16,294] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  Pre authenticator is called in IdentityMgtEventListener
[2018-07-31 11:33:16,295] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,296] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountDisableHandler} -  Account disable feature is disabled for tenant :carbon.super
[2018-07-31 11:33:16,296] DEBUG {org.wso2.carbon.identity.recovery.handler.AdminForcedPasswordResetHandler} -  Handling event : PRE_AUTHENTICATION
[2018-07-31 11:33:16,296] DEBUG {org.wso2.carbon.identity.recovery.handler.AdminForcedPasswordResetHandler} -  PreAuthenticate - AdminForcedPasswordResetHandler for user : [hidden email]
[2018-07-31 11:33:16,296] DEBUG {org.wso2.carbon.identity.core.util.IdentityUtil} -  Error while reading user store property CaseInsensitiveUsername. Considering as case sensitive.
[2018-07-31 11:33:16,297] DEBUG {org.wso2.carbon.identity.recovery.handler.AccountConfirmationValidationHandler} -  PreAuthenticate
[2018-07-31 11:33:16,297] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,297] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : accountLock from user store domain : PRIMARY for claim : http://wso2.org/claims/identity/accountLocked in tenant : -1234
[2018-07-31 11:33:16,303] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,303] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post get user claim values is called in IdentityMgtEventListener
[2018-07-31 11:33:16,303] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityStoreEventListener} -  doPostGetUserClaimValues getting executed in the IdentityStoreEventListener for user: admin
[2018-07-31 11:33:16,304] DEBUG {org.wso2.carbon.identity.core.util.IdentityUtil} -  Error while reading user store property CaseInsensitiveUsername. Considering as case sensitive.
[2018-07-31 11:33:16,304] DEBUG {org.wso2.carbon.identity.governance.store.InMemoryIdentityDataStore} -  Loaded UserIdentityClaimsDO from cache for user :admin with claims: {}
[2018-07-31 11:33:16,304] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,305] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountLockHandler} -  Account lock handler is disabled in tenant: carbon.super
[2018-07-31 11:33:16,309] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,310] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,310] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,311] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Picking mapped attribute for external claim : urn:scim:schemas:core:1.0:active using mapped local claim : http://wso2.org/claims/active
[2018-07-31 11:33:16,311] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : active from user store domain : PRIMARY for claim : http://wso2.org/claims/active in tenant : -1234
[2018-07-31 11:33:16,317] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,318] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,318] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,318] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post get user claim value is called in IdentityMgtEventListener
[2018-07-31 11:33:16,319] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post authenticator is called in IdentityMgtEventListener
[2018-07-31 11:33:16,319] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,321] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,322] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountLockHandler} -  Account lock handler is disabled in tenant: carbon.super
[2018-07-31 11:33:16,323]  INFO {org.wso2.carbon.core.services.util.CarbonAuthenticationUtil} -  '[hidden email] [-1234]' logged in at [2018-07-31 11:33:16,322+0530]
[2018-07-31 11:33:16,334] DEBUG {org.wso2.carbon.identity.provisioning.listener.DefaultInboundUserProvisioningListener} -  Adding domain name : PRIMARY to user : sol1role95
[2018-07-31 11:33:16,335] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is listener enabled from configs: true
[2018-07-31 11:33:16,335] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is consent enabled system wide: true
[2018-07-31 11:33:16,335] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Listener is enabled and consent is enabled system wide. Hence returning true for isEnabled
[2018-07-31 11:33:16,335] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Loading Basic Application Data of wso2carbon-local-sp
[2018-07-31 11:33:16,335] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  ApplicationID: 1 ApplicationName: wso2carbon-local-sp UserName: wso2.system.user TenantDomain: carbon.super
[2018-07-31 11:33:16,335] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Clients of Application 1
[2018-07-31 11:33:16,335] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Steps of Application 1
[2018-07-31 11:33:16,336] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Claim Mappings of Application 1
[2018-07-31 11:33:16,336] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Role Mapping of Application 1
[2018-07-31 11:33:16,337] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is listener enabled from configs: true
[2018-07-31 11:33:16,337] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is consent enabled system wide: true
[2018-07-31 11:33:16,337] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Listener is enabled and consent is enabled system wide. Hence returning true for isEnabled
[2018-07-31 11:33:16,337] DEBUG {org.wso2.carbon.identity.provisioning.OutboundProvisioningManager} -  Provisioning cache HIT for org.wso2.carbon.identity.application.common.model.ServiceProvider@6ed9127 of carbon.super
[2018-07-31 11:33:16,337] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  pre add role is called in IdentityMgtEventListener
[2018-07-31 11:33:16,347] DEBUG {org.wso2.carbon.identity.entitlement.listener.CacheClearingUserOperationListener} -  Clearing entitlement cache on post add role operation for role sol1role95
[2018-07-31 11:33:16,347] DEBUG {org.wso2.carbon.identity.entitlement.cache.EntitlementBaseCache} -  Cache : PIP_ATTRIBUTE_CACHE is cleared in tenant domain : carbon.super
[2018-07-31 11:33:16,347] DEBUG {org.wso2.carbon.identity.entitlement.cache.EntitlementBaseCache} -  Cache : PDP_DECISION_CACHE is cleared in tenant domain : carbon.super
[2018-07-31 11:33:16,347] DEBUG {org.wso2.carbon.identity.entitlement.cache.PolicyCache} -  Trigger invalidateCache to tenant :  -1234 and all policy 
[2018-07-31 11:33:16,347] DEBUG {org.wso2.carbon.identity.entitlement.cache.PolicyCache} -  Trigger event to clear all cache in tenant :  -1234
[2018-07-31 11:33:16,347] DEBUG {org.wso2.carbon.identity.entitlement.cache.PolicyCache} -  Clustering not enabled. Not sending cluster message to other nodes.
[2018-07-31 11:33:16,348] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post add role is called in IdentityMgtEventListener
[2018-07-31 11:33:16,350] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Created singleton instance for org.wso2.carbon.identity.auth.service.handler.HandlerManager
[2018-07-31 11:33:16,350] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler for the given handler list.
[2018-07-31 11:33:16,350] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler : DefaultAuthenticationManager(org.wso2.carbon.identity.auth.service.AuthenticationManager)
[2018-07-31 11:33:16,357] DEBUG {org.wso2.carbon.identity.provisioning.listener.DefaultInboundUserProvisioningListener} -  Adding domain name : PRIMARY to user : sol1user95
[2018-07-31 11:33:16,357] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is listener enabled from configs: true
[2018-07-31 11:33:16,357] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is consent enabled system wide: true
[2018-07-31 11:33:16,357] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Listener is enabled and consent is enabled system wide. Hence returning true for isEnabled
[2018-07-31 11:33:16,358] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Loading Basic Application Data of wso2carbon-local-sp
[2018-07-31 11:33:16,358] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  ApplicationID: 1 ApplicationName: wso2carbon-local-sp UserName: wso2.system.user TenantDomain: carbon.super
[2018-07-31 11:33:16,358] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Clients of Application 1
[2018-07-31 11:33:16,358] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Steps of Application 1
[2018-07-31 11:33:16,358] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Claim Mappings of Application 1
[2018-07-31 11:33:16,358] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Role Mapping of Application 1
[2018-07-31 11:33:16,359] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is listener enabled from configs: true
[2018-07-31 11:33:16,359] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is consent enabled system wide: true
[2018-07-31 11:33:16,359] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Listener is enabled and consent is enabled system wide. Hence returning true for isEnabled
[2018-07-31 11:33:16,359] DEBUG {org.wso2.carbon.identity.provisioning.OutboundProvisioningManager} -  Provisioning cache HIT for org.wso2.carbon.identity.application.common.model.ServiceProvider@77135c40 of carbon.super
[2018-07-31 11:33:16,359] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  Pre add user is called in IdentityMgtEventListener
[2018-07-31 11:33:16,359] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,359] DEBUG {org.wso2.carbon.identity.password.policy.handler.PasswordPolicyValidationHandler} -  Password Policy validation is disabled
[2018-07-31 11:33:16,360] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,360] DEBUG {org.wso2.carbon.identity.recovery.handler.UserEmailVerificationHandler} -  Email verification Handler is disabled in tenant: carbon.super
[2018-07-31 11:33:16,360] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityStoreEventListener} -  doPreAddUser executed in the IdentityStoreEventListener for user: sol1user95
[2018-07-31 11:33:16,368] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,369] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,369] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,369] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,369] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,369] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,370] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,370] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,370] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,370] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,370] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,370] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,372] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,372] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,372] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,372] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Picking mapped attribute for external claim : urn:scim:schemas:core:1.0:userName using mapped local claim : http://wso2.org/claims/username
[2018-07-31 11:33:16,372] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : uid from user store domain : PRIMARY for claim : http://wso2.org/claims/username in tenant : -1234
[2018-07-31 11:33:16,372] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,372] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,372] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,372] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Picking mapped attribute for external claim : urn:scim:schemas:core:1.0:id using mapped local claim : http://wso2.org/claims/userid
