SSPR 5015 if user's password is about to expire within next 5 days

I am getting the below error in SSPR when trying to change password only if my password is going to expire within next 5 days. In the Change Password screen I am getting below error message.

If the password expiry is more than 6 days then I am not seeing any error and successfully land on the Change Password page.

SSPR 5015 An error has occurred. If this error occurs repeatedly please contact your help desk.

In the SSPR log I am getting the below error

ERROR, servlet.AbstractPwmServlet, {16626338,PA600039-Iapple} unexpected error processing request: org.apache.jasper.JasperException: Unable to compile class for JSP: [10.10.30.56]

An error occurred at line: [38] in the jsp file: [/WEB-INF/jsp/fragment/footer.jsp]
JspUtility cannot be resolved

Below are the SSPR logs.

2024-01-10T06:44:56Z, TRACE, http.HttpEventManager, new http session created
2024-01-10T06:44:56Z, TRACE, http.PwmSession, {16626347} created new session
2024-01-10T06:44:56Z, TRACE, http.PwmSessionWrapper, {16626347} setting java servlet session timeout to 2h due to Setting Settings ⇨ Application ⇨ Application ⇨ Idle Timeout Seconds
2024-01-10T06:44:56Z, TRACE, filter.RequestInitializationFilter, {16626347} user locale set to 'en' [10.10.30.253]
2024-01-10T06:44:56Z, TRACE, http.PwmRequest, {16626347} GET request for: /sspr/public/test_health.jsp (no params) requestID=16 [10.10.30.253]
2024-01-10T06:44:56Z, TRACE, filter.SessionFilter, {16626347} https secure request headers:  [10.10.30.253]
  host='sspr.iaglab.com'
  connection='Close'
2024-01-10T06:44:56Z, TRACE, filter.SessionFilter, {16626347} session has not been validated, redirecting with verification key to /sspr/public/test_health.jsp?stickyRedirectTest=95FcU5pbNNeYWhV7hW7XQzxY9lXoGJSQ18cf330954f [10.10.30.253]
2024-01-10T06:44:56Z, TRACE, state.CryptoCookieLoginImpl, {16626347} wrote LoginInfoBean={"a":false,"p":"*hidden*","t":"UNAUTHENTICATED","af":[],"rq":"2024-01-10T11:44:56Z","g":"lr7praz3RjwhGYrv0IBMqDDSFD370Mn1lCKqPTpf74ox4kXPa9ekwxuntcvgWKAaPUpV5zHN","c":0,"lf":[]} [10.10.30.253]
2024-01-10T06:44:56Z, TRACE, http.PwmResponse, {16626347} sending 302 redirect to /sspr/public/test_health.jsp?stickyRedirectTest=95FcU5pbNNeYWhV7hW7XQzxY9lXoGJSQ18cf330954f [10.10.30.253]
2024-01-10T06:45:01Z, TRACE, http.PwmRequest, {16626338} GET request for: /sspr/private/changepassword requestID=17 [10.10.30.56]
  locale='en'
2024-01-10T06:45:01Z, DEBUG, filter.SessionFilter, {16626338} detected locale request parameter locale with value en [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, http.PwmSession, {16626338} setting session locale to 'en' [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, auth.BasicFilterAuthenticationProvider, {16626338} attempting to authenticate user using basic auth header (username=cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab) [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, search.UserSearchEngine, {16626338} username 'cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab' appears to be a DN (starts with configured ldap naming attribute 'cn'), skipping username search [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapOperationsHelper, opening new ldap proxy connection
2024-01-10T06:45:01Z, TRACE, ldap.LdapOperationsHelper, creating new ldap connection using config: ChaiConfiguration:  settings: {chai.bind.URLs=ldaps://10.10.30.159:636,ldaps://10.10.30.160:636,, chai.bind.dn=cn=ssprproxyuser,ou=sa,ou=services,o=testlab, chai.bind.password=**stripped**, chai.cache.enable=false, chai.cache.maximumSize=128, chai.cache.maximumAge=1000, chai.statistics.enable=true, chai.watchdog.enable=true, chai.watchdog.operationTimeout=60000, chai.watchdog.idleTimeout=30000, chai.watchdog.maxConnectionLifetime=3300000, chai.watchdog.disableIfPwExpired=true, chai.connection.promiscuousSSL=false, chai.wireDebug.enable=false, chai.failover.enable=true, chai.failover.useLastKnownGoodHint=true, chai.failover.failBackTime=90000, chai.failover.connectRetries=4, chai.ldap.dereferenceAliases=never, chai.ldap.ldapTimeout=30000, chai.ldap.ldapReadTimeout=0, chai.ldap.followReferrals=false, chai.provider.implementation=com.novell.ldapchai.provider.JNDIProviderImpl, chai.edirectory.enableNMAS=true, chai.provider.extendedOperation.failureCache=true, chai.provider.readonly=false, chai.vendor.default=, chai.provider.jndi.enablePool=false, chai.crsetting.caseInsensitive=true, chai.crsetting.allowDuplicateResponses=false, chai.crsetting.defaultFormatType=PBKDF2_SHA512, chai.cr.chai.attributeName=pwmResponseSet, chai.cr.chai.recordId=0002, chai.cr.chai.saltCount=100000, chai.ad.setPolicyHintsOnPwSet=false, chai.ldap.paging.enable=auto, chai.ldap.paging.size=500, chai.openldap.passwordPolicyDn=, chai.openldap.passwordPolicy.url=file:/etc/openldap/check_password.conf, chai.jndi.resolveInNamespace=true, chai.ldap.characterEncoding=UTF8}
2024-01-10T06:45:01Z, TRACE, provider.JNDIProviderImpl, bind successful as cn=ssprproxyuser,ou=sa,ou=services,o=testlab (52ms)
2024-01-10T06:45:01Z, TRACE, provider.ChaiProviderFactory, adding WatchdogWrapper to provider instance
2024-01-10T06:45:01Z, TRACE, provider.WatchdogWrapper, checking for user password expiration to adjust watchdog timeout id=w3
2024-01-10T06:45:01Z, TRACE, provider.ChaiProviderFactory, adding StatisticsWrapper to provider instance
2024-01-10T06:45:01Z, DEBUG, auth.LDAPAuthenticationRequest, {16626338} authID=0, preparing to authenticate user using authenticationType=AUTHENTICATED using strategy BIND [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, auth.LDAPAuthenticationRequest, {16626338} authID=0, beginning testCredentials process [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, auth.LDAPAuthenticationRequest, {16626338} authID=0, attempting authentication using ldap BIND [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapOperationsHelper, {16626338} creating new ldap connection using config: ChaiConfiguration:  settings: {chai.bind.URLs=ldaps://10.10.30.159:636,ldaps://10.10.30.160:636,, chai.bind.dn=cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab, chai.bind.password=**stripped**, chai.cache.enable=false, chai.cache.maximumSize=128, chai.cache.maximumAge=1000, chai.statistics.enable=true, chai.watchdog.enable=true, chai.watchdog.operationTimeout=60000, chai.watchdog.idleTimeout=30000, chai.watchdog.maxConnectionLifetime=3300000, chai.watchdog.disableIfPwExpired=true, chai.connection.promiscuousSSL=false, chai.wireDebug.enable=false, chai.failover.enable=true, chai.failover.useLastKnownGoodHint=true, chai.failover.failBackTime=90000, chai.failover.connectRetries=4, chai.ldap.dereferenceAliases=never, chai.ldap.ldapTimeout=30000, chai.ldap.ldapReadTimeout=0, chai.ldap.followReferrals=false, chai.provider.implementation=com.novell.ldapchai.provider.JNDIProviderImpl, chai.edirectory.enableNMAS=true, chai.provider.extendedOperation.failureCache=true, chai.provider.readonly=false, chai.vendor.default=, chai.provider.jndi.enablePool=false, chai.crsetting.caseInsensitive=true, chai.crsetting.allowDuplicateResponses=false, chai.crsetting.defaultFormatType=PBKDF2_SHA512, chai.cr.chai.attributeName=pwmResponseSet, chai.cr.chai.recordId=0002, chai.cr.chai.saltCount=100000, chai.ad.setPolicyHintsOnPwSet=false, chai.ldap.paging.enable=auto, chai.ldap.paging.size=500, chai.openldap.passwordPolicyDn=, chai.openldap.passwordPolicy.url=file:/etc/openldap/check_password.conf, chai.jndi.resolveInNamespace=true, chai.ldap.characterEncoding=UTF8} [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, provider.JNDIProviderImpl, bind successful as cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab (54ms)
