Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-09-01 12:12:30 INFO
TEST-RUNNER
Test instance UnUpaJH01qQiwtW created
baseUrl
https://www.certification.openid.net/test/UnUpaJH01qQiwtW
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "client_registration": "dynamic_client",
  "response_mode": "default"
}
alias

                                
description
test suite runner for openid-client
planId
7n4X1Ncvmepka
config
{
  "description": "test suite runner for openid-client",
  "waitTimeoutSeconds": 2
}
testName
oidcc-client-test-signing-key-rotation
2020-09-01 12:12:30 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/UnUpaJH01qQiwtW/",
  "authorization_endpoint": "https://www.certification.openid.net/test/UnUpaJH01qQiwtW/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/UnUpaJH01qQiwtW/token",
  "jwks_uri": "https://www.certification.openid.net/test/UnUpaJH01qQiwtW/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/UnUpaJH01qQiwtW/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/UnUpaJH01qQiwtW/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:12:30
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/UnUpaJH01qQiwtW/",
  "authorization_endpoint": "https://www.certification.openid.net/test/UnUpaJH01qQiwtW/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/UnUpaJH01qQiwtW/token",
  "jwks_uri": "https://www.certification.openid.net/test/UnUpaJH01qQiwtW/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/UnUpaJH01qQiwtW/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/UnUpaJH01qQiwtW/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:12:31
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "6I80ihrNBvk7UwktpODMAsFM9Da7ieVB_bZUW_OxCH9Z_KovjNiDAbdgQ6toCXU05sxbtMbOI1F8pEhGfdfVWZs2-5zEuiyhc2_gjG4SFRSvJsi-MDATL-SKmZFHdWu1sYfBZcBcO6Cf4rShAfgxCF2SVOX0FuZ-nVeAgUiFZxM",
      "kty": "RSA",
      "q": "pqr7zI_JTzwW0XQnxG7SHODTf3hRoJ9V7q6eN7gwdo4Jh-3LYeUDB6xPj2SnRMZ8zEAfAUAOYSItmDaCS2u03eixLlX_Z2e39n_JsABAb3gnKXOz9Qil7wQo0V_dnj8XbpAZnLR94rKI5jHd5F35bI9BRShU_-T4GjaYkbz-QwU",
      "d": "Ru-wapKr8QD2I2GKEBwiIJmx1kOre7Vu28LcfPu5ErbRBjpNKNtyMTpnwS4y3GmUU1X7LoiZbXJII3POGd04lmlaqk4qaxLzCRxY5yH0KzB-S7-b3PH1vHkNCbEcbcHjpLkUfHZF_I_bEqgIls4XzT3NYhXyw8MH48b-5tUOz6kvORtnxlcTYY7QpAjQ7s4cDdzAwWlzP47EhYxIpvUmGTqq5nWow2VmyI0yNB5xvG4cCA3xW6Dw3w_jcJHs_b6cMQVDegoUggBGlASFKosrTptFHuoVw3F3LR8Vjgywt2gXxqFdh5JcAw3vuEA6COG2gvVBrg2eGu2Dr97-af7tyQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "f8bdd258-716c-4193-9c7c-c0eade912c75",
      "qi": "u3Zi096Rn4MPs-y-z9lRZTZ1dEDdXC-i5TSGuDEjBD6MPkNSh6zhrMOFFTTtkMF-rWQPNc32Sp9i_Hwh76a8--V1VMLT-XAG7NSSKVCxJkERkJmpxYwhWLs4UxXHmbFdQQj8emCfQs_Jr969-k2CUQdttcBPsJPTaxaPDHVvUG0",
      "dp": "HcS-__KgTgU3L9Db8-AGnU-rDxO2e9dJ1DUzpTWTcrgCh9ItFgVc96pGe0MEpTlIlUaRcpmEJ4c1wj2yMEeher_gkOKnWAGAhStL_g3U6LfmF7vYhIiS3C2QBEpRcFliP6BWBDVUWRmdfcKLXZoshJqdsZph3VCR4ogh3eqvkNs",
      "dq": "Q9ub14a3ZN5HQBI12sFwJLfZBK49NdOJzjskSfVhLfPYp5JG2129pRMf9Xb6r4LM7vAwb3bgI-YhgDa5R_HbWvpRoVb8POK6wM74lAMWOQxHjZYBMAPMY4ti_xQ0DCkN5kMfWnEWTAV6vZaSDFfCpNOStJCeQu27ohiWd8fmEe0",
      "n": "l2gv6K5W48TMGj5TZ4s6cWdlUvpjBskz9de7f6Oa-JIJKcXqoe8iQ5aF-oe__ZGzyX4biM6AIS4xsE-EuGrwdt_NNKha2s0ze-WjIjcrzlCI-Al30kr5wkbDiPW0TblTwRvQuR0Gt_SGUeHt1NntmiWfoqYa2BIKC4NT_3dQSXEhMVK0T1mL4aX37MZzGrNVLyki4yuWIP61JR1h-4SgXQaS2gimQ4Pv6O9ewA84lHPuch7T9FrXcT7BMnvC92H64fCfRDXmTRzY7zt1YD5F97xfnKC9jwaHxf6Rgw0r6cWoFRBLl3WsnUuKoT6plTPuaj6Eg7hnLiRfo-5SjW78Xw"
    },
    {
      "kty": "EC",
      "d": "3DgBNcWpDw9rFPOopH8e4oLVuuxRbjDM3CTdhfopXQM",
      "use": "sig",
      "crv": "P-256",
      "kid": "20064e03-eafb-441b-8052-5af3941d05c3",
      "x": "64XH5_E37uyYBoyYOQHEu3s-18xtJpCjX0zYAx7CMFw",
      "y": "bpngyZMDxPXByGV5z6OW4VIwsgAQ7Zp8m0MKsXjF_20"
    },
    {
      "kty": "EC",
      "d": "XYbHTh00GxzhXikJpoI3IPjJ1ZBaZ7bxZdHjwYWT56s",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "743ea733-3efc-456e-9b55-b0c0fef91b1b",
      "x": "A8SsibIbzB3ShpayW_s8PFGYR5WpUbcxVnThiYFCfNY",
      "y": "uzUMb4908pM9wJ-PQBxjWkUuTrziI_HnWxDCKe0HnZo"
    },
    {
      "kty": "OKP",
      "d": "4t3Ot2zow0Bxr3Cd-IC_dWPZwYx2radrcbqg7W43bTc",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "88f96469-70e2-4aeb-989b-70b26869f8b1",
      "x": "QAPZ0pnM928oSjNDbdR5OXFPFBNuxXD40FeRJ6UDaWU"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "7F9QBCnafHUP3GfRiBbTSliZJLiwzVuPRNh4KNOJ_iCCMKo8J83oMagFNDsopwTo9UaMnZ6Kf5VGzb7jwzPi_2IeSXvGLZXRFHDrRI44VQ021ulwu23qfJxk8jTyVESe5x7PGj0F9EfG_n75ja1jVXpklgdV605w1H99L-c_mZs",
      "kty": "RSA",
