Test Info

Issuerhttps://isamfed.com:30443/test
Profile[]
Test IDOP-scope-email
Test descriptionScope requesting email claims
Timestamp2019-06-17T15:20:13Z

Conditions


verify-scopes: status=OK [Verifies that the claims corresponding to the requested scopes are returned]
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK

Trace Output

0phase<--<-- 0 --- Webfinger -->-->
0not expected to doWebFinger
0phase<--<-- 1 --- Discovery -->-->
0provider_config
kwargs:{'issuer': 'https://isamfed.com:30443/test'}
1http response
url:https://isamfed.com:30443/test/.well-known/openid-configuration status_code:200
1ProviderConfigurationResponse
{
    "authorization_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/authorize",
    "claims_parameter_supported": false,
    "claims_supported": [
        "realmName",
        "preferred_username",
        "given_name",
        "uid",
        "upn",
        "groupIds",
        "employee_id",
        "name",
        "tenantId",
        "mobile_number",
        "department",
        "job_title",
        "family_name",
        "email"
    ],
    "device_authorize_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/device_authorize",
    "grant_types_supported": [
        "urn:ietf:params:oauth:grant-type:jwt-bearer",
        "implicit",
        "urn:ietf:params:oauth:grant-type:saml2-bearer",
        "urn:ietf:params:oauth:grant-type:device_code",
        "client_credentials",
        "password",
        "authorization_code",
        "refresh_token"
    ],
    "id_token_encryption_alg_values_supported": [
        "RSA-OAEP-256"
    ],
    "id_token_encryption_enc_values_supported": [
        "A128CBC-HS256"
    ],
    "id_token_signing_alg_values_supported": [
        "RS256"
    ],
    "introspect_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/introspect",
    "issuer": "https://isamfed.com:30443/test",
    "jwks_uri": "https://isamfed.com:30443/mga/sps/jwks",
    "name": "OIDCDefinition",
    "poc": "https://isamfed.com:30443/mga/",
    "registration_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/register/OIDCDefinition",
    "request_parameter_supported": true,
    "request_uri_parameter_supported": true,
    "require_request_uri_registration": false,
    "response_modes_supported": [
        "fragment",
        "form_post"
    ],
    "response_types_supported": [
        "token",
        "id_token",
        "token id_token",
        "code",
        "code id_token",
        "code token id_token",
        "code token",
        "none"
    ],
    "revocation_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/revoke",
    "subject_types_supported": [
        "public"
    ],
    "token_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/token",