2024-01-10T06:45:01Z, TRACE, provider.ChaiProviderFactory, adding WatchdogWrapper to provider instance
2024-01-10T06:45:01Z, TRACE, provider.WatchdogWrapper, checking for user password expiration to adjust watchdog timeout id=w4
2024-01-10T06:45:01Z, TRACE, provider.ChaiProviderFactory, adding StatisticsWrapper to provider instance
2024-01-10T06:45:01Z, DEBUG, auth.LDAPAuthenticationRequest, {16626338} authID=0, successful ldap authentication for UserIdentity{"userDN":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","ldapProfile":"default"} (59ms) type: AUTHENTICATED, using strategy BIND, using proxy connection: false, returning bind dn: cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab [10.10.30.56]
2024-01-10T06:45:01Z, INFO , event.AuditService, audit event: {"perpetratorID":"PA600039-Iapple","perpetratorDN":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","perpetratorLdapProfile":"default","sourceAddress":"10.10.30.56","sourceHost":"10.10.30.56","type":"USER","eventCode":"AUTHENTICATE","guid":"5396d7ca-8ad8-4733-85eb-3922ea027cee","timestamp":"2024-01-10T11:45:01Z","message":"type=AUTHENTICATED, source=BASIC_AUTH","narrative":"PA600039-Iapple (cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab) has authenticated","xdasTaxonomy":"XDAS_AE_AUTHENTICATE_ACCOUNT","xdasOutcome":"XDAS_OUT_SUCCESS"}
2024-01-10T06:45:01Z, TRACE, entry.EdirEntries, using active universal password policy for user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab at cn=PartnerPasswordPolicy,cn=Password Policies,cn=Security
2024-01-10T06:45:01Z, DEBUG, operations.PasswordUtility, {16626338} discovered assigned password policy for cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab PwmPasswordPolicy: {"policyMap":{"chai.pwrule.changeMessage":"","chai.pwrule.upper.min":"1","chai.pwrule.numeric.allow":"TRUE","password.policy.minimumNonAlpha":"0","chai.pwrule.disallowedValues":"","chai.pwrule.length.max":"32","chai.pwrule.nonalpha.allow":"FALSE","chai.pwrule.nonalpha.max":"0","chai.pwrule.disallowedAttributes":"","chai.pwrule.uniqueRequired":"TRUE","chai.pwrule.ADComplexity2008":"FALSE","chai.pwrule.sequentialRepeat.max":"0","password.policy.allowNonAlpha":"true","chai.pwrule.lower.min":"0","chai.pwrule.special.max":"0","chai.pwrule.nonalpha.min":"0","chai.pwrule.numeric.allowLast":"TRUE","chai.pwrule.numeric.allowFirst":"TRUE","chai.pwrule.policyEnabled":"true","chai.pwrule.special.allow":"TRUE","chai.pwrule.expirationInterval":"7776000","chai.pwrule.special.min":"1","password.policy.maximumNonAlpha":"0","chai.pwrule.lower.max":"0","chai.pwrule.numeric.max":"0","chai.pwrule.ADComplexityMaxViolation":"2","chai.pwrule.upper.max":"0","chai.pwrule.numeric.min":"1","chai.pwrule.unique.min":"0","chai.pwrule.special.allowFirst":"TRUE","chai.pwrule.length.min":"8","chai.pwrule.special.allowLast":"TRUE","chai.pwrule.caseSensitive":"TRUE","chai.pwrule.lifetime.minimimum":"0"}} [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, operations.PasswordUtility, {16626338} readPasswordPolicyForUser via method LDAP completed in 3ms [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.UserInfoReader, {16626338} beginning password status check process for cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.UserInfoReader, {16626338} password for cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab does not appear to be expired [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.UserInfoReader, {16626338} read password expiration time: 2024-01-12T11:14:47Z, 1d:23h:29m from now [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.UserInfoReader, {16626338} user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab password will expire within 1d:23h:29m, marking as within warn period [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.UserInfoReader, {16626338} completed user password status check for cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab PasswordStatus.PasswordStatusBuilder(expired=false, preExpired=false, violatesPolicy=false, warnPeriod=true) (6ms) [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, auth.SessionAuthenticator, {16626338,PA600039-Iapple} clearing permission cache [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, auth.HttpAuthenticationUtilities, {16626338,PA600039-Iapple} authentication provided by method BASIC_AUTH [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, auth.HttpAuthenticationUtilities, {16626338,PA600039-Iapple} authentication provided by method SSO_AUTH_HEADER [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, auth.HttpAuthenticationUtilities, {16626338,PA600039-Iapple} authentication provided by method OAUTH [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, filter.AuthenticationFilter, {16626338,PA600039-Iapple} inline authentication occurred during this request, redirecting to current url to restart request [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, state.CryptoCookieLoginImpl, {16626338,PA600039-Iapple} wrote LoginInfoBean={"u":{"userDN":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","ldapProfile":"default"},"a":true,"p":"*hidden*","t":"AUTHENTICATED","af":[],"as":"BASIC_AUTH","at":"2024-01-10T11:45:01Z","rq":"2024-01-10T11:45:01Z","g":"lr7pqird2KQG848liC2e0Mikg8NDZ5URsKEc6fqHLjO0k1g9XV9frqN9ZLhtgC7fyzSqejPG","ba":{"username":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","password":"*hidden*"},"c":1,"lf":[]} [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, http.PwmResponse, {16626338,PA600039-Iapple} sending 302 redirect to /sspr/private/changepassword?locale=en [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, http.PwmRequest, {16626338,PA600039-Iapple} GET request for: /sspr/private/changepassword completed requestID=17 in 135ms [10.10.30.56]
  locale='en'
2024-01-10T06:45:01Z, TRACE, ldap.LdapPermissionTester, {16626338,PA600039-Iapple} begin check for ldapGroup match for UserIdentity{"userDN":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","ldapProfile":"default"} using queryMatch: cn=sspradmin,ou=groups,o=testlab [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapPermissionTester, {16626338,PA600039-Iapple} checking ldap to see if UserIdentity{"userDN":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","ldapProfile":"default"} matches group 'cn=sspradmin,ou=groups,o=testlab' using filter '(groupMembership=cn=sspradmin,ou=groups,o=testlab)' [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapOperationsHelper, opening new ldap proxy connection
2024-01-10T06:45:01Z, TRACE, ldap.LdapOperationsHelper, creating new ldap connection using config: ChaiConfiguration:  settings: {chai.bind.URLs=ldaps://10.10.30.159:636,ldaps://10.10.30.160:636,, chai.bind.dn=cn=ssprproxyuser,ou=sa,ou=services,o=testlab, chai.bind.password=**stripped**, chai.cache.enable=false, chai.cache.maximumSize=128, chai.cache.maximumAge=1000, chai.statistics.enable=true, chai.watchdog.enable=true, chai.watchdog.operationTimeout=60000, chai.watchdog.idleTimeout=30000, chai.watchdog.maxConnectionLifetime=3300000, chai.watchdog.disableIfPwExpired=true, chai.connection.promiscuousSSL=false, chai.wireDebug.enable=false, chai.failover.enable=true, chai.failover.useLastKnownGoodHint=true, chai.failover.failBackTime=90000, chai.failover.connectRetries=4, chai.ldap.dereferenceAliases=never, chai.ldap.ldapTimeout=30000, chai.ldap.ldapReadTimeout=0, chai.ldap.followReferrals=false, chai.provider.implementation=com.novell.ldapchai.provider.JNDIProviderImpl, chai.edirectory.enableNMAS=true, chai.provider.extendedOperation.failureCache=true, chai.provider.readonly=false, chai.vendor.default=, chai.provider.jndi.enablePool=false, chai.crsetting.caseInsensitive=true, chai.crsetting.allowDuplicateResponses=false, chai.crsetting.defaultFormatType=PBKDF2_SHA512, chai.cr.chai.attributeName=pwmResponseSet, chai.cr.chai.recordId=0002, chai.cr.chai.saltCount=100000, chai.ad.setPolicyHintsOnPwSet=false, chai.ldap.paging.enable=auto, chai.ldap.paging.size=500, chai.openldap.passwordPolicyDn=, chai.openldap.passwordPolicy.url=file:/etc/openldap/check_password.conf, chai.jndi.resolveInNamespace=true, chai.ldap.characterEncoding=UTF8}
