Hi,
There is no entry in the Audit log for a request from Radius. In the apache logs I can’t see any specific informations and here ist the privacyidea log.
[DEBUG][privacyidea.api.before_after:82] Begin handling of request u’/validate/check?’
[DEBUG][privacyidea.lib.config:78] The singleton <class ‘privacyidea.lib.config.ConfigClass’> already exists.
[DEBUG][privacyidea.api.lib.utils:219] Can not get param: No JSON object could be decoded
[DEBUG][privacyidea.lib.user:185] Entering get_user_from_param with arguments ({‘resConf’: u’raysono.int’, ‘client’: u’172.16.148.32’, ‘realm’: u’raysono.int\t’, ‘user’: u’raysono\gptest’, ‘pass’: u’Elfmeter111’},) and keywords {}
[DEBUG][privacyidea.lib.config:185] Entering get_from_config with arguments (‘splitAtSign’,) and keywords {‘default’: False, ‘return_bool’: True}
[DEBUG][privacyidea.lib.config:78] The singleton <class ‘privacyidea.lib.config.ConfigClass’> already exists.
[DEBUG][privacyidea.lib.config:197] Exiting get_from_config with result True
[DEBUG][privacyidea.lib.user:185] Entering split_user with arguments (u’raysono\gptest’,) and keywords {}
[DEBUG][privacyidea.lib.user:197] Exiting split_user with result (u’gptest’, u’raysono’)
[DEBUG][privacyidea.lib.user:185] Entering User with arguments () and keywords {‘login’: u’gptest’, ‘realm’: u’raysono.int\t’, ‘resolver’: None}
[DEBUG][privacyidea.lib.config:185] Entering get_from_config with arguments (‘UserCacheExpiration’, ‘0’) and keywords {}
[DEBUG][privacyidea.lib.config:78] The singleton <class ‘privacyidea.lib.config.ConfigClass’> already exists.
[DEBUG][privacyidea.lib.config:197] Exiting get_from_config with result 0
[DEBUG][privacyidea.lib.user:185] Entering get_ordererd_resolvers with arguments (User(login=u’gptest’, realm=u’raysono.int\t’, resolver=’’),) and keywords {}
[DEBUG][privacyidea.lib.realm:185] Entering get_realms with arguments (u’raysono.int\t’,) and keywords {}
[DEBUG][privacyidea.lib.config:78] The singleton <class ‘privacyidea.lib.config.ConfigClass’> already exists.
[DEBUG][privacyidea.lib.realm:197] Exiting get_realms with result {}
[DEBUG][privacyidea.lib.user:197] Exiting get_ordererd_resolvers with result []
[DEBUG][privacyidea.lib.resolver:185] Entering get_resolver_list with arguments () and keywords {‘filter_resolver_name’: ‘’}
[DEBUG][privacyidea.lib.config:78] The singleton <class ‘privacyidea.lib.config.ConfigClass’> already exists.
[DEBUG][privacyidea.lib.resolver:199] Exiting get_resolver_list with result HIDDEN
[DEBUG][privacyidea.lib.user:197] Exiting User with result <gptest@raysono.int >
[DEBUG][privacyidea.lib.user:197] Exiting get_user_from_param with result <gptest@raysono.int >
[DEBUG][privacyidea.lib.config:78] The singleton <class ‘privacyidea.lib.policy.PolicyClass’> already exists.
