0 | phase | <--<-- 0 --- Webfinger -->--> |
0 | not expected to do | WebFinger |
0 | phase | <--<-- 1 --- Discovery -->--> |
0 | provider_config | kwargs:{'issuer': 'https://isamfed.com:30443/test'}
|
0 | http response | url:https://isamfed.com:30443/test/.well-known/openid-configuration status_code:200
|
0 | ProviderConfigurationResponse | {
"authorization_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/authorize",
"claims_parameter_supported": false,
"claims_supported": [
"realmName",
"preferred_username",
"given_name",
"uid",
"upn",
"groupIds",
"employee_id",
"name",
"tenantId",
"mobile_number",
"department",
"job_title",
"family_name",
"email"
],
"device_authorize_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/device_authorize",
"grant_types_supported": [
"urn:ietf:params:oauth:grant-type:jwt-bearer",
"implicit",
"urn:ietf:params:oauth:grant-type:saml2-bearer",
"urn:ietf:params:oauth:grant-type:device_code",
"client_credentials",
"password",
"authorization_code",
"refresh_token"
],
"id_token_encryption_alg_values_supported": [
"RSA-OAEP-256"
],
"id_token_encryption_enc_values_supported": [
"A128CBC-HS256"
],
"id_token_signing_alg_values_supported": [
"RS256"
],
"introspect_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/introspect",
"issuer": "https://isamfed.com:30443/test",
"jwks_uri": "https://isamfed.com:30443/mga/sps/jwks",
"name": "OIDCDefinition",
"poc": "https://isamfed.com:30443/mga/",
"registration_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/register/OIDCDefinition",
"request_parameter_supported": true,
"request_uri_parameter_supported": true,
"require_request_uri_registration": false,
"response_modes_supported": [
"fragment",
"form_post"
],
"response_types_supported": [
"token",
"id_token",
"token id_token",
"code",
"code id_token",
"code token id_token",
"code token",
"none"
],
"revocation_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/revoke",
"subject_types_supported": [
"public"
],
"token_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/token",
"token_endpoint_auth_methods_supported": [
"private_key_jwt",
"client_secret_post",
"client_secret_basic"
],
"user_authorize_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/user_authorize",
"userinfo_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/userinfo",
"userinfo_signing_alg_values_supported": [
"RS256"
],
"version": "3.0"
}
|
0 | phase | <--<-- 2 --- Registration -->--> |