2024-01-10T06:45:01Z, TRACE, provider.JNDIProviderImpl, bind successful as cn=ssprproxyuser,ou=sa,ou=services,o=testlab (50ms)
2024-01-10T06:45:01Z, TRACE, provider.ChaiProviderFactory, adding WatchdogWrapper to provider instance
2024-01-10T06:45:01Z, TRACE, provider.WatchdogWrapper, checking for user password expiration to adjust watchdog timeout id=w5
2024-01-10T06:45:01Z, TRACE, provider.ChaiProviderFactory, adding StatisticsWrapper to provider instance
2024-01-10T06:45:01Z, DEBUG, ldap.LdapPermissionTester, {16626338,PA600039-Iapple} user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab (default) is not a match for group 'cn=sspradmin,ou=groups,o=testlab' (53ms) [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, http.SessionManager, {16626338,PA600039-Iapple} permission PWMADMIN for user default|cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab is DENIED [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapPermissionTester, {16626338} begin check for ldapGroup match for UserIdentity{"userDN":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","ldapProfile":"default"} using queryMatch: cn=ssprhdadmingp,ou=sa,ou=services,o=testlab [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapPermissionTester, {16626338} checking ldap to see if UserIdentity{"userDN":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","ldapProfile":"default"} matches group 'cn=ssprhdadmingp,ou=sa,ou=services,o=testlab' using filter '(groupMembership=cn=ssprhdadmingp,ou=sa,ou=services,o=testlab)' [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.LdapPermissionTester, {16626338} user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab (default) is not a match for group 'cn=ssprhdadmingp,ou=sa,ou=services,o=testlab' (1ms) [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.UserInfoReader, {16626338} Helpdesk has no matching profiles for user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab (default) [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapPermissionTester, {16626338} begin check for ldapQuery match for UserIdentity{"userDN":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","ldapProfile":"default"} using queryMatch: (objectClass=person) [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapPermissionTester, {16626338} checking ldap to see if UserIdentity{"userDN":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","ldapProfile":"default"} matches '(objectClass=person)' [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.LdapPermissionTester, {16626338} user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab (default) is a match for filter '(objectClass=person)' (1ms) [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.UserInfoReader, {16626338} assigned UpdateAttributes profileID "default" to cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab (default) [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.UserInfoReader, {16626338} DeleteAccount has no matching profiles for user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab (default) [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapPermissionTester, {16626338} begin check for ldapQuery match for UserIdentity{"userDN":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","ldapProfile":"default"} using queryMatch: (objectClass=*) [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapPermissionTester, {16626338} queryMatch check is guaranteed to be true, skipping ldap query [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.LdapPermissionTester, {16626338} user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab (default) is a match for filter '(objectClass=*)' (0ms) [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.UserInfoReader, {16626338} assigned SetupOTPProfile profileID "default" to cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab (default) [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.UserInfoReader, {16626338} EmailServers has no matching profiles for user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab (default) [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, http.PwmRequest, {16626338,PA600039-Iapple} GET request for: /sspr/private/changepassword requestID=18 [10.10.30.56]
  locale='en'
2024-01-10T06:45:01Z, DEBUG, filter.SessionFilter, {16626338,PA600039-Iapple} detected locale request parameter locale with value en [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, http.PwmSession, {16626338,PA600039-Iapple} setting session locale to 'en' [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, http.PwmSession, {16626338,PA600039-Iapple} performing reloadUserInfoBean [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, auth.HttpAuthenticationUtilities, {16626338,PA600039-Iapple} wrote auth record cookie to user browser for use during forgotten password [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, state.CryptoCookieBeanImpl, {16626338,PA600039-Iapple} disregarded existing ChangePasswordBean cookie bean due to session change [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, entry.EdirEntries, using active universal password policy for user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab at cn=PartnerPasswordPolicy,cn=Password Policies,cn=Security
2024-01-10T06:45:01Z, DEBUG, operations.PasswordUtility, {16626338,PA600039-Iapple} discovered assigned password policy for cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab PwmPasswordPolicy: {"policyMap":{"chai.pwrule.changeMessage":"","chai.pwrule.upper.min":"1","chai.pwrule.numeric.allow":"TRUE","password.policy.minimumNonAlpha":"0","chai.pwrule.disallowedValues":"","chai.pwrule.length.max":"32","chai.pwrule.nonalpha.allow":"FALSE","chai.pwrule.nonalpha.max":"0","chai.pwrule.disallowedAttributes":"","chai.pwrule.uniqueRequired":"TRUE","chai.pwrule.ADComplexity2008":"FALSE","chai.pwrule.sequentialRepeat.max":"0","password.policy.allowNonAlpha":"true","chai.pwrule.lower.min":"0","chai.pwrule.special.max":"0","chai.pwrule.nonalpha.min":"0","chai.pwrule.numeric.allowLast":"TRUE","chai.pwrule.numeric.allowFirst":"TRUE","chai.pwrule.policyEnabled":"true","chai.pwrule.special.allow":"TRUE","chai.pwrule.expirationInterval":"7776000","chai.pwrule.special.min":"1","password.policy.maximumNonAlpha":"0","chai.pwrule.lower.max":"0","chai.pwrule.numeric.max":"0","chai.pwrule.ADComplexityMaxViolation":"2","chai.pwrule.upper.max":"0","chai.pwrule.numeric.min":"1","chai.pwrule.unique.min":"0","chai.pwrule.special.allowFirst":"TRUE","chai.pwrule.length.min":"8","chai.pwrule.special.allowLast":"TRUE","chai.pwrule.caseSensitive":"TRUE","chai.pwrule.lifetime.minimimum":"0"}} [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, operations.PasswordUtility, {16626338,PA600039-Iapple} readPasswordPolicyForUser via method LDAP completed in 3ms [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, edir.NmasCrFactory, challengeSetDN is null, return null for readNmasAssignedChallengeSetPolicy()
2024-01-10T06:45:01Z, TRACE, entry.EdirEntries, using active universal password policy for user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab at cn=PartnerPasswordPolicy,cn=Password Policies,cn=Security
2024-01-10T06:45:01Z, TRACE, edir.NmasCrFactory, challengeSetDN is null, return null for readNmasAssignedChallengeSetPolicy()