    "token_endpoint_auth_methods_supported": [
        "private_key_jwt",
        "client_secret_post",
        "client_secret_basic"
    ],
    "user_authorize_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/user_authorize",
    "userinfo_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/userinfo",
    "userinfo_signing_alg_values_supported": [
        "RS256"
    ],
    "version": "3.0"
}
1phase<--<-- 2 --- Registration -->-->
1register
kwargs:{'response_types': ['code id_token'], 'grant_types': ['authorization_code', 'implicit'], 'application_name': 'OIC test tool', 'application_type': 'web', 'redirect_uris': ['https://op.certification.openid.net:61716/authz_cb'], 'contacts': ['roland@example.com'], 'post_logout_redirect_uris': ['https://op.certification.openid.net:61716/logout'], 'url': 'https://isamfed.com:30443/mga/sps/oauth/oauth20/register/OIDCDefinition', 'jwks_uri': 'https://op.certification.openid.net:61716/static/jwks_61716.json', 'token_endpoint_auth_method': 'private_key_jwt'}
1RegistrationRequest
{
    "application_type": "web",
    "contacts": [
        "roland@example.com"
    ],
    "grant_types": [
        "implicit",
        "authorization_code"
    ],
    "jwks_uri": "https://op.certification.openid.net:61716/static/jwks_61716.json",
    "post_logout_redirect_uris": [
        "https://op.certification.openid.net:61716/logout"
    ],
    "redirect_uris": [
        "https://op.certification.openid.net:61716/authz_cb"
    ],
    "response_types": [
        "code id_token"
    ],
    "token_endpoint_auth_method": "private_key_jwt"
}
1http response
url:https://isamfed.com:30443/mga/sps/oauth/oauth20/register/OIDCDefinition status_code:200
1RegistrationResponse
{
    "application_type": "web",
    "client_id": "PkwjrKU11G1gkLNimL3y",
    "client_id_issued_at": 1560784810,
    "client_secret": "JOuxdcKUIHjmGLyEW0Kv",
    "client_secret_expires_at": 0,
    "contacts": [
        "roland@example.com"
    ],
    "grant_types": [
        "implicit",
        "authorization_code"
    ],
    "jwks_uri": "https://op.certification.openid.net:61716/static/jwks_61716.json",
    "post_logout_redirect_uris": [
        "https://op.certification.openid.net:61716/logout"
    ],
    "redirect_uris": [
        "https://op.certification.openid.net:61716/authz_cb"
    ],
    "registration_access_token": "m5AsT6T3MIS79JIuV06y",
    "registration_client_uri": "https://isamfed.com:30443/mga/sps/oauth/oauth20/register/OIDCDefinition?client_id=PkwjrKU11G1gkLNimL3y",
    "response_types": [
        "code",
        "id_token"
    ],
    "token_endpoint_auth_method": "private_key_jwt"
}
1phase<--<-- 3 --- AsyncAuthn -->-->
1AuthorizationRequest
{
    "client_id": "PkwjrKU11G1gkLNimL3y",