      "q": "qx11ay2JDFQRB7HgqIqTotxp_iIfERklZt9yeDYlV__EgPuxtSAQFr7iLq6aWdanieupe_31gYj5Y-GsYEqPGv5_pk57cRRkyp8iQE5W9uNtu4lbB_hOj0Y_iUw85cVTwvfM0RX0ZlbfgOJEOfwH4QVLv6FdouiF987IAsHZmVM",
      "d": "ePkguAHN-Wwe1b-8UpcBnrC_55dtrMfet5mOdXxfZG0KEV9Rz_Z-LZgD_N2tSe1e82KYlYQdgYqLuuKMDqUu83FwROPQgm2ffUgBWO2GeyOkjin4SHl9RY005Yed9AX1xAhJTBRiFheTbcafCGic6tfoscOY1wxgbVagLyTJw5s_KwVwDo1i9jCAGW6gnY3dY_RfszRkOi2-Xvv7H0dRajr1cVuD3cl2tpuqJPBxPpkBG5bqOKZnHdRDmN3stehKkYCr6k5gmZnOk1nw-2NY_lfcN3f1Csu8w2LmSlaX_yqPg79yzt8U3TyOPWRnhcXm90csYLGlPbE8D3D0zHxFUQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "82d7786e-7028-4538-b996-8cf72306e073",
      "qi": "xpSN_yShXgjvVbbi71OMc5BfNg_avjNMBFu-8Us5RBsLIkvJ0O_HBgqJ-KcMdRbM_diYT4-6H3c2t5SyTO72rlPDLNXW4jwoE1cI3tZL98QlNlyHTqs_fon_XvV6o4y1B1EZMlS6bBR7eq-eDjntOVnHAgi6IQIbU0fSMbS-AN4",
      "dp": "ArdBoxqcAQwTR5QFy0t_1_3WnJ5moaVoqwDVuJpdnobfGBIMqORrw45LqQL4_5pF1vOdj_4PV1Huw1RrJ4YEGK0W7f83ErUC9vopKdt8eDWzqJp8ChtEM3RUkJfdJOy46qzm8kU7OUhN2AS7d05Dsuq6FyM0cISxNS_Vz2QXzfs",
      "alg": "RSA-OAEP",
      "dq": "YC16pfc-JLPLrquIPrNFMDD7UmATXiToJN5LFM46Ry_3XxgZVljjMiWwM9Tn5L8GBDt1U7_2kgxPQJjDrou5y85oKS3LrE9uJ4UyVzqxHqvOLa6Sf_RNE7LEW4OCZxN2dQubD5preGozzdlfx8elFhFH9jnYy4wuYI7VVNdoWwk",
      "n": "nf7dqV3hUzVIZDrICWdr4KrrAN_Dnj17eizibRElXlI7DGTTFOCgK91mCYSXnlkPAK5qHVPoHMYC2APKS8vUIQ-B633qXC_soOxh39_WFp8MB1a9ge_9YhDouuf1Xcm6TSrmvRM75-NQ8HC1nPxVZglyJG1Z_GTtlObTe2IEaOvfeQo4fREPDvoxBcCbgBx6aMB3WyYvi05LQqws5oQ4kJ20q4FJO9PcFZ3IqcewBcGX7pBTmr-Mk97xjnMmJVsbd9Xwf8OFr-qIA6sufMsmpT68cQ_xsgRF2xciiddjc-QrRgIWX5QTOAh8sjUh2XFRdjsolIzQOfn4U3qqC89wQQ"
    },
    {
      "kty": "EC",
      "d": "ah6IhXJ8BfJL7aXJNwnVOo4v18luk4QLcYqL5rtn5yE",
      "use": "enc",
      "crv": "P-256",
      "kid": "9a861092-22f0-4310-b7ca-9f6517ad14bb",
      "x": "4Hs_dflEccaiukBcFfZsM-RLIJGi91Fcof8aFBNaTnE",
      "y": "RytHlDnZpNOUTyjZBRU_QvFzo99tHZRiA5oRgGm4ohQ",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "f8bdd258-716c-4193-9c7c-c0eade912c75",
      "n": "l2gv6K5W48TMGj5TZ4s6cWdlUvpjBskz9de7f6Oa-JIJKcXqoe8iQ5aF-oe__ZGzyX4biM6AIS4xsE-EuGrwdt_NNKha2s0ze-WjIjcrzlCI-Al30kr5wkbDiPW0TblTwRvQuR0Gt_SGUeHt1NntmiWfoqYa2BIKC4NT_3dQSXEhMVK0T1mL4aX37MZzGrNVLyki4yuWIP61JR1h-4SgXQaS2gimQ4Pv6O9ewA84lHPuch7T9FrXcT7BMnvC92H64fCfRDXmTRzY7zt1YD5F97xfnKC9jwaHxf6Rgw0r6cWoFRBLl3WsnUuKoT6plTPuaj6Eg7hnLiRfo-5SjW78Xw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "4cad480a-b015-4ff2-b5c3-01e3a325fe7e",
      "n": "gAa3gTuEyZcor2aI8DFg_GGRY6rZPqyQSlf1EcFsbk0Y8hP_kvh6eGqm0VohoU3UhEnTLUbaj9dxTWpUN7xfRwo1NAXG0DGP3cRu-Nyhf0TbQ5gbClmc6pVwcNCvwm322mYGTYcwydmS6RLO_Bc112I1dh-6-ePrlIOl4TwycRugfrcyilZ_lFNfBs3BCgsQl6uas7VvaVM8teFlLY-UgKraY52czLWRX0oBgUn-MBQ75eEAIUwUkaCYNYbdbKRrCh-50Yv3DAx6D64nvybThUXSUpGqtPu9dr93oKofCHe_YSCsizZ6OY80QArMgM4sgPeXsI0VvtCB5T2wOLngxQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "20064e03-eafb-441b-8052-5af3941d05c3",
      "x": "64XH5_E37uyYBoyYOQHEu3s-18xtJpCjX0zYAx7CMFw",
      "y": "bpngyZMDxPXByGV5z6OW4VIwsgAQ7Zp8m0MKsXjF_20"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "410fb7e1-7017-4fd1-a1f4-2202a0e5b4cf",
      "x": "0O3K9K_KKDH5Q0c3Kh9iAeVYhbaZOJ3lwSzUY70zoNc",
      "y": "0lHS2L_yfHLz8aAhnEQ04I-7fnVz2CwiDrQsBnNnDWo"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "743ea733-3efc-456e-9b55-b0c0fef91b1b",
      "x": "A8SsibIbzB3ShpayW_s8PFGYR5WpUbcxVnThiYFCfNY",
      "y": "uzUMb4908pM9wJ-PQBxjWkUuTrziI_HnWxDCKe0HnZo"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "88f96469-70e2-4aeb-989b-70b26869f8b1",
      "x": "QAPZ0pnM928oSjNDbdR5OXFPFBNuxXD40FeRJ6UDaWU"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "82d7786e-7028-4538-b996-8cf72306e073",
      "alg": "RSA-OAEP",
      "n": "nf7dqV3hUzVIZDrICWdr4KrrAN_Dnj17eizibRElXlI7DGTTFOCgK91mCYSXnlkPAK5qHVPoHMYC2APKS8vUIQ-B633qXC_soOxh39_WFp8MB1a9ge_9YhDouuf1Xcm6TSrmvRM75-NQ8HC1nPxVZglyJG1Z_GTtlObTe2IEaOvfeQo4fREPDvoxBcCbgBx6aMB3WyYvi05LQqws5oQ4kJ20q4FJO9PcFZ3IqcewBcGX7pBTmr-Mk97xjnMmJVsbd9Xwf8OFr-qIA6sufMsmpT68cQ_xsgRF2xciiddjc-QrRgIWX5QTOAh8sjUh2XFRdjsolIzQOfn4U3qqC89wQQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "9a861092-22f0-4310-b7ca-9f6517ad14bb",
      "x": "4Hs_dflEccaiukBcFfZsM-RLIJGi91Fcof8aFBNaTnE",
      "y": "RytHlDnZpNOUTyjZBRU_QvFzo99tHZRiA5oRgGm4ohQ",
      "alg": "ECDH-ES"
    }
  ]
}
2020-09-01 12:12:31 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-09-01 12:12:31 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-09-01 12:12:31 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": "1580000000"
}
2020-09-01 12:12:31 SUCCESS
GetDynamicClientConfiguration
No client details on configuration, created an empty dynamic_client_registration_template object.
