Test Info

Issuerhttps://isamfed.com:30443/test
Profile[]
Test IDOP-scope-All
Test descriptionScope requesting all claims
Timestamp2019-06-18T04:22:04Z

Conditions


verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'address'] [Verifies that the claims corresponding to the requested scopes are returned]
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK

Trace Output

0phase<--<-- 0 --- Webfinger -->-->
0not expected to doWebFinger
0phase<--<-- 1 --- Discovery -->-->
0provider_config
kwargs:{'issuer': 'https://isamfed.com:30443/test'}
0http response
url:https://isamfed.com:30443/test/.well-known/openid-configuration status_code:200
0ProviderConfigurationResponse
{
    "authorization_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/authorize",
    "claims_parameter_supported": false,
    "claims_supported": [
        "realmName",
        "preferred_username",
        "given_name",
        "uid",
        "upn",
        "groupIds",
        "employee_id",
        "name",
        "tenantId",
        "mobile_number",
        "department",
        "job_title",
        "family_name",
        "email"
    ],
    "device_authorize_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/device_authorize",
    "grant_types_supported": [
        "urn:ietf:params:oauth:grant-type:jwt-bearer",
        "implicit",
        "urn:ietf:params:oauth:grant-type:saml2-bearer",
        "urn:ietf:params:oauth:grant-type:device_code",
        "client_credentials",
        "password",
        "authorization_code",
        "refresh_token"
    ],
    "id_token_encryption_alg_values_supported": [
        "A128KW"
    ],
    "id_token_encryption_enc_values_supported": [
        "A128CBC-HS256"
    ],
    "id_token_signing_alg_values_supported": [
        "RS256"
    ],
    "introspect_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/introspect",
    "issuer": "https://isamfed.com:30443/test",
    "jwks_uri": "https://isamfed.com:30443/mga/sps/jwks",
    "name": "OIDCDefinition",
    "poc": "https://isamfed.com:30443/mga/",
    "registration_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/register/OIDCDefinition",
    "request_parameter_supported": true,
    "request_uri_parameter_supported": true,
    "require_request_uri_registration": false,
    "response_modes_supported": [
        "fragment",
        "form_post"
    ],
    "response_types_supported": [
        "token",
        "id_token",
        "token id_token",
        "code",
        "code id_token",
        "code token id_token",
        "code token",
        "none"
    ],
    "revocation_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/revoke",
    "subject_types_supported": [
        "public"
    ],
    "token_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/token",
    "token_endpoint_auth_methods_supported": [
        "private_key_jwt",
        "client_secret_post",
        "client_secret_basic"
    ],
    "user_authorize_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/user_authorize",
    "userinfo_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/userinfo",
    "userinfo_signing_alg_values_supported": [
        "RS256"
    ],
    "version": "3.0"
}
0phase<--<-- 2 --- Registration -->-->
0not expected to doDynamic registration
0phase<--<-- 3 --- AsyncAuthn -->-->
