Explanation | Application names must be unique for security authorization policy to be enforced. |
Action | Review the configuration to verify applications have unique names, and restart the application. |
Explanation | The authorization table for an application was not created and therefore no users will be authorized to protected resources. |
Action | Examine the application's authorization configuration to determine why the authorization table was not created. |