    "nonce": "f9p6QJ62dGa3KUmg",
    "redirect_uri": "https://op.certification.openid.net:61716/authz_cb",
    "response_type": "code id_token",
    "scope": "openid email",
    "state": "86QlKl6NW4OMgBh5"
}
1redirect urlhttps://isamfed.com:30443/mga/sps/oauth/oauth20/authorize?state=86QlKl6NW4OMgBh5&nonce=f9p6QJ62dGa3KUmg&response_type=code+id_token&scope=openid+email&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61716%2Fauthz_cb&client_id=PkwjrKU11G1gkLNimL3y
1redirecthttps://isamfed.com:30443/mga/sps/oauth/oauth20/authorize?state=86QlKl6NW4OMgBh5&nonce=f9p6QJ62dGa3KUmg&response_type=code+id_token&scope=openid+email&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61716%2Fauthz_cb&client_id=PkwjrKU11G1gkLNimL3y
2http args{}
2responseURL with fragment
2responsestate=86QlKl6NW4OMgBh5&code=ngsTkdho0hYZePyTnvHogsLd97dlFF&id_token=eyJhbGciOiJSU0EtT0FFUC0yNTYiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZ3RINHYzWXIyUXFMcmVCU3owQnlRUTh2a2Y4ZUZvMUtJaXQzcy0zQmJ3dyIsImN0eSI6IkpXVCJ9.hUFAMqWFjFACc_qJMGqRHg8snItv20uu7yiA_yF4wv4nyRj4psRwqHVCbc_0dH4DmsE5k6UtRJ9G7P7CQq6ovRzD1k6iuwEZFQY0hchbtlGZ6d0CgaIY_kZu_Z0CGvdR5OWE0ExRFLho3_oN1HegF77YRcfN7DeHumNEC41RjvKjV5Ektlili5PDQn5XMZY1fIZBwacVjIpw3WqXRrvrF9MqNYxULjxOFW7L8WRnKRicmVybbUcfI1ify4rugtQRnGYx6foK91otCs6PmQ_mbxHazedaAo9vPTEtDhwc-YID-J9zvgAlCgJHrmNcchOOL5X_Ou14TKJ7mp8S-dFn4A.6aJzjgFQohEXSLwHKuFMJw.CR8tWVCdJSaa38QC5dim8wGmNk3KLsnC43rGHdwUq7I3efoKVSDca4eXhy4ERE6xY6vK-4mSHjeSJqJHWOCoSuGKElmoJmD46kc2nNcu3Y6rx934uiB7ytMbQMqDgqfPlUktlwHp4NB2xqHLb6Wr0nM3G4tA6Opry43hh3QbyFK0EU3sVrqTMz0BhEREBkwSIHvly9lIc2E70bIksbFcXdxebI3KEMgrGmPqfAqtHvNK7Z679ORc5A7Y5ASf1GxwtCAayKSncrdw8aH-VGLS420rdqzrqJ8yO0JiZWdDuh3-MynPH9z839fsR1eOvc4vsQZGUcBbQtg8xJy1MmfefRPZywf2YZkaxMn2puwSzgHRVVqxOkQUXOQeQUpY0vor7kIwVIhZ-XO8EbDd45lBGS49GEnwCM8T_Wajpw1sqpj9krm7qhIpN0MA-C-G0Ssu8xgMxisLtGj497nie4ml_-Epx0xBtZWXtOVYjSyx8cKAcEAL4OucsRDA-lkBb8ZzzSSKJD4blYmAB4NUR27h2knCvTP_JDNx7YMDWDAmUMXhrZBjUy_AvNI-ZbseA6cnW19ZLTIUOyS_lAjsRoD1oJTQbwd6CorZh4rFQ9ASomUwbCwRcwdBkwm2YE6f1fxLmQFGbQ_4D5tFQbMDEfIX1gnol_lbuFvtlOoGN8fKUNgGVG7WXKmXXZddCavfdy0Goh2VSozeXWh3oUDC7Zwl8jnx3a_TkDqgZdvoBPAaQ-pDYW3Ph4G6Eptv-cmHYJNlRTpnqaJ6M1W0gdymFQH8KXbMpXrKVciCBAyEAgZULO9Og9aVHFz4InsLBJXWbRsux30XvRjkNk6pVlQByxwIZShCt0Ftn4qdy1z8_14VhC5UJnXFpj4mxHu70rOVfsk4k0vi1Ol632IZo-23LPkiSVglk44-39OpOZIMc9j7dzQYgMYjibfjbDaetiuLYIK04GO1lkXGgzh_3XOjggPUs1RGOgNHgxRSSR0P4T2J_hk.-v6VjLzy8IpLgPKzqhsQJQ