2020-09-01 12:12:31
oidcc-client-test-signing-key-rotation
Setup Done
2020-09-01 12:12:34 INCOMING
oidcc-client-test-signing-key-rotation
Incoming HTTP request to test instance UnUpaJH01qQiwtW
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2020-09-01 12:12:34 OUTGOING
oidcc-client-test-signing-key-rotation
Response to HTTP request to test instance UnUpaJH01qQiwtW
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/UnUpaJH01qQiwtW/",
  "authorization_endpoint": "https://www.certification.openid.net/test/UnUpaJH01qQiwtW/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/UnUpaJH01qQiwtW/token",
  "jwks_uri": "https://www.certification.openid.net/test/UnUpaJH01qQiwtW/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/UnUpaJH01qQiwtW/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/UnUpaJH01qQiwtW/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2020-09-01 12:12:34 INCOMING
oidcc-client-test-signing-key-rotation
Incoming HTTP request to test instance UnUpaJH01qQiwtW
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "161",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
incoming_query_string_params
{}
incoming_body
{"token_endpoint_auth_method":"client_secret_basic","response_types":["code"],"grant_types":["authorization_code"],"redirect_uris":["https://rp.example.com/cb"]}
Registration endpoint
2020-09-01 12:12:34 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
2020-09-01 12:12:34 INFO
EnsureRegistrationRequestContainsAtLeastOneContact
This application requires that registration requests contain at least one contact.
2020-09-01 12:12:34 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2020-09-01 12:12:34 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://rp.example.com/cb"
]
2020-09-01 12:12:34 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2020-09-01 12:12:34 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2020-09-01 12:12:34 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2020-09-01 12:12:34 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2020-09-01 12:12:34 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2020-09-01 12:12:34 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2020-09-01 12:12:34 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2020-09-01 12:12:34 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:12:34 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2020-09-01 12:12:34 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2020-09-01 12:12:34 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2020-09-01 12:12:34 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2020-09-01 12:12:34 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2020-09-01 12:12:34 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2020-09-01 12:12:34 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2020-09-01 12:12:34 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2020-09-01 12:12:34 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2020-09-01 12:12:34 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2020-09-01 12:12:34 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_yvPZWHyoLxJBRUD99702|\u0026,\u003c?"
}
2020-09-01 12:12:34
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_RGOxRSWqcwYydxOrtIonMhxBcxLWjrhQRUiMiiWrrHdlKtdTMX3562701466 ,@~!
2020-09-01 12:12:34 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2020-09-01 12:12:34 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_yvPZWHyoLxJBRUD99702|\u0026,\u003c?",
  "client_secret": "secret_RGOxRSWqcwYydxOrtIonMhxBcxLWjrhQRUiMiiWrrHdlKtdTMX3562701466 ,@~!"
}
2020-09-01 12:12:34 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2020-09-01 12:12:34 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2020-09-01 12:12:34
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2020-09-01 12:12:34 OUTGOING
oidcc-client-test-signing-key-rotation
Response to HTTP request to test instance UnUpaJH01qQiwtW
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_yvPZWHyoLxJBRUD99702|\u0026,\u003c?",
  "client_secret": "secret_RGOxRSWqcwYydxOrtIonMhxBcxLWjrhQRUiMiiWrrHdlKtdTMX3562701466 ,@~!",
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2020-09-01 12:12:35 INCOMING
oidcc-client-test-signing-key-rotation
Incoming HTTP request to test instance UnUpaJH01qQiwtW
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "got/9.6.0 (https://github.com/sindresorhus/got)",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "client_yvPZWHyoLxJBRUD99702|\u0026,\u003c?",
  "scope": "openid",
  "response_type": "code",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "YVHSqZ1PYuz4lnhS9oiBUNqp48kAXzM7dWYRG69aV1A"
}
incoming_body
Authorization endpoint
2020-09-01 12:12:35 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2020-09-01 12:12:35 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid"
]
expected
openid
2020-09-01 12:12:35 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "client_yvPZWHyoLxJBRUD99702|\u0026,\u003c?",
  "scope": "openid",
  "response_type": "code",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "YVHSqZ1PYuz4lnhS9oiBUNqp48kAXzM7dWYRG69aV1A"
}
2020-09-01 12:12:35 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid
2020-09-01 12:12:35 INFO
ExtractNonceFromAuthorizationRequest
Couldn't find 'nonce' in authorization endpoint parameters
2020-09-01 12:12:35 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2020-09-01 12:12:35 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_yvPZWHyoLxJBRUD99702|&,<?
2020-09-01 12:12:35 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://rp.example.com/cb
expected
[
  "https://rp.example.com/cb"
]
2020-09-01 12:12:35 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid"
]
expected
openid
2020-09-01 12:12:35 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2020-09-01 12:12:35 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
XP3fd3LF17
2020-09-01 12:12:35 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
TzefDEhyGkGTcQVhouxRgw
2020-09-01 12:12:35 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "YVHSqZ1PYuz4lnhS9oiBUNqp48kAXzM7dWYRG69aV1A"
}
2020-09-01 12:12:35 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "YVHSqZ1PYuz4lnhS9oiBUNqp48kAXzM7dWYRG69aV1A",
  "code": "XP3fd3LF17"
}
2020-09-01 12:12:35
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
https://rp.example.com/cb?state=YVHSqZ1PYuz4lnhS9oiBUNqp48kAXzM7dWYRG69aV1A&code=XP3fd3LF17
2020-09-01 12:12:35 OUTGOING
oidcc-client-test-signing-key-rotation
Response to HTTP request to test instance UnUpaJH01qQiwtW
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [https://rp.example.com/cb?state=YVHSqZ1PYuz4lnhS9oiBUNqp48kAXzM7dWYRG69aV1A&code=XP3fd3LF17]
outgoing_path
authorize
2020-09-01 12:12:36 INCOMING
oidcc-client-test-signing-key-rotation
Incoming HTTP request to test instance UnUpaJH01qQiwtW
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "authorization": "Basic Y2xpZW50X3l2UFpXSHlvTHhKQlJVRDk5NzAyJTdDJTI2JTJDJTNDJTNGOnNlY3JldF9SR094UlNXcWN3WXlkeE9ydElvbk1oeEJjeExXanJoUVJVaU1paVdyckhkbEt0ZFRNWDM1NjI3MDE0NjYrJTJDJTQwfiE\u003d",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/x-www-form-urlencoded",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "92",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "grant_type": "authorization_code",
  "code": "XP3fd3LF17",
  "redirect_uri": "https://rp.example.com/cb"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
grant_type=authorization_code&code=XP3fd3LF17&redirect_uri=https%3A%2F%2Frp.example.com%2Fcb
Token endpoint
2020-09-01 12:12:36 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
client_yvPZWHyoLxJBRUD99702|&,<?
client_secret
secret_RGOxRSWqcwYydxOrtIonMhxBcxLWjrhQRUiMiiWrrHdlKtdTMX3562701466 ,@~!
method
client_secret_basic
2020-09-01 12:12:36 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2020-09-01 12:12:36 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
XP3fd3LF17
2020-09-01 12:12:36 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://rp.example.com/cb
2020-09-01 12:12:36 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
z05KHD2UEXIq0dHYxajvtzugo5ssmjUayTPSmxLKpWOM84QcUe
2020-09-01 12:12:36 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
3_BmQHB-qvVwfhi1HhfS2w
2020-09-01 12:12:36 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/UnUpaJH01qQiwtW/
sub
user-subject-1234531
aud
client_yvPZWHyoLxJBRUD99702|&,<?