0 | register | kwargs:{'response_types': ['code'], 'grant_types': ['authorization_code'], 'application_name': 'OIC test tool', 'application_type': 'web', 'redirect_uris': ['https://op.certification.openid.net:61583/authz_cb'], 'contacts': ['roland@example.com'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61583/logout'], 'url': 'https://isamfed.com:30443/mga/sps/oauth/oauth20/register/OIDCDefinition', 'jwks_uri': 'https://op.certification.openid.net:61583/static/jwks_61583.json', 'token_endpoint_auth_method': 'private_key_jwt'}
|
0 | RegistrationRequest | {
"application_type": "web",
"contacts": [
"roland@example.com"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61583/static/jwks_61583.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61583/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61583/authz_cb"
],
"response_types": [
"code"
],
"token_endpoint_auth_method": "private_key_jwt"
}
|
1 | http response | url:https://isamfed.com:30443/mga/sps/oauth/oauth20/register/OIDCDefinition status_code:200
|
1 | RegistrationResponse | {
"application_type": "web",
"client_id": "xuDTTIjDRu9SwwbFLpvU",
"client_id_issued_at": 1560786234,
"client_secret": "DKUZcHPWVlGKuddC52J8",
"client_secret_expires_at": 0,
"contacts": [
"roland@example.com"
],
"grant_types": [
"authorization_code"
],
"jwks_uri": "https://op.certification.openid.net:61583/static/jwks_61583.json",
"post_logout_redirect_uris": [
"https://op.certification.openid.net:61583/logout"
],
"redirect_uris": [
"https://op.certification.openid.net:61583/authz_cb"
],
"registration_access_token": "wS7iffbSZQMpOsPAGicZ",
"registration_client_uri": "https://isamfed.com:30443/mga/sps/oauth/oauth20/register/OIDCDefinition?client_id=xuDTTIjDRu9SwwbFLpvU",
"response_types": [
"code"
],
"token_endpoint_auth_method": "private_key_jwt"
}
|
1 | phase | <--<-- 3 --- AsyncAuthn -->--> |
1 | AuthorizationRequest | {
"client_id": "xuDTTIjDRu9SwwbFLpvU",
"nonce": "godmorgon",
"redirect_uri": "https://op.certification.openid.net:61583/authz_cb",
"response_type": "code",
"scope": "openid",
"state": "zIhrsIbNy03WlSNn"
}
|
1 | redirect url | https://isamfed.com:30443/mga/sps/oauth/oauth20/authorize?state=zIhrsIbNy03WlSNn&nonce=godmorgon&response_type=code&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61583%2Fauthz_cb&client_id=xuDTTIjDRu9SwwbFLpvU |
1 | redirect | https://isamfed.com:30443/mga/sps/oauth/oauth20/authorize?state=zIhrsIbNy03WlSNn&nonce=godmorgon&response_type=code&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61583%2Fauthz_cb&client_id=xuDTTIjDRu9SwwbFLpvU |
1 | response | Response URL with query part |
1 | response | {'state': 'zIhrsIbNy03WlSNn', 'code': '2hOEkS6x2sRIryeLdNQfg5r4boIvVB'} |
1 | response | {'state': 'zIhrsIbNy03WlSNn', 'code': '2hOEkS6x2sRIryeLdNQfg5r4boIvVB'} |
1 | AuthorizationResponse | {
"code": "2hOEkS6x2sRIryeLdNQfg5r4boIvVB",
"state": "zIhrsIbNy03WlSNn"
}
|