2024-01-10T06:45:01Z, DEBUG, operations.CrService, {16626338,PA600039-Iapple} no nmas c/r policy found for user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, operations.CrService, {16626338,PA600039-Iapple} no detected c/r policy for user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab in nmas [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, profile.ChallengeProfile, discarding configured helpdesk challengeSet for profile 'default' issue: 5203 CONFIG_FORMAT_ERROR (invalid challenge set configuration: too few challenges are required)
2024-01-10T06:45:01Z, DEBUG, operations.CrService, {16626338,PA600039-Iapple} testing challenge profiles 'default' [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapPermissionTester, {16626338,PA600039-Iapple} begin check for ldapQuery match for UserIdentity{"userDN":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","ldapProfile":"default"} using queryMatch: (objectClass=*) [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapPermissionTester, {16626338,PA600039-Iapple} queryMatch check is guaranteed to be true, skipping ldap query [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.LdapPermissionTester, {16626338,PA600039-Iapple} user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab (default) is a match for filter '(objectClass=*)' (0ms) [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, profile.ChallengeProfile, discarding configured helpdesk challengeSet for profile 'default' issue: 5203 CONFIG_FORMAT_ERROR (invalid challenge set configuration: too few challenges are required)
2024-01-10T06:45:01Z, TRACE, operations.CrService, {16626338,PA600039-Iapple} readUserChallengeProfile completed in 28ms returned profile: default [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, operations.CrService, {16626338,PA600039-Iapple} beginning read of user response sequence [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, operations.CrService, {16626338,PA600039-Iapple} will attempt to read the following storage methods: ["LOCALDB"] for response info for user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, operations.CrService, {16626338,PA600039-Iapple} attempting read of response info via storage method: LOCALDB [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, operations.CrService, {16626338,PA600039-Iapple} no responses info read using method LOCALDB [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, operations.CrService, {16626338,PA600039-Iapple} no response info found for user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, operations.CrService, {16626338,PA600039-Iapple} beginning check to determine if responses need to be configured for user [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, operations.CrService, {16626338,PA600039-Iapple} checkIfResponseConfigNeeded: response setup is disabled, so user is not required to setup responses [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.UserInfoReader, {16626338,PA600039-Iapple} checkOtp: beginning process to check if user OTP setup is required [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapPermissionTester, {16626338,PA600039-Iapple} begin check for ldapGroup match for UserIdentity{"userDN":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","ldapProfile":"default"} using queryMatch: cn=ssprhdadmingp,ou=sa,ou=services,o=testlab [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapPermissionTester, {16626338,PA600039-Iapple} checking ldap to see if UserIdentity{"userDN":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","ldapProfile":"default"} matches group 'cn=ssprhdadmingp,ou=sa,ou=services,o=testlab' using filter '(groupMembership=cn=ssprhdadmingp,ou=sa,ou=services,o=testlab)' [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.LdapPermissionTester, {16626338,PA600039-Iapple} user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab (default) is not a match for group 'cn=ssprhdadmingp,ou=sa,ou=services,o=testlab' (4ms) [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.UserInfoReader, {16626338,PA600039-Iapple} Helpdesk has no matching profiles for user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab (default) [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapPermissionTester, {16626338,PA600039-Iapple} begin check for ldapQuery match for UserIdentity{"userDN":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","ldapProfile":"default"} using queryMatch: (objectClass=person) [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapPermissionTester, {16626338,PA600039-Iapple} checking ldap to see if UserIdentity{"userDN":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","ldapProfile":"default"} matches '(objectClass=person)' [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.LdapPermissionTester, {16626338,PA600039-Iapple} user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab (default) is a match for filter '(objectClass=person)' (3ms) [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.UserInfoReader, {16626338,PA600039-Iapple} assigned UpdateAttributes profileID "default" to cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab (default) [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.UserInfoReader, {16626338,PA600039-Iapple} DeleteAccount has no matching profiles for user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab (default) [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapPermissionTester, {16626338,PA600039-Iapple} begin check for ldapQuery match for UserIdentity{"userDN":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","ldapProfile":"default"} using queryMatch: (objectClass=*) [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapPermissionTester, {16626338,PA600039-Iapple} queryMatch check is guaranteed to be true, skipping ldap query [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.LdapPermissionTester, {16626338,PA600039-Iapple} user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab (default) is a match for filter '(objectClass=*)' (0ms) [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.UserInfoReader, {16626338,PA600039-Iapple} assigned SetupOTPProfile profileID "default" to cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab (default) [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.UserInfoReader, {16626338,PA600039-Iapple} EmailServers has no matching profiles for user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab (default) [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.UserInfoReader, {16626338,PA600039-Iapple} checkOtp: OTP allow setup is not enabled [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.UserInfoReader, {16626338,PA600039-Iapple} checkProfiles: UserIdentity{"userDN":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","ldapProfile":"default"} profile module is not enabled [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapPermissionTester, {16626338,PA600039-Iapple} begin check for ldapQuery match for UserIdentity{"userDN":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","ldapProfile":"default"} using queryMatch: (objectClass=*) [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapPermissionTester, {16626338,PA600039-Iapple} queryMatch check is guaranteed to be true, skipping ldap query [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.LdapPermissionTester, {16626338,PA600039-Iapple} user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab (default) is a match for filter '(objectClass=*)' (0ms) [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, http.SessionManager, {16626338,PA600039-Iapple} permission CHANGE_PASSWORD for user default|cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab is GRANTED [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, entry.EdirEntries, using active universal password policy for user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab at cn=PartnerPasswordPolicy,cn=Password Policies,cn=Security