2response{'state': '86QlKl6NW4OMgBh5', 'code': 'ngsTkdho0hYZePyTnvHogsLd97dlFF', 'id_token': 'eyJhbGciOiJSU0EtT0FFUC0yNTYiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZ3RINHYzWXIyUXFMcmVCU3owQnlRUTh2a2Y4ZUZvMUtJaXQzcy0zQmJ3dyIsImN0eSI6IkpXVCJ9.hUFAMqWFjFACc_qJMGqRHg8snItv20uu7yiA_yF4wv4nyRj4psRwqHVCbc_0dH4DmsE5k6UtRJ9G7P7CQq6ovRzD1k6iuwEZFQY0hchbtlGZ6d0CgaIY_kZu_Z0CGvdR5OWE0ExRFLho3_oN1HegF77YRcfN7DeHumNEC41RjvKjV5Ektlili5PDQn5XMZY1fIZBwacVjIpw3WqXRrvrF9MqNYxULjxOFW7L8WRnKRicmVybbUcfI1ify4rugtQRnGYx6foK91otCs6PmQ_mbxHazedaAo9vPTEtDhwc-YID-J9zvgAlCgJHrmNcchOOL5X_Ou14TKJ7mp8S-dFn4A.6aJzjgFQohEXSLwHKuFMJw.CR8tWVCdJSaa38QC5dim8wGmNk3KLsnC43rGHdwUq7I3efoKVSDca4eXhy4ERE6xY6vK-4mSHjeSJqJHWOCoSuGKElmoJmD46kc2nNcu3Y6rx934uiB7ytMbQMqDgqfPlUktlwHp4NB2xqHLb6Wr0nM3G4tA6Opry43hh3QbyFK0EU3sVrqTMz0BhEREBkwSIHvly9lIc2E70bIksbFcXdxebI3KEMgrGmPqfAqtHvNK7Z679ORc5A7Y5ASf1GxwtCAayKSncrdw8aH-VGLS420rdqzrqJ8yO0JiZWdDuh3-MynPH9z839fsR1eOvc4vsQZGUcBbQtg8xJy1MmfefRPZywf2YZkaxMn2puwSzgHRVVqxOkQUXOQeQUpY0vor7kIwVIhZ-XO8EbDd45lBGS49GEnwCM8T_Wajpw1sqpj9krm7qhIpN0MA-C-G0Ssu8xgMxisLtGj497nie4ml_-Epx0xBtZWXtOVYjSyx8cKAcEAL4OucsRDA-lkBb8ZzzSSKJD4blYmAB4NUR27h2knCvTP_JDNx7YMDWDAmUMXhrZBjUy_AvNI-ZbseA6cnW19ZLTIUOyS_lAjsRoD1oJTQbwd6CorZh4rFQ9ASomUwbCwRcwdBkwm2YE6f1fxLmQFGbQ_4D5tFQbMDEfIX1gnol_lbuFvtlOoGN8fKUNgGVG7WXKmXXZddCavfdy0Goh2VSozeXWh3oUDC7Zwl8jnx3a_TkDqgZdvoBPAaQ-pDYW3Ph4G6Eptv-cmHYJNlRTpnqaJ6M1W0gdymFQH8KXbMpXrKVciCBAyEAgZULO9Og9aVHFz4InsLBJXWbRsux30XvRjkNk6pVlQByxwIZShCt0Ftn4qdy1z8_14VhC5UJnXFpj4mxHu70rOVfsk4k0vi1Ol632IZo-23LPkiSVglk44-39OpOZIMc9j7dzQYgMYjibfjbDaetiuLYIK04GO1lkXGgzh_3XOjggPUs1RGOgNHgxRSSR0P4T2J_hk.-v6VjLzy8IpLgPKzqhsQJQ'}
3AuthorizationResponse
{
    "code": "ngsTkdho0hYZePyTnvHogsLd97dlFF",
    "id_token": {
        "aud": [
            "PkwjrKU11G1gkLNimL3y"
        ],
        "c_hash": "QTV-suJsrRSuS4ddiRV5Ig",
        "email": "test_isamfed@gmail.com",
        "email_verified": false,
        "exp": 1560788231,
        "iat": 1560784811,
        "iss": "https://isamfed.com:30443/test",
        "nonce": "f9p6QJ62dGa3KUmg",
        "sub": "testuser"
    },
    "state": "86QlKl6NW4OMgBh5"
}
3phase<--<-- 4 --- AccessToken -->-->
3requestop_args: {'state': '86QlKl6NW4OMgBh5'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61716/authz_cb'}
3do_access_token_request
kwargs:{'request_args': {'redirect_uri': 'https://op.certification.openid.net:61716/authz_cb', 'code': 'ngsTkdho0hYZePyTnvHogsLd97dlFF', 'state': '86QlKl6NW4OMgBh5', 'grant_type': 'authorization_code', 'client_id': 'PkwjrKU11G1gkLNimL3y'}, 'state': '86QlKl6NW4OMgBh5', 'authn_method': 'private_key_jwt'}
3AccessTokenRequest
{
    "client_assertion": "eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiUGt3anJLVTExRzFna0xOaW1MM3kiLCAic3ViIjogIlBrd2pyS1UxMUcxZ2tMTmltTDN5IiwgImF1ZCI6IFsiaHR0cHM6Ly9pc2FtZmVkLmNvbTozMDQ0My9tZ2Evc3BzL29hdXRoL29hdXRoMjAvdG9rZW4iXSwgImp0aSI6ICI1MXZWVUFZVWlxR0pSZGRTNXRwYU5vNDdTYldiSzRhdiIsICJleHAiOiAxNTYwNzg1NDEyLCAiaWF0IjogMTU2MDc4NDgxMn0.ZCvSUhaaOEGae87juRxSowrE76tjbIyMhwhykRs1tzy7vmTF4m9x8PNW2LB2Z01fzJChpEI2atPdqQUBtX90d77DhiNfGvN8ClHA6jBxSU6mssDHtOQWiDTYMsScruyBehKClyL2Nglb3PwRlNX_7Kt7qtLRQyDBI_x2cgoLfA5bqagNUExh-rOhDRPEYrGiOfN9_xnXqWqPh4z1f1W8hZBOVRtKsacCllQqbEBwWjKN35FZBovyBFtzgUwaIfdVHo4u5Az7H8xIVvhkOLvNd-FdfarMutU69XfY2VIb4pUv-tmEYq9c1hTLj8CaaVNa-0pMW4CbpZXygu-9lo8nWQ",