1 | phase | <--<-- 4 --- AccessToken -->--> |
1 | request | op_args: {'state': 'zIhrsIbNy03WlSNn'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61583/authz_cb'} |
1 | do_access_token_request | kwargs:{'request_args': {'redirect_uri': 'https://op.certification.openid.net:61583/authz_cb', 'code': '2hOEkS6x2sRIryeLdNQfg5r4boIvVB', 'state': 'zIhrsIbNy03WlSNn', 'grant_type': 'authorization_code', 'client_id': 'xuDTTIjDRu9SwwbFLpvU'}, 'state': 'zIhrsIbNy03WlSNn', 'authn_method': 'private_key_jwt'}
|
1 | AccessTokenRequest | {
"client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAieHVEVFRJakRSdTlTd3diRkxwdlUiLCAic3ViIjogInh1RFRUSWpEUnU5U3d3YkZMcHZVIiwgImF1ZCI6IFsiaHR0cHM6Ly9pc2FtZmVkLmNvbTozMDQ0My9tZ2Evc3BzL29hdXRoL29hdXRoMjAvdG9rZW4iXSwgImp0aSI6ICJITEx6VnRzYU9OZXdEZkhyVHRRY3NsMzZrejd5VDM1ZyIsICJleHAiOiAxNTYwNzg2ODM0LCAiaWF0IjogMTU2MDc4NjIzNH0.XG1CK58kAnAAbLRl_LCR4rnYHeRs2XtEp-U0LFyYxL-4FPIDCkILHJNMhjD4zuYNdQjKk2qF-Xj54OBXsR9G3p_adOAKrUv4uPRv6gtZFiuOrqvZswahS3SPAi0dAwdz482W8G1IsOqYr3IwqpzUmPFoSC0Ye9RceEL4eQgd2A6Hetl0HCUGVSTiQnVWhEha1sJqJhTmoyTmPyD1U0Qc5aIx0SuODXv4Da_M5fX-AavMkcNqo6XJlRmDRGwANLXItRXo-V4PHAQ17_gQppOybNALBY36t9FR8puyWgk967y0OEvD2mH5HLsjCeehTcfb4qm-7mM8nA7lQqD_4AnPMQ",
"client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
"code": "2hOEkS6x2sRIryeLdNQfg5r4boIvVB",
"grant_type": "authorization_code",
"redirect_uri": "https://op.certification.openid.net:61583/authz_cb",
"state": "zIhrsIbNy03WlSNn"
}
|
1 | request_url | https://isamfed.com:30443/mga/sps/oauth/oauth20/token |
1 | request_http_args | {'headers': {'Content-Type': 'application/x-www-form-urlencoded'}} |
1 | request | grant_type=authorization_code&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61583%2Fauthz_cb&code=2hOEkS6x2sRIryeLdNQfg5r4boIvVB&state=zIhrsIbNy03WlSNn&client_assertion=eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAieHVEVFRJakRSdTlTd3diRkxwdlUiLCAic3ViIjogInh1RFRUSWpEUnU5U3d3YkZMcHZVIiwgImF1ZCI6IFsiaHR0cHM6Ly9pc2FtZmVkLmNvbTozMDQ0My9tZ2Evc3BzL29hdXRoL29hdXRoMjAvdG9rZW4iXSwgImp0aSI6ICJITEx6VnRzYU9OZXdEZkhyVHRRY3NsMzZrejd5VDM1ZyIsICJleHAiOiAxNTYwNzg2ODM0LCAiaWF0IjogMTU2MDc4NjIzNH0.XG1CK58kAnAAbLRl_LCR4rnYHeRs2XtEp-U0LFyYxL-4FPIDCkILHJNMhjD4zuYNdQjKk2qF-Xj54OBXsR9G3p_adOAKrUv4uPRv6gtZFiuOrqvZswahS3SPAi0dAwdz482W8G1IsOqYr3IwqpzUmPFoSC0Ye9RceEL4eQgd2A6Hetl0HCUGVSTiQnVWhEha1sJqJhTmoyTmPyD1U0Qc5aIx0SuODXv4Da_M5fX-AavMkcNqo6XJlRmDRGwANLXItRXo-V4PHAQ17_gQppOybNALBY36t9FR8puyWgk967y0OEvD2mH5HLsjCeehTcfb4qm-7mM8nA7lQqD_4AnPMQ&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer |
2 | http response | url:https://isamfed.com:30443/mga/sps/oauth/oauth20/token status_code:200
|
