Test Info

Issuerhttps://isamfed.com:30443/test
Profile[]
Test IDOP-Req-max_age=1
Test descriptionRequesting ID Token with max_age=1 seconds restriction
Timestamp2019-06-18T04:19:36Z

Conditions


claims-check: status=OK [Checks if specific claims is present or not]
auth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
multiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK

Trace Output

0phase<--<-- 0 --- Webfinger -->-->
0not expected to doWebFinger
0phase<--<-- 1 --- Discovery -->-->
0provider_config
kwargs:{'issuer': 'https://isamfed.com:30443/test'}
1http response
url:https://isamfed.com:30443/test/.well-known/openid-configuration status_code:200
1ProviderConfigurationResponse
{
    "authorization_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/authorize",
    "claims_parameter_supported": false,
    "claims_supported": [
        "realmName",
        "preferred_username",
        "given_name",
        "uid",
        "upn",
        "groupIds",
        "employee_id",
        "name",
        "tenantId",
        "mobile_number",
        "department",
        "job_title",
        "family_name",
        "email"
    ],
    "device_authorize_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/device_authorize",
    "grant_types_supported": [
        "urn:ietf:params:oauth:grant-type:jwt-bearer",
        "implicit",
        "urn:ietf:params:oauth:grant-type:saml2-bearer",
        "urn:ietf:params:oauth:grant-type:device_code",
        "client_credentials",
        "password",
        "authorization_code",
        "refresh_token"
    ],
    "id_token_encryption_alg_values_supported": [
        "A128KW"
    ],
    "id_token_encryption_enc_values_supported": [
        "A128CBC-HS256"
    ],
    "id_token_signing_alg_values_supported": [
        "RS256"
    ],
    "introspect_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/introspect",
    "issuer": "https://isamfed.com:30443/test",
    "jwks_uri": "https://isamfed.com:30443/mga/sps/jwks",
    "name": "OIDCDefinition",
    "poc": "https://isamfed.com:30443/mga/",
    "registration_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/register/OIDCDefinition",
    "request_parameter_supported": true,
    "request_uri_parameter_supported": true,
    "require_request_uri_registration": false,
    "response_modes_supported": [
        "fragment",
        "form_post"
    ],
    "response_types_supported": [
        "token",
        "id_token",
        "token id_token",
        "code",
        "code id_token",
        "code token id_token",
        "code token",
        "none"
    ],
    "revocation_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/revoke",
    "subject_types_supported": [
        "public"
    ],
    "token_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/token",
    "token_endpoint_auth_methods_supported": [
        "private_key_jwt",
