We have configured a Java product to use only FIPS-validated RSA JCE crypto providers. However, the product won't work when only the RSA libraries are listed in java.security. Therefore, something is requesting non-FIPS algorithms from another provider.
By the process of elimination, we can tell which jars are necessary for successful operation, but that doesn't tell us which algorithms are being requested, or by whom.
This seems like a frequently asked question, but evidently we haven't stumbled on the right documentation or Google search string: Is there any reliable, convenient, and consistent mechanism to determine which JCE providers are being used in a running JVM instance?