To understand the access rights being granted by the AppGate ZTNA system, you need to understand:
who is being granted this Policy (assignment criteria in Policies)
what Entitlements are contained within a given Policy (by name or tag)
when any Entitlements will be allowed (Risk model and/or access criteria in Conditions).
Remember that AppGate ZTNA uses claims to make access decisions. Claims are used in criteria expressions to decide who is going to be assigned a given Policy and when an Entitlement is allowed.
Claims are key-value pairs that relate to the identity and context of the user or device and are specific to each session.
There are several types of claims:
Context. Based on helpers that evaluate things like is in the IP range.
User. Static, non-changing claims such as username from the IdP, user claims script, or Connector.
Device. Dynamic, changeable claims such as the IP address of the connecting device.
System. Dynamic, changeable claims such the country code from the Gateway.
And two classes of availability within the system:
Built-in (formerly Fixed). Set by the system; will always be gathered.
Scripted (formerly On-demand). Configured by the admin; gathered when required.
Who
Test users - Active Session Mode
When you are creating or editing a Policy or Criteria Script you can use the <Actions> button to perform a Test. This Test feature has two modes; Simulation and Active session. The Active session mode is most useful in this case on a live system with active users.
In active session mode you can pick and test an active user/IdP combination from the active sessions list. The criteria will be evaluated against this user's current claims and a true/false result shown.
What
Entitlements are the 'crown jewels' regarding access - they are effectively the 'allow' firewall rule, so it is important to know where they are used:
Using the Entitlements list
Go to the Entitlement list view and click on the action buttons of the Entitlement of interest.
List linked Policies
To establish which Policies contain a given Entitlement in the Entitlement view - from here you can analyze the system configuration to determine all the Policies (by name or tag) that are linked to this Entitlement.
Using active sessions
Go to Active Sessions and click on the user to reveal the Active session details for that user.
Analyze Policy assignments
Runs a simulation of the Policy assignment process using the user's currently reported Claims.
Use the <Actions> button to Analyze Policy Assignments
This will allow you to see which Policies are being assigned to the user.
Importantly it also will show you the specific Policy which is being used to apply the various device settings:

List Entitlements
The Entitlements tab lists all the Entitlements the user has been granted. For each one it shows the Matched Policies that included this Entitlement.
When
The most powerful way to set up access controls is to use Condition based access. Conditions contain claims-based access criteria expressions that must equate to true for the Action(s) specified in the Entitlement to be allowed. For example: access may only be allowed if the user is working from an office-based IP address. When the criteria equate to false then the Entitlement will not be allowed (block rule applies). If a user interaction has been configured in a Condition, this will be triggered when the access criteria equate to false. User interactions provide an alternative way for the user to unblock access - by updating claims or providing new claims that will now meet the access criteria. For example: providing multi-factor authentication could be an alternative method for gaining access if not working from an office-based IP address.
Using Conditions
List linked Entitlements
Go to the Conditions list view click on the action buttons of the Condition of interest.
From here you can analyze the system configuration to determine all the Entitlements linked to this Condition.

Test criteria - Simulation Mode
When you are creating or editing a Condition you can use the <Actions> button to perform a Test. This Test feature has two modes; Simulation and Active session. The Simulation mode is most useful in this case while setting up new Conditions.
If you have an (access) criteria of "The Client Device has an IP in network 192.168.1.0/24" then the Test function will automagically create a dialogue that allows you to enter values for this claim. In the example below 192.160.0.12 is not in the range so the test results in false.
If you add a second claim value (Client Devices can have multiple interfaces) of 192.168.1.12, this is in the range so the test results in true.

Using Active Sessions
Go to Active Sessions and click on the username that is of interest to reveal the session details for that user.
List user's Claims
There are tabs for User Claims, Device Claims, and System Claims which list all the Claims being used by the Collective to make assignment/access decisions.