[2018-07-31 11:33:16,373] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : scimId from user store domain : PRIMARY for claim : http://wso2.org/claims/userid in tenant : -1234
[2018-07-31 11:33:16,373] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,373] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,373] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,373] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Picking mapped attribute for external claim : urn:scim:schemas:core:1.0:meta.lastModified using mapped local claim : http://wso2.org/claims/modified
[2018-07-31 11:33:16,373] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : lastModifiedDate from user store domain : PRIMARY for claim : http://wso2.org/claims/modified in tenant : -1234
[2018-07-31 11:33:16,373] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,373] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,373] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,373] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Picking mapped attribute for external claim : urn:scim:schemas:core:1.0:meta.created using mapped local claim : http://wso2.org/claims/created
[2018-07-31 11:33:16,373] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : createdDate from user store domain : PRIMARY for claim : http://wso2.org/claims/created in tenant : -1234
[2018-07-31 11:33:16,391] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post add user is called in IdentityMgtEventListener
[2018-07-31 11:33:16,391] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,391] DEBUG {org.wso2.carbon.identity.password.history.handler.PasswordHistoryValidationHandler} -  Password History validation is disabled
[2018-07-31 11:33:16,391] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,391] DEBUG {org.wso2.carbon.identity.recovery.handler.UserSelfRegistrationHandler} -  Self signup feature is disabled in tenant: carbon.super
[2018-07-31 11:33:16,392] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,392] DEBUG {org.wso2.carbon.identity.recovery.handler.UserEmailVerificationHandler} -  Email verification Handler is disabled in tenant: carbon.super
[2018-07-31 11:33:16,392] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityStoreEventListener} -  doPostAddUser executed in the IdentityStoreEventListener for user: sol1user95
[2018-07-31 11:33:16,395] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Created singleton instance for org.wso2.carbon.identity.auth.service.handler.HandlerManager
[2018-07-31 11:33:16,395] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler for the given handler list.
[2018-07-31 11:33:16,395] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler : DefaultAuthenticationManager(org.wso2.carbon.identity.auth.service.AuthenticationManager)
[2018-07-31 11:33:16,396] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  Pre authenticator is called in IdentityMgtEventListener
[2018-07-31 11:33:16,396] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,397] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountDisableHandler} -  Account disable feature is disabled for tenant :carbon.super
[2018-07-31 11:33:16,397] DEBUG {org.wso2.carbon.identity.recovery.handler.AdminForcedPasswordResetHandler} -  Handling event : PRE_AUTHENTICATION
[2018-07-31 11:33:16,397] DEBUG {org.wso2.carbon.identity.recovery.handler.AdminForcedPasswordResetHandler} -  PreAuthenticate - AdminForcedPasswordResetHandler for user : [hidden email]
[2018-07-31 11:33:16,397] DEBUG {org.wso2.carbon.identity.core.util.IdentityUtil} -  Error while reading user store property CaseInsensitiveUsername. Considering as case sensitive.
[2018-07-31 11:33:16,397] DEBUG {org.wso2.carbon.identity.recovery.handler.AccountConfirmationValidationHandler} -  PreAuthenticate
[2018-07-31 11:33:16,397] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,397] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : accountLock from user store domain : PRIMARY for claim : http://wso2.org/claims/identity/accountLocked in tenant : -1234
[2018-07-31 11:33:16,399] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,399] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post get user claim values is called in IdentityMgtEventListener
[2018-07-31 11:33:16,399] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityStoreEventListener} -  doPostGetUserClaimValues getting executed in the IdentityStoreEventListener for user: admin
[2018-07-31 11:33:16,399] DEBUG {org.wso2.carbon.identity.core.util.IdentityUtil} -  Error while reading user store property CaseInsensitiveUsername. Considering as case sensitive.
[2018-07-31 11:33:16,399] DEBUG {org.wso2.carbon.identity.governance.store.InMemoryIdentityDataStore} -  Loaded UserIdentityClaimsDO from cache for user :admin with claims: {}
[2018-07-31 11:33:16,399] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,400] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountLockHandler} -  Account lock handler is disabled in tenant: carbon.super
[2018-07-31 11:33:16,407] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,407] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,407] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,407] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Picking mapped attribute for external claim : urn:scim:schemas:core:1.0:active using mapped local claim : http://wso2.org/claims/active
[2018-07-31 11:33:16,407] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : active from user store domain : PRIMARY for claim : http://wso2.org/claims/active in tenant : -1234
[2018-07-31 11:33:16,408] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,409] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,409] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,409] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post get user claim value is called in IdentityMgtEventListener
[2018-07-31 11:33:16,409] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post authenticator is called in IdentityMgtEventListener
[2018-07-31 11:33:16,409] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,410] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,410] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountLockHandler} -  Account lock handler is disabled in tenant: carbon.super
[2018-07-31 11:33:16,410]  INFO {org.wso2.carbon.core.services.util.CarbonAuthenticationUtil} -  '[hidden email] [-1234]' logged in at [2018-07-31 11:33:16,410+0530]
[2018-07-31 11:33:16,415] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Created singleton instance for org.wso2.carbon.identity.auth.service.handler.HandlerManager
[2018-07-31 11:33:16,415] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler for the given handler list.
[2018-07-31 11:33:16,415] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler : DefaultAuthenticationManager(org.wso2.carbon.identity.auth.service.AuthenticationManager)
[2018-07-31 11:33:16,416] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  Pre authenticator is called in IdentityMgtEventListener
[2018-07-31 11:33:16,416] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,416] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountDisableHandler} -  Account disable feature is disabled for tenant :carbon.super
[2018-07-31 11:33:16,416] DEBUG {org.wso2.carbon.identity.recovery.handler.AdminForcedPasswordResetHandler} -  Handling event : PRE_AUTHENTICATION
[2018-07-31 11:33:16,416] DEBUG {org.wso2.carbon.identity.recovery.handler.AdminForcedPasswordResetHandler} -  PreAuthenticate - AdminForcedPasswordResetHandler for user : [hidden email]
[2018-07-31 11:33:16,417] DEBUG {org.wso2.carbon.identity.core.util.IdentityUtil} -  Error while reading user store property CaseInsensitiveUsername. Considering as case sensitive.
[2018-07-31 11:33:16,417] DEBUG {org.wso2.carbon.identity.recovery.handler.AccountConfirmationValidationHandler} -  PreAuthenticate
[2018-07-31 11:33:16,417] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,417] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : accountLock from user store domain : PRIMARY for claim : http://wso2.org/claims/identity/accountLocked in tenant : -1234
[2018-07-31 11:33:16,418] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,419] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post get user claim values is called in IdentityMgtEventListener
[2018-07-31 11:33:16,419] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityStoreEventListener} -  doPostGetUserClaimValues getting executed in the IdentityStoreEventListener for user: admin
[2018-07-31 11:33:16,419] DEBUG {org.wso2.carbon.identity.core.util.IdentityUtil} -  Error while reading user store property CaseInsensitiveUsername. Considering as case sensitive.
[2018-07-31 11:33:16,419] DEBUG {org.wso2.carbon.identity.governance.store.InMemoryIdentityDataStore} -  Loaded UserIdentityClaimsDO from cache for user :admin with claims: {}
[2018-07-31 11:33:16,419] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,420] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountLockHandler} -  Account lock handler is disabled in tenant: carbon.super
[2018-07-31 11:33:16,421] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,421] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,421] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,421] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Picking mapped attribute for external claim : urn:scim:schemas:core:1.0:active using mapped local claim : http://wso2.org/claims/active
[2018-07-31 11:33:16,421] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : active from user store domain : PRIMARY for claim : http://wso2.org/claims/active in tenant : -1234
[2018-07-31 11:33:16,423] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,424] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,424] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,424] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post get user claim value is called in IdentityMgtEventListener
[2018-07-31 11:33:16,424] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post authenticator is called in IdentityMgtEventListener
[2018-07-31 11:33:16,424] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,424] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,424] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountLockHandler} -  Account lock handler is disabled in tenant: carbon.super
[2018-07-31 11:33:16,425]  INFO {org.wso2.carbon.core.services.util.CarbonAuthenticationUtil} -  '[hidden email] [-1234]' logged in at [2018-07-31 11:33:16,425+0530]
[2018-07-31 11:33:16,425] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is listener enabled from configs: true
[2018-07-31 11:33:16,426] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is consent enabled system wide: true
[2018-07-31 11:33:16,426] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Listener is enabled and consent is enabled system wide. Hence returning true for isEnabled
[2018-07-31 11:33:16,426] DEBUG {org.wso2.carbon.identity.application.mgt.ApplicationMgtUtil} -  Creating application role : Application/travelocitySP1 and assign the user : [admin] to that role
[2018-07-31 11:33:16,428] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Creating Application travelocitySP1 for user admin
[2018-07-31 11:33:16,428] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Application Stored successfully with application id 10
[2018-07-31 11:33:16,428] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is listener enabled from configs: true
