Test Info

Issuerhttps://isamfed.com:30443/test
Profile[]
Test IDOP-IDToken-kid
Test descriptionIDToken has kid [Basic, Implicit, Hybrid]
Timestamp2019-06-18T04:17:47Z

Conditions


verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
verify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
Done: status=OK

Trace Output

0phase<--<-- 0 --- Webfinger -->-->
0not expected to doWebFinger
0phase<--<-- 1 --- Discovery -->-->
0provider_config
kwargs:{'issuer': 'https://isamfed.com:30443/test'}
0http response
url:https://isamfed.com:30443/test/.well-known/openid-configuration status_code:200
0ProviderConfigurationResponse
{
    "authorization_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/authorize",
    "claims_parameter_supported": false,
    "claims_supported": [
        "realmName",
        "preferred_username",
        "given_name",
        "uid",
        "upn",
        "groupIds",
        "employee_id",
        "name",
        "tenantId",
        "mobile_number",
        "department",
        "job_title",
        "family_name",
        "email"
    ],
    "device_authorize_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/device_authorize",
    "grant_types_supported": [
        "urn:ietf:params:oauth:grant-type:jwt-bearer",
        "implicit",
        "urn:ietf:params:oauth:grant-type:saml2-bearer",
        "urn:ietf:params:oauth:grant-type:device_code",
        "client_credentials",
        "password",
        "authorization_code",
        "refresh_token"
    ],
    "id_token_encryption_alg_values_supported": [
        "A128KW"
    ],
    "id_token_encryption_enc_values_supported": [
        "A128CBC-HS256"
    ],
    "id_token_signing_alg_values_supported": [
        "RS256"
    ],
    "introspect_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/introspect",
    "issuer": "https://isamfed.com:30443/test",
    "jwks_uri": "https://isamfed.com:30443/mga/sps/jwks",
    "name": "OIDCDefinition",
    "poc": "https://isamfed.com:30443/mga/",
    "registration_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/register/OIDCDefinition",
    "request_parameter_supported": true,
    "request_uri_parameter_supported": true,
    "require_request_uri_registration": false,
    "response_modes_supported": [
        "fragment",
        "form_post"
    ],
    "response_types_supported": [
        "token",
        "id_token",
        "token id_token",
        "code",
        "code id_token",
        "code token id_token",
        "code token",
        "none"
    ],
    "revocation_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/revoke",
    "subject_types_supported": [
        "public"
    ],
    "token_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/token",
    "token_endpoint_auth_methods_supported": [
        "private_key_jwt",
        "client_secret_post",
        "client_secret_basic"
    ],
    "user_authorize_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/user_authorize",
    "userinfo_endpoint": "https://isamfed.com:30443/mga/sps/oauth/oauth20/userinfo",
    "userinfo_signing_alg_values_supported": [
        "RS256"
    ],
    "version": "3.0"
}
0phase<--<-- 2 --- Registration -->-->
0not expected to doDynamic registration
0phase<--<-- 3 --- AsyncAuthn -->-->
0AuthorizationRequest
{
    "client_id": "clientID",
    "nonce": "9u5eVA27LSQx3M9e",
    "redirect_uri": "https://op.certification.openid.net:61772/authz_cb",