        "client_secret_post",
        "client_secret_basic"
    ],
    "user_authorize_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/user_authorize",
    "userinfo_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/userinfo",
    "userinfo_signing_alg_values_supported": [
        "RS256"
    ],
    "version": "3.0"
}
1phase<--<-- 2 --- Registration -->-->
1not expected to doDynamic registration
1phase<--<-- 3 --- AsyncAuthn -->-->
1AuthorizationRequest
{
    "client_id": "clientID",
    "nonce": "hi9Hh1IdYFuPrePt",
    "redirect_uri": "https://op.certification.openid.net:61772/authz_cb",
    "response_type": "code id_token",
    "scope": "openid",
    "state": "E4oyQFK313ME8NDX"
}
1redirect urlhttps://isamfed.com:30443/mga/sps/oauth/oauth20/authorize?state=E4oyQFK313ME8NDX&nonce=hi9Hh1IdYFuPrePt&response_type=code+id_token&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61772%2Fauthz_cb&client_id=clientID
1redirecthttps://isamfed.com:30443/mga/sps/oauth/oauth20/authorize?state=E4oyQFK313ME8NDX&nonce=hi9Hh1IdYFuPrePt&response_type=code+id_token&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61772%2Fauthz_cb&client_id=clientID
2http args{}
2responseURL with fragment
2responseid_token=eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.RWgKSkBqwF9pYlWccSkJmdoH8esJT9InDU_N9XzsAktB1FCQgPMCDA.ywqHuTTbaX7HcAiaWAluYA.9UL7Km8q6R9qdIH3d59FR4V_OSDp-gdmGDhTGigbWwNTj_FoTg5v9Mb2CNojgiRyuIuq_c8Uebk1ofwJkIU011xlyCRzVVLwri0aXyP9vsGqM7hUzsVv4yqbSqbSeyI-RTt1eI5OVlLr7ELUZcAXpIPq-3H6esrhxVg2VcPalUN5IltlxqUXOukI2EMuXlMNtsCAr0_YLmJQamPxlaZ9w3rJUIvac_kvnXHmtErIUSp-T711gxagC-KVAUB4eFo_WS5r855NHFyf4G2Y05b_NjtyDu2fB9-xg3yuJTbcjL38NHpzd4MXU_LnjTPTZt9DsLwQ_jstIYCkKRsbUj53XrN1zJTbAhZWzp0cge6ZBTUc02eyr72Kj1ihlDPbyIZQyAXMzmt5y-70h09FQz82muJfnNJfE6nqxCmaMqzQT3mJX6OhUuf9mS9T5chIj9_RogWnbdx1QTmQRnmOaJBIgZJS1hNqMXUVCfCzZXUppsIpWQ9IMfriLmSKoXF2eJzflHmfScsJJRyvEMxX93uFLg_P-6bDBCgQ_RRQskHkp0opRcxm1nDw6X02LgZHrrYXqgHPAdY1KnoXsvLozH6mhpLBRjt1laKFH6ShSOFrj2nqEEJPDtMlWnmArvIu-2aMO88-WVzK6hqSb8eDg_UHO2XAWqaln0kL5GxKw_Ml2EQSn-M4ZcE1niyG_E3duucCOfKoAC9vlvjYn2u_mIHVvwsZcZ-ZBY9LoJFwrG2jeFLRS3x4MxiVUsDeyquzG2_IvukHIbydMhRJQcMNvJTAl5u3H-5ccuiMykjra8kMGC95fy0A4WshSG98e2UCdGt9EREnhfPFjgjHm9Tf6kHQyYUU4H6MYBZFg9-ghuV0gaGw5ushwAMvbRqvTScAJi-1.CX2BkSIIEnP71LOaMqpbsw&state=E4oyQFK313ME8NDX&code=TpFPRGX9wMSeMqPpWFODxfasEFfMLC
2response{'id_token': 'eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.RWgKSkBqwF9pYlWccSkJmdoH8esJT9InDU_N9XzsAktB1FCQgPMCDA.ywqHuTTbaX7HcAiaWAluYA.9UL7Km8q6R9qdIH3d59FR4V_OSDp-gdmGDhTGigbWwNTj_FoTg5v9Mb2CNojgiRyuIuq_c8Uebk1ofwJkIU011xlyCRzVVLwri0aXyP9vsGqM7hUzsVv4yqbSqbSeyI-RTt1eI5OVlLr7ELUZcAXpIPq-3H6esrhxVg2VcPalUN5IltlxqUXOukI2EMuXlMNtsCAr0_YLmJQamPxlaZ9w3rJUIvac_kvnXHmtErIUSp-T711gxagC-KVAUB4eFo_WS5r855NHFyf4G2Y05b_NjtyDu2fB9-xg3yuJTbcjL38NHpzd4MXU_LnjTPTZt9DsLwQ_jstIYCkKRsbUj53XrN1zJTbAhZWzp0cge6ZBTUc02eyr72Kj1ihlDPbyIZQyAXMzmt5y-70h09FQz82muJfnNJfE6nqxCmaMqzQT3mJX6OhUuf9mS9T5chIj9_RogWnbdx1QTmQRnmOaJBIgZJS1hNqMXUVCfCzZXUppsIpWQ9IMfriLmSKoXF2eJzflHmfScsJJRyvEMxX93uFLg_P-6bDBCgQ_RRQskHkp0opRcxm1nDw6X02LgZHrrYXqgHPAdY1KnoXsvLozH6mhpLBRjt1laKFH6ShSOFrj2nqEEJPDtMlWnmArvIu-2aMO88-WVzK6hqSb8eDg_UHO2XAWqaln0kL5GxKw_Ml2EQSn-M4ZcE1niyG_E3duucCOfKoAC9vlvjYn2u_mIHVvwsZcZ-ZBY9LoJFwrG2jeFLRS3x4MxiVUsDeyquzG2_IvukHIbydMhRJQcMNvJTAl5u3H-5ccuiMykjra8kMGC95fy0A4WshSG98e2UCdGt9EREnhfPFjgjHm9Tf6kHQyYUU4H6MYBZFg9-ghuV0gaGw5ushwAMvbRqvTScAJi-1.CX2BkSIIEnP71LOaMqpbsw', 'state': 'E4oyQFK313ME8NDX', 'code': 'TpFPRGX9wMSeMqPpWFODxfasEFfMLC'}
2AuthorizationResponse
{
    "code": "TpFPRGX9wMSeMqPpWFODxfasEFfMLC",
    "id_token": {
        "aud": [
            "clientID"
        ],
        "c_hash": "ttZmiFufTwfn7dTa_5dfDA",
        "exp": 1560834990,
        "iat": 1560831570,
        "iss": "https://isamfed.com:30443/test",
        "nonce": "hi9Hh1IdYFuPrePt",
        "sub": "testuser"
    },
    "state": "E4oyQFK313ME8NDX"
}
2phase<--<-- 4 --- AccessToken -->-->
2requestop_args: {'state': 'E4oyQFK313ME8NDX'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61772/authz_cb'}
2do_access_token_request
kwargs:{'request_args': {'redirect_uri': 'https://op.certification.openid.net:61772/authz_cb', 'code': 'TpFPRGX9wMSeMqPpWFODxfasEFfMLC', 'state': 'E4oyQFK313ME8NDX', 'grant_type': 'authorization_code', 'client_id': 'clientID'}, 'state': 'E4oyQFK313ME8NDX', 'authn_method': 'client_secret_basic'}
2AccessTokenRequest
{
    "code": "TpFPRGX9wMSeMqPpWFODxfasEFfMLC",
    "grant_type": "authorization_code",
    "redirect_uri": "https://op.certification.openid.net:61772/authz_cb",
    "state": "E4oyQFK313ME8NDX"
}
2request_urlhttps://isamfed.com:30443/mga/sps/oauth/oauth20/token
2request_http_args{'headers': {'Authorization': 'Basic Y2xpZW50SUQ6Y2xpZW50U2VjcmV0', 'Content-Type': 'application/x-www-form-urlencoded'}}
2requestgrant_type=authorization_code&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61772%2Fauthz_cb&code=TpFPRGX9wMSeMqPpWFODxfasEFfMLC&state=E4oyQFK313ME8NDX
3http response
url:https://isamfed.com:30443/mga/sps/oauth/oauth20/token status_code:200
3response{'access_token': 'Rsqppw86aiEz1IBPNpLL', 'refresh_token': 'FU1kphwmmFzLfLJIABVAOxWcjdcvZhYezn0h9ILc', 'scope': 'openid', 'id_token': 'eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.ypJqN6ZU-kSLO4Q_8HZT_lydkfc3A7sJTR9frbAM1k6igzv8DSSETQ.Pzm-cYO0kZUGVvPvhIVGjQ.or_w1ayLcLcilCB0GmUVJGuhMUtiY8rh6bbaOJkLQIbk7VT2z-J0g-8X3_xfDUBcomEZXfRyzyRVHgD0hCmrlU18Nd1-5dkOOBWDLPGHXQpySGxyLmk0bgQYbCLUqdmLzCwtlLVUS_a2Xt575niaHDBnPYi07KPxBE8QyWomXt53pp4TJZY1Q-GL0eMQw-81XM1UIjEnNLZCtGeqGJum9ceTcoEf4_JvlJYBEsjpm9CEDMHjA7jfxanhNKr64S1rZDyP_M-RcwLEWmYorcNemJvQ4IGrjyZggPfj_jrSI0yEBPQkB1BT8mnfCl6GYRKvDDUJCjZqSdFv_WoySMYtDlT2d4Y-7h7kScHr4NDnyJXPsNceUEfxZvGVM24Ld1DuTpOiNkyGIkKGBy3V4CTUzw6aaqTNNjxJJLhMj9LKrPT8ABBueqTDHDtbuAMrFYwAvYWRItIxRlyxTtqELPgV3qghhdMfQFsXsejNiAG70XMmmqM7wMKas16CM9b0EYrXXFPPIFFi2D46TZIhizzt_GdscRTktDYdjaKmcITwG4SSnK7K-jh2MjPoSpeLKBqgDMxSkFgdOKqc-AQ6dq8eqgGpewnLwGTLVg2FcmsQ9rbrtcRdI2i-Igk5ty2j-hUYiQcoxlqAbd05o3SzXE-20R3KEwvR-RNRY1dgNQFIn2eHGZGMXCwtamXw_wCZks03LNHTwE7EZHQMsRavHX7mGEZz9WWT5ucWOav6SmKEZfA7C9s0aF408HqsGZwPvPKQc5cEFE3oHJVpdclyfoL2hTzkZAHUwHVNKGs_zxo03JDkF2H3taASUB6pV89QoCvRUJ1df8uLW2QOAY6btzTzddbpF4aOrTa7xwNWVnRq8Cbt3daHet1wrekbxhuwXRuDs7_sKLtv1w5yE0dGwu0xDVCAyIFOna9hZMsAk3bCcnMdDNWJ8PJG-cat40TrW3mO.euzY4P0Zc67HmAUytLmAkg', 'token_type': 'bearer', 'expires_in': 3599}
3AccessTokenResponse
{
    "access_token": "Rsqppw86aiEz1IBPNpLL",
    "expires_in": 3599,
    "id_token": {
        "at_hash": "4vxzKkqPEyx6vzsSTWvjOw",
        "aud": [
            "clientID"
        ],
        "exp": 1560834992,
        "iat": 1560831572,
        "iss": "https://isamfed.com:30443/test",
        "nonce": "hi9Hh1IdYFuPrePt",
        "rt_hash": "ofgXjmuTIH2gET6aj5Awxw",
        "sub": "testuser"
    },
    "refresh_token": "FU1kphwmmFzLfLJIABVAOxWcjdcvZhYezn0h9ILc",
    "scope": "openid",
    "token_type": "bearer"
}
3jws header{'kid': '_uhPdeGrTWxobFeH0XbzjJpRrzp3CB9nknx1yFV1G-0', 'alg': 'RS256'}
3jwe header{'alg': 'A128KW', 'enc': 'A128CBC-HS256', 'cty': 'JWT'}
3phase<--<-- 5 --- Note -->-->
3phase<--<-- 6 --- Webfinger -->-->
3not expected to doWebFinger
3phase<--<-- 7 --- Discovery -->-->
3provider_config
kwargs:{'issuer': 'https://isamfed.com:30443/test'}
3http response
url:https://isamfed.com:30443/test/.well-known/openid-configuration status_code:200
3ProviderConfigurationResponse
{
    "authorization_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/authorize",
    "claims_parameter_supported": false,
    "claims_supported": [
        "realmName",
        "preferred_username",
        "given_name",
        "uid",
        "upn",
        "groupIds",
        "employee_id",
        "name",
        "tenantId",
        "mobile_number",
        "department",
        "job_title",
        "family_name",
        "email"
    ],
    "device_authorize_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/device_authorize",
    "grant_types_supported": [
        "urn:ietf:params:oauth:grant-type:jwt-bearer",
        "implicit",
        "urn:ietf:params:oauth:grant-type:saml2-bearer",
        "urn:ietf:params:oauth:grant-type:device_code",
        "client_credentials",
        "password",
        "authorization_code",
        "refresh_token"
    ],
    "id_token_encryption_alg_values_supported": [
        "A128KW"
    ],
    "id_token_encryption_enc_values_supported": [
        "A128CBC-HS256"
    ],
    "id_token_signing_alg_values_supported": [
        "RS256"
    ],
    "introspect_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/introspect",
    "issuer": "https://isamfed.com:30443/test",
    "jwks_uri": "https://isamfed.com:30443/mga/sps/jwks",
    "name": "OIDCDefinition",