[2018-07-31 11:33:16,428] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is consent enabled system wide: true
[2018-07-31 11:33:16,428] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Listener is enabled and consent is enabled system wide. Hence returning true for isEnabled
[2018-07-31 11:33:16,432] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Created singleton instance for org.wso2.carbon.identity.auth.service.handler.HandlerManager
[2018-07-31 11:33:16,432] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler for the given handler list.
[2018-07-31 11:33:16,433] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler : DefaultAuthenticationManager(org.wso2.carbon.identity.auth.service.AuthenticationManager)
[2018-07-31 11:33:16,434] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  Pre authenticator is called in IdentityMgtEventListener
[2018-07-31 11:33:16,434] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,434] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountDisableHandler} -  Account disable feature is disabled for tenant :carbon.super
[2018-07-31 11:33:16,434] DEBUG {org.wso2.carbon.identity.recovery.handler.AdminForcedPasswordResetHandler} -  Handling event : PRE_AUTHENTICATION
[2018-07-31 11:33:16,434] DEBUG {org.wso2.carbon.identity.recovery.handler.AdminForcedPasswordResetHandler} -  PreAuthenticate - AdminForcedPasswordResetHandler for user : [hidden email]
[2018-07-31 11:33:16,434] DEBUG {org.wso2.carbon.identity.core.util.IdentityUtil} -  Error while reading user store property CaseInsensitiveUsername. Considering as case sensitive.
[2018-07-31 11:33:16,434] DEBUG {org.wso2.carbon.identity.recovery.handler.AccountConfirmationValidationHandler} -  PreAuthenticate
[2018-07-31 11:33:16,434] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,435] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : accountLock from user store domain : PRIMARY for claim : http://wso2.org/claims/identity/accountLocked in tenant : -1234
[2018-07-31 11:33:16,447] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,448] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post get user claim values is called in IdentityMgtEventListener
[2018-07-31 11:33:16,448] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityStoreEventListener} -  doPostGetUserClaimValues getting executed in the IdentityStoreEventListener for user: admin
[2018-07-31 11:33:16,448] DEBUG {org.wso2.carbon.identity.core.util.IdentityUtil} -  Error while reading user store property CaseInsensitiveUsername. Considering as case sensitive.
[2018-07-31 11:33:16,448] DEBUG {org.wso2.carbon.identity.governance.store.InMemoryIdentityDataStore} -  Loaded UserIdentityClaimsDO from cache for user :admin with claims: {}
[2018-07-31 11:33:16,448] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,448] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountLockHandler} -  Account lock handler is disabled in tenant: carbon.super
[2018-07-31 11:33:16,451] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,451] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,451] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,451] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Picking mapped attribute for external claim : urn:scim:schemas:core:1.0:active using mapped local claim : http://wso2.org/claims/active
[2018-07-31 11:33:16,451] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : active from user store domain : PRIMARY for claim : http://wso2.org/claims/active in tenant : -1234
[2018-07-31 11:33:16,454] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,455] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,455] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,455] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post get user claim value is called in IdentityMgtEventListener
[2018-07-31 11:33:16,455] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post authenticator is called in IdentityMgtEventListener
[2018-07-31 11:33:16,455] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,455] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,455] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountLockHandler} -  Account lock handler is disabled in tenant: carbon.super
[2018-07-31 11:33:16,456]  INFO {org.wso2.carbon.core.services.util.CarbonAuthenticationUtil} -  '[hidden email] [-1234]' logged in at [2018-07-31 11:33:16,456+0530]
[2018-07-31 11:33:16,460] DEBUG {org.wso2.carbon.identity.core.dao.SAMLSSOServiceProviderDAO} -  Service Provider travelocity.com is added successfully.
[2018-07-31 11:33:16,463] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Created singleton instance for org.wso2.carbon.identity.auth.service.handler.HandlerManager
[2018-07-31 11:33:16,463] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler for the given handler list.
[2018-07-31 11:33:16,463] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler : DefaultAuthenticationManager(org.wso2.carbon.identity.auth.service.AuthenticationManager)
[2018-07-31 11:33:16,464] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  Pre authenticator is called in IdentityMgtEventListener
[2018-07-31 11:33:16,464] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,464] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountDisableHandler} -  Account disable feature is disabled for tenant :carbon.super
[2018-07-31 11:33:16,465] DEBUG {org.wso2.carbon.identity.recovery.handler.AdminForcedPasswordResetHandler} -  Handling event : PRE_AUTHENTICATION
[2018-07-31 11:33:16,465] DEBUG {org.wso2.carbon.identity.recovery.handler.AdminForcedPasswordResetHandler} -  PreAuthenticate - AdminForcedPasswordResetHandler for user : [hidden email]
[2018-07-31 11:33:16,465] DEBUG {org.wso2.carbon.identity.core.util.IdentityUtil} -  Error while reading user store property CaseInsensitiveUsername. Considering as case sensitive.
[2018-07-31 11:33:16,465] DEBUG {org.wso2.carbon.identity.recovery.handler.AccountConfirmationValidationHandler} -  PreAuthenticate
[2018-07-31 11:33:16,465] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,465] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : accountLock from user store domain : PRIMARY for claim : http://wso2.org/claims/identity/accountLocked in tenant : -1234
[2018-07-31 11:33:16,471] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,471] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post get user claim values is called in IdentityMgtEventListener
[2018-07-31 11:33:16,471] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityStoreEventListener} -  doPostGetUserClaimValues getting executed in the IdentityStoreEventListener for user: admin
[2018-07-31 11:33:16,471] DEBUG {org.wso2.carbon.identity.core.util.IdentityUtil} -  Error while reading user store property CaseInsensitiveUsername. Considering as case sensitive.
[2018-07-31 11:33:16,471] DEBUG {org.wso2.carbon.identity.governance.store.InMemoryIdentityDataStore} -  Loaded UserIdentityClaimsDO from cache for user :admin with claims: {}
[2018-07-31 11:33:16,472] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,472] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountLockHandler} -  Account lock handler is disabled in tenant: carbon.super
[2018-07-31 11:33:16,479] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,479] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,479] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,479] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Picking mapped attribute for external claim : urn:scim:schemas:core:1.0:active using mapped local claim : http://wso2.org/claims/active
[2018-07-31 11:33:16,479] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : active from user store domain : PRIMARY for claim : http://wso2.org/claims/active in tenant : -1234
[2018-07-31 11:33:16,481] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,482] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,482] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,482] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post get user claim value is called in IdentityMgtEventListener
[2018-07-31 11:33:16,482] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post authenticator is called in IdentityMgtEventListener
[2018-07-31 11:33:16,482] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,482] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,483] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountLockHandler} -  Account lock handler is disabled in tenant: carbon.super
[2018-07-31 11:33:16,483]  INFO {org.wso2.carbon.core.services.util.CarbonAuthenticationUtil} -  '[hidden email] [-1234]' logged in at [2018-07-31 11:33:16,483+0530]
[2018-07-31 11:33:16,489] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Created singleton instance for org.wso2.carbon.identity.auth.service.handler.HandlerManager
[2018-07-31 11:33:16,489] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler for the given handler list.
[2018-07-31 11:33:16,489] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler : DefaultAuthenticationManager(org.wso2.carbon.identity.auth.service.AuthenticationManager)
[2018-07-31 11:33:16,490] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  Pre authenticator is called in IdentityMgtEventListener
[2018-07-31 11:33:16,491] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,491] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountDisableHandler} -  Account disable feature is disabled for tenant :carbon.super
[2018-07-31 11:33:16,491] DEBUG {org.wso2.carbon.identity.recovery.handler.AdminForcedPasswordResetHandler} -  Handling event : PRE_AUTHENTICATION
[2018-07-31 11:33:16,491] DEBUG {org.wso2.carbon.identity.recovery.handler.AdminForcedPasswordResetHandler} -  PreAuthenticate - AdminForcedPasswordResetHandler for user : [hidden email]
[2018-07-31 11:33:16,491] DEBUG {org.wso2.carbon.identity.core.util.IdentityUtil} -  Error while reading user store property CaseInsensitiveUsername. Considering as case sensitive.
[2018-07-31 11:33:16,491] DEBUG {org.wso2.carbon.identity.recovery.handler.AccountConfirmationValidationHandler} -  PreAuthenticate
[2018-07-31 11:33:16,491] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,492] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : accountLock from user store domain : PRIMARY for claim : http://wso2.org/claims/identity/accountLocked in tenant : -1234
[2018-07-31 11:33:16,494] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,494] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post get user claim values is called in IdentityMgtEventListener
[2018-07-31 11:33:16,494] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityStoreEventListener} -  doPostGetUserClaimValues getting executed in the IdentityStoreEventListener for user: admin
[2018-07-31 11:33:16,494] DEBUG {org.wso2.carbon.identity.core.util.IdentityUtil} -  Error while reading user store property CaseInsensitiveUsername. Considering as case sensitive.
[2018-07-31 11:33:16,495] DEBUG {org.wso2.carbon.identity.governance.store.InMemoryIdentityDataStore} -  Loaded UserIdentityClaimsDO from cache for user :admin with claims: {}
[2018-07-31 11:33:16,495] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,495] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountLockHandler} -  Account lock handler is disabled in tenant: carbon.super