iat
1598962356
exp
1598962656
2020-09-01 12:12:36 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
3_BmQHB-qvVwfhi1HhfS2w
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/UnUpaJH01qQiwtW/",
  "sub": "user-subject-1234531",
  "aud": "client_yvPZWHyoLxJBRUD99702|\u0026,\u003c?",
  "iat": 1598962356,
  "exp": 1598962656,
  "at_hash": "3_BmQHB-qvVwfhi1HhfS2w"
}
2020-09-01 12:12:36 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiJmOGJkZDI1OC03MTZjLTQxOTMtOWM3Yy1jMGVhZGU5MTJjNzUiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiM19CbVFIQi1xdlZ3ZmhpMUhoZlMydyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X3l2UFpXSHlvTHhKQlJVRDk5NzAyfCYsPD8iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvVW5VcGFKSDAxcVFpd3RXXC8iLCJleHAiOjE1OTg5NjI2NTYsImlhdCI6MTU5ODk2MjM1Nn0.aKuhSJUZxNYxYHbjOIb0HwuNWX-33f9gzGBLxy7gQgIOUyEJA_WcwIPWoL8jmLc446eCxyDmZC01DYXaMLBaZZqj26i5drksmE4g_SeYIgooyMqwXFQSQ721CiaWRfhpfRMYl232JXnvMhZDpmrWbZnmIo5bZodGrAulSjlv-JsKaRY38bxbySFPD8bNyZqBUjybNTFy5I4vYNPiUW1P6nVhOYs-on76y9YzrDOA77AWHGDulLnUXgQ13Md7LX9uU7FZ-ayxjiO-yLgoV0Kt05UFyoUgNz1HcWqfYm4mbA4k6tFFhbulJFK0Bm1nRvE0oCkiGnfkpTkiB2yj8ic9Tg
key
{"p":"6I80ihrNBvk7UwktpODMAsFM9Da7ieVB_bZUW_OxCH9Z_KovjNiDAbdgQ6toCXU05sxbtMbOI1F8pEhGfdfVWZs2-5zEuiyhc2_gjG4SFRSvJsi-MDATL-SKmZFHdWu1sYfBZcBcO6Cf4rShAfgxCF2SVOX0FuZ-nVeAgUiFZxM","kty":"RSA","q":"pqr7zI_JTzwW0XQnxG7SHODTf3hRoJ9V7q6eN7gwdo4Jh-3LYeUDB6xPj2SnRMZ8zEAfAUAOYSItmDaCS2u03eixLlX_Z2e39n_JsABAb3gnKXOz9Qil7wQo0V_dnj8XbpAZnLR94rKI5jHd5F35bI9BRShU_-T4GjaYkbz-QwU","d":"Ru-wapKr8QD2I2GKEBwiIJmx1kOre7Vu28LcfPu5ErbRBjpNKNtyMTpnwS4y3GmUU1X7LoiZbXJII3POGd04lmlaqk4qaxLzCRxY5yH0KzB-S7-b3PH1vHkNCbEcbcHjpLkUfHZF_I_bEqgIls4XzT3NYhXyw8MH48b-5tUOz6kvORtnxlcTYY7QpAjQ7s4cDdzAwWlzP47EhYxIpvUmGTqq5nWow2VmyI0yNB5xvG4cCA3xW6Dw3w_jcJHs_b6cMQVDegoUggBGlASFKosrTptFHuoVw3F3LR8Vjgywt2gXxqFdh5JcAw3vuEA6COG2gvVBrg2eGu2Dr97-af7tyQ","e":"AQAB","use":"sig","kid":"f8bdd258-716c-4193-9c7c-c0eade912c75","qi":"u3Zi096Rn4MPs-y-z9lRZTZ1dEDdXC-i5TSGuDEjBD6MPkNSh6zhrMOFFTTtkMF-rWQPNc32Sp9i_Hwh76a8--V1VMLT-XAG7NSSKVCxJkERkJmpxYwhWLs4UxXHmbFdQQj8emCfQs_Jr969-k2CUQdttcBPsJPTaxaPDHVvUG0","dp":"HcS-__KgTgU3L9Db8-AGnU-rDxO2e9dJ1DUzpTWTcrgCh9ItFgVc96pGe0MEpTlIlUaRcpmEJ4c1wj2yMEeher_gkOKnWAGAhStL_g3U6LfmF7vYhIiS3C2QBEpRcFliP6BWBDVUWRmdfcKLXZoshJqdsZph3VCR4ogh3eqvkNs","dq":"Q9ub14a3ZN5HQBI12sFwJLfZBK49NdOJzjskSfVhLfPYp5JG2129pRMf9Xb6r4LM7vAwb3bgI-YhgDa5R_HbWvpRoVb8POK6wM74lAMWOQxHjZYBMAPMY4ti_xQ0DCkN5kMfWnEWTAV6vZaSDFfCpNOStJCeQu27ohiWd8fmEe0","n":"l2gv6K5W48TMGj5TZ4s6cWdlUvpjBskz9de7f6Oa-JIJKcXqoe8iQ5aF-oe__ZGzyX4biM6AIS4xsE-EuGrwdt_NNKha2s0ze-WjIjcrzlCI-Al30kr5wkbDiPW0TblTwRvQuR0Gt_SGUeHt1NntmiWfoqYa2BIKC4NT_3dQSXEhMVK0T1mL4aX37MZzGrNVLyki4yuWIP61JR1h-4SgXQaS2gimQ4Pv6O9ewA84lHPuch7T9FrXcT7BMnvC92H64fCfRDXmTRzY7zt1YD5F97xfnKC9jwaHxf6Rgw0r6cWoFRBLl3WsnUuKoT6plTPuaj6Eg7hnLiRfo-5SjW78Xw"}
algorithm
RS256
2020-09-01 12:12:36 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-09-01 12:12:36 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
z05KHD2UEXIq0dHYxajvtzugo5ssmjUayTPSmxLKpWOM84QcUe
token_type
Bearer
id_token
eyJraWQiOiJmOGJkZDI1OC03MTZjLTQxOTMtOWM3Yy1jMGVhZGU5MTJjNzUiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiM19CbVFIQi1xdlZ3ZmhpMUhoZlMydyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X3l2UFpXSHlvTHhKQlJVRDk5NzAyfCYsPD8iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvVW5VcGFKSDAxcVFpd3RXXC8iLCJleHAiOjE1OTg5NjI2NTYsImlhdCI6MTU5ODk2MjM1Nn0.aKuhSJUZxNYxYHbjOIb0HwuNWX-33f9gzGBLxy7gQgIOUyEJA_WcwIPWoL8jmLc446eCxyDmZC01DYXaMLBaZZqj26i5drksmE4g_SeYIgooyMqwXFQSQ721CiaWRfhpfRMYl232JXnvMhZDpmrWbZnmIo5bZodGrAulSjlv-JsKaRY38bxbySFPD8bNyZqBUjybNTFy5I4vYNPiUW1P6nVhOYs-on76y9YzrDOA77AWHGDulLnUXgQ13Md7LX9uU7FZ-ayxjiO-yLgoV0Kt05UFyoUgNz1HcWqfYm4mbA4k6tFFhbulJFK0Bm1nRvE0oCkiGnfkpTkiB2yj8ic9Tg
scope
openid
2020-09-01 12:12:36 OUTGOING
oidcc-client-test-signing-key-rotation
Response to HTTP request to test instance UnUpaJH01qQiwtW
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "z05KHD2UEXIq0dHYxajvtzugo5ssmjUayTPSmxLKpWOM84QcUe",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiJmOGJkZDI1OC03MTZjLTQxOTMtOWM3Yy1jMGVhZGU5MTJjNzUiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiM19CbVFIQi1xdlZ3ZmhpMUhoZlMydyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X3l2UFpXSHlvTHhKQlJVRDk5NzAyfCYsPD8iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvVW5VcGFKSDAxcVFpd3RXXC8iLCJleHAiOjE1OTg5NjI2NTYsImlhdCI6MTU5ODk2MjM1Nn0.aKuhSJUZxNYxYHbjOIb0HwuNWX-33f9gzGBLxy7gQgIOUyEJA_WcwIPWoL8jmLc446eCxyDmZC01DYXaMLBaZZqj26i5drksmE4g_SeYIgooyMqwXFQSQ721CiaWRfhpfRMYl232JXnvMhZDpmrWbZnmIo5bZodGrAulSjlv-JsKaRY38bxbySFPD8bNyZqBUjybNTFy5I4vYNPiUW1P6nVhOYs-on76y9YzrDOA77AWHGDulLnUXgQ13Md7LX9uU7FZ-ayxjiO-yLgoV0Kt05UFyoUgNz1HcWqfYm4mbA4k6tFFhbulJFK0Bm1nRvE0oCkiGnfkpTkiB2yj8ic9Tg",
