Yeah, absolutely the same log's entries.
NT AUTHORITY\LogonSessionId in vmware-identity-sts.log
2018-01-19T18:06:40.766+07:00 tomcat-http--33 vsphere.local 88d61fa1-998d-4caf-bb9a-5316e5383ac4 DEBUG com.vmware.identity.saml.impl.AuthnOnlyTokenValidator] Principal {Name: vctest, Domain: domain.local}is active
[2018-01-19T18:06:40.766+07:00 tomcat-http--33 vsphere.local 88d61fa1-998d-4caf-bb9a-5316e5383ac4 DEBUG com.vmware.identity.saml.impl.AuthnOnlyTokenValidator] Token validated
[2018-01-19T18:06:40.766+07:00 tomcat-http--33 vsphere.local 88d61fa1-998d-4caf-bb9a-5316e5383ac4 DEBUG com.vmware.identity.saml.impl.AuthnOnlyTokenValidator] Token is from external idp: [false]
[2018-01-19T18:06:40.766+07:00 tomcat-http--33 vsphere.local 88d61fa1-998d-4caf-bb9a-5316e5383ac4 INFO com.vmware.identity.saml.impl.AuthnOnlyTokenValidator] Token _3945b840-fb78-478c-bd63-e3de5e91d949 for principal {Name: vctest, Domain: domain.local} successfully validated.
[2018-01-19T18:06:40.826+07:00 tomcat-http--33 vsphere.local 88d61fa1-998d-4caf-bb9a-5316e5383ac4 TRACE com.vmware.identity.saml.idm.IdmPrincipalAttributesExtractor] An attribute PrincipalAttribute [name=http://rsa.com/schemas/attr-names/2009/01/GroupIdentity, formatformat=urn:oasis:names:tc:SAML:2.0:attrname-format:uri, friendly name=Groups, value=[domain.local\Пользователи домена, NT AUTHORITY\LogonSessionId_0_290563188, vsphere.local\Everyone]] retrieved for {Name: vctest, Domain: domain.local}