[2018-07-31 11:33:16,496] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,496] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,496] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,497] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Picking mapped attribute for external claim : urn:scim:schemas:core:1.0:active using mapped local claim : http://wso2.org/claims/active
[2018-07-31 11:33:16,497] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : active from user store domain : PRIMARY for claim : http://wso2.org/claims/active in tenant : -1234
[2018-07-31 11:33:16,500] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,500] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,501] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,501] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post get user claim value is called in IdentityMgtEventListener
[2018-07-31 11:33:16,501] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post authenticator is called in IdentityMgtEventListener
[2018-07-31 11:33:16,501] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,501] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,501] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountLockHandler} -  Account lock handler is disabled in tenant: carbon.super
[2018-07-31 11:33:16,502]  INFO {org.wso2.carbon.core.services.util.CarbonAuthenticationUtil} -  '[hidden email] [-1234]' logged in at [2018-07-31 11:33:16,502+0530]
[2018-07-31 11:33:16,502] DEBUG {org.wso2.carbon.identity.application.mgt.ApplicationMgtUtil} -  Checking whether user has role : Application/travelocitySP1 by retrieving role list of user : admin
[2018-07-31 11:33:16,503] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is listener enabled from configs: true
[2018-07-31 11:33:16,503] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is consent enabled system wide: true
[2018-07-31 11:33:16,503] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Listener is enabled and consent is enabled system wide. Hence returning true for isEnabled
[2018-07-31 11:33:16,503] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Loading Basic Application Data of travelocitySP1
[2018-07-31 11:33:16,503] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  ApplicationID: 10 ApplicationName: travelocitySP1 UserName: admin TenantDomain: carbon.super
[2018-07-31 11:33:16,503] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Clients of Application 10
[2018-07-31 11:33:16,503] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Steps of Application 10
[2018-07-31 11:33:16,503] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Claim Mappings of Application 10
[2018-07-31 11:33:16,503] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Role Mapping of Application 10
[2018-07-31 11:33:16,504] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is listener enabled from configs: true
[2018-07-31 11:33:16,504] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is consent enabled system wide: true
[2018-07-31 11:33:16,504] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Listener is enabled and consent is enabled system wide. Hence returning true for isEnabled
[2018-07-31 11:33:16,522] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Created singleton instance for org.wso2.carbon.identity.auth.service.handler.HandlerManager
[2018-07-31 11:33:16,522] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler for the given handler list.
[2018-07-31 11:33:16,522] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler : DefaultAuthenticationManager(org.wso2.carbon.identity.auth.service.AuthenticationManager)
[2018-07-31 11:33:16,523] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  Pre authenticator is called in IdentityMgtEventListener
[2018-07-31 11:33:16,523] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,524] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountDisableHandler} -  Account disable feature is disabled for tenant :carbon.super
[2018-07-31 11:33:16,524] DEBUG {org.wso2.carbon.identity.recovery.handler.AdminForcedPasswordResetHandler} -  Handling event : PRE_AUTHENTICATION
[2018-07-31 11:33:16,524] DEBUG {org.wso2.carbon.identity.recovery.handler.AdminForcedPasswordResetHandler} -  PreAuthenticate - AdminForcedPasswordResetHandler for user : [hidden email]
[2018-07-31 11:33:16,524] DEBUG {org.wso2.carbon.identity.core.util.IdentityUtil} -  Error while reading user store property CaseInsensitiveUsername. Considering as case sensitive.
[2018-07-31 11:33:16,524] DEBUG {org.wso2.carbon.identity.recovery.handler.AccountConfirmationValidationHandler} -  PreAuthenticate
[2018-07-31 11:33:16,524] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,524] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : accountLock from user store domain : PRIMARY for claim : http://wso2.org/claims/identity/accountLocked in tenant : -1234
[2018-07-31 11:33:16,526] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,526] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post get user claim values is called in IdentityMgtEventListener
[2018-07-31 11:33:16,526] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityStoreEventListener} -  doPostGetUserClaimValues getting executed in the IdentityStoreEventListener for user: admin
[2018-07-31 11:33:16,526] DEBUG {org.wso2.carbon.identity.core.util.IdentityUtil} -  Error while reading user store property CaseInsensitiveUsername. Considering as case sensitive.
[2018-07-31 11:33:16,526] DEBUG {org.wso2.carbon.identity.governance.store.InMemoryIdentityDataStore} -  Loaded UserIdentityClaimsDO from cache for user :admin with claims: {}
[2018-07-31 11:33:16,527] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,527] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountLockHandler} -  Account lock handler is disabled in tenant: carbon.super
[2018-07-31 11:33:16,531] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,531] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,531] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,531] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Picking mapped attribute for external claim : urn:scim:schemas:core:1.0:active using mapped local claim : http://wso2.org/claims/active
[2018-07-31 11:33:16,531] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : active from user store domain : PRIMARY for claim : http://wso2.org/claims/active in tenant : -1234
[2018-07-31 11:33:16,533] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,533] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,534] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,534] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post get user claim value is called in IdentityMgtEventListener
[2018-07-31 11:33:16,534] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post authenticator is called in IdentityMgtEventListener
[2018-07-31 11:33:16,534] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,534] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,534] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountLockHandler} -  Account lock handler is disabled in tenant: carbon.super
[2018-07-31 11:33:16,535]  INFO {org.wso2.carbon.core.services.util.CarbonAuthenticationUtil} -  '[hidden email] [-1234]' logged in at [2018-07-31 11:33:16,534+0530]
[2018-07-31 11:33:16,537] DEBUG {org.wso2.carbon.identity.application.mgt.ApplicationMgtUtil} -  Checking whether user has role : Application/travelocitySP1 by retrieving role list of user : admin
[2018-07-31 11:33:16,537] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Loading Basic Application Data of application ID: 10
[2018-07-31 11:33:16,537] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  ApplicationID: 10 ApplicationName: travelocitySP1 UserName: admin TenantDomain: carbon.super
[2018-07-31 11:33:16,537] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Clients of Application 10
[2018-07-31 11:33:16,537] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Steps of Application 10
[2018-07-31 11:33:16,538] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Claim Mappings of Application 10
[2018-07-31 11:33:16,538] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Role Mapping of Application 10
[2018-07-31 11:33:16,538] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is listener enabled from configs: true
[2018-07-31 11:33:16,538] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is consent enabled system wide: true
[2018-07-31 11:33:16,538] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Listener is enabled and consent is enabled system wide. Hence returning true for isEnabled
[2018-07-31 11:33:16,538] DEBUG {org.wso2.carbon.identity.provisioning.listener.ProvisioningApplicationMgtListener} -  Clearing cache entry for travelocitySP1
[2018-07-31 11:33:16,539] DEBUG {org.wso2.carbon.identity.provisioning.listener.ProvisioningApplicationMgtListener} -  Provisioning cached entry not found for sp travelocitySP1
[2018-07-31 11:33:16,539] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is listener enabled from configs: true
[2018-07-31 11:33:16,539] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is consent enabled system wide: true
[2018-07-31 11:33:16,539] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Listener is enabled and consent is enabled system wide. Hence returning true for isEnabled
[2018-07-31 11:33:16,539] DEBUG {org.wso2.carbon.identity.application.mgt.ApplicationMgtUtil} -  Checking whether user has role : Application/travelocitySP1 by retrieving role list of user : admin
[2018-07-31 11:33:16,539] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Loading Application Name for ID: 10
[2018-07-31 11:33:16,539] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  ApplicationName : travelocitySP1
[2018-07-31 11:33:16,539] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Updating Application with ID: 10
[2018-07-31 11:33:16,540] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Loading Application Name for ID: 10
[2018-07-31 11:33:16,540] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  ApplicationName : travelocitySP1
[2018-07-31 11:33:16,540] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Stored Application Name travelocitySP1
[2018-07-31 11:33:16,540] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Updated Application successfully
[2018-07-31 11:33:16,540] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Deleting Clients of the Application 10
[2018-07-31 11:33:16,540] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Updating inbound authentication request configuration of the application 10inbound auth key: travelocity.com inbound auth type: samlsso
[2018-07-31 11:33:16,540] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Updating inbound authentication request configuration of the application 10inbound auth key: travelocity.com inbound auth type: openid
[2018-07-31 11:33:16,540] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Updating inbound authentication request configuration of the application 10inbound auth key: travelocity.com inbound auth type: passivests
[2018-07-31 11:33:16,541] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Deleting Steps of Application 10
[2018-07-31 11:33:16,541] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Updating Federated IdP of Application 10 Step Order: 2 IdP: linkedinnnnnnnnn Authenticator: org.wso2.carbon.identity.application.common.model.FederatedAuthenticatorConfig@4b0ff13e
[2018-07-31 11:33:16,541] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Updating Local IdP of Application 10 Step Order: 1 IdP: wso2carbon-local-idp Authenticator: BasicAuthenticator
[2018-07-31 11:33:16,541] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Deleting request path authenticators 10