  "scope": "openid"
}
outgoing_path
token
2020-09-01 12:12:36 INCOMING
oidcc-client-test-signing-key-rotation
Incoming HTTP request to test instance UnUpaJH01qQiwtW
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2020-09-01 12:12:36 OUTGOING
oidcc-client-test-signing-key-rotation
Response to HTTP request to test instance UnUpaJH01qQiwtW
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "f8bdd258-716c-4193-9c7c-c0eade912c75",
      "n": "l2gv6K5W48TMGj5TZ4s6cWdlUvpjBskz9de7f6Oa-JIJKcXqoe8iQ5aF-oe__ZGzyX4biM6AIS4xsE-EuGrwdt_NNKha2s0ze-WjIjcrzlCI-Al30kr5wkbDiPW0TblTwRvQuR0Gt_SGUeHt1NntmiWfoqYa2BIKC4NT_3dQSXEhMVK0T1mL4aX37MZzGrNVLyki4yuWIP61JR1h-4SgXQaS2gimQ4Pv6O9ewA84lHPuch7T9FrXcT7BMnvC92H64fCfRDXmTRzY7zt1YD5F97xfnKC9jwaHxf6Rgw0r6cWoFRBLl3WsnUuKoT6plTPuaj6Eg7hnLiRfo-5SjW78Xw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "4cad480a-b015-4ff2-b5c3-01e3a325fe7e",
      "n": "gAa3gTuEyZcor2aI8DFg_GGRY6rZPqyQSlf1EcFsbk0Y8hP_kvh6eGqm0VohoU3UhEnTLUbaj9dxTWpUN7xfRwo1NAXG0DGP3cRu-Nyhf0TbQ5gbClmc6pVwcNCvwm322mYGTYcwydmS6RLO_Bc112I1dh-6-ePrlIOl4TwycRugfrcyilZ_lFNfBs3BCgsQl6uas7VvaVM8teFlLY-UgKraY52czLWRX0oBgUn-MBQ75eEAIUwUkaCYNYbdbKRrCh-50Yv3DAx6D64nvybThUXSUpGqtPu9dr93oKofCHe_YSCsizZ6OY80QArMgM4sgPeXsI0VvtCB5T2wOLngxQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "20064e03-eafb-441b-8052-5af3941d05c3",
      "x": "64XH5_E37uyYBoyYOQHEu3s-18xtJpCjX0zYAx7CMFw",
      "y": "bpngyZMDxPXByGV5z6OW4VIwsgAQ7Zp8m0MKsXjF_20"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "410fb7e1-7017-4fd1-a1f4-2202a0e5b4cf",
      "x": "0O3K9K_KKDH5Q0c3Kh9iAeVYhbaZOJ3lwSzUY70zoNc",
      "y": "0lHS2L_yfHLz8aAhnEQ04I-7fnVz2CwiDrQsBnNnDWo"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "743ea733-3efc-456e-9b55-b0c0fef91b1b",
      "x": "A8SsibIbzB3ShpayW_s8PFGYR5WpUbcxVnThiYFCfNY",
      "y": "uzUMb4908pM9wJ-PQBxjWkUuTrziI_HnWxDCKe0HnZo"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "88f96469-70e2-4aeb-989b-70b26869f8b1",
      "x": "QAPZ0pnM928oSjNDbdR5OXFPFBNuxXD40FeRJ6UDaWU"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "82d7786e-7028-4538-b996-8cf72306e073",
      "alg": "RSA-OAEP",
      "n": "nf7dqV3hUzVIZDrICWdr4KrrAN_Dnj17eizibRElXlI7DGTTFOCgK91mCYSXnlkPAK5qHVPoHMYC2APKS8vUIQ-B633qXC_soOxh39_WFp8MB1a9ge_9YhDouuf1Xcm6TSrmvRM75-NQ8HC1nPxVZglyJG1Z_GTtlObTe2IEaOvfeQo4fREPDvoxBcCbgBx6aMB3WyYvi05LQqws5oQ4kJ20q4FJO9PcFZ3IqcewBcGX7pBTmr-Mk97xjnMmJVsbd9Xwf8OFr-qIA6sufMsmpT68cQ_xsgRF2xciiddjc-QrRgIWX5QTOAh8sjUh2XFRdjsolIzQOfn4U3qqC89wQQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "9a861092-22f0-4310-b7ca-9f6517ad14bb",
      "x": "4Hs_dflEccaiukBcFfZsM-RLIJGi91Fcof8aFBNaTnE",
      "y": "RytHlDnZpNOUTyjZBRU_QvFzo99tHZRiA5oRgGm4ohQ",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2020-09-01 12:12:37 INCOMING
oidcc-client-test-signing-key-rotation
Incoming HTTP request to test instance UnUpaJH01qQiwtW
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "authorization": "Bearer z05KHD2UEXIq0dHYxajvtzugo5ssmjUayTPSmxLKpWOM84QcUe",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
userinfo
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Userinfo endpoint
2020-09-01 12:12:37 SUCCESS
OIDCCExtractBearerAccessTokenFromRequest
Found access token on incoming request
access_token
z05KHD2UEXIq0dHYxajvtzugo5ssmjUayTPSmxLKpWOM84QcUe
2020-09-01 12:12:37 SUCCESS
RequireBearerAccessToken
Found access token in request
actual
z05KHD2UEXIq0dHYxajvtzugo5ssmjUayTPSmxLKpWOM84QcUe
2020-09-01 12:12:37 SUCCESS
FilterUserInfoForScopes
User info endpoint output
sub
user-subject-1234531
2020-09-01 12:12:37
ClearAccessTokenFromRequest
Condition ran but did not log anything
2020-09-01 12:12:37 INFO
AddIssAndAudToUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:12:37 INFO
SignUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:12:37 INFO
EncryptUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_encrypted_response_alg
path
userinfo_encrypted_response_alg
mapped
object
client