0AuthorizationRequest
{
    "client_id": "clientID",
    "nonce": "SHqjtebarhBMlRIC",
    "redirect_uri": "https://op.certification.openid.net:61771/authz_cb",
    "response_type": "code token",
    "scope": "openid profile email address phone",
    "state": "kJLGYZH7FZbSMRcO"
}
0redirect urlhttps://isamfed.com:30443/mga/sps/oauth/oauth20/authorize?state=kJLGYZH7FZbSMRcO&nonce=SHqjtebarhBMlRIC&response_type=code+token&scope=openid+profile+email+address+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61771%2Fauthz_cb&client_id=clientID
0redirecthttps://isamfed.com:30443/mga/sps/oauth/oauth20/authorize?state=kJLGYZH7FZbSMRcO&nonce=SHqjtebarhBMlRIC&response_type=code+token&scope=openid+profile+email+address+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61771%2Fauthz_cb&client_id=clientID
3http args{}
3responseURL with fragment
3responseaccess_token=GSeFvtbnL0rntW8NgVME&state=kJLGYZH7FZbSMRcO&expires_in=3599&token_type=bearer&code=qSfhVH6aFIZHb1f4hYXYPNdP8Sk2vp&scope=address%20phone%20openid%20profile%20email
3response{'access_token': 'GSeFvtbnL0rntW8NgVME', 'state': 'kJLGYZH7FZbSMRcO', 'expires_in': 3599, 'token_type': 'bearer', 'code': 'qSfhVH6aFIZHb1f4hYXYPNdP8Sk2vp', 'scope': 'address phone openid profile email'}
3AuthorizationResponse
{
    "access_token": "GSeFvtbnL0rntW8NgVME",
    "code": "qSfhVH6aFIZHb1f4hYXYPNdP8Sk2vp",
    "expires_in": 3599,
    "scope": "address phone openid profile email",
    "state": "kJLGYZH7FZbSMRcO",
    "token_type": "bearer"
}
3phase<--<-- 4 --- AccessToken -->-->
3requestop_args: {'state': 'kJLGYZH7FZbSMRcO'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61771/authz_cb'}
3do_access_token_request
kwargs:{'request_args': {'redirect_uri': 'https://op.certification.openid.net:61771/authz_cb', 'code': 'qSfhVH6aFIZHb1f4hYXYPNdP8Sk2vp', 'state': 'kJLGYZH7FZbSMRcO', 'grant_type': 'authorization_code', 'client_id': 'clientID'}, 'state': 'kJLGYZH7FZbSMRcO', 'authn_method': 'client_secret_basic'}
3AccessTokenRequest
{
    "code": "qSfhVH6aFIZHb1f4hYXYPNdP8Sk2vp",
    "grant_type": "authorization_code",
    "redirect_uri": "https://op.certification.openid.net:61771/authz_cb",
    "state": "kJLGYZH7FZbSMRcO"
}
3request_urlhttps://isamfed.com:30443/mga/sps/oauth/oauth20/token
3request_http_args{'headers': {'Authorization': 'Basic Y2xpZW50SUQ6Y2xpZW50U2VjcmV0', 'Content-Type': 'application/x-www-form-urlencoded'}}
3requestgrant_type=authorization_code&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61771%2Fauthz_cb&code=qSfhVH6aFIZHb1f4hYXYPNdP8Sk2vp&state=kJLGYZH7FZbSMRcO
4http response
url:https://isamfed.com:30443/mga/sps/oauth/oauth20/token status_code:200
4response{'access_token': 'q0pdusNkbPjcZbTr0hrR', 'refresh_token': 'CIz5jmr8r77iILz1YNtbQiDYzh4WLS7AzFTV3WxR', 'scope': 'address phone openid profile email', 'id_token': 'eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.AgGjIq3sjlPJ7AOPgjp-CFapPGCp_DNEWINpwHjB69_wOMM3gopU7A.D9egBC7x76UiG5Tv6ZgvRw.FJkFL2dGM0mfBtydS7MOW3eQX-lc7IkgQdQVdQ9Mez9PmAnvW25kGS5l56P-5o6u-4DJVRLLPS3iMc-NyyBhc9pbNOmKoOkKS3dXq8gvqHSEniSf3DuA3EzjLkAuDgm7M2KUP-RCkqzM72a2z44PP-OWae7aYfrR-ReLJ-cWXTecyPZfVwHLamMiMJMMLAva-oWYuhc-zaADO8gk9tDUrXi-TFojw-VTzRzXEBKG0p2kpQRpVISAVm4ZKk5uPp6ymuLQcUS9uU0d0JzllwufIe9Cispd2LNDrxFTN5eGP8FH767fdibENysPOHvkUHpW7jqf1jJWnqTgzFLfPlh0NSLnAihs89iK_M7UrcAAfmdZpWx7tiFf-jDtv-HTTVhEaWPc1_YDY1Enz1CaucrAJ_LTHaHB6FI5-E07fz89B0Kx5GPXJw6JUgnEdf7oHtwcMptx-DemCeZSO_TUe1sun811PbR7xcHdrpDbMZMojWVKm2YXMt94GEKsmwnS6zklgsrywMW8BYqb6CNb4_jGx5c2KEbjqEq_TY-EFv5pgU0pmzmkMTjEiPA3hBqaachPUfWfbM5KUWcoYwCLq--j-d0e7UBjbeC1ZvOnJpsj_GlQmAHjdw2wYoqG0VmHCOTnOULDsmVFjCeOnKrUCzgy4Tj_08-78f8aPR_SLrVvhybocyNh59ew1RqOtPD12ly6ZVPo5m-lxeKs2ZN1a8IZftfzhhH8TverV1mzqDXh-6vsH_J5CRF9k0z-fZT0T01dcvozYfUWyfdkCKtpUAhEl91u0c-A16RiPmq9a-c63ot4oBtFBQYR_k1WZUf5swoEkkaFKMQ9pOYRlsjvXvg0On3nyfzqoDpYRkimfvy2trN4-VijkjBnUwcjtOk4Fa7mnoyF3mKwR43cSrg68GHnYLTyrswWD13jeqoSW5DeO62yrjaEeOV0QE3sldsovH638vYsufjCrtqlVwEK-BRD0pObbO-38394_c2za7HKcbjC_EzV0KXbwqExUBXxNPjZ2cAwwpk_lsP9vsKLFwMpLm8jodgeBg610N2ujIcgG7Zhu6FxjAziY_q_OEo4AS8wJQPLBu0pvNOLOvK_xmHCQnjn7VlqPBHTJszxmO6fLJ0e1EicQMHwaQxGBLUuciWGecFhccFOVIlUgBnQ4Rvv0E28kvsmu84E71arQ4kWyAM.MhWFE4ZzCnALQqom_0OdEg', 'token_type': 'bearer', 'expires_in': 3599}
4AccessTokenResponse
{
    "access_token": "q0pdusNkbPjcZbTr0hrR",
    "expires_in": 3599,
    "id_token": {
        "at_hash": "OYQCbJ20clCFxCK5lPRYYw",
        "aud": [
            "clientID"
        ],
        "email": "test_isamfed@gmail.com",
        "email_verified": false,
        "exp": 1560835143,
        "iat": 1560831723,
        "iss": "https://isamfed.com:30443/test",
        "name": "isamfed testuser",
        "nonce": "SHqjtebarhBMlRIC",
        "phone_number": "87654215",
        "phone_number_verified": false,
        "rt_hash": "1VCJEVDuFeTDxXk37q1IrQ",
        "sub": "testuser"
    },
    "refresh_token": "CIz5jmr8r77iILz1YNtbQiDYzh4WLS7AzFTV3WxR",
    "scope": "address phone openid profile email",
    "token_type": "bearer"
}
4jws header{'kid': '_uhPdeGrTWxobFeH0XbzjJpRrzp3CB9nknx1yFV1G-0', 'alg': 'RS256'}
4jwe header{'alg': 'A128KW', 'enc': 'A128CBC-HS256', 'cty': 'JWT'}
4phase<--<-- 5 --- UserInfo -->-->
4do_user_info_request
kwargs:{'state': 'kJLGYZH7FZbSMRcO', 'method': 'GET', 'authn_method': 'bearer_header'}
4request{'body': None}
4request_urlhttps://isamfed.com:30443/mga/sps/oauth/oauth20/userinfo
4request_http_args{'headers': {'Authorization': 'Bearer q0pdusNkbPjcZbTr0hrR'}}
5http response
url:https://isamfed.com:30443/mga/sps/oauth/oauth20/userinfo status_code:200
5OpenIDSchema
{
    "email": "test_isamfed@gmail.com",
    "email_verified": false,
    "name": "isamfed testuser",
    "phone_number": "87654215",
    "phone_number_verified": false,
    "sub": "testuser"
}
5OpenIDSchema
{
    "email": "test_isamfed@gmail.com",
    "email_verified": false,
    "name": "isamfed testuser",
    "phone_number": "87654215",
    "phone_number_verified": false,
    "sub": "testuser"
}
5phase<--<-- 6 --- Done -->-->
5end
5assertionVerifyScopes
5conditionverify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'address'] [Verifies that the claims corresponding to the requested scopes are returned]
5assertionCheckHTTPResponse
5conditioncheck-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
5assertionVerifyResponse
5conditionverify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
5conditionDone: status=OK

Result

WARNING
Warnings:
The following claims were missing from the returned information: ['given_name', 'family_name', 'middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at', 'preferred_username', 'address']