    "poc": "https://isamfed.com:30443/mga/",
    "registration_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/register/OIDCDefinition",
    "request_parameter_supported": true,
    "request_uri_parameter_supported": true,
    "require_request_uri_registration": false,
    "response_modes_supported": [
        "fragment",
        "form_post"
    ],
    "response_types_supported": [
        "token",
        "id_token",
        "token id_token",
        "code",
        "code id_token",
        "code token id_token",
        "code token",
        "none"
    ],
    "revocation_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/revoke",
    "subject_types_supported": [
        "public"
    ],
    "token_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/token",
    "token_endpoint_auth_methods_supported": [
        "private_key_jwt",
        "client_secret_post",
        "client_secret_basic"
    ],
    "user_authorize_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/user_authorize",
    "userinfo_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/userinfo",
    "userinfo_signing_alg_values_supported": [
        "RS256"
    ],
    "version": "3.0"
}
3phase<--<-- 8 --- Registration -->-->
3not expected to doDynamic registration
3phase<--<-- 9 --- AsyncAuthn -->-->
3AuthorizationRequest
{
    "client_id": "clientID",
    "max_age": 1,
    "nonce": "i0N8rZTSCpejV5OG",
    "redirect_uri": "https://op.certification.openid.net:61772/authz_cb",
    "response_type": "code id_token",
    "scope": "openid",
    "state": "01nrJfHdVti5bMsC"
}
3redirect urlhttps://isamfed.com:30443/mga/sps/oauth/oauth20/authorize?state=01nrJfHdVti5bMsC&nonce=i0N8rZTSCpejV5OG&response_type=code+id_token&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61772%2Fauthz_cb&max_age=1&client_id=clientID
3redirecthttps://isamfed.com:30443/mga/sps/oauth/oauth20/authorize?state=01nrJfHdVti5bMsC&nonce=i0N8rZTSCpejV5OG&response_type=code+id_token&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61772%2Fauthz_cb&max_age=1&client_id=clientID
6http args{}
7responseURL with fragment
7responsestate=01nrJfHdVti5bMsC&code=7ncYnrlIz8liRoxBtFPBmM93qzRvDU&id_token=eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.D_SY_Sm4n3xK9Tt5nr8bIbG10QD0RHiKZn7CWgHGH0N9aN5RMgX-ww.A8vPl0w5gqOSgdjqsBuH9g.1sft1eMlCOH5kzYSSUwz74pkE7uGCbP8fUjOt1x_qyBXyq69BTTpbcQD3OOznSjFGj_Cgzqz51jSBuJKtn7QhUw0jdThmx8o0LUc8XZynzUCMy5LsrTbl0RZVNM6X-68t9QJQoobHwl-uc7qI8mtHBbmudBagj32klopFMReT1gF5FBsPEAIrFzNt2SX03jMgUDA3oRohlN-u1d-QqX0Kil1z1H06M5ulpaWDdU-tOn3er5ZH28YfVx4d_mLkMvOoam8OSdRq3jsIZsToLYpVW5n7EsjcaYYHWKKxcWAtSBw3M47764ydTqnIAPEjH17AeuBOKtxorIBWcYKDpJuUKRPB4XbADcMRZ-ExNPCn2DGxzg5Mjy-Cytz5FtWdaJrALM_w0WMQhGy7CJZczqUYSLstKPlISlXBL543Mu8PnxMAfj_0l1qURGFMSTAr4fZssm53eDcjTzNfubVWSBesmKmZi201g99wKhgHVMFryVLaQlBScqmLXUJHfUS43tOB5U2c3Z9OWARNL4kamuJbmZbBSZ-OixfFcddglZfkaSuc4O3JfOSnhxldaUGPgXSD2KQzisfkG0i6V29SBVPwmjeX3CA7mK5toZtq3kHXX4ja62kHU_JRURTS3BTWQ99XrAywAoojc2p2NbBDwteoF2-Mz-lxJTpTA_xn1KcaVMHZRgLjGjT_9sfLuUmiMEwjOsWSBEDlf3FmeDYZs8C87Dtu9nKTNYFFevnDKTePtgVC3V8g70xi7IDACbf276odQgA-Y3hlYCc0OUwSRU7TZlyS7zBqatUMnsIPQ3nKRyCAVNJGcIPyh1DBVEVIY5U2ixYmYFz2DQpD9WWq3xw_ROHjr7GXQvceDi9dT0PIw3bnc5rXQclalu3gZi3USOEGJlBbMpNEgQ_D53Kd9oMi7s97qZcWxvKfcQNdE17oV8.Xm--FMaL0HixmVksw68fJw