2024-01-10T06:45:01Z, DEBUG, operations.PasswordUtility, {16626338,PA600039-Iapple} discovered assigned password policy for cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab PwmPasswordPolicy: {"policyMap":{"chai.pwrule.changeMessage":"","chai.pwrule.upper.min":"1","chai.pwrule.numeric.allow":"TRUE","password.policy.minimumNonAlpha":"0","chai.pwrule.disallowedValues":"","chai.pwrule.length.max":"32","chai.pwrule.nonalpha.allow":"FALSE","chai.pwrule.nonalpha.max":"0","chai.pwrule.disallowedAttributes":"","chai.pwrule.uniqueRequired":"TRUE","chai.pwrule.ADComplexity2008":"FALSE","chai.pwrule.sequentialRepeat.max":"0","password.policy.allowNonAlpha":"true","chai.pwrule.lower.min":"0","chai.pwrule.special.max":"0","chai.pwrule.nonalpha.min":"0","chai.pwrule.numeric.allowLast":"TRUE","chai.pwrule.numeric.allowFirst":"TRUE","chai.pwrule.policyEnabled":"true","chai.pwrule.special.allow":"TRUE","chai.pwrule.expirationInterval":"7776000","chai.pwrule.special.min":"1","password.policy.maximumNonAlpha":"0","chai.pwrule.lower.max":"0","chai.pwrule.numeric.max":"0","chai.pwrule.ADComplexityMaxViolation":"2","chai.pwrule.upper.max":"0","chai.pwrule.numeric.min":"1","chai.pwrule.unique.min":"0","chai.pwrule.special.allowFirst":"TRUE","chai.pwrule.length.min":"8","chai.pwrule.special.allowLast":"TRUE","chai.pwrule.caseSensitive":"TRUE","chai.pwrule.lifetime.minimimum":"0"}} [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, operations.PasswordUtility, {16626338,PA600039-Iapple} readPasswordPolicyForUser via method LDAP completed in 12ms [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, http.HttpEventManager, new http session created
2024-01-10T06:45:01Z, TRACE, http.PwmSession, {16626348} created new session
2024-01-10T06:45:01Z, TRACE, http.PwmSessionWrapper, {16626348} setting java servlet session timeout to 2h due to Setting Settings ⇨ Application ⇨ Application ⇨ Idle Timeout Seconds
2024-01-10T06:45:01Z, TRACE, operations.PasswordUtility, {16626338,PA600039-Iapple} read last user password change timestamp (via chai) as: 2024-01-10T11:14:47Z [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.UserInfoReader, {16626338,PA600039-Iapple} beginning password status check process for cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.UserInfoReader, {16626338,PA600039-Iapple} password for cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab does not appear to be expired [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.UserInfoReader, {16626338,PA600039-Iapple} read password expiration time: 2024-01-12T11:14:47Z, 1d:23h:29m from now [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.UserInfoReader, {16626338,PA600039-Iapple} user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab password will expire within 1d:23h:29m, marking as within warn period [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.UserInfoReader, {16626338,PA600039-Iapple} completed user password status check for cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab PasswordStatus.PasswordStatusBuilder(expired=false, preExpired=false, violatesPolicy=false, warnPeriod=true) (4ms) [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.UserInfoReader, {16626338,PA600039-Iapple} beginning password status check process for cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.UserInfoReader, {16626338,PA600039-Iapple} password for cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab does not appear to be expired [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.UserInfoReader, {16626338,PA600039-Iapple} read password expiration time: 2024-01-12T11:14:47Z, 1d:23h:29m from now [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.UserInfoReader, {16626338,PA600039-Iapple} user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab password will expire within 1d:23h:29m, marking as within warn period [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.UserInfoReader, {16626338,PA600039-Iapple} completed user password status check for cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab PasswordStatus.PasswordStatusBuilder(expired=false, preExpired=false, violatesPolicy=false, warnPeriod=true) (1ms) [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, changepw.ChangePasswordServlet, {16626338,PA600039-Iapple} password expiration is within password warn period, forwarding user to warning page [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, http.SessionManager, {16626338,PA600039-Iapple} incremented request counter to 2 [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, state.CryptoCookieLoginImpl, {16626338,PA600039-Iapple} wrote LoginInfoBean={"u":{"userDN":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","ldapProfile":"default"},"a":true,"p":"*hidden*","t":"AUTHENTICATED","af":[],"as":"BASIC_AUTH","at":"2024-01-10T11:45:01Z","rq":"2024-01-10T11:45:01Z","g":"lr7pqird2KQG848liC2e0Mikg8NDZ5URsKEc6fqHLjO0k1g9XV9frqN9ZLhtgC7fyzSqejPG","ba":{"username":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","password":"*hidden*"},"c":2,"lf":["authRecordSet"]} [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, http.PwmResponse, {16626338,PA600039-Iapple} forwarding to /WEB-INF/jsp/changepassword-warn.jsp [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapPermissionTester, {16626338,PA600039-Iapple} begin check for ldapQuery match for UserIdentity{"userDN":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","ldapProfile":"default"} using queryMatch: (objectClass=*) [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, ldap.LdapPermissionTester, {16626338,PA600039-Iapple} queryMatch check is guaranteed to be true, skipping ldap query [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.LdapPermissionTester, {16626338,PA600039-Iapple} user cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab (default) is a match for filter '(objectClass=*)' (0ms) [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, ldap.UserInfoReader, {16626338,PA600039-Iapple} checkPassword: password is within warn period, marking new password as required [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, macro.MacroMachine, {16626338,PA600039-Iapple} replaced macro @User:ID@ with value: PA600039-Iapple [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, filter.RequestInitializationFilter, {16626348} user locale set to 'en' [10.10.30.253]
2024-01-10T06:45:01Z, TRACE, http.PwmRequest, {16626348} GET request for: /sspr/public/test_health.jsp (no params) requestID=19 [10.10.30.253]
2024-01-10T06:45:01Z, TRACE, filter.SessionFilter, {16626348} https secure request headers:  [10.10.30.253]
  host='sspr.iaglab.com'
  connection='Close'
2024-01-10T06:45:01Z, TRACE, filter.SessionFilter, {16626348} session has not been validated, redirecting with verification key to /sspr/public/test_health.jsp?stickyRedirectTest=cUgElHcKfPDZjK6eEw27uQx2eYshsgjo18cf330a8d7 [10.10.30.253]
2024-01-10T06:45:01Z, TRACE, state.CryptoCookieLoginImpl, {16626348} wrote LoginInfoBean={"a":false,"p":"*hidden*","t":"UNAUTHENTICATED","af":[],"rq":"2024-01-10T11:45:01Z","g":"lr7pretztQlTBfGZ7OwEADChjdBGFwZIHr8LT5wjXOgFTOAAijvsl0uC1VMBJG5tp5o7oHaA","c":0,"lf":[]} [10.10.30.253]
2024-01-10T06:45:01Z, TRACE, http.PwmResponse, {16626348} sending 302 redirect to /sspr/public/test_health.jsp?stickyRedirectTest=cUgElHcKfPDZjK6eEw27uQx2eYshsgjo18cf330a8d7 [10.10.30.253]
2024-01-10T06:45:01Z, ERROR, servlet.AbstractPwmServlet, {16626338,PA600039-Iapple} unexpected error processing request: org.apache.jasper.JasperException: Unable to compile class for JSP:  [10.10.30.56]