[2018-07-31 11:33:16,542] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Deleting Application Claim Mapping 10
[2018-07-31 11:33:16,546] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Storing Claim Mapping. Local Claim: http://wso2.org/claims/nickname SPClaim: id
[2018-07-31 11:33:16,546] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Storing Claim Mapping. Local Claim: http://wso2.org/claims/fullname SPClaim: name
[2018-07-31 11:33:16,546] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Storing Claim Mapping. Local Claim: http://wso2.org/claims/gender SPClaim: gender
[2018-07-31 11:33:16,546] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Storing Claim Mapping. Local Claim: http://wso2.org/claims/emailaddress SPClaim: email
[2018-07-31 11:33:16,547] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Storing Claim Mapping. Local Claim: http://wso2.org/claims/givenname SPClaim: first_name
[2018-07-31 11:33:16,547] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Storing Claim Mapping. Local Claim: http://wso2.org/claims/lastname SPClaim: last_name
[2018-07-31 11:33:16,547] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Storing Claim Mapping. Local Claim: http://wso2.org/claims/dob SPClaim: age_range
[2018-07-31 11:33:16,548] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Storing Claim Mapping. Local Claim: http://wso2.org/claims/url SPClaim: link
[2018-07-31 11:33:16,549] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Deleting Steps of Application 10
[2018-07-31 11:33:16,549] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Deleting Role Mapping of Application 10
[2018-07-31 11:33:16,550] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is listener enabled from configs: true
[2018-07-31 11:33:16,550] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is consent enabled system wide: true
[2018-07-31 11:33:16,550] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Listener is enabled and consent is enabled system wide. Hence returning true for isEnabled
[2018-07-31 11:33:16,564] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Created singleton instance for org.wso2.carbon.identity.auth.service.handler.HandlerManager
[2018-07-31 11:33:16,564] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler for the given handler list.
[2018-07-31 11:33:16,565] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler : DefaultAuthenticationManager(org.wso2.carbon.identity.auth.service.AuthenticationManager)
[2018-07-31 11:33:16,566] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  Pre authenticator is called in IdentityMgtEventListener
[2018-07-31 11:33:16,567] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,567] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountDisableHandler} -  Account disable feature is disabled for tenant :carbon.super
[2018-07-31 11:33:16,567] DEBUG {org.wso2.carbon.identity.recovery.handler.AdminForcedPasswordResetHandler} -  Handling event : PRE_AUTHENTICATION
[2018-07-31 11:33:16,567] DEBUG {org.wso2.carbon.identity.recovery.handler.AdminForcedPasswordResetHandler} -  PreAuthenticate - AdminForcedPasswordResetHandler for user : [hidden email]
[2018-07-31 11:33:16,567] DEBUG {org.wso2.carbon.identity.core.util.IdentityUtil} -  Error while reading user store property CaseInsensitiveUsername. Considering as case sensitive.
[2018-07-31 11:33:16,567] DEBUG {org.wso2.carbon.identity.recovery.handler.AccountConfirmationValidationHandler} -  PreAuthenticate
[2018-07-31 11:33:16,567] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,568] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : accountLock from user store domain : PRIMARY for claim : http://wso2.org/claims/identity/accountLocked in tenant : -1234
[2018-07-31 11:33:16,572] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,572] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post get user claim values is called in IdentityMgtEventListener
[2018-07-31 11:33:16,572] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityStoreEventListener} -  doPostGetUserClaimValues getting executed in the IdentityStoreEventListener for user: admin
[2018-07-31 11:33:16,573] DEBUG {org.wso2.carbon.identity.core.util.IdentityUtil} -  Error while reading user store property CaseInsensitiveUsername. Considering as case sensitive.
[2018-07-31 11:33:16,573] DEBUG {org.wso2.carbon.identity.governance.store.InMemoryIdentityDataStore} -  Loaded UserIdentityClaimsDO from cache for user :admin with claims: {}
[2018-07-31 11:33:16,573] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,573] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountLockHandler} -  Account lock handler is disabled in tenant: carbon.super
[2018-07-31 11:33:16,575] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,575] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,575] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,576] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Picking mapped attribute for external claim : urn:scim:schemas:core:1.0:active using mapped local claim : http://wso2.org/claims/active
[2018-07-31 11:33:16,576] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : active from user store domain : PRIMARY for claim : http://wso2.org/claims/active in tenant : -1234
[2018-07-31 11:33:16,588] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,590] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,590] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,590] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post get user claim value is called in IdentityMgtEventListener
[2018-07-31 11:33:16,591] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post authenticator is called in IdentityMgtEventListener
[2018-07-31 11:33:16,591] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,591] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,591] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountLockHandler} -  Account lock handler is disabled in tenant: carbon.super
[2018-07-31 11:33:16,592]  INFO {org.wso2.carbon.core.services.util.CarbonAuthenticationUtil} -  '[hidden email] [-1234]' logged in at [2018-07-31 11:33:16,592+0530]
[2018-07-31 11:33:16,604] DEBUG {org.wso2.carbon.identity.provisioning.listener.DefaultInboundUserProvisioningListener} -  Adding domain name : PRIMARY to user : sol1user95
[2018-07-31 11:33:16,604] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is listener enabled from configs: true
[2018-07-31 11:33:16,604] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is consent enabled system wide: true
[2018-07-31 11:33:16,605] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Listener is enabled and consent is enabled system wide. Hence returning true for isEnabled
[2018-07-31 11:33:16,605] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Loading Basic Application Data of wso2carbon-local-sp
[2018-07-31 11:33:16,605] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  ApplicationID: 1 ApplicationName: wso2carbon-local-sp UserName: wso2.system.user TenantDomain: carbon.super
[2018-07-31 11:33:16,605] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Clients of Application 1
[2018-07-31 11:33:16,605] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Steps of Application 1
[2018-07-31 11:33:16,605] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Claim Mappings of Application 1
[2018-07-31 11:33:16,605] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Role Mapping of Application 1
[2018-07-31 11:33:16,605] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is listener enabled from configs: true
[2018-07-31 11:33:16,605] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is consent enabled system wide: true
[2018-07-31 11:33:16,606] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Listener is enabled and consent is enabled system wide. Hence returning true for isEnabled
[2018-07-31 11:33:16,606] DEBUG {org.wso2.carbon.identity.provisioning.OutboundProvisioningManager} -  Provisioning cache HIT for org.wso2.carbon.identity.application.common.model.ServiceProvider@83ee496 of carbon.super
[2018-07-31 11:33:16,606] DEBUG {org.wso2.carbon.identity.user.account.association.internal.UserOperationEventListenerImpl} -  User account associations for user sol1user95 with tenant id -1234 is getting deleted.
[2018-07-31 11:33:16,606] DEBUG {org.wso2.carbon.identity.provider.openid.listener.IdentityOpenIDUserEventListener} -  Clearing OpenID related information of the user : sol1user95
[2018-07-31 11:33:16,606] DEBUG {org.wso2.carbon.identity.provider.openid.listener.IdentityOpenIDUserEventListener} -  Clearing 0 RPs in DB related to the user : sol1user95
[2018-07-31 11:33:16,606] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  pre delete user is called in IdentityMgtEventListener
[2018-07-31 11:33:16,606] DEBUG {org.wso2.carbon.identity.core.util.IdentityUtil} -  Error while reading user store property CaseInsensitiveUsername. Considering as case sensitive.
[2018-07-31 11:33:16,606] DEBUG {org.wso2.carbon.identity.oauth2.dao.TokenManagementDAOImpl} -  Retrieving all authorized clients by user: [hidden email]
[2018-07-31 11:33:16,606] DEBUG {org.wso2.carbon.identity.core.util.IdentityUtil} -  Error while reading user store property CaseInsensitiveUsername. Considering as case sensitive.
[2018-07-31 11:33:16,606] DEBUG {org.wso2.carbon.identity.oauth2.dao.TokenManagementDAOImpl} -  Found authorized clients  for user: [hidden email]
[2018-07-31 11:33:16,606] DEBUG {org.wso2.carbon.identity.user.profile.mgt.listener.ProfileMgtEventListener} -  doPreDeleteUser method executed in ProfileMgtEventListener for user:[hidden email]
[2018-07-31 11:33:16,606] DEBUG {org.wso2.carbon.identity.user.profile.mgt.listener.ProfileMgtEventListener} -  Deleting federated IDP user account associations of user:[hidden email]
[2018-07-31 11:33:16,662] DEBUG {org.wso2.carbon.identity.entitlement.listener.CacheClearingUserOperationListener} -  Clearing entitlement cache on post delete user operation for user sol1user95
[2018-07-31 11:33:16,662] DEBUG {org.wso2.carbon.identity.entitlement.cache.EntitlementBaseCache} -  Cache : PIP_ATTRIBUTE_CACHE is cleared in tenant domain : carbon.super
[2018-07-31 11:33:16,662] DEBUG {org.wso2.carbon.identity.entitlement.cache.EntitlementBaseCache} -  Cache : PDP_DECISION_CACHE is cleared in tenant domain : carbon.super
[2018-07-31 11:33:16,662] DEBUG {org.wso2.carbon.identity.entitlement.cache.PolicyCache} -  Trigger invalidateCache to tenant :  -1234 and all policy 
[2018-07-31 11:33:16,662] DEBUG {org.wso2.carbon.identity.entitlement.cache.PolicyCache} -  Trigger event to clear all cache in tenant :  -1234
[2018-07-31 11:33:16,662] DEBUG {org.wso2.carbon.identity.entitlement.cache.PolicyCache} -  Clustering not enabled. Not sending cluster message to other nodes.
[2018-07-31 11:33:16,662] DEBUG {org.wso2.carbon.identity.mgt.listener.UserOperationsNotificationListener} -  Sending user delete notification for user sol1user95
[2018-07-31 11:33:16,662] DEBUG {org.wso2.carbon.identity.mgt.listener.UserOperationsNotificationListener} -  Invoking notification sender
[2018-07-31 11:33:16,662] DEBUG {org.wso2.carbon.identity.notification.mgt.NotificationSender} -  Adding event to the event queue userOperation
[2018-07-31 11:33:16,662] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post delete user is called in IdentityMgtEventListener
[2018-07-31 11:33:16,662] ERROR {org.wso2.carbon.user.core.common.AbstractUserStoreManager} -  Error occurred while accessing Java Security Manager Privilege Block