2020-09-01 12:12:37 OUTGOING
oidcc-client-test-signing-key-rotation
Response to HTTP request to test instance UnUpaJH01qQiwtW
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "sub": "user-subject-1234531"
}
outgoing_path
userinfo
2020-09-01 12:12:37 INCOMING
oidcc-client-test-signing-key-rotation
Incoming HTTP request to test instance UnUpaJH01qQiwtW
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "got/9.6.0 (https://github.com/sindresorhus/got)",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "client_yvPZWHyoLxJBRUD99702|\u0026,\u003c?",
  "scope": "openid",
  "response_type": "code",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "C1Ch-_opcTsn1vf8ed91ic6657QCg-pdroVskE-Yso0"
}
incoming_body
2020-09-01 12:12:37
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "_TUDVIhu35ZCSjyiRysMNGCcD7JtXL1K-Tm4oEBFW7jIFB7_ovzvK7LlZuziIsSTmmWi_vZ-3WHdzAWjNe5tcrkX9XEHRdblKqdz7MaDMC3VHJPT07wHst54_hVZHl3gA6jPCQLW4VtGKshRcl-nxZe6sfjNSBhR5ec4OThPhpc",
      "kty": "RSA",
      "q": "9aYXWsjUkaRdhRbfpTIizFsy3gw5Rzd0XnptQZNYQiJzzs2YS1G9koWZqw3QAPhETZ6Gu2IJerfyaEtOW5lOGm4qK_eP_w89OEsE78iMAsgBgKblK-RreZzAtpTsEwkpky5-T4d08gcIhOUt4QBqC0oRpym4RzNcGSY_FEfWC40",
      "d": "HyFx7rCjjaljMSVI7R34h8n-bpv3tzRKPMinpoMAHLgzi8YCxDA2u_xcfxENLcWiKyKwtWsLTh7b_-vFZFcmwL4GJUg672dVL8YNhE64iQNF0hK6xdsM6Hf9aNhzWd75wZ2fWfcewaiEOuv1hH9ZuTKobz2Ym5NuQpqk0tMDvAKqvPZ0sNaAi8GwJDiky_eICBjVrEQywu3_Uc50jVW8LVXf3JczGr0nqSIE9EOBM3LpTuCmOqvHUzxBPs5Xn_FimY6ST3nA-AM1fFNsNqwMdXXL0HPDCbHttUIKhT5M6w87aeFNOh5E0mYdc1WP8jVxeJxXz3DUVM-2Wd0_BEOiaQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "97c3def2-465e-4918-806e-238d1b5ea8ed",
      "qi": "QKOZC-Uqed3sWi-mdXzTttm33mbn2-c93iPmd-ACJQ1xP3tNnt1Czcqf8zQltRbAqMFuTAq3IeBhJ3jDrnuDZOOtTXsh2wiwwut1uWVwrDofr0ydlEizFbRkwRGCbSYkszHx7YyLfNKrSFqvCpr7PaqNlaBn7PUCc7cD1R1Bcs0",
      "dp": "UKbxL5zhjBBlfxX_LqIUmh5nt0xDL3YQCoCLQWgXb5bVDCuvi6_7UrUCAx3TDfYFefmDyKilUkjZCCKHkScn75Hrgr-E7Ib9qe96qmG06cS_jAG-SEQtQ5k_etc78sM-FoxPnfQsk82p9PinkMHNQ9AHpKa2ZI9yjsNukjNQiXM",
      "dq": "ubP-I9t_Fzsyl9Ja7_-e3u5y3fpPss7xYhsbTV-ecSCqe8RhRU9eCM6HBRFEFfeZazRUloPetq8oyj9j1UtoCAMQTnywlxlmJpBQAxWRAulAeYmx5iSgOyeNaHncnednTqTvSCAXAIDgp9a5gEdX44DzJ3Qao3joPvry5NoJrmE",
      "n": "8vgDqZ32Amgb4aY_jB2PzNvRjls6LLG4_3Ks1hmgz5DKji2gCGIis0wkFEplXTlIjV1BVk0nhCqf5eVk8jS3Coquq3iFpOmrxHdOBwTvIe0fmFxXNfy7DdaIqyZzQD8JMdPSvp6dpFVr4GvQ0eZGkFZjoPE1imHMLEt380_8EWXBdJzS2AWv6xcxtIqVCYGvDCM_ukHCcnA0qwaFmMjNS-KgUviQzTQ9ZB0WYMfUgBYIFQ0x_KUQFz1VD6iBC566JognwFWsq3uLwVL7iV3ErG7nzvAah8Eca5u-03PvQao1ptGpvXf4HF465TpnJ4cmpNGDafEkRmgf9zqJ0c-eKw"
    },
    {
      "kty": "EC",
      "d": "ygEp8fpDeBaCr1idrd53WFrfyCAHDR4tzRC__jgNRFY",
      "use": "sig",
      "crv": "P-256",
      "kid": "b8edfdfc-a672-4041-9502-22deb2e3b914",
      "x": "hl2uQB3co4wNnPHhDoJ0x9wpZ0dbcOGNTEOPeYdgPHw",
      "y": "Bl4GpdDLZrXUlfHaUBz-3OIJrgM0EnBbhISHwIOnhfk"
    },
    {
      "kty": "EC",
      "d": "JvAFkgGvDqs-U5IrT80cTnSEdO3s_FbTzFJeHxgh7ks",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "740e47af-6541-418c-8128-3864b4e47f19",
      "x": "aGx5DcW8N9wujJuqn71pp5tAnFW3EHZcONlG3OpyWRc",
      "y": "5J8hX_lWEcmEIG6iY01sG_8XG6GUDPFfYdKTVyhndTw"
    },
    {
      "kty": "OKP",
      "d": "zqw9WPkAY08XSYdHQhVMHYyaKUhCduNspzIh7xVqbc4",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "2aa286ca-b153-4d49-b6e4-444883a173c4",
      "x": "WGL3My4xSS5OgQfakBirsYUH3tHHuNZQVBFlhyqSdBM"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "5xqrgb6QP-D_Q6Xqz83hYYVAtRnrwNeFRUOdBv8F3z99Rb7_YBFc9ebl2UvY_DeAo4CE3ipnnXjLiG0oiqehX_YMOXVVlfXMj2UgS1AWmawKmUrQupjqVHw50kRin25HJumO_LHbh_A4b4Ivzm21aeTED_Jvh0gyTLFaTdY0Ss0",
      "kty": "RSA",
      "q": "5g-1FrZRb6e0Vxc3a90m9D9NgJo5uYaolPVG5ImWNL7l3jTQvidd5PziAhBBlD45_Zwm2rd0KZIhy2_u6_k8oetIWGkfGQSJ-s4gyZneB6Qe-ZGLUWrp9LNpylYSt8wFerWR247kAEK_3NXVBmOdUYxTPZHHsFd3iUAxyzPw2uE",
      "d": "dMmy90w3DTC-lQb02gXFhs4nJfSijzF_ivoWbr2zgK57oa_M2hXSK_0L36gpmtS1BkUCOdWDK2yB8nnQj43Bi_cWcRswI9IfE0PKwsdSx4TQ_0XkEwqzsD6rdhkoEetmQGKvMPm7cNx3znQKlzc1z-POYJic5z864Ixyhb8nrKo53KhgEwejaVMQEiZg1rzqTbKwtT86UnGwb9LmDAFlDzguuXmhhcaBo9XwigNoMEG0mheQycSZq3E2EIqHhSavpUo2GYoQtxPgNdPXzK2rM0ttIR6aboOhY4bovxBwJskMoL651R5RPx4Q-Fs81v3GQD78f24cCP8J0S3sq7QsgQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "26ecba89-5883-487d-865b-92cdcffa2d75",
      "qi": "ZS5MZKQrX8KkIBoSBvk240RWnqL6sczRluquWjMa4r4yQYzr5W6dYRHRjpW3wYi1FhcWjfj4eZyxd4UdIpMdq6x1ee4vbDiODwvxC5jp4FNxQ4Omr-ns7wh8joV5uVQfY7PrSBIn0jfpvUOd7oRzVj6cPzMy0z8jVpUkwI55_FA",