    "client_assertion_type": "urn:ietf:params:oauth:client-assertion-type:jwt-bearer",
    "code": "ngsTkdho0hYZePyTnvHogsLd97dlFF",
    "grant_type": "authorization_code",
    "redirect_uri": "https://op.certification.openid.net:61716/authz_cb",
    "state": "86QlKl6NW4OMgBh5"
}
3request_urlhttps://isamfed.com:30443/mga/sps/oauth/oauth20/token
3request_http_args{'headers': {'Content-Type': 'application/x-www-form-urlencoded'}}
3requestgrant_type=authorization_code&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61716%2Fauthz_cb&code=ngsTkdho0hYZePyTnvHogsLd97dlFF&state=86QlKl6NW4OMgBh5&client_assertion=eyJhbGciOiJSUzI1NiIsImtpZCI6Ind0MjVPZ3lSX256RzNPb1E3ZGFhMnJMNi1nTW5GZGZSekJqaFVWUHU4UlEifQ.eyJpc3MiOiAiUGt3anJLVTExRzFna0xOaW1MM3kiLCAic3ViIjogIlBrd2pyS1UxMUcxZ2tMTmltTDN5IiwgImF1ZCI6IFsiaHR0cHM6Ly9pc2FtZmVkLmNvbTozMDQ0My9tZ2Evc3BzL29hdXRoL29hdXRoMjAvdG9rZW4iXSwgImp0aSI6ICI1MXZWVUFZVWlxR0pSZGRTNXRwYU5vNDdTYldiSzRhdiIsICJleHAiOiAxNTYwNzg1NDEyLCAiaWF0IjogMTU2MDc4NDgxMn0.ZCvSUhaaOEGae87juRxSowrE76tjbIyMhwhykRs1tzy7vmTF4m9x8PNW2LB2Z01fzJChpEI2atPdqQUBtX90d77DhiNfGvN8ClHA6jBxSU6mssDHtOQWiDTYMsScruyBehKClyL2Nglb3PwRlNX_7Kt7qtLRQyDBI_x2cgoLfA5bqagNUExh-rOhDRPEYrGiOfN9_xnXqWqPh4z1f1W8hZBOVRtKsacCllQqbEBwWjKN35FZBovyBFtzgUwaIfdVHo4u5Az7H8xIVvhkOLvNd-FdfarMutU69XfY2VIb4pUv-tmEYq9c1hTLj8CaaVNa-0pMW4CbpZXygu-9lo8nWQ&client_assertion_type=urn%3Aietf%3Aparams%3Aoauth%3Aclient-assertion-type%3Ajwt-bearer
3http response
url:https://isamfed.com:30443/mga/sps/oauth/oauth20/token status_code:200
3response{'access_token': '5a2d0Y9eRuN8CFSktejO', 'refresh_token': 'gof1lvpbZ5gf9u22tTIxgranl3V6nw2xO58wDmDF', 'scope': 'openid email', 'id_token': 'eyJhbGciOiJSU0EtT0FFUC0yNTYiLCJlbmMiOiJBMTI4Q0JDLUhTMjU2Iiwia2lkIjoiZ3RINHYzWXIyUXFMcmVCU3owQnlRUTh2a2Y4ZUZvMUtJaXQzcy0zQmJ3dyIsImN0eSI6IkpXVCJ9.OozOHy2RBWJJ-TvgkSb3430WWY4ZCHly6dQqa1hIRpYzLBXREmAO7E3BEwKDvpBx22g2DOAUBHq_6EkoD0sQ-D_E9-ziKI7irdU0cpb0hzVFEPUI0gIMQmeVDoYlr4OuLDMUNDkuUHdMuSQsxGyyQkGf4kioC5YNnWjDUgWFtPYowfv_xhourAZrlTv6Ta_ynwcFkhHSIG8_eCUDnfjqFFO-Q84J3KOPgz9T-lBfIdCoN0t1e0HqoBCyRN8WWfcvTh9-dqxceDoGXFjLLL9RAyJvch4DbQQkm7dtbx_B7LrgO3T4ta0Y-_NgkgCL4h7CtZHmMTnHe9JrrlM3HKjPUw.