7response{'state': '01nrJfHdVti5bMsC', 'code': '7ncYnrlIz8liRoxBtFPBmM93qzRvDU', 'id_token': 'eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.D_SY_Sm4n3xK9Tt5nr8bIbG10QD0RHiKZn7CWgHGH0N9aN5RMgX-ww.A8vPl0w5gqOSgdjqsBuH9g.1sft1eMlCOH5kzYSSUwz74pkE7uGCbP8fUjOt1x_qyBXyq69BTTpbcQD3OOznSjFGj_Cgzqz51jSBuJKtn7QhUw0jdThmx8o0LUc8XZynzUCMy5LsrTbl0RZVNM6X-68t9QJQoobHwl-uc7qI8mtHBbmudBagj32klopFMReT1gF5FBsPEAIrFzNt2SX03jMgUDA3oRohlN-u1d-QqX0Kil1z1H06M5ulpaWDdU-tOn3er5ZH28YfVx4d_mLkMvOoam8OSdRq3jsIZsToLYpVW5n7EsjcaYYHWKKxcWAtSBw3M47764ydTqnIAPEjH17AeuBOKtxorIBWcYKDpJuUKRPB4XbADcMRZ-ExNPCn2DGxzg5Mjy-Cytz5FtWdaJrALM_w0WMQhGy7CJZczqUYSLstKPlISlXBL543Mu8PnxMAfj_0l1qURGFMSTAr4fZssm53eDcjTzNfubVWSBesmKmZi201g99wKhgHVMFryVLaQlBScqmLXUJHfUS43tOB5U2c3Z9OWARNL4kamuJbmZbBSZ-OixfFcddglZfkaSuc4O3JfOSnhxldaUGPgXSD2KQzisfkG0i6V29SBVPwmjeX3CA7mK5toZtq3kHXX4ja62kHU_JRURTS3BTWQ99XrAywAoojc2p2NbBDwteoF2-Mz-lxJTpTA_xn1KcaVMHZRgLjGjT_9sfLuUmiMEwjOsWSBEDlf3FmeDYZs8C87Dtu9nKTNYFFevnDKTePtgVC3V8g70xi7IDACbf276odQgA-Y3hlYCc0OUwSRU7TZlyS7zBqatUMnsIPQ3nKRyCAVNJGcIPyh1DBVEVIY5U2ixYmYFz2DQpD9WWq3xw_ROHjr7GXQvceDi9dT0PIw3bnc5rXQclalu3gZi3USOEGJlBbMpNEgQ_D53Kd9oMi7s97qZcWxvKfcQNdE17oV8.Xm--FMaL0HixmVksw68fJw'}
7AuthorizationResponse
{
    "code": "7ncYnrlIz8liRoxBtFPBmM93qzRvDU",
    "id_token": {
        "aud": [
            "clientID"
        ],
        "auth_time": 1560831575,
        "c_hash": "p0C9eOw-3dvV8I1QAhyGrA",
        "exp": 1560834995,
        "iat": 1560831575,
        "iss": "https://isamfed.com:30443/test",
        "nonce": "i0N8rZTSCpejV5OG",
        "sub": "testuser"
    },
    "state": "01nrJfHdVti5bMsC"
}
7phase<--<-- 10 --- AccessToken -->-->
7requestop_args: {'state': '01nrJfHdVti5bMsC'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61772/authz_cb'}
7do_access_token_request
kwargs:{'request_args': {'redirect_uri': 'https://op.certification.openid.net:61772/authz_cb', 'code': '7ncYnrlIz8liRoxBtFPBmM93qzRvDU', 'state': '01nrJfHdVti5bMsC', 'grant_type': 'authorization_code', 'client_id': 'clientID'}, 'state': '01nrJfHdVti5bMsC', 'authn_method': 'client_secret_basic'}
7AccessTokenRequest
{
    "code": "7ncYnrlIz8liRoxBtFPBmM93qzRvDU",
    "grant_type": "authorization_code",
    "redirect_uri": "https://op.certification.openid.net:61772/authz_cb",
    "state": "01nrJfHdVti5bMsC"
}
7request_urlhttps://isamfed.com:30443/mga/sps/oauth/oauth20/token
7request_http_args{'headers': {'Authorization': 'Basic Y2xpZW50SUQ6Y2xpZW50U2VjcmV0', 'Content-Type': 'application/x-www-form-urlencoded'}}