      "dp": "gN9seION6TFM56pkUNFcN4eZV-RGhVkp5kAYFsiru5yp_PTPcAD-t9m0nwIe1DcXMxX-Ae3frf6ocUF99CQaZ2rL0lbODTvugKBB6_2TPMqldmo0D3oqYkaL7-dWn9VdNCPWKq_73chlkDkm85RWL-D0PHhTHTtzYTUdSH6E1pk",
      "alg": "RSA-OAEP",
      "dq": "WUe1Nggw2EzTvoyC9HgReu3qDMNNLYNlftEk3uHKCdQfbrk-XNz4IjpFFxnp6Taw2Iu1xGE3Uj6koMdih-7kKc4d-DlrWREa3tsJfFMbCAoX_zANSd5cxpqtrljy0KL7aWB3JyZvsu40eOX-0ojr706uqxEc1oFLIVdpO3t_t-E",
      "n": "z7AkIPnztuS4LanHa6P_SBTvvSxJocOSBqqE3WZ70T_1cUXdZ9IEDjF43gnqHInYfrf2C2eEW8Zv0WavBSK7uILHKHJugx_Qd7jo1lsw2Mi66uG-TmrtBZEP5FtuZQM3qTPsGlHf4ig5l9Co6Aa0He_Ukrsw9wv_XAB-YuNsycZe5U2EvsNDU-zcQoRU62Ps1oTnfg90XSMgTWC_gYU16vWkYJHyW29V3AEuoJpeIxCSF5uiG2Dcp1Hzj_Yu3JhFFKSuA7fSx_5pUDbxstvrp43O07A-F90Jrp-ej-TckxriHJPyEnGYOkz4TQRcPdpWOyx-rgt9_-TfdHBNwthQLQ"
    },
    {
      "kty": "EC",
      "d": "zBAvI8rf0e85tRCK8Ey6voofI_aVyvWgEMSELaqRyAQ",
      "use": "enc",
      "crv": "P-256",
      "kid": "38c0794d-4c44-4331-9a05-cb4a9b188993",
      "x": "dWprIumt1lNGVSPplrneUO92Ua1RtF6mCHpzAr2y2qY",
      "y": "7yC2NRyMltHtO-vvwfHR5mOrjSmAkkcb6nL0hJxCluY",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "97c3def2-465e-4918-806e-238d1b5ea8ed",
      "n": "8vgDqZ32Amgb4aY_jB2PzNvRjls6LLG4_3Ks1hmgz5DKji2gCGIis0wkFEplXTlIjV1BVk0nhCqf5eVk8jS3Coquq3iFpOmrxHdOBwTvIe0fmFxXNfy7DdaIqyZzQD8JMdPSvp6dpFVr4GvQ0eZGkFZjoPE1imHMLEt380_8EWXBdJzS2AWv6xcxtIqVCYGvDCM_ukHCcnA0qwaFmMjNS-KgUviQzTQ9ZB0WYMfUgBYIFQ0x_KUQFz1VD6iBC566JognwFWsq3uLwVL7iV3ErG7nzvAah8Eca5u-03PvQao1ptGpvXf4HF465TpnJ4cmpNGDafEkRmgf9zqJ0c-eKw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "e6544643-2a19-459d-bb6d-9312937fdffc",
      "n": "vVlGUaDRAEapMC3evqXd6PQSRTh3rByRcSZFgC5QScj9dSC6jl4XII8sw4GZLBjkcjWVwSVY5V57y6TIWEj9Y30u4QsS-s9nRrOx6co2161zZ2hnK8Wdr40mB_8J9kKYI7YTVCTkUeyP5Jg1rnzacI1m8-zKgJnyHxlJ9XDQVCrQoYSAq6Xj_YBsc2qZOqhwPv4tOZDvMcAJ1KdC_uH1hgWMdcE0dyhw718dqbezVl5q4Jq_OXyTmUILOYImqGH64PEaKDFmFEVBQWJzmHcgYxrLi-Aag5Mbdl3ZXQDbYjVQGX4faGrj7e3Yicub8hoTVVlWPJ6YAeMY8u9WftnWlw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "b8edfdfc-a672-4041-9502-22deb2e3b914",
      "x": "hl2uQB3co4wNnPHhDoJ0x9wpZ0dbcOGNTEOPeYdgPHw",
      "y": "Bl4GpdDLZrXUlfHaUBz-3OIJrgM0EnBbhISHwIOnhfk"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "c952bcce-928b-47c0-a0cc-92687e287b18",
      "x": "RT4f25GN0kiTHVK-L6KrvzDv0Dj8W5gHaFcTIONM25M",
      "y": "m7asCi2eDDAasMOa_je2aV-m8MPdmf6Nedt3GIKpSY4"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "740e47af-6541-418c-8128-3864b4e47f19",
      "x": "aGx5DcW8N9wujJuqn71pp5tAnFW3EHZcONlG3OpyWRc",
      "y": "5J8hX_lWEcmEIG6iY01sG_8XG6GUDPFfYdKTVyhndTw"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "2aa286ca-b153-4d49-b6e4-444883a173c4",
      "x": "WGL3My4xSS5OgQfakBirsYUH3tHHuNZQVBFlhyqSdBM"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "26ecba89-5883-487d-865b-92cdcffa2d75",
      "alg": "RSA-OAEP",
      "n": "z7AkIPnztuS4LanHa6P_SBTvvSxJocOSBqqE3WZ70T_1cUXdZ9IEDjF43gnqHInYfrf2C2eEW8Zv0WavBSK7uILHKHJugx_Qd7jo1lsw2Mi66uG-TmrtBZEP5FtuZQM3qTPsGlHf4ig5l9Co6Aa0He_Ukrsw9wv_XAB-YuNsycZe5U2EvsNDU-zcQoRU62Ps1oTnfg90XSMgTWC_gYU16vWkYJHyW29V3AEuoJpeIxCSF5uiG2Dcp1Hzj_Yu3JhFFKSuA7fSx_5pUDbxstvrp43O07A-F90Jrp-ej-TckxriHJPyEnGYOkz4TQRcPdpWOyx-rgt9_-TfdHBNwthQLQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "38c0794d-4c44-4331-9a05-cb4a9b188993",
      "x": "dWprIumt1lNGVSPplrneUO92Ua1RtF6mCHpzAr2y2qY",
      "y": "7yC2NRyMltHtO-vvwfHR5mOrjSmAkkcb6nL0hJxCluY",
      "alg": "ECDH-ES"
    }
  ]
}
Second Authorization Request
2020-09-01 12:12:37 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2020-09-01 12:12:37 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid"
]
expected
openid
2020-09-01 12:12:37 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "client_yvPZWHyoLxJBRUD99702|\u0026,\u003c?",
  "scope": "openid",
  "response_type": "code",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "C1Ch-_opcTsn1vf8ed91ic6657QCg-pdroVskE-Yso0"
}
2020-09-01 12:12:37 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid
2020-09-01 12:12:37 INFO
ExtractNonceFromAuthorizationRequest
Couldn't find 'nonce' in authorization endpoint parameters
2020-09-01 12:12:37 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2020-09-01 12:12:37 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_yvPZWHyoLxJBRUD99702|&,<?