2 | response | {'access_token': 'cpG56NvK2tLDAzFby3hL', 'refresh_token': '1MpBzDlWU14hYZdQyjLyeDRbUxgSICTcGCOiLadr', 'scope': 'openid', 'id_token': 'eyJhbGciOiJSU0EtT0FFUC0yNTYiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZ3RINHYzWXIyUXFMcmVCU3owQnlRUTh2a2Y4ZUZvMUtJaXQzcy0zQmJ3dyIsImN0eSI6IkpXVCJ9.jb2QAbiCgbDJ7tZUQSeRsEnUQ2lIDhebqMkYJsbHgrPOPZIZ8BfZE7YilxBUsqqbwMUzZQs8PeglO_ijuy01pvvPQxksgHHQfD1H9SneOgIIpqhw7VvuwY8F0LwBQt0vhGwdgNsC2gjfTsY37pMZ56Uy9roJ38VqAWx7KzeYBIywnxL15w09dUuh8FsrJrYXLZEFzrim3z5uiwPaDwrAJTmHzXag7yMCpBAt6nSB1w_UCZ3a1SbbzdeqomKQGFE_XKbvZCkuROVBzMULUkQZT8EcZduNHFiZxTMT5F1L2eQiGhk0msFLmoG7usuQPI1lqiNmXJd9aG4i93TFdUyLrw.ak-vPHRCHWo2vrnYcb6XZA.cAHlYSuHq3RdwJsSPZweEhw41319wfWCcaSDNcOPang4e-DMHpsEenBJx8K-pDgZiK8uKx4w6b5YjIcDELgg3wTD5q5EN9hM8TcX8hfGT4oZem8SR_tWIPB6lRXzwneYqO-2aHzUb9x4N0xtQzFRskLJXVayxcrnzHHAJ2J34c1bgXceOoqFXYXII-15FKoO-UUOgW2mw5rmwWmGzhGPGMPOUo-GaSO9Rk_N7a8JltGGJvEGQYwKmM4l5v-IQNNZrJ0Jk4cpIKc67vtE-9Fjz0y6kaJRutl-46CWbvLd5c3Y8FNA5YNtHqclBkMAUST7G2HujvO2ayKdqSp47_QffXpl1h4rsT0Kk1hjo1_EcVOTXEmfxSzF2VJ9-xQxs8kqRm1rkikWjXvWYKCHpgcJt7-W8o-iyRYwwfN2pfpaiC1cBLT0MduDvlBdcS_g_J71tkypxsEG5Z1-ZkCAtIFv9wWxB6RBM3Mttzvy3AnLmLqLIzdzBS4nPm1_nM2SXc1SplBNTT6fNnfoJmpe6O1dX1_c39APFYLx2hl0zQPey5cTThtd3GXNdjc9jsrU1IE8iDH6K8yMZsFkxWk110M8dcazCHtua6IWtBz8D8HDnizW4pWfMhC6QfFrzDK0I1N31xOXi1hi0Lps-Ylima5TkVCJB8wCFzUecqjDYk6Jq248CckRrLSOJ3DIe09pJsGZOVLNAIhV-pq028c3YL-zJbuXGO3rNrbwjh6-L47UqfE278IXLGUwBB6T-IKf2Gx54YBqoWBCYjEz5nza_ex7KEoTEnUPXwh0ap79gA7PRD3MKtC_vPdZFvzayqFd2jTFpVe8b7fFuzHhYQfSNesMRic7S09HDaDemBl-dbaXCIHBSG06I0L019RIjZ5WGwJdBBeSsBDFWTOvk24lvOO8E616vcQJ3zM28oGVMjqW24tNCcxNu_MeYaWOODcp0q10.MzhELAlDYjceT-cj5kRzxA', 'token_type': 'bearer', 'expires_in': 3599} |
2 | AccessTokenResponse | {
"access_token": "cpG56NvK2tLDAzFby3hL",
"expires_in": 3599,
"id_token": {
"at_hash": "iHfXCa1uriBkfOIJQUgGlQ",
"aud": [
"xuDTTIjDRu9SwwbFLpvU"
],
"exp": 1560789655,
"iat": 1560786235,
"iss": "https://isamfed.com:30443/test",
"nonce": "godmorgon",
"rt_hash": "MzrvdxCDaewC3kJ9B4MpUQ",
"sub": "testuser"
},
"refresh_token": "1MpBzDlWU14hYZdQyjLyeDRbUxgSICTcGCOiLadr",
"scope": "openid",
"token_type": "bearer"
}
|
2 | jws header | {'kid': '_uhPdeGrTWxobFeH0XbzjJpRrzp3CB9nknx1yFV1G-0', 'alg': 'RS256'} |
2 | jwe header | {'alg': 'RSA-OAEP-256', 'enc': 'A128CBC-HS256', 'kid': 'gtH4v3Yr2QqLreBSz0ByQQ8vkf8eFo1KIit3s-3Bbww', 'cty': 'JWT'} |
2 | phase | <--<-- 5 --- Done -->--> |
2 | end | |
2 | assertion | VerifyNonce |
2 | condition | verify-nonce: status=OK [Verifies that the nonce received in the IDToken is the same as was given in the Authorization Request] |
2 | assertion | VerifyResponse |
2 | condition | verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses] |
2 | condition | Done: status=OK |