-pkp5gQcnCrQEdONGKr0BA.k-nqLMnliGWF8X_MR3fJJS5TCoGBiQEiZOzOAnQ69qtfgcruH1pi8hEBGOzZmpFNETGxKbYjJL10x4O-ljgitQj3HSVWVxUELTdAJUV_g01ksOZ1wngaosismpUfic2f_B-RF0eNe-_SgI8R608Qb5_T5-tmLQ9H2zIJaEVUFsaP3ho-DIMctHF4kNPlyMrrPjY25mgEtaFzRstksY3HUeWfqKSnHwfDAmadETM0HlOB-jCzAoX4BnpN7m_Xpp8f_LjF6rlCcxyrqBIEBOwofVit6uWRzlF5yRBjP61mnegzLb6RffYw7I7lsdxrFhTmh4p5qCtmPxM3fZx4ZODbXrIw6G-Ke3G3XksOMmPMCkUAziDYhHajwgRHsZwlLiM8CDwFO1mdi2atA_86_PddgYBFWTRFyvOrR5ZPnfC3pkdOjr7Y4kMhyhjCeguaobok-LLxWcfZgmmW8zYYZh9xGRi-NSSz4dgNocss2i-G9CsTCntIyZexGXRMUftv4Z17m1mJdw3Y1XZ0p7uRGZvQaDumodcLCdNumrzSCzkYxmF7A5M3Zj-7TDmNOqCgW75KlPqyudafzRbUPmEnnBPrW78K57J41OOUoIC58dijHWwI2Vvb6g0MTP0B14LEUZ0hwnwZoAQZrHyXiQy4zKJzfH3kjXatwcqqTCl5ml0VJfWJ5KaqEAku6NqfVxE63Y-0SBeywMOeM9Rui5o2psHrECkneDHu3v79HY-TQaKH2Lf5lJcOqdPbjtLOvfXpiwWKHH5nD_uqLjhXKUKktlfW57Ii00Uv9lzOuKteheyTayAGjotzbeAoJtsuDuT6fCUZlHYKeOByGxxyO_PL6GkqZH87ZLCHHI-Mg524OJzcD4qHgaGNqPmdIUHiXSYcT6MXg1KSDumg-MeVtaPSq3kjfGAELk8aLe91QWwywIAE4N0421-dbAFNGVE2lsAxAmUCWHi-byQgO1YXybSJOOCgQnUlX9sIl82lotu8fl3fJZZRjyGki5Y-reUHE9TzTSEtFtm5mrIDhMrytpdiTgwVpxYqFMuIzf8nw9puEH_NYaw.EMR1ifREx_JqYcWTFioXyw', 'token_type': 'bearer', 'expires_in': 3599}
3AccessTokenResponse
{
    "access_token": "5a2d0Y9eRuN8CFSktejO",
    "expires_in": 3599,
    "id_token": {
        "at_hash": "3AlTzAH7ZtpQ_xfYx2lkDA",
        "aud": [
            "PkwjrKU11G1gkLNimL3y"
        ],
        "email": "test_isamfed@gmail.com",
        "email_verified": false,
        "exp": 1560788232,
        "iat": 1560784812,
        "iss": "https://isamfed.com:30443/test",
        "nonce": "f9p6QJ62dGa3KUmg",
        "rt_hash": "qNCHNXoC_UJNsvP_z8Ar8w",
        "sub": "testuser"
    },
    "refresh_token": "gof1lvpbZ5gf9u22tTIxgranl3V6nw2xO58wDmDF",
    "scope": "openid email",
    "token_type": "bearer"
}
3jws header{'kid': '_uhPdeGrTWxobFeH0XbzjJpRrzp3CB9nknx1yFV1G-0', 'alg': 'RS256'}
3jwe header{'alg': 'RSA-OAEP-256', 'enc': 'A128CBC-HS256', 'kid': 'gtH4v3Yr2QqLreBSz0ByQQ8vkf8eFo1KIit3s-3Bbww', 'cty': 'JWT'}
3phase<--<-- 5 --- UserInfo -->-->
3do_user_info_request
kwargs:{'state': '86QlKl6NW4OMgBh5', 'method': 'GET', 'authn_method': 'bearer_header'}
3request{'body': None}
3request_urlhttps://isamfed.com:30443/mga/sps/oauth/oauth20/userinfo
3request_http_args{'headers': {'Authorization': 'Bearer 5a2d0Y9eRuN8CFSktejO'}}
4http response
url:https://isamfed.com:30443/mga/sps/oauth/oauth20/userinfo status_code:200
4OpenIDSchema
{
    "email": "test_isamfed@gmail.com",
    "email_verified": false,
    "sub": "testuser"
}
4OpenIDSchema
{
    "email": "test_isamfed@gmail.com",
    "email_verified": false,
    "sub": "testuser"
}
4phase<--<-- 6 --- Done -->-->
4end
4assertionVerifyScopes
4conditionverify-scopes: status=OK [Verifies that the claims corresponding to the requested scopes are returned]
4assertionCheckHTTPResponse
4conditioncheck-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
4assertionVerifyResponse
4conditionverify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
4conditionDone: status=OK

Result

PASSED