[2018-07-31 11:33:16,662] ERROR {org.wso2.carbon.user.mgt.UserRealmProxy} -  Error occurred while accessing Java Security Manager Privilege Block
org.wso2.carbon.user.core.UserStoreException: Error occurred while accessing Java Security Manager Privilege Block
at org.wso2.carbon.user.core.common.AbstractUserStoreManager.callSecure(AbstractUserStoreManager.java:170)
at org.wso2.carbon.user.core.common.AbstractUserStoreManager.deleteUser(AbstractUserStoreManager.java:1724)
at org.wso2.carbon.user.mgt.UserRealmProxy.deleteUser(UserRealmProxy.java:870)
at org.wso2.carbon.user.mgt.UserAdmin.deleteUser(UserAdmin.java:243)
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at org.apache.axis2.rpc.receivers.RPCUtil.invokeServiceClass(RPCUtil.java:212)
at org.apache.axis2.rpc.receivers.RPCMessageReceiver.invokeBusinessLogic(RPCMessageReceiver.java:117)
at org.apache.axis2.receivers.AbstractInOutMessageReceiver.invokeBusinessLogic(AbstractInOutMessageReceiver.java:40)
at org.apache.axis2.receivers.AbstractMessageReceiver.receive(AbstractMessageReceiver.java:110)
at org.apache.axis2.engine.AxisEngine.receive(AxisEngine.java:180)
at org.apache.axis2.transport.http.HTTPTransportUtils.processHTTPPostRequest(HTTPTransportUtils.java:173)
at org.apache.axis2.transport.http.AxisServlet.doPost(AxisServlet.java:146)
at org.wso2.carbon.core.transports.CarbonServlet.doPost(CarbonServlet.java:232)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:650)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
at org.eclipse.equinox.http.servlet.internal.ServletRegistration.service(ServletRegistration.java:61)
at org.eclipse.equinox.http.servlet.internal.ProxyServlet.processAlias(ProxyServlet.java:128)
at org.eclipse.equinox.http.servlet.internal.ProxyServlet.service(ProxyServlet.java:68)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:731)
at org.wso2.carbon.tomcat.ext.servlet.DelegationServlet.service(DelegationServlet.java:68)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:303)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:52)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.owasp.csrfguard.CsrfGuardFilter.doFilter(CsrfGuardFilter.java:72)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.apache.catalina.filters.HttpHeaderSecurityFilter.doFilter(HttpHeaderSecurityFilter.java:124)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.wso2.carbon.tomcat.ext.filter.CharacterSetFilter.doFilter(CharacterSetFilter.java:65)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.apache.catalina.filters.HttpHeaderSecurityFilter.doFilter(HttpHeaderSecurityFilter.java:124)
at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:241)
at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:208)
at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:219)
at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:110)
at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:169)
at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:103)
at org.wso2.carbon.identity.context.rewrite.valve.TenantContextRewriteValve.invoke(TenantContextRewriteValve.java:80)
at org.wso2.carbon.identity.authz.valve.AuthorizationValve.invoke(AuthorizationValve.java:91)
at org.wso2.carbon.identity.auth.valve.AuthenticationValve.invoke(AuthenticationValve.java:60)
at org.wso2.carbon.tomcat.ext.valves.CompositeValve.continueInvocation(CompositeValve.java:99)
at org.wso2.carbon.tomcat.ext.valves.CarbonTomcatValve$1.invoke(CarbonTomcatValve.java:47)
at org.wso2.carbon.webapp.mgt.TenantLazyLoaderValve.invoke(TenantLazyLoaderValve.java:57)
at org.wso2.carbon.tomcat.ext.valves.TomcatValveContainer.invokeValves(TomcatValveContainer.java:47)
at org.wso2.carbon.tomcat.ext.valves.CompositeValve.invoke(CompositeValve.java:62)
at org.wso2.carbon.tomcat.ext.valves.CarbonStuckThreadDetectionValve.invoke(CarbonStuckThreadDetectionValve.java:159)
at org.apache.catalina.valves.AccessLogValve.invoke(AccessLogValve.java:962)
at org.wso2.carbon.tomcat.ext.valves.CarbonContextCreatorValve.invoke(CarbonContextCreatorValve.java:57)
at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:116)
at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:445)
at org.apache.coyote.http11.AbstractHttp11Processor.process(AbstractHttp11Processor.java:1115)
at org.apache.coyote.AbstractProtocol$AbstractConnectionHandler.process(AbstractProtocol.java:637)
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1775)
at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.run(NioEndpoint.java:1734)
at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1149)
at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:624)
at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
at java.lang.Thread.run(Thread.java:748)
Caused by: java.security.PrivilegedActionException: java.lang.reflect.InvocationTargetException
at java.security.AccessController.doPrivileged(Native Method)
at org.wso2.carbon.user.core.common.AbstractUserStoreManager.callSecure(AbstractUserStoreManager.java:155)
... 64 more
Caused by: java.lang.reflect.InvocationTargetException
at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:62)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)
at java.lang.reflect.Method.invoke(Method.java:498)
at org.wso2.carbon.user.core.common.AbstractUserStoreManager$2.run(AbstractUserStoreManager.java:158)
... 66 more
Caused by: java.util.MissingFormatArgumentException: Format specifier '%s'
at java.util.Formatter.format(Formatter.java:2519)
at java.util.Formatter.format(Formatter.java:2455)
at java.lang.String.format(String.java:2940)
at org.wso2.carbon.identity.consent.mgt.handler.ConsentDeletionUserEventHandler.handleEvent(ConsentDeletionUserEventHandler.java:116)
at org.wso2.carbon.identity.event.services.IdentityEventServiceImpl.handleEvent(IdentityEventServiceImpl.java:56)
at org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener.handleEvent(IdentityMgtEventListener.java:604)
at org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener.handleEvent(IdentityMgtEventListener.java:572)
at org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener.doPostDeleteUser(IdentityMgtEventListener.java:298)
at org.wso2.carbon.user.core.common.AbstractUserStoreManager.deleteUser(AbstractUserStoreManager.java:1829)
... 71 more
[2018-07-31 11:33:16,668] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Created singleton instance for org.wso2.carbon.identity.auth.service.handler.HandlerManager
[2018-07-31 11:33:16,668] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler for the given handler list.
[2018-07-31 11:33:16,669] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler : DefaultAuthenticationManager(org.wso2.carbon.identity.auth.service.AuthenticationManager)
[2018-07-31 11:33:16,673] DEBUG {org.wso2.carbon.identity.provisioning.listener.DefaultInboundUserProvisioningListener} -  Adding domain name : PRIMARY to user : sol1role95
[2018-07-31 11:33:16,673] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is listener enabled from configs: true
[2018-07-31 11:33:16,673] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is consent enabled system wide: true
[2018-07-31 11:33:16,673] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Listener is enabled and consent is enabled system wide. Hence returning true for isEnabled
[2018-07-31 11:33:16,673] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Loading Basic Application Data of wso2carbon-local-sp
[2018-07-31 11:33:16,673] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  ApplicationID: 1 ApplicationName: wso2carbon-local-sp UserName: wso2.system.user TenantDomain: carbon.super
[2018-07-31 11:33:16,673] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Clients of Application 1
[2018-07-31 11:33:16,674] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Steps of Application 1
[2018-07-31 11:33:16,674] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Claim Mappings of Application 1
[2018-07-31 11:33:16,674] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Role Mapping of Application 1
[2018-07-31 11:33:16,674] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is listener enabled from configs: true
[2018-07-31 11:33:16,674] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is consent enabled system wide: true
[2018-07-31 11:33:16,674] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Listener is enabled and consent is enabled system wide. Hence returning true for isEnabled
[2018-07-31 11:33:16,674] DEBUG {org.wso2.carbon.identity.provisioning.OutboundProvisioningManager} -  Provisioning cache HIT for org.wso2.carbon.identity.application.common.model.ServiceProvider@2f4fa883 of carbon.super
[2018-07-31 11:33:16,674] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  pre delete role is called in IdentityMgtEventListener
[2018-07-31 11:33:16,687] DEBUG {org.wso2.carbon.identity.entitlement.listener.CacheClearingUserOperationListener} -  Clearing entitlement cache on post delete role operation for role sol1role95
[2018-07-31 11:33:16,687] DEBUG {org.wso2.carbon.identity.entitlement.cache.EntitlementBaseCache} -  Cache : PIP_ATTRIBUTE_CACHE is cleared in tenant domain : carbon.super
[2018-07-31 11:33:16,687] DEBUG {org.wso2.carbon.identity.entitlement.cache.EntitlementBaseCache} -  Cache : PDP_DECISION_CACHE is cleared in tenant domain : carbon.super
[2018-07-31 11:33:16,687] DEBUG {org.wso2.carbon.identity.entitlement.cache.PolicyCache} -  Trigger invalidateCache to tenant :  -1234 and all policy 
[2018-07-31 11:33:16,687] DEBUG {org.wso2.carbon.identity.entitlement.cache.PolicyCache} -  Trigger event to clear all cache in tenant :  -1234
[2018-07-31 11:33:16,687] DEBUG {org.wso2.carbon.identity.entitlement.cache.PolicyCache} -  Clustering not enabled. Not sending cluster message to other nodes.
[2018-07-31 11:33:16,688] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post delete role is called in IdentityMgtEventListener
[2018-07-31 11:33:16,691] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Created singleton instance for org.wso2.carbon.identity.auth.service.handler.HandlerManager
[2018-07-31 11:33:16,692] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler for the given handler list.
[2018-07-31 11:33:16,692] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler : DefaultAuthenticationManager(org.wso2.carbon.identity.auth.service.AuthenticationManager)
[2018-07-31 11:33:16,693] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  Pre authenticator is called in IdentityMgtEventListener
[2018-07-31 11:33:16,693] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,694] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountDisableHandler} -  Account disable feature is disabled for tenant :carbon.super
[2018-07-31 11:33:16,694] DEBUG {org.wso2.carbon.identity.recovery.handler.AdminForcedPasswordResetHandler} -  Handling event : PRE_AUTHENTICATION
[2018-07-31 11:33:16,694] DEBUG {org.wso2.carbon.identity.recovery.handler.AdminForcedPasswordResetHandler} -  PreAuthenticate - AdminForcedPasswordResetHandler for user : [hidden email]
[2018-07-31 11:33:16,694] DEBUG {org.wso2.carbon.identity.core.util.IdentityUtil} -  Error while reading user store property CaseInsensitiveUsername. Considering as case sensitive.
[2018-07-31 11:33:16,694] DEBUG {org.wso2.carbon.identity.recovery.handler.AccountConfirmationValidationHandler} -  PreAuthenticate
[2018-07-31 11:33:16,694] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,694] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : accountLock from user store domain : PRIMARY for claim : http://wso2.org/claims/identity/accountLocked in tenant : -1234
