The current implementation of authentication filter tracers is fairly minimal. A more complete implementation would log factors such as when a filter short-circuits or sets a principal.
↧