Running Federation services in CA Access Gateway (SPS), when a user goes to and OIDC journey, the CA Access Gateway (SPS) trace masks the value of the token produced as X's:
[11/16/2023][16:19:04][][][][AuthorizationService.java][sendResponse][Masked URL :example://openID?code=XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXZz0=&XXXXX=XXXXXXXXXXXXXXXXXXMkvQ]
How to make it readable?
At first glance, for security and legal obligations, unmasking the value is not an out of the box functionality and there's no configuration to make it readable.