[DEBUG][privacyidea.lib.audit:188] Entering getAudit with arguments HIDDEN and keywords HIDDEN
[DEBUG][privacyidea.lib.utils:1110] klass: <class ‘privacyidea.lib.auditmodules.sqlaudit.Audit’>
[DEBUG][privacyidea.lib.auditmodules.base:185] Entering read_keys with arguments (<privacyidea.lib.auditmodules.sqlaudit.Audit object at 0x7f6dd90caf90>, ‘/etc/privacyidea/public.pem’, ‘/etc/privacyidea/private.pem’) and keywords {}
[DEBUG][privacyidea.lib.auditmodules.base:197] Exiting read_keys with result None
[DEBUG][privacyidea.lib.audit:197] Exiting getAudit with result <privacyidea.lib.auditmodules.sqlaudit.Audit object at 0x7f6dd90caf90>
[DEBUG][privacyidea.lib.config:185] Entering get_from_config with arguments (‘OverrideAuthorizationClient’,) and keywords {}
[DEBUG][privacyidea.lib.config:78] The singleton <class ‘privacyidea.lib.config.ConfigClass’> already exists.
[DEBUG][privacyidea.lib.config:197] Exiting get_from_config with result None
[WARNING][privacyidea.lib.utils:636] Proxy ::1 not allowed to set IP to 172.16.148.32.
[DEBUG][privacyidea.lib.auditmodules.base:185] Entering log with arguments (<privacyidea.lib.auditmodules.sqlaudit.Audit object at 0x7f6dd90caf90>, {‘info’: ‘’, ‘success’: False, ‘privacyidea_server’: ‘localhost’, ‘client_user_agent’: None, ‘client’: ‘::1’, ‘action_detail’: ‘’, ‘action’: ‘POST /validate/check’}) and keywords {}
[DEBUG][privacyidea.lib.auditmodules.base:197] Exiting log with result None
[DEBUG][privacyidea.lib.policy:185] Entering get_action_values with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f6ddaaee690>, ‘setrealm’) and keywords {‘scope’: ‘authorization’, ‘audit_data’: {‘info’: ‘’, ‘success’: False, ‘privacyidea_server’: ‘localhost’, ‘client_user_agent’: None, ‘client’: ‘::1’, ‘action_detail’: ‘’, ‘action’: ‘POST /validate/check’}, ‘client’: ‘::1’, ‘realm’: u’raysono.int\t’, ‘user’: u’gptest’}
[DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f6ddaaee690>,) and keywords {‘realm’: u’raysono.int\t’, ‘sort_by_priority’: True, ‘active’: True, ‘client’: ‘::1’, ‘user’: u’gptest’, ‘resolver’: None, ‘action’: ‘setrealm’, ‘scope’: ‘authorization’, ‘adminrealm’: None}
[DEBUG][privacyidea.lib.policy:500] Policies after matching time: [{‘time’: u’’, ‘user’: [], ‘resolver’: [], ‘active’: True, ‘adminrealm’: [], ‘condition’: 0, ‘realm’: [], ‘name’: u’Webui’, ‘priority’: 1, ‘client’: [], ‘check_all_resolvers’: False, ‘action’: {u’hide_welcome_info’: True, u’logout_time’: u’300’}, ‘scope’: u’webui’}, {‘time’: u’’, ‘user’: [], ‘resolver’: [u’raysono’, u’testgruppe’, u’rsadmins’], ‘active’: True, ‘adminr
[DEBUG][privacyidea.lib.policy:510] Policies after matching active: [{‘time’: u’’, ‘user’: [], ‘resolver’: [], ‘active’: True, ‘adminrealm’: [], ‘condition’: 0, ‘realm’: [], ‘name’: u’Webui’, ‘priority’: 1, ‘client’: [], ‘check_all_resolvers’: False, ‘action’: {u’hide_welcome_info’: True, u’logout_time’: u’300’}, ‘scope’: u’webui’}, {‘time’: u’’, ‘user’: [], ‘resolver’: [u’raysono’, u’testgruppe’, u’rsadmins’], ‘active’: True, ‘admi