    "response_type": "code id_token",
    "scope": "openid",
    "state": "AW5RHKksos4QjJ4e"
}
0redirect urlhttps://isamfed.com:30443/mga/sps/oauth/oauth20/authorize?state=AW5RHKksos4QjJ4e&nonce=9u5eVA27LSQx3M9e&response_type=code+id_token&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61772%2Fauthz_cb&client_id=clientID
0redirecthttps://isamfed.com:30443/mga/sps/oauth/oauth20/authorize?state=AW5RHKksos4QjJ4e&nonce=9u5eVA27LSQx3M9e&response_type=code+id_token&scope=openid&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61772%2Fauthz_cb&client_id=clientID
1http args{}
1responseURL with fragment
1responseid_token=eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.EhnTxkCLB80BT2Kr5KLTGH_NMne4Gt31mdLl_Ydmx8MUA2tXGrn3wg.ttIJ6Uwj59wrEgN4XRmyWA.9BnSByHjnNnTfpl8B4r6IY7B7PUckqvU_syc7yiDYckBPSMd3dKh4V8LzWsQqbYW09Zrr9psKv3da5apH3r9Zw832DrhN7FDKbRSli8MDEZpip-RJvGaaZisqOmWZaW9BMnaj-Zvlvy1XoPMNgMmS643Bu1jqLBbQP9aiUuIwYjKFul6s4wrraRF7nsSrw0DQmAamPXusLV8sVCMgLdOPUGsb67dQBMU-Un3NbQsawZ8SaKjUfJDarkHQc2qWVWZ5N7_aDbgvOu3wHSCcAKPWcVMbSycf3CTOhM_iApjK2LXdwkY1JYjMlvOt1eWDV-pDgZrM6NCQH0Aio0RrVJG4LarM24owxb3vooIGaAPUlWFj-rK7WFuoqXlEPpxWhBasTPK5vZAvA_GLc1LFD4ofk0O1SJbn8ivP4cuzNEOnR5WrLb8g2JNHoEO-gzRp_VSj-uvpii4tdx7sI9-NE9jWQ5R-y9vYKyBk76ScI1igYF0qraWL7B6ofFK3vPuPs7crPLO8eUoNu13rQNqTrnqshlQi79MhNg85VAOXNr_NhMnSQWdJuf26K7bYRBWtQFRJqkjDrQkiEuUl4M2d5wRhb_KzCU54vpK4ifE3SYXn56Wmw1RBIwW3BjOm6Kzaa9Ys41iPdDttVzCW4TWnv1mew6YJjHl7pTY9FMkG3OAbXKt8rs9IonaCFYjpeKNjV3OLFuT78E_ed7XFsKrQeHW631Z1w0Av1HlA0bXV77YHo3JPfSLH3VLN9RAI7LphD0QL5MAQO4TNKe5mreteb3RcHo2SfIVEEi06MF68iwbk4Zx2si6Dk5EiksZuC6WwwdaZPLGASWHvGvdSwjCvY_EGPggynniopbhUJ7mIL23VKM3t22MvwYJTdNImB0W-3oe.PqvJxc0ta4cIeq2n6cbChw&state=AW5RHKksos4QjJ4e&code=kOqSWJT1FIkgcjKBKXSoWdroY33UAR
1response{'id_token': 'eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.EhnTxkCLB80BT2Kr5KLTGH_NMne4Gt31mdLl_Ydmx8MUA2tXGrn3wg.ttIJ6Uwj59wrEgN4XRmyWA.9BnSByHjnNnTfpl8B4r6IY7B7PUckqvU_syc7yiDYckBPSMd3dKh4V8LzWsQqbYW09Zrr9psKv3da5apH3r9Zw832DrhN7FDKbRSli8MDEZpip-RJvGaaZisqOmWZaW9BMnaj-Zvlvy1XoPMNgMmS643Bu1jqLBbQP9aiUuIwYjKFul6s4wrraRF7nsSrw0DQmAamPXusLV8sVCMgLdOPUGsb67dQBMU-Un3NbQsawZ8SaKjUfJDarkHQc2qWVWZ5N7_aDbgvOu3wHSCcAKPWcVMbSycf3CTOhM_iApjK2LXdwkY1JYjMlvOt1eWDV-pDgZrM6NCQH0Aio0RrVJG4LarM24owxb3vooIGaAPUlWFj-rK7WFuoqXlEPpxWhBasTPK5vZAvA_GLc1LFD4ofk0O1SJbn8ivP4cuzNEOnR5WrLb8g2JNHoEO-gzRp_VSj-uvpii4tdx7sI9-NE9jWQ5R-y9vYKyBk76ScI1igYF0qraWL7B6ofFK3vPuPs7crPLO8eUoNu13rQNqTrnqshlQi79MhNg85VAOXNr_NhMnSQWdJuf26K7bYRBWtQFRJqkjDrQkiEuUl4M2d5wRhb_KzCU54vpK4ifE3SYXn56Wmw1RBIwW3BjOm6Kzaa9Ys41iPdDttVzCW4TWnv1mew6YJjHl7pTY9FMkG3OAbXKt8rs9IonaCFYjpeKNjV3OLFuT78E_ed7XFsKrQeHW631Z1w0Av1HlA0bXV77YHo3JPfSLH3VLN9RAI7LphD0QL5MAQO4TNKe5mreteb3RcHo2SfIVEEi06MF68iwbk4Zx2si6Dk5EiksZuC6WwwdaZPLGASWHvGvdSwjCvY_EGPggynniopbhUJ7mIL23VKM3t22MvwYJTdNImB0W-3oe.PqvJxc0ta4cIeq2n6cbChw', 'state': 'AW5RHKksos4QjJ4e', 'code': 'kOqSWJT1FIkgcjKBKXSoWdroY33UAR'}
2AuthorizationResponse
{
    "code": "kOqSWJT1FIkgcjKBKXSoWdroY33UAR",
    "id_token": {
        "aud": [
            "clientID"
        ],
        "c_hash": "bIFYyq-C9EwWKld6qT4YGQ",
        "exp": 1560834886,
        "iat": 1560831466,
        "iss": "https://isamfed.com:30443/test",
        "nonce": "9u5eVA27LSQx3M9e",
        "sub": "testuser"
    },
    "state": "AW5RHKksos4QjJ4e"
}
2phase<--<-- 4 --- AccessToken -->-->