[2018-07-31 11:33:16,698] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,698] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post get user claim values is called in IdentityMgtEventListener
[2018-07-31 11:33:16,699] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityStoreEventListener} -  doPostGetUserClaimValues getting executed in the IdentityStoreEventListener for user: admin
[2018-07-31 11:33:16,699] DEBUG {org.wso2.carbon.identity.core.util.IdentityUtil} -  Error while reading user store property CaseInsensitiveUsername. Considering as case sensitive.
[2018-07-31 11:33:16,699] DEBUG {org.wso2.carbon.identity.governance.store.InMemoryIdentityDataStore} -  Loaded UserIdentityClaimsDO from cache for user :admin with claims: {}
[2018-07-31 11:33:16,699] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,700] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountLockHandler} -  Account lock handler is disabled in tenant: carbon.super
[2018-07-31 11:33:16,701] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,701] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,701] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,701] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Picking mapped attribute for external claim : urn:scim:schemas:core:1.0:active using mapped local claim : http://wso2.org/claims/active
[2018-07-31 11:33:16,701] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.DefaultClaimMetadataStore} -  Assigned mapped attribute : active from user store domain : PRIMARY for claim : http://wso2.org/claims/active in tenant : -1234
[2018-07-31 11:33:16,704] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedLocalClaimDAO} -  Cache hit for local claim list for tenant: -1234
[2018-07-31 11:33:16,704] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: http://schemas.xmlsoap.org/ws/2005/05/identity in tenant: -1234
[2018-07-31 11:33:16,705] DEBUG {org.wso2.carbon.identity.claim.metadata.mgt.dao.CacheBackedExternalClaimDAO} -  Cache hit for external claim list for dialect: urn:scim:schemas:core:1.0 in tenant: -1234
[2018-07-31 11:33:16,705] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post get user claim value is called in IdentityMgtEventListener
[2018-07-31 11:33:16,705] DEBUG {org.wso2.carbon.identity.governance.listener.IdentityMgtEventListener} -  post authenticator is called in IdentityMgtEventListener
[2018-07-31 11:33:16,705] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,705] DEBUG {org.wso2.carbon.identity.application.common.processors.RandomPasswordProcessor} -  Cache Key not found for Random Password Container
[2018-07-31 11:33:16,705] DEBUG {org.wso2.carbon.identity.handler.event.account.lock.AccountLockHandler} -  Account lock handler is disabled in tenant: carbon.super
[2018-07-31 11:33:16,705]  INFO {org.wso2.carbon.core.services.util.CarbonAuthenticationUtil} -  '[hidden email] [-1234]' logged in at [2018-07-31 11:33:16,705+0530]
[2018-07-31 11:33:16,706] DEBUG {org.wso2.carbon.identity.application.mgt.ApplicationMgtUtil} -  Checking whether user has role : Application/travelocitySP1 by retrieving role list of user : admin
[2018-07-31 11:33:16,707] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is listener enabled from configs: true
[2018-07-31 11:33:16,707] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is consent enabled system wide: true
[2018-07-31 11:33:16,707] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Listener is enabled and consent is enabled system wide. Hence returning true for isEnabled
[2018-07-31 11:33:16,707] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Loading Basic Application Data of travelocitySP1
[2018-07-31 11:33:16,707] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  ApplicationID: 10 ApplicationName: travelocitySP1 UserName: admin TenantDomain: carbon.super
[2018-07-31 11:33:16,707] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Clients of Application 10
[2018-07-31 11:33:16,707] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Steps of Application 10
[2018-07-31 11:33:16,707] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Claim Mappings of Application 10
[2018-07-31 11:33:16,708] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/nickname SPClaim: id
[2018-07-31 11:33:16,708] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/fullname SPClaim: name
[2018-07-31 11:33:16,708] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/gender SPClaim: gender
[2018-07-31 11:33:16,708] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/emailaddress SPClaim: email
[2018-07-31 11:33:16,708] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/givenname SPClaim: first_name
[2018-07-31 11:33:16,708] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/lastname SPClaim: last_name
[2018-07-31 11:33:16,708] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/dob SPClaim: age_range
[2018-07-31 11:33:16,708] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/url SPClaim: link
[2018-07-31 11:33:16,708] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Role Mapping of Application 10
[2018-07-31 11:33:16,708] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is listener enabled from configs: true
[2018-07-31 11:33:16,709] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is consent enabled system wide: true
[2018-07-31 11:33:16,709] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Listener is enabled and consent is enabled system wide. Hence returning true for isEnabled
[2018-07-31 11:33:16,709] DEBUG {org.wso2.carbon.identity.provisioning.listener.ProvisioningApplicationMgtListener} -  Clearing cache entry for travelocitySP1
[2018-07-31 11:33:16,709] DEBUG {org.wso2.carbon.identity.provisioning.listener.ProvisioningApplicationMgtListener} -  Provisioning cached entry not found for sp travelocitySP1
[2018-07-31 11:33:16,709] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is listener enabled from configs: true
[2018-07-31 11:33:16,709] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is consent enabled system wide: true
[2018-07-31 11:33:16,709] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Listener is enabled and consent is enabled system wide. Hence returning true for isEnabled
[2018-07-31 11:33:16,709] DEBUG {org.wso2.carbon.identity.application.mgt.ApplicationMgtUtil} -  Checking whether user has role : Application/travelocitySP1 by retrieving role list of user : admin
[2018-07-31 11:33:16,709] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Loading Basic Application Data of travelocitySP1
[2018-07-31 11:33:16,709] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  ApplicationID: 10 ApplicationName: travelocitySP1 UserName: admin TenantDomain: carbon.super
[2018-07-31 11:33:16,709] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Clients of Application 10
[2018-07-31 11:33:16,709] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Steps of Application 10
[2018-07-31 11:33:16,710] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Claim Mappings of Application 10
[2018-07-31 11:33:16,710] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/nickname SPClaim: id
[2018-07-31 11:33:16,710] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/fullname SPClaim: name
[2018-07-31 11:33:16,710] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/gender SPClaim: gender
[2018-07-31 11:33:16,710] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/emailaddress SPClaim: email
[2018-07-31 11:33:16,710] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/givenname SPClaim: first_name
[2018-07-31 11:33:16,710] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/lastname SPClaim: last_name
[2018-07-31 11:33:16,710] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/dob SPClaim: age_range
[2018-07-31 11:33:16,710] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/url SPClaim: link
[2018-07-31 11:33:16,710] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Role Mapping of Application 10
[2018-07-31 11:33:16,710] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Deleting Application travelocitySP1
[2018-07-31 11:33:16,710] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Loading Basic Application Data of travelocitySP1
[2018-07-31 11:33:16,710] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  ApplicationID: 10 ApplicationName: travelocitySP1 UserName: admin TenantDomain: carbon.super
[2018-07-31 11:33:16,710] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Clients of Application 10
[2018-07-31 11:33:16,710] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Steps of Application 10
[2018-07-31 11:33:16,711] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Claim Mappings of Application 10
[2018-07-31 11:33:16,711] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/nickname SPClaim: id
[2018-07-31 11:33:16,711] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/fullname SPClaim: name
[2018-07-31 11:33:16,711] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/gender SPClaim: gender
[2018-07-31 11:33:16,711] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/emailaddress SPClaim: email
[2018-07-31 11:33:16,711] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/givenname SPClaim: first_name
[2018-07-31 11:33:16,711] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/lastname SPClaim: last_name
[2018-07-31 11:33:16,711] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/dob SPClaim: age_range
[2018-07-31 11:33:16,711] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Local Claim: http://wso2.org/claims/url SPClaim: link
[2018-07-31 11:33:16,711] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Role Mapping of Application 10
[2018-07-31 11:33:16,712] DEBUG {org.wso2.carbon.identity.application.mgt.dao.impl.ApplicationDAOImpl} -  Reading Clients of Application 10
[2018-07-31 11:33:16,714] DEBUG {org.wso2.carbon.identity.application.mgt.ApplicationMgtUtil} -  Deleting application role : Application/travelocitySP1
[2018-07-31 11:33:16,715] DEBUG {org.wso2.carbon.identity.core.dao.SAMLSSOServiceProviderDAO} -  Registry resource does not exist for the path: /repository/identity/SAMLSSO/dHJhdmVsb2NpdHkuY29t
[2018-07-31 11:33:16,716] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is listener enabled from configs: true
[2018-07-31 11:33:16,716] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Is consent enabled system wide: true
[2018-07-31 11:33:16,716] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Listener is enabled and consent is enabled system wide. Hence returning true for isEnabled
[2018-07-31 11:33:16,716] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  Deleting consents on deletion of application: travelocitySP1, in tenant domain
[2018-07-31 11:33:16,716] DEBUG {org.wso2.carbon.identity.consent.mgt.listener.ConsentDeletionAppMgtListener} -  0 number of consents found for application travelocitySP1
[2018-07-31 11:33:16,720] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Created singleton instance for org.wso2.carbon.identity.auth.service.handler.HandlerManager
[2018-07-31 11:33:16,720] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler for the given handler list.
[2018-07-31 11:33:16,720] DEBUG {org.wso2.carbon.identity.auth.service.handler.HandlerManager} -  Get first priority handler : DefaultAuthenticationManager(org.wso2.carbon.identity.auth.service.AuthenticationManager)
[2018-07-31 11:33:16,722] DEBUG {org.wso2.carbon.identity.provisioning.listener.ProvisioningIdentityProviderMgtListener} -  Provisioning cached entry not found for idp linkedinnnnnnnnn


