Besides Debug Business Rules, Debug Security Rules is probably the most frequently used option. Without it, it can be rather difficult to understand what the contextual security manager is doing. Let's start by performing the following steps:
- Firstly, end the Business Rule debugging by navigating to System Diagnostics > Session Debug > Disable All.
- Then activate the security debug by navigating to System Diagnostics > Session Debug > Debug Security. This will cause the platform place little bug icons on all the fields and again add lots of logs at the end of every page.
- Once enabled, impersonate a user that has the Hotel roles; I'll use Polly Sherman again, like I did in Chapter 8, Securing Applications ...