7requestgrant_type=authorization_code&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61772%2Fauthz_cb&code=7ncYnrlIz8liRoxBtFPBmM93qzRvDU&state=01nrJfHdVti5bMsC
7http response
url:https://isamfed.com:30443/mga/sps/oauth/oauth20/token status_code:200
7response{'access_token': 'E9M1uhBbuBo2XeswQ8VJ', 'refresh_token': 'DMlTc6BzZPo0XpsbGssD3HuKOR4lYjXgwW33sDbg', 'scope': 'openid', 'id_token': 'eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0._N6f57r-_tQDqq3GoDVmEhAHcvbXgYVfSGndCso0yCnoDPbspg59qQ.fAf2ZpBGCY0tRqZqiymzyw.sgKR538GYjfuaC4Mqw1GGwuOb6Ck5BO7JaxowoujJcaPyzBO6K9sIefLvPAgePkqG7E3OIrcsRzGyb0AjIJ0FOIVxv64cOWtsuP5xHXQHS_-mSygff-sROZGfzF2gjVU9mogC8PRW_1KhxBlFIq32CVrKAM4AWN0A05n4Pqg7WpkI0UneFGgNEMngUlfAThLHxl9xtHiIMBjW3-BZzmmG9LMkOvbPnPteGBe0nA6yObNrOA88Pfi-0SPdNobdQhJE72YcIYjH3a2ayp3l7BYxreJNbf7LY0Rn4uMUF_Plo8LuuE8nt76JV6XC0mE9en5QEB9Y4vrewOT1i4QEB6IkvDuUEp-XQsQ6h3yrsD9u09WdXpXLsvZr4jXLY-d0w61lgm79s1XKSjA4IexDRp4Wxvc51JPF4tGqUJuu2zyHquk2ca82mFPaTtPrIymWkEubJHbYFeQYFKYOAJpA43vIs23WLXVmWztmb6fTI19JbmmRSjZ3dSootQcU79_2fv9yAwEQGg4RBC6rHAAJZU_ddWllgtmaLkcqcg3OlPUwfEJAUjgA3Dz7Z93zL0v2tTOcv4n5iz_IGtpywLCC2A5lv6XBTwEKnO8qJj9WW3z14p7KhAAxMssXnR2JTVL30FW6KUmd8Q9GM-9IQLdMfdshS0cSlPZtqO5UTqrpuTogIvkSxk5dxFUTLaaAAjku-Zp_ndvyOv5lpJCUp9U3cKClNyR17XPOk4G05rOaAUhzQzi1GogsJgbFcS5579j7xjPYbP5QjgfN0-0YXNkwXmp0voM3ctmCwDKfm6EtS-4aCaNF-gtod9rHRGowzUmH4wFv4rHX0aDjP8CbXuIh2QR_qR94DLUmopEoE6o4Cu97KFTOFhpJKa0YOu_DzT1RwOZn2IYbTPqLq2ZLpN7-8k3PVQO2at3yS3GlDI-W_YGE2pfoo680gpTwqvXgybs6o-K-_L699Guk9Uiyzqlqc4wnaIZwcv3uACmQubbZZ7DsuY.RD9sNuNgSB1wyXos83lw_g', 'token_type': 'bearer', 'expires_in': 3599}
7AccessTokenResponse
{
    "access_token": "E9M1uhBbuBo2XeswQ8VJ",
    "expires_in": 3599,
    "id_token": {
        "at_hash": "q_JT43M_Ke7bQEsNo2Bbtg",
        "aud": [
            "clientID"
        ],
        "auth_time": 1560831577,
        "exp": 1560834996,
        "iat": 1560831576,
        "iss": "https://isamfed.com:30443/test",
        "nonce": "i0N8rZTSCpejV5OG",
        "rt_hash": "N-71YVyBZx68C8ekoBnTuQ",
        "sub": "testuser"
    },
    "refresh_token": "DMlTc6BzZPo0XpsbGssD3HuKOR4lYjXgwW33sDbg",
    "scope": "openid",
    "token_type": "bearer"
}
7jws header{'kid': '_uhPdeGrTWxobFeH0XbzjJpRrzp3CB9nknx1yFV1G-0', 'alg': 'RS256'}
7jwe header{'alg': 'A128KW', 'enc': 'A128CBC-HS256', 'cty': 'JWT'}
7phase<--<-- 11 --- Done -->-->
7end
7assertionClaimsCheck
7conditionclaims-check: status=OK [Checks if specific claims is present or not]
7assertionAuthTimeCheck
7conditionauth_time-check: status=OK [Check that the auth_time returned in the ID Token is in the expected range.]
7assertionMultipleSignOn
7conditionmultiple-sign-on: status=OK [Verifies that multiple authentications was used in the flow]
7assertionVerifyResponse
7conditionverify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
7conditionDone: status=OK

Result

PASSED