Working with the Lawson Security Server Log File (lase_server_#.log)
This section describes how to locate the Lawson Server log file (lase_server_n.log) and use it to troubleshoot security issues.
Typically, setup errors and conflicting rules are the causes of user access problems. When you need to troubleshoot a problem, it is always best to start by reviewing a user's access through viewing it on-screen in the Lawson Security Administrator or by running a security report. A general overview of practices related to security troubleshooting is available.
Working with log files can be complex. However, when you need to dig more deeply into problems related to rule execution, the Lawson Security server log file can provide helpful information. Here is an example: Suppose a user has been denied access when he or she should have been granted access. In your troubleshooting, you have reviewed the securable objects that the user has been assigned; they are correct. Your review of the conditional rules that have been assigned to the user does not indicate a problem. In this situation, you can use the log file to go to a deeper level.