2020-09-01 12:12:37 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://rp.example.com/cb
expected
[
  "https://rp.example.com/cb"
]
2020-09-01 12:12:37 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid"
]
expected
openid
2020-09-01 12:12:37 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2020-09-01 12:12:37 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
rHDQTaIAeL
2020-09-01 12:12:37 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
6V_J_Qj7BloCnDjFi5j57w
2020-09-01 12:12:37 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "C1Ch-_opcTsn1vf8ed91ic6657QCg-pdroVskE-Yso0"
}
2020-09-01 12:12:37 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "C1Ch-_opcTsn1vf8ed91ic6657QCg-pdroVskE-Yso0",
  "code": "rHDQTaIAeL"
}
2020-09-01 12:12:37
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
https://rp.example.com/cb?state=C1Ch-_opcTsn1vf8ed91ic6657QCg-pdroVskE-Yso0&code=rHDQTaIAeL
2020-09-01 12:12:37 OUTGOING
oidcc-client-test-signing-key-rotation
Response to HTTP request to test instance UnUpaJH01qQiwtW
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [https://rp.example.com/cb?state=C1Ch-_opcTsn1vf8ed91ic6657QCg-pdroVskE-Yso0&code=rHDQTaIAeL]
outgoing_path
authorize
2020-09-01 12:12:38 INCOMING
oidcc-client-test-signing-key-rotation
Incoming HTTP request to test instance UnUpaJH01qQiwtW
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "authorization": "Basic Y2xpZW50X3l2UFpXSHlvTHhKQlJVRDk5NzAyJTdDJTI2JTJDJTNDJTNGOnNlY3JldF9SR094UlNXcWN3WXlkeE9ydElvbk1oeEJjeExXanJoUVJVaU1paVdyckhkbEt0ZFRNWDM1NjI3MDE0NjYrJTJDJTQwfiE\u003d",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/x-www-form-urlencoded",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "92",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "grant_type": "authorization_code",
  "code": "rHDQTaIAeL",
  "redirect_uri": "https://rp.example.com/cb"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
grant_type=authorization_code&code=rHDQTaIAeL&redirect_uri=https%3A%2F%2Frp.example.com%2Fcb
Token endpoint
2020-09-01 12:12:38 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
client_yvPZWHyoLxJBRUD99702|&,<?
client_secret
secret_RGOxRSWqcwYydxOrtIonMhxBcxLWjrhQRUiMiiWrrHdlKtdTMX3562701466 ,@~!
method
client_secret_basic
2020-09-01 12:12:38 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2020-09-01 12:12:38 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
rHDQTaIAeL
2020-09-01 12:12:38 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://rp.example.com/cb
2020-09-01 12:12:38 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
sficYt6qbi0Rkh57nkWjsDRSeDRHbmDICgDfGrWa62LDe7QhxF
2020-09-01 12:12:38 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
Ed3SOWjfo-PNGb0PoQECjQ
2020-09-01 12:12:38 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/UnUpaJH01qQiwtW/
sub
user-subject-1234531
aud
client_yvPZWHyoLxJBRUD99702|&,<?
iat
1598962358
exp
1598962658
2020-09-01 12:12:38 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
Ed3SOWjfo-PNGb0PoQECjQ
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/UnUpaJH01qQiwtW/",
  "sub": "user-subject-1234531",
  "aud": "client_yvPZWHyoLxJBRUD99702|\u0026,\u003c?",
  "iat": 1598962358,
  "exp": 1598962658,
  "at_hash": "Ed3SOWjfo-PNGb0PoQECjQ"
}
2020-09-01 12:12:38 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiI5N2MzZGVmMi00NjVlLTQ5MTgtODA2ZS0yMzhkMWI1ZWE4ZWQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiRWQzU09XamZvLVBOR2IwUG9RRUNqUSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X3l2UFpXSHlvTHhKQlJVRDk5NzAyfCYsPD8iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvVW5VcGFKSDAxcVFpd3RXXC8iLCJleHAiOjE1OTg5NjI2NTgsImlhdCI6MTU5ODk2MjM1OH0.Rht-PaWtmqwmGXVR1sAug6bWtFRlbQsWwbh_E4NCKmTxzSLALxo98vwB8PRk2-BUh7bjC8M0tO_Ka0BhDzcc3XLCewucXZaEyyDIZnoU5tAk2xeYjo1gDpYkCBl9RiMlfOPjACR8qtzDfT75BvUmE3T8xkdDu_rLPZBGsPpEJWw9ayn9uwxKP85M_01N207KRrFJmJhBSF1wAwJIDjPnecpfIBured2uWA2TIW4mkhk_e3ebHcCO0x7pjvwAnkvVJWOnGacRYIrZfakBTyCYGL4tnCrlqwJtrzC1R3p5g5bFRK-2THmdEFhJHogjE0mJTj5ITbsE4GdcAmpkxg-LvA
key
{"p":"_TUDVIhu35ZCSjyiRysMNGCcD7JtXL1K-Tm4oEBFW7jIFB7_ovzvK7LlZuziIsSTmmWi_vZ-3WHdzAWjNe5tcrkX9XEHRdblKqdz7MaDMC3VHJPT07wHst54_hVZHl3gA6jPCQLW4VtGKshRcl-nxZe6sfjNSBhR5ec4OThPhpc","kty":"RSA","q":"9aYXWsjUkaRdhRbfpTIizFsy3gw5Rzd0XnptQZNYQiJzzs2YS1G9koWZqw3QAPhETZ6Gu2IJerfyaEtOW5lOGm4qK_eP_w89OEsE78iMAsgBgKblK-RreZzAtpTsEwkpky5-T4d08gcIhOUt4QBqC0oRpym4RzNcGSY_FEfWC40","d":"HyFx7rCjjaljMSVI7R34h8n-bpv3tzRKPMinpoMAHLgzi8YCxDA2u_xcfxENLcWiKyKwtWsLTh7b_-vFZFcmwL4GJUg672dVL8YNhE64iQNF0hK6xdsM6Hf9aNhzWd75wZ2fWfcewaiEOuv1hH9ZuTKobz2Ym5NuQpqk0tMDvAKqvPZ0sNaAi8GwJDiky_eICBjVrEQywu3_Uc50jVW8LVXf3JczGr0nqSIE9EOBM3LpTuCmOqvHUzxBPs5Xn_FimY6ST3nA-AM1fFNsNqwMdXXL0HPDCbHttUIKhT5M6w87aeFNOh5E0mYdc1WP8jVxeJxXz3DUVM-2Wd0_BEOiaQ","e":"AQAB","use":"sig","kid":"97c3def2-465e-4918-806e-238d1b5ea8ed","qi":"QKOZC-Uqed3sWi-mdXzTttm33mbn2-c93iPmd-ACJQ1xP3tNnt1Czcqf8zQltRbAqMFuTAq3IeBhJ3jDrnuDZOOtTXsh2wiwwut1uWVwrDofr0ydlEizFbRkwRGCbSYkszHx7YyLfNKrSFqvCpr7PaqNlaBn7PUCc7cD1R1Bcs0","dp":"UKbxL5zhjBBlfxX_LqIUmh5nt0xDL3YQCoCLQWgXb5bVDCuvi6_7UrUCAx3TDfYFefmDyKilUkjZCCKHkScn75Hrgr-E7Ib9qe96qmG06cS_jAG-SEQtQ5k_etc78sM-FoxPnfQsk82p9PinkMHNQ9AHpKa2ZI9yjsNukjNQiXM","dq":"ubP-I9t_Fzsyl9Ja7_-e3u5y3fpPss7xYhsbTV-ecSCqe8RhRU9eCM6HBRFEFfeZazRUloPetq8oyj9j1UtoCAMQTnywlxlmJpBQAxWRAulAeYmx5iSgOyeNaHncnednTqTvSCAXAIDgp9a5gEdX44DzJ3Qao3joPvry5NoJrmE","n":"8vgDqZ32Amgb4aY_jB2PzNvRjls6LLG4_3Ks1hmgz5DKji2gCGIis0wkFEplXTlIjV1BVk0nhCqf5eVk8jS3Coquq3iFpOmrxHdOBwTvIe0fmFxXNfy7DdaIqyZzQD8JMdPSvp6dpFVr4GvQ0eZGkFZjoPE1imHMLEt380_8EWXBdJzS2AWv6xcxtIqVCYGvDCM_ukHCcnA0qwaFmMjNS-KgUviQzTQ9ZB0WYMfUgBYIFQ0x_KUQFz1VD6iBC566JognwFWsq3uLwVL7iV3ErG7nzvAah8Eca5u-03PvQao1ptGpvXf4HF465TