Counter Example Trace: Specification of query: Can user39 REACH role26 ? ==> Step 1: Target User: user0 CAN ASSIGN rule applied to user0: Administrative user to invoke the rule: user99 Role configuration of user0 before applying rule: No role Role configuration of user0 after applying rule: role29 ==> Step 2: Target User: user0 CAN ASSIGN rule applied to user0: Administrative user to invoke the rule: user99 Role configuration of user0 before applying rule: role29 Role configuration of user0 after applying rule: role29 role21 ==> Step 3: Target User: user0 CAN ASSIGN rule applied to user0: Administrative user to invoke the rule: user99 Role configuration of user0 before applying rule: role29 role21 Role configuration of user0 after applying rule: role29 role21 role26 ==> Step 4: Target User: user39 CAN ASSIGN rule applied to user39: Administrative user to invoke the rule: user99 Role configuration of user39 before applying rule: No role Role configuration of user39 after applying rule: role29 ==> Step 5: Target User: user39 CAN ASSIGN rule applied to user39: Administrative user to invoke the rule: user99 Role configuration of user39 before applying rule: role29 Role configuration of user39 after applying rule: role29 role21 ==> Step 6: Target User: user39 CAN ASSIGN rule applied to user39: Administrative user to invoke the rule: user99 Role configuration of user39 before applying rule: role29 role21 Role configuration of user39 after applying rule: role29 role21 role26 user39 can REACH role26 role26 is REACHABLE