2requestop_args: {'state': 'AW5RHKksos4QjJ4e'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:61772/authz_cb'}
2do_access_token_request
kwargs:{'request_args': {'redirect_uri': 'https://op.certification.openid.net:61772/authz_cb', 'code': 'kOqSWJT1FIkgcjKBKXSoWdroY33UAR', 'state': 'AW5RHKksos4QjJ4e', 'grant_type': 'authorization_code', 'client_id': 'clientID'}, 'state': 'AW5RHKksos4QjJ4e', 'authn_method': 'client_secret_basic'}
2AccessTokenRequest
{
    "code": "kOqSWJT1FIkgcjKBKXSoWdroY33UAR",
    "grant_type": "authorization_code",
    "redirect_uri": "https://op.certification.openid.net:61772/authz_cb",
    "state": "AW5RHKksos4QjJ4e"
}
2request_urlhttps://isamfed.com:30443/mga/sps/oauth/oauth20/token
2request_http_args{'headers': {'Authorization': 'Basic Y2xpZW50SUQ6Y2xpZW50U2VjcmV0', 'Content-Type': 'application/x-www-form-urlencoded'}}
2requestgrant_type=authorization_code&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61772%2Fauthz_cb&code=kOqSWJT1FIkgcjKBKXSoWdroY33UAR&state=AW5RHKksos4QjJ4e
2http response
url:https://isamfed.com:30443/mga/sps/oauth/oauth20/token status_code:200
2response{'access_token': 'zWDn14yV6ra3itVscdJw', 'refresh_token': 'cmrgzd3blYpiRH7vbgrCT8888sq7QMppiCuMFTsd', 'scope': 'openid', 'id_token': 'eyJhbGciOiJBMTI4S1ciLCJlbmMiOiJBMTI4Q0JDLUhTMjU2IiwiY3R5IjoiSldUIn0.1JJcIGCW15WH_QGOGiih9eHwLK3gfRNt9a5AGh-_lJm_B6U6av1pMg.L-32cmxEyVxIJfFxYMmh6g._vQd8DWCloJlnmlN8YAbIAedceMliWBsUaBWZQDxNraeyN-uNDohbYwr-jNjxeXa88neu1t8ys3a9EmtlrtdtrkGq1KvXsF-xbGaZL8KGcCvc20arIrMnhnnBZ7ceJUy1afjZSEmiqL8CN6RUUDsK5KLR7eU5EJ0rQSuFtZLDztPuJaTsE2O5pvwSs-AW1To52uSJ0c3o-tB-o4t49-hdQCbjDKBBQVJvTJKVh4gXpklFm6ka6YVQxin1hLMtEetvtRQt4slyWNem6sPLDL916l_-14A-VabHSxlqYZQCahF_idevfFIcpEZAMi0dgBwWI9ETCvI31KJlxoCxaU1WDSBYNCSi1f08kdhDgzObL46xuIjljNiyywlVTGEPiy0bl-eg62-DXXBl8P2mAGI1y-W3h2M6PEbqhOUGD7rCzs2i1v1YXHWf0xIM0n4VMbRwjKvJz_luvbjmD_9Dg23O-nynWWffSn8mzVX1Ppm3ehX5eY4uSC6UPZF63wLvjayPj_UraVLtM3ByAq8t89bJLn_6ldJ8WmafoU47kvahJXMyrJczrd-CiKUoXJqmFVLbLCF-vziEjDsjBRal2oNBmrrGN-gNpR3E_qjvsqXGXLuzDvt93bSnd0QM2CnLq-44zeppoMBFVY3IscQckjCzSx66MHSk45ohHRxcsB0jqaioNZ5j_MtyAkqDICpK0oasjqyQd2V78zITU1bU_HpjrxkmnJIPqttpmyad47IIRnjcIbgAtkV3doWqvvsrlktRwstkZibp9bLehkUHIOzyTsupgdmakG0Q5x4KoJWA990Z7LyvDoVVuzIzgq1xP_HHjlLVbHbWt_97gSkk3xuxWRCBsF8UkyGyrLbuGVlGJDIbiWuLWspoMORjyyUeCCCbapBH4Odr6x36KfGoCh-adjNxjVuovmmZ0lkv_0t6Soyy6Yw-yldUkw-Vh7A3wyX.TocTEum15V0tlUI3z_tiHA', 'token_type': 'bearer', 'expires_in': 3599}
2AccessTokenResponse
{
    "access_token": "zWDn14yV6ra3itVscdJw",
    "expires_in": 3599,
    "id_token": {
        "at_hash": "hAMCWm7PjpI8yPH_4VOFlQ",
        "aud": [
            "clientID"
        ],
        "exp": 1560834887,
        "iat": 1560831467,
        "iss": "https://isamfed.com:30443/test",
        "nonce": "9u5eVA27LSQx3M9e",
        "rt_hash": "wK5HvB-Z9i287TsbzNLy-g",
        "sub": "testuser"
    },
    "refresh_token": "cmrgzd3blYpiRH7vbgrCT8888sq7QMppiCuMFTsd",
    "scope": "openid",
    "token_type": "bearer"
}
2jws header{'kid': '_uhPdeGrTWxobFeH0XbzjJpRrzp3CB9nknx1yFV1G-0', 'alg': 'RS256'}
2jwe header{'alg': 'A128KW', 'enc': 'A128CBC-HS256', 'cty': 'JWT'}
2phase<--<-- 5 --- Done -->-->
2end
2assertionVerifyResponse
2conditionverify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
2assertionVerifySignedIdTokenHasKID
2conditionverify-signed-idtoken-has-kid: status=OK [Verifies that the header of a signed IDToken includes a kid claim.]
2conditionDone: status=OK

Result

PASSED