An error occurred at line: [38] in the jsp file: [/WEB-INF/jsp/fragment/footer.jsp]
JspUtility cannot be resolved
35: </pwm:if>
36: 
37: 
38: <% final Locale testlocale = JspUtility.locale(request); %>
39: <%
40: 
41: String contactUs="Contact Us";


Stacktrace: [F6BCFA08A8A27975E41FE7173BB8956AF6797D9D] (stacktrace follows)
org.apache.jasper.JasperException: Unable to compile class for JSP: 

An error occurred at line: [38] in the jsp file: [/WEB-INF/jsp/fragment/footer.jsp]
JspUtility cannot be resolved
35: </pwm:if>
36: 
37: 
38: <% final Locale testlocale = JspUtility.locale(request); %>
39: <%
40: 
41: String contactUs="Contact Us";


Stacktrace:
	at org.apache.jasper.compiler.DefaultErrorHandler.javacError(DefaultErrorHandler.java:102)
	at org.apache.jasper.compiler.ErrorDispatcher.javacError(ErrorDispatcher.java:213)
	at org.apache.jasper.compiler.JDTCompiler.generateClass(JDTCompiler.java:487)
	at org.apache.jasper.compiler.Compiler.compile(Compiler.java:397)
	at org.apache.jasper.compiler.Compiler.compile(Compiler.java:367)
	at org.apache.jasper.compiler.Compiler.compile(Compiler.java:351)
	at org.apache.jasper.JspCompilationContext.compile(JspCompilationContext.java:605)
	at org.apache.jasper.servlet.JspServletWrapper.service(JspServletWrapper.java:399)
	at org.apache.jasper.servlet.JspServlet.serviceJspFile(JspServlet.java:379)
	at org.apache.jasper.servlet.JspServlet.service(JspServlet.java:327)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:764)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.apache.catalina.core.ApplicationDispatcher.invoke(ApplicationDispatcher.java:711)
	at org.apache.catalina.core.ApplicationDispatcher.doInclude(ApplicationDispatcher.java:578)
	at org.apache.catalina.core.ApplicationDispatcher.include(ApplicationDispatcher.java:517)
	at org.apache.jasper.runtime.JspRuntimeLibrary.include(JspRuntimeLibrary.java:994)
	at org.apache.jsp.WEB_002dINF.jsp.changepassword_002dwarn_jsp._jspService(changepassword_002dwarn_jsp.java:702)
	at org.apache.jasper.runtime.HttpJspBase.service(HttpJspBase.java:70)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:764)
	at org.apache.jasper.servlet.JspServletWrapper.service(JspServletWrapper.java:466)
	at org.apache.jasper.servlet.JspServlet.serviceJspFile(JspServlet.java:379)
	at org.apache.jasper.servlet.JspServlet.service(JspServlet.java:327)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:764)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.apache.catalina.core.ApplicationDispatcher.invoke(ApplicationDispatcher.java:711)
	at org.apache.catalina.core.ApplicationDispatcher.processRequest(ApplicationDispatcher.java:459)
	at org.apache.catalina.core.ApplicationDispatcher.doForward(ApplicationDispatcher.java:385)
	at org.apache.catalina.core.ApplicationDispatcher.forward(ApplicationDispatcher.java:313)
	at password.pwm.http.PwmResponse.forwardToJsp(PwmResponse.java:118)
	at password.pwm.http.PwmRequest.forwardToJsp(PwmRequest.java:151)
	at password.pwm.http.servlet.changepw.ChangePasswordServlet.nextStep(ChangePasswordServlet.java:460)
	at password.pwm.http.servlet.ControlledPwmServlet.processAction(ControlledPwmServlet.java:189)
	at password.pwm.http.servlet.AbstractPwmServlet.handleRequest(AbstractPwmServlet.java:125)
	at password.pwm.http.servlet.AbstractPwmServlet.doGet(AbstractPwmServlet.java:66)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:655)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:764)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at password.pwm.http.filter.AbstractPwmFilter$PwmFilterChain.doFilter(AbstractPwmFilter.java:155)
	at password.pwm.http.filter.AuthenticationFilter.processAuthenticatedSession(AuthenticationFilter.java:210)
	at password.pwm.http.filter.AuthenticationFilter.processFilter(AuthenticationFilter.java:109)
	at password.pwm.http.filter.AbstractPwmFilter.doFilter(AbstractPwmFilter.java:99)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at password.pwm.http.filter.AbstractPwmFilter$PwmFilterChain.doFilter(AbstractPwmFilter.java:155)
	at password.pwm.http.filter.SessionFilter.processFilter(SessionFilter.java:112)
	at password.pwm.http.filter.AbstractPwmFilter.doFilter(AbstractPwmFilter.java:99)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at password.pwm.http.filter.AbstractPwmFilter$PwmFilterChain.doFilter(AbstractPwmFilter.java:155)
	at password.pwm.http.filter.ApplicationModeFilter.processFilter(ApplicationModeFilter.java:82)
	at password.pwm.http.filter.AbstractPwmFilter.doFilter(AbstractPwmFilter.java:99)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at password.pwm.http.filter.AbstractPwmFilter$PwmFilterChain.doFilter(AbstractPwmFilter.java:155)
	at password.pwm.http.filter.ObsoleteUrlFilter.processFilter(ObsoleteUrlFilter.java:52)
	at password.pwm.http.filter.AbstractPwmFilter.doFilter(AbstractPwmFilter.java:99)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at password.pwm.http.filter.RequestInitializationFilter.initializeServletRequest(RequestInitializationFilter.java:246)
	at password.pwm.http.filter.RequestInitializationFilter.doFilter(RequestInitializationFilter.java:168)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at com.github.ziplet.filter.compression.CompressingFilter.doFilter(CompressingFilter.java:263)
	at password.pwm.http.filter.GZIPFilter.doFilter(GZIPFilter.java:81)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197)
	at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97)
	at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:542)
	at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135)
	at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92)
	at org.apache.catalina.valves.AbstractAccessLogValve.invoke(AbstractAccessLogValve.java:687)
	at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78)
	at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357)
	at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382)
	at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65)
	at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:893)
	at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1726)
	at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49)
	at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191)
	at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659)
	at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
	at java.base/java.lang.Thread.run(Thread.java:834)

org.apache.jasper.JasperException: Unable to compile class for JSP: 

An error occurred at line: [38] in the jsp file: [/WEB-INF/jsp/fragment/footer.jsp]
JspUtility cannot be resolved
35: </pwm:if>
36: 
37: 
38: <% final Locale testlocale = JspUtility.locale(request); %>
39: <%
40: 
41: String contactUs="Contact Us";


Stacktrace:
	at org.apache.jasper.compiler.DefaultErrorHandler.javacError(DefaultErrorHandler.java:102)
	at org.apache.jasper.compiler.ErrorDispatcher.javacError(ErrorDispatcher.java:213)
	at org.apache.jasper.compiler.JDTCompiler.generateClass(JDTCompiler.java:487)
	at org.apache.jasper.compiler.Compiler.compile(Compiler.java:397)
	at org.apache.jasper.compiler.Compiler.compile(Compiler.java:367)
	at org.apache.jasper.compiler.Compiler.compile(Compiler.java:351)
	at org.apache.jasper.JspCompilationContext.compile(JspCompilationContext.java:605)
	at org.apache.jasper.servlet.JspServletWrapper.service(JspServletWrapper.java:399)
	at org.apache.jasper.servlet.JspServlet.serviceJspFile(JspServlet.java:379)
	at org.apache.jasper.servlet.JspServlet.service(JspServlet.java:327)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:764)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.apache.catalina.core.ApplicationDispatcher.invoke(ApplicationDispatcher.java:711)
	at org.apache.catalina.core.ApplicationDispatcher.doInclude(ApplicationDispatcher.java:578)
	at org.apache.catalina.core.ApplicationDispatcher.include(ApplicationDispatcher.java:517)
	at org.apache.jasper.runtime.JspRuntimeLibrary.include(JspRuntimeLibrary.java:994)
	at org.apache.jsp.WEB_002dINF.jsp.changepassword_002dwarn_jsp._jspService(changepassword_002dwarn_jsp.java:702)
	at org.apache.jasper.runtime.HttpJspBase.service(HttpJspBase.java:70)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:764)
	at org.apache.jasper.servlet.JspServletWrapper.service(JspServletWrapper.java:466)
	at org.apache.jasper.servlet.JspServlet.serviceJspFile(JspServlet.java:379)
	at org.apache.jasper.servlet.JspServlet.service(JspServlet.java:327)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:764)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.apache.catalina.core.ApplicationDispatcher.invoke(ApplicationDispatcher.java:711)
	at org.apache.catalina.core.ApplicationDispatcher.processRequest(ApplicationDispatcher.java:459)
	at org.apache.catalina.core.ApplicationDispatcher.doForward(ApplicationDispatcher.java:385)
	at org.apache.catalina.core.ApplicationDispatcher.forward(ApplicationDispatcher.java:313)
	at password.pwm.http.PwmResponse.forwardToJsp(PwmResponse.java:118)
	at password.pwm.http.PwmRequest.forwardToJsp(PwmRequest.java:151)
	at password.pwm.http.servlet.changepw.ChangePasswordServlet.nextStep(ChangePasswordServlet.java:460)
	at password.pwm.http.servlet.ControlledPwmServlet.processAction(ControlledPwmServlet.java:189)
	at password.pwm.http.servlet.AbstractPwmServlet.handleRequest(AbstractPwmServlet.java:125)
	at password.pwm.http.servlet.AbstractPwmServlet.doGet(AbstractPwmServlet.java:66)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:655)
	at javax.servlet.http.HttpServlet.service(HttpServlet.java:764)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:227)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.apache.tomcat.websocket.server.WsFilter.doFilter(WsFilter.java:53)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at password.pwm.http.filter.AbstractPwmFilter$PwmFilterChain.doFilter(AbstractPwmFilter.java:155)
	at password.pwm.http.filter.AuthenticationFilter.processAuthenticatedSession(AuthenticationFilter.java:210)
	at password.pwm.http.filter.AuthenticationFilter.processFilter(AuthenticationFilter.java:109)
	at password.pwm.http.filter.AbstractPwmFilter.doFilter(AbstractPwmFilter.java:99)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at password.pwm.http.filter.AbstractPwmFilter$PwmFilterChain.doFilter(AbstractPwmFilter.java:155)
	at password.pwm.http.filter.SessionFilter.processFilter(SessionFilter.java:112)
	at password.pwm.http.filter.AbstractPwmFilter.doFilter(AbstractPwmFilter.java:99)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at password.pwm.http.filter.AbstractPwmFilter$PwmFilterChain.doFilter(AbstractPwmFilter.java:155)
	at password.pwm.http.filter.ApplicationModeFilter.processFilter(ApplicationModeFilter.java:82)
	at password.pwm.http.filter.AbstractPwmFilter.doFilter(AbstractPwmFilter.java:99)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at password.pwm.http.filter.AbstractPwmFilter$PwmFilterChain.doFilter(AbstractPwmFilter.java:155)
	at password.pwm.http.filter.ObsoleteUrlFilter.processFilter(ObsoleteUrlFilter.java:52)
	at password.pwm.http.filter.AbstractPwmFilter.doFilter(AbstractPwmFilter.java:99)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at password.pwm.http.filter.RequestInitializationFilter.initializeServletRequest(RequestInitializationFilter.java:246)
	at password.pwm.http.filter.RequestInitializationFilter.doFilter(RequestInitializationFilter.java:168)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at com.github.ziplet.filter.compression.CompressingFilter.doFilter(CompressingFilter.java:263)
	at password.pwm.http.filter.GZIPFilter.doFilter(GZIPFilter.java:81)
	at org.apache.catalina.core.ApplicationFilterChain.internalDoFilter(ApplicationFilterChain.java:189)
	at org.apache.catalina.core.ApplicationFilterChain.doFilter(ApplicationFilterChain.java:162)
	at org.apache.catalina.core.StandardWrapperValve.invoke(StandardWrapperValve.java:197)
	at org.apache.catalina.core.StandardContextValve.invoke(StandardContextValve.java:97)
	at org.apache.catalina.authenticator.AuthenticatorBase.invoke(AuthenticatorBase.java:542)
	at org.apache.catalina.core.StandardHostValve.invoke(StandardHostValve.java:135)
	at org.apache.catalina.valves.ErrorReportValve.invoke(ErrorReportValve.java:92)
	at org.apache.catalina.valves.AbstractAccessLogValve.invoke(AbstractAccessLogValve.java:687)
	at org.apache.catalina.core.StandardEngineValve.invoke(StandardEngineValve.java:78)
	at org.apache.catalina.connector.CoyoteAdapter.service(CoyoteAdapter.java:357)
	at org.apache.coyote.http11.Http11Processor.service(Http11Processor.java:382)
	at org.apache.coyote.AbstractProcessorLight.process(AbstractProcessorLight.java:65)
	at org.apache.coyote.AbstractProtocol$ConnectionHandler.process(AbstractProtocol.java:893)
	at org.apache.tomcat.util.net.NioEndpoint$SocketProcessor.doRun(NioEndpoint.java:1726)
	at org.apache.tomcat.util.net.SocketProcessorBase.run(SocketProcessorBase.java:49)
	at org.apache.tomcat.util.threads.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1191)
	at org.apache.tomcat.util.threads.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:659)
	at org.apache.tomcat.util.threads.TaskThread$WrappingRunnable.run(TaskThread.java:61)
	at java.base/java.lang.Thread.run(Thread.java:834)
2024-01-10T06:45:01Z, FATAL, servlet.AbstractPwmServlet, {16626338,PA600039-Iapple} unexpected error: 5015 ERROR_INTERNAL (unexpected error processing request: org.apache.jasper.JasperException: Unable to compile class for JSP:  [10.10.30.56]

An error occurred at line: [38] in the jsp file: [/WEB-INF/jsp/fragment/footer.jsp]
JspUtility cannot be resolved
35: </pwm:if>
36: 
37: 
38: <% final Locale testlocale = JspUtility.locale(request); %>
39: <%
40: 
41: String contactUs="Contact Us";


Stacktrace: [F6BCFA08A8A27975E41FE7173BB8956AF6797D9D])
2024-01-10T06:45:01Z, ERROR, http.PwmResponse, {16626338,PA600039-Iapple} 5015 ERROR_INTERNAL (unexpected error processing request: org.apache.jasper.JasperException: Unable to compile class for JSP:  [10.10.30.56]

An error occurred at line: [38] in the jsp file: [/WEB-INF/jsp/fragment/footer.jsp]
JspUtility cannot be resolved
35: </pwm:if>
36: 
37: 
38: <% final Locale testlocale = JspUtility.locale(request); %>
39: <%
40: 
41: String contactUs="Contact Us";