[DEBUG][privacyidea.lib.policy:510] Policies after matching scope: [{‘time’: u’’, ‘user’: [], ‘resolver’: [u’raysono’, u’rsadmins’], ‘active’: True, ‘adminrealm’: [], ‘condition’: 0, ‘realm’: [u’raysono’, u’rsadmins’], ‘name’: u’AuthorizationRS’, ‘priority’: 1, ‘client’: [], ‘check_all_resolvers’: True, ‘action’: {u’add_resolver_in_response’: True, u’tokentype’: u’totp’}, ‘scope’: u’authorization’}]
[DEBUG][privacyidea.lib.policy:534] Policies after matching action: []
[DEBUG][privacyidea.lib.policy:534] Policies after matching user: []
[DEBUG][privacyidea.lib.policy:534] Policies after matching realm: []
[DEBUG][privacyidea.lib.policy:597] Policies after matching client
[DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
[DEBUG][privacyidea.lib.policy:197] Exiting get_action_values with result {}
[DEBUG][privacyidea.lib.policy:185] Entering get_action_values with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f6ddaaee690>, ‘mangle’) and keywords {‘scope’: ‘authentication’, ‘client’: ‘::1’, ‘realm’: u’raysono.int\t’, ‘user’: u’gptest’}
[DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f6ddaaee690>,) and keywords {‘realm’: u’raysono.int\t’, ‘sort_by_priority’: True, ‘active’: True, ‘client’: ‘::1’, ‘user’: u’gptest’, ‘resolver’: None, ‘action’: ‘mangle’, ‘scope’: ‘authentication’, ‘adminrealm’: None}
[DEBUG][privacyidea.lib.policy:500] Policies after matching time: [{‘time’: u’’, ‘user’: [], ‘resolver’: [], ‘active’: True, ‘adminrealm’: [], ‘condition’: 0, ‘realm’: [], ‘name’: u’Webui’, ‘priority’: 1, ‘client’: [], ‘check_all_resolvers’: False, ‘action’: {u’hide_welcome_info’: True, u’logout_time’: u’300’}, ‘scope’: u’webui’}, {‘time’: u’’, ‘user’: [], ‘resolver’: [u’raysono’, u’testgruppe’, u’rsadmins’], ‘active’: True, ‘adminr
[DEBUG][privacyidea.lib.policy:510] Policies after matching active: [{‘time’: u’’, ‘user’: [], ‘resolver’: [], ‘active’: True, ‘adminrealm’: [], ‘condition’: 0, ‘realm’: [], ‘name’: u’Webui’, ‘priority’: 1, ‘client’: [], ‘check_all_resolvers’: False, ‘action’: {u’hide_welcome_info’: True, u’logout_time’: u’300’}, ‘scope’: u’webui’}, {‘time’: u’’, ‘user’: [], ‘resolver’: [u’raysono’, u’testgruppe’, u’rsadmins’], ‘active’: True, ‘admi
[DEBUG][privacyidea.lib.policy:510] Policies after matching scope: [{‘time’: u’’, ‘user’: [], ‘resolver’: [u’raysono’, u’rsadmins’], ‘active’: True, ‘adminrealm’: [], ‘condition’: 0, ‘realm’: [u’raysono’, u’rsadmins’], ‘name’: u’AuthenticationRS’, ‘priority’: 1, ‘client’: [], ‘check_all_resolvers’: True, ‘action’: {u’challenge_response’: u’totp’, u’otppin’: u’userstore’}, ‘scope’: u’authentication’}, {‘time’: u’’, ‘user’: [], ‘resol
[DEBUG][privacyidea.lib.policy:534] Policies after matching action: []
[DEBUG][privacyidea.lib.policy:534] Policies after matching user: []
[DEBUG][privacyidea.lib.policy:534] Policies after matching realm: []
[DEBUG][privacyidea.lib.policy:597] Policies after matching client
[DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
[DEBUG][privacyidea.lib.policy:197] Exiting get_action_values with result {}
[DEBUG][privacyidea.lib.clientapplication:185] Entering save_clientapplication with arguments (’::1’, ‘FreeRADIUS’) and keywords {}
[DEBUG][privacyidea.lib.clientapplication:197] Exiting save_clientapplication with result 2
[DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f6ddaaee690>,) and keywords {‘audit_data’: {‘info’: ‘’, ‘success’: False, ‘privacyidea_server’: ‘localhost’, ‘client_user_agent’: None, ‘client’: ‘::1’, ‘action_detail’: ‘’, ‘action’: ‘POST /validate/check’}, ‘realm’: u’raysono.int\t’, ‘active’: True, ‘client’: ‘::1’, ‘user’: u’gptest’, ‘action’: ‘api_key_requir
[DEBUG][privacyidea.lib.policy:500] Policies after matching time: [{‘time’: u’’, ‘user’: [], ‘resolver’: [], ‘active’: True, ‘adminrealm’: [], ‘condition’: 0, ‘realm’: [], ‘name’: u’Webui’, ‘priority’: 1, ‘client’: [], ‘check_all_resolvers’: False, ‘action’: {u’hide_welcome_info’: True, u’logout_time’: u’300’}, ‘scope’: u’webui’}, {‘time’: u’’, ‘user’: [], ‘resolver’: [u’raysono’, u’testgruppe’, u’rsadmins’], ‘active’: True, ‘adminr
[DEBUG][privacyidea.lib.policy:510] Policies after matching active: [{‘time’: u’’, ‘user’: [], ‘resolver’: [], ‘active’: True, ‘adminrealm’: [], ‘condition’: 0, ‘realm’: [], ‘name’: u’Webui’, ‘priority’: 1, ‘client’: [], ‘check_all_resolvers’: False, ‘action’: {u’hide_welcome_info’: True, u’logout_time’: u’300’}, ‘scope’: u’webui’}, {‘time’: u’’, ‘user’: [], ‘resolver’: [u’raysono’, u’testgruppe’, u’rsadmins’], ‘active’: True, ‘admi
[DEBUG][privacyidea.lib.policy:510] Policies after matching scope: [{‘time’: u’’, ‘user’: [], ‘resolver’: [u’raysono’, u’rsadmins’], ‘active’: True, ‘adminrealm’: [], ‘condition’: 0, ‘realm’: [u’raysono’, u’rsadmins’], ‘name’: u’AuthorizationRS’, ‘priority’: 1, ‘client’: [], ‘check_all_resolvers’: True, ‘action’: {u’add_resolver_in_response’: True, u’tokentype’: u’totp’}, ‘scope’: u’authorization’}]
[DEBUG][privacyidea.lib.policy:534] Policies after matching action: []
[DEBUG][privacyidea.lib.policy:534] Policies after matching user: []
[DEBUG][privacyidea.lib.policy:534] Policies after matching realm: []
[DEBUG][privacyidea.lib.policy:597] Policies after matching client
[DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
[DEBUG][privacyidea.lib.auditmodules.base:185] Entering log with arguments (<privacyidea.lib.auditmodules.sqlaudit.Audit object at 0x7f6dd90caf90>, {‘realm’: u’raysono.int\t’, ‘user’: u’gptest’, ‘resolver’: ‘’}) and keywords {}
[DEBUG][privacyidea.lib.auditmodules.base:197] Exiting log with result None
[DEBUG][privacyidea.lib.policy:185] Entering get_action_values with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f6ddaaee690>,) and keywords {‘realm’: u’raysono.int\t’, ‘client’: ‘::1’, ‘user’: u’gptest’, ‘resolver’: ‘’, ‘action’: ‘auth_cache’, ‘scope’: ‘authentication’, ‘unique’: True}
[DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f6ddaaee690>,) and keywords {‘realm’: u’raysono.int\t’, ‘sort_by_priority’: True, ‘active’: True, ‘client’: ‘::1’, ‘user’: u’gptest’, ‘resolver’: ‘’, ‘action’: ‘auth_cache’, ‘scope’: ‘authentication’, ‘adminrealm’: None}
[DEBUG][privacyidea.lib.policy:500] Policies after matching time: [{‘time’: u’’, ‘user’: [], ‘resolver’: [], ‘active’: True, ‘adminrealm’: [], ‘condition’: 0, ‘realm’: [], ‘name’: u’Webui’, ‘priority’: 1, ‘client’: [], ‘check_all_resolvers’: False, ‘action’: {u’hide_welcome_info’: True, u’logout_time’: u’300’}, ‘scope’: u’webui’}, {‘time’: u’’, ‘user’: [], ‘resolver’: [u’raysono’, u’testgruppe’, u’rsadmins’], ‘active’: True, ‘adminr
[DEBUG][privacyidea.lib.policy:510] Policies after matching active: [{‘time’: u’’, ‘user’: [], ‘resolver’: [], ‘active’: True, ‘adminrealm’: [], ‘condition’: 0, ‘realm’: [], ‘name’: u’Webui’, ‘priority’: 1, ‘client’: [], ‘check_all_resolvers’: False, ‘action’: {u’hide_welcome_info’: True, u’logout_time’: u’300’}, ‘scope’: u’webui’}, {‘time’: u’’, ‘user’: [], ‘resolver’: [u’raysono’, u’testgruppe’, u’rsadmins’], ‘active’: True, ‘admi
[DEBUG][privacyidea.lib.policy:510] Policies after matching scope: [{‘time’: u’’, ‘user’: [], ‘resolver’: [u’raysono’, u’rsadmins’], ‘active’: True, ‘adminrealm’: [], ‘condition’: 0, ‘realm’: [u’raysono’, u’rsadmins’], ‘name’: u’AuthenticationRS’, ‘priority’: 1, ‘client’: [], ‘check_all_resolvers’: True, ‘action’: {u’challenge_response’: u’totp’, u’otppin’: u’userstore’}, ‘scope’: u’authentication’}, {‘time’: u’’, ‘user’: [], ‘resol
[DEBUG][privacyidea.lib.policy:534] Policies after matching action: []
[DEBUG][privacyidea.lib.policy:534] Policies after matching user: []
[DEBUG][privacyidea.lib.policy:534] Policies after matching realm: []
[DEBUG][privacyidea.lib.policy:569] Policies after matching resolver: []
[DEBUG][privacyidea.lib.policy:597] Policies after matching client
[DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
[DEBUG][privacyidea.lib.policy:197] Exiting get_action_values with result {}
[DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f6ddaaee690>,) and keywords {‘realm’: u’raysono.int\t’, ‘active’: True, ‘client’: ‘::1’, ‘user’: u’gptest’, ‘resolver’: ‘’, ‘action’: ‘passOnNoUser’, ‘scope’: ‘authentication’}
[DEBUG][privacyidea.lib.policy:500] Policies after matching time: [{‘time’: u’’, ‘user’: [], ‘resolver’: [], ‘active’: True, ‘adminrealm’: [], ‘condition’: 0, ‘realm’: [], ‘name’: u’Webui’, ‘priority’: 1, ‘client’: [], ‘check_all_resolvers’: False, ‘action’: {u’hide_welcome_info’: True, u’logout_time’: u’300’}, ‘scope’: u’webui’}, {‘time’: u’’, ‘user’: [], ‘resolver’: [u’raysono’, u’testgruppe’, u’rsadmins’], ‘active’: True, ‘adminr