 














Thanks & Best Regards!
Achini Jayasena
Software Engineer - QA | WSO2

Email: [hidden email]
Mobile: +943 882 897

http://wso2.com/signature

On Mon, Jul 30, 2018 at 7:48 PM, Hasintha Indrajee <[hidden email]> wrote:
Can you please enable debug logs for carbon.identity level and see whether you observe any stack trace or any useful clue on this ?

On Mon, Jul 30, 2018 at 4:21 PM Achini Jayasena <[hidden email]> wrote:
Hi All,

In Jmeter, I'm trying to delete the Idp from API call. Even though the IDP delete ,I'm getting following error in the response. And also there are no errors available in the logs

Request:
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/" xmlns:mgt="http://mgt.idp.carbon.wso2.org">
   <soapenv:Header/>
   <soapenv:Body>
      <mgt:deleteIdP>
         <!--Optional:-->
         <mgt:idPName>${IdentityProviderName}</mgt:idPName>
      </mgt:deleteIdP>
   </soapenv:Body>
</soapenv:Envelope>

Response:
<?xml version="1.0" encoding="UTF-8"?>
<soapenv:Envelope xmlns:soapenv="http://schemas.xmlsoap.org/soap/envelope/">
   <soapenv:Body>
      <soapenv:Fault>
         <faultcode>soapenv:Server</faultcode>
         <faultstring>Exception occurred while trying to invoke service method deleteIdP</faultstring>
         <detail />
      </soapenv:Fault>
   </soapenv:Body>
</soapenv:Envelope>

Jmeter version: 3.3

Endpoint: htttps://localhost:9443/services/IdentityProviderMgtService.IdentityProviderMgtServiceHttpsSoap11Endpoint

Anyone have an idea why I'm getting this exception ? 


Thanks & Best Regards!
Achini Jayasena
Software Engineer - QA | WSO2

Email: [hidden email]
Mobile: +943 882 897

http://wso2.com/signature


--
Hasintha Indrajee
WSO2, Inc.
Mobile:+94 771892453



_______________________________________________
Dev mailing list
[hidden email]
http://wso2.org/cgi-bin/mailman/listinfo/dev