Stacktrace: [F6BCFA08A8A27975E41FE7173BB8956AF6797D9D])
2024-01-10T06:45:01Z, DEBUG, http.PwmResponse, {16626338,PA600039-Iapple} forcing logout due to error 5015 ERROR_INTERNAL (unexpected error processing request: org.apache.jasper.JasperException: Unable to compile class for JSP:  [10.10.30.56]

An error occurred at line: [38] in the jsp file: [/WEB-INF/jsp/fragment/footer.jsp]
JspUtility cannot be resolved
35: </pwm:if>
36: 
37: 
38: <% final Locale testlocale = JspUtility.locale(request); %>
39: <%
40: 
41: String contactUs="Contact Us";


Stacktrace: [F6BCFA08A8A27975E41FE7173BB8956AF6797D9D])
2024-01-10T06:45:01Z, DEBUG, http.SessionManager, {16626338} closing user ldap connection [10.10.30.56]
2024-01-10T06:45:01Z, DEBUG, http.PwmSession, {16626338} unauthenticate session from 10.10.30.56 (UserIdentity{"userDN":"cn=PA600039-Iapple,ou=people,ou=TestPortal,o=testlab","ldapProfile":"default"}) [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, http.SessionManager, {16626338} incremented request counter to 1 [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, state.CryptoCookieLoginImpl, {16626338} wrote LoginInfoBean={"a":false,"p":"*hidden*","t":"UNAUTHENTICATED","af":[],"rq":"2024-01-10T11:45:01Z","g":"lr7preymAqHK4bPr35JPnRlecuUZxhald7vUiMiathfNOBGkwEwFOhhFPIpchVNN4zvW2dyU","c":1,"lf":[]} [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, http.PwmResponse, {16626338} forwarding to /WEB-INF/jsp/error.jsp [10.10.30.56]
2024-01-10T06:45:01Z, TRACE, http.PwmRequest, {16626338} GET request for: /sspr/private/changepassword completed requestID=18 in 234ms [10.10.30.56]
  locale='en'
2024-01-10T06:45:06Z, TRACE, http.HttpEventManager, new http session created
2024-01-10T06:45:06Z, TRACE, http.PwmSession, {16626349} created new session
2024-01-10T06:45:06Z, TRACE, http.PwmSessionWrapper, {16626349} setting java servlet session timeout to 2h due to Setting Settings ⇨ Application ⇨ Application ⇨ Idle Timeout Seconds
2024-01-10T06:45:06Z, TRACE, filter.RequestInitializationFilter, {16626349} user locale set to 'en' [10.10.30.253]
2024-01-10T06:45:06Z, TRACE, http.PwmRequest, {16626349} GET request for: /sspr/public/test_health.jsp (no params) requestID=20 [10.10.30.253]
2024-01-10T06:45:06Z, TRACE, filter.SessionFilter, {16626349} https secure request headers:  [10.10.30.253]
  host='sspr.iaglab.com'
  connection='Close'
2024-01-10T06:45:06Z, TRACE, filter.SessionFilter, {16626349} session has not been validated, redirecting with verification key to /sspr/public/test_health.jsp?stickyRedirectTest=dJL9JxqwNAOwo4OiOHwn9Ign9hRvS3I718cf330bc1a [10.10.30.253]
2024-01-10T06:45:06Z, TRACE, state.CryptoCookieLoginImpl, {16626349} wrote LoginInfoBean={"a":false,"p":"*hidden*","t":"UNAUTHENTICATED","af":[],"rq":"2024-01-10T11:45:06Z","g":"lr7primyKrQRNJiILZ6WshbIkhaJepERLqfUfqnoJOLVb3trNIw2gGikAu4z3RAtiNgV7Iv7","c":0,"lf":[]} [10.10.30.253]
2024-01-10T06:45:06Z, TRACE, http.PwmResponse, {16626349} sending 302 redirect to /sspr/public/test_health.jsp?stickyRedirectTest=dJL9JxqwNAOwo4OiOHwn9Ign9hRvS3I718cf330bc1a [10.10.30.253]
2024-01-10T06:45:10Z, TRACE, localdb.XodusLocalDB, xodus environment stats: BYTES_WRITTEN=0,BYTES_READ=0,BYTES_MOVED_BY_GC=0,TRANSACTIONS=0,READONLY_TRANSACTIONS=0,ACTIVE_TRANSACTIONS=0,FLUSHED_TRANSACTIONS=0,DISK_USAGE=0,UTILIZATION_PERCENT=0,LOG_CACHE_HIT_RATE=0,STORE_GET_CACHE_HIT_RATE=0,size.PWM_META=9,size.SHAREDHISTORY_META=3,size.SHAREDHISTORY_WORDS=0,size.WORDLIST_WORDS=847267,size.SEEDLIST_WORDS=21696,size.PWM_STATS=1537,size.EVENTLOG_EVENTS=1000003,size.EMAIL_QUEUE=3,size.SMS_QUEUE=3,size.RESPONSE_STORAGE=2,size.OTP_SECRET=0,size.TOKENS=0,size.INTRUDER=0,size.AUDIT_QUEUE=0,size.AUDIT_EVENTS=116,size.USER_CACHE=0,size.TEMP=0,size.SYSLOG_QUEUE=0,size.CACHE=0,size.REPORT_QUEUE=3
2024-01-10T06:45:11Z, TRACE, http.HttpEventManager, new http session created
2024-01-10T06:45:11Z, TRACE, http.PwmSession, {16626350} created new session
2024-01-10T06:45:11Z, TRACE, http.PwmSessionWrapper, {16626350} setting java servlet session timeout to 2h due to Setting Settings ⇨ Application ⇨ Application ⇨ Idle Timeout Seconds
2024-01-10T06:45:11Z, TRACE, filter.RequestInitializationFilter, {16626350} user locale set to 'en' [10.10.30.253]
2024-01-10T06:45:11Z, TRACE, http.PwmRequest, {16626350} GET request for: /sspr/public/test_health.jsp (no params) requestID=21 [10.10.30.253]
2024-01-10T06:45:11Z, TRACE, filter.SessionFilter, {16626350} https secure request headers:  [10.10.30.253]
  host='sspr.iaglab.com'
  connection='Close'
2024-01-10T06:45:11Z, TRACE, filter.SessionFilter, {16626350} session has not been validated, redirecting with verification key to /sspr/public/test_health.jsp?stickyRedirectTest=HdAlWOLbvGXkUOZ5a8tkwaSZArnBk53Q18cf330cfa4 [10.10.30.253]
2024-01-10T06:45:11Z, TRACE, state.CryptoCookieLoginImpl, {16626350} wrote LoginInfoBean={"a":false,"p":"*hidden*","t":"UNAUTHENTICATED","af":[],"rq":"2024-01-10T11:45:11Z","g":"lr7prmhw8ZMBdMuaX7vwiW9F8lmSMD03FFdvkAGRHvN9FgXCA6eRVWaNFWiyKxyvTWp4DOmr","c":0,"lf":[]} [10.10.30.253]
2024-01-10T06:45:11Z, TRACE, http.PwmResponse, {16626350} sending 302 redirect to /sspr/public/test_health.jsp?stickyRedirectTest=HdAlWOLbvGXkUOZ5a8tkwaSZArnBk53Q18cf330cfa4 [10.10.30.253]

I am using SSPR v4.5.0.4.