[DEBUG][privacyidea.lib.policy:510] Policies after matching active: [{‘time’: u’’, ‘user’: [], ‘resolver’: [], ‘active’: True, ‘adminrealm’: [], ‘condition’: 0, ‘realm’: [], ‘name’: u’Webui’, ‘priority’: 1, ‘client’: [], ‘check_all_resolvers’: False, ‘action’: {u’hide_welcome_info’: True, u’logout_time’: u’300’}, ‘scope’: u’webui’}, {‘time’: u’’, ‘user’: [], ‘resolver’: [u’raysono’, u’testgruppe’, u’rsadmins’], ‘active’: True, ‘admi
[DEBUG][privacyidea.lib.policy:510] Policies after matching scope: [{‘time’: u’’, ‘user’: [], ‘resolver’: [u’raysono’, u’rsadmins’], ‘active’: True, ‘adminrealm’: [], ‘condition’: 0, ‘realm’: [u’raysono’, u’rsadmins’], ‘name’: u’AuthenticationRS’, ‘priority’: 1, ‘client’: [], ‘check_all_resolvers’: True, ‘action’: {u’challenge_response’: u’totp’, u’otppin’: u’userstore’}, ‘scope’: u’authentication’}, {‘time’: u’’, ‘user’: [], ‘resol
[DEBUG][privacyidea.lib.policy:534] Policies after matching action: []
[DEBUG][privacyidea.lib.policy:534] Policies after matching user: []
[DEBUG][privacyidea.lib.policy:534] Policies after matching realm: []
[DEBUG][privacyidea.lib.policy:569] Policies after matching resolver: []
[DEBUG][privacyidea.lib.policy:597] Policies after matching client
[DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
[DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f6ddaaee690>,) and keywords {‘realm’: u’raysono.int\t’, ‘active’: True, ‘client’: ‘::1’, ‘user’: u’gptest’, ‘resolver’: ‘’, ‘action’: ‘passOnNoToken’, ‘scope’: ‘authentication’}
[DEBUG][privacyidea.lib.policy:500] Policies after matching time: [{‘time’: u’’, ‘user’: [], ‘resolver’: [], ‘active’: True, ‘adminrealm’: [], ‘condition’: 0, ‘realm’: [], ‘name’: u’Webui’, ‘priority’: 1, ‘client’: [], ‘check_all_resolvers’: False, ‘action’: {u’hide_welcome_info’: True, u’logout_time’: u’300’}, ‘scope’: u’webui’}, {‘time’: u’’, ‘user’: [], ‘resolver’: [u’raysono’, u’testgruppe’, u’rsadmins’], ‘active’: True, ‘adminr
[DEBUG][privacyidea.lib.policy:510] Policies after matching active: [{‘time’: u’’, ‘user’: [], ‘resolver’: [], ‘active’: True, ‘adminrealm’: [], ‘condition’: 0, ‘realm’: [], ‘name’: u’Webui’, ‘priority’: 1, ‘client’: [], ‘check_all_resolvers’: False, ‘action’: {u’hide_welcome_info’: True, u’logout_time’: u’300’}, ‘scope’: u’webui’}, {‘time’: u’’, ‘user’: [], ‘resolver’: [u’raysono’, u’testgruppe’, u’rsadmins’], ‘active’: True, ‘admi
[DEBUG][privacyidea.lib.policy:510] Policies after matching scope: [{‘time’: u’’, ‘user’: [], ‘resolver’: [u’raysono’, u’rsadmins’], ‘active’: True, ‘adminrealm’: [], ‘condition’: 0, ‘realm’: [u’raysono’, u’rsadmins’], ‘name’: u’AuthenticationRS’, ‘priority’: 1, ‘client’: [], ‘check_all_resolvers’: True, ‘action’: {u’challenge_response’: u’totp’, u’otppin’: u’userstore’}, ‘scope’: u’authentication’}, {‘time’: u’’, ‘user’: [], ‘resol
[DEBUG][privacyidea.lib.policy:534] Policies after matching action: []
[DEBUG][privacyidea.lib.policy:534] Policies after matching user: []
[DEBUG][privacyidea.lib.policy:534] Policies after matching realm: []
[DEBUG][privacyidea.lib.policy:569] Policies after matching resolver: []
[DEBUG][privacyidea.lib.policy:597] Policies after matching client
[DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
[DEBUG][privacyidea.lib.policy:185] Entering get_policies with arguments (<privacyidea.lib.policy.PolicyClass object at 0x7f6ddaaee690>,) and keywords {‘realm’: u’raysono.int\t’, ‘sort_by_priority’: True, ‘active’: True, ‘client’: ‘::1’, ‘user’: u’gptest’, ‘resolver’: ‘’, ‘action’: ‘passthru’, ‘scope’: ‘authentication’}
[DEBUG][privacyidea.lib.policy:500] Policies after matching time: [{‘time’: u’’, ‘user’: [], ‘resolver’: [], ‘active’: True, ‘adminrealm’: [], ‘condition’: 0, ‘realm’: [], ‘name’: u’Webui’, ‘priority’: 1, ‘client’: [], ‘check_all_resolvers’: False, ‘action’: {u’hide_welcome_info’: True, u’logout_time’: u’300’}, ‘scope’: u’webui’}, {‘time’: u’’, ‘user’: [], ‘resolver’: [u’raysono’, u’testgruppe’, u’rsadmins’], ‘active’: True, ‘adminr
[DEBUG][privacyidea.lib.policy:510] Policies after matching active: [{‘time’: u’’, ‘user’: [], ‘resolver’: [], ‘active’: True, ‘adminrealm’: [], ‘condition’: 0, ‘realm’: [], ‘name’: u’Webui’, ‘priority’: 1, ‘client’: [], ‘check_all_resolvers’: False, ‘action’: {u’hide_welcome_info’: True, u’logout_time’: u’300’}, ‘scope’: u’webui’}, {‘time’: u’’, ‘user’: [], ‘resolver’: [u’raysono’, u’testgruppe’, u’rsadmins’], ‘active’: True, ‘admi
[DEBUG][privacyidea.lib.policy:510] Policies after matching scope: [{‘time’: u’’, ‘user’: [], ‘resolver’: [u’raysono’, u’rsadmins’], ‘active’: True, ‘adminrealm’: [], ‘condition’: 0, ‘realm’: [u’raysono’, u’rsadmins’], ‘name’: u’AuthenticationRS’, ‘priority’: 1, ‘client’: [], ‘check_all_resolvers’: True, ‘action’: {u’challenge_response’: u’totp’, u’otppin’: u’userstore’}, ‘scope’: u’authentication’}, {‘time’: u’’, ‘user’: [], ‘resol
[DEBUG][privacyidea.lib.policy:534] Policies after matching action: []
[DEBUG][privacyidea.lib.policy:534] Policies after matching user: []
[DEBUG][privacyidea.lib.policy:534] Policies after matching realm: []
[DEBUG][privacyidea.lib.policy:569] Policies after matching resolver: []
[DEBUG][privacyidea.lib.policy:597] Policies after matching client
[DEBUG][privacyidea.lib.policy:197] Exiting get_policies with result []
[DEBUG][privacyidea.lib.token:185] Entering check_user_pass with arguments () and keywords {}
[DEBUG][privacyidea.lib.token:185] Entering get_tokens with arguments () and keywords {‘user’: User(login=u’gptest’, realm=u’raysono.int\t’, resolver=’’)}
[DEBUG][privacyidea.lib.auditmodules.base:185] Entering log with arguments (<privacyidea.lib.auditmodules.sqlaudit.Audit object at 0x7f6dd90caf90>, {‘info’: u’ERR904: The user can not be found in any resolver in this realm!’}) and keywords {}
[DEBUG][privacyidea.lib.auditmodules.base:197] Exiting log with result None
[DEBUG][privacyidea.api.lib.utils:219] Can not get param: No JSON object could be decoded
[DEBUG][privacyidea.api.lib.utils:219] Can not get param: No JSON object could be decoded
[DEBUG][privacyidea.api.before_after:88] End handling of request u’/validate/check?’
Best regards
Robert