When a security policy is in "dark launch" mode, the policy is not enforced. The requests always pass through. However, the unauthorized requests are logged. This allows admin to observe how policies behave in "dark launch" mode, before actually enforcing the policies.
Dark launch mode applies to both authentication policies and authorization (e.g., RBAC) policies. However, for authentication policies, the logs will be a little tricky because the client identity is unknown for unauthenticated requests.
When a security policy is in "dark launch" mode, the policy is not enforced. The requests always pass through. However, the unauthorized requests are logged. This allows admin to observe how policies behave in "dark launch" mode, before actually enforcing the policies.
Dark launch mode applies to both authentication policies and authorization (e.g., RBAC) policies. However, for authentication policies, the logs will be a little tricky because the client identity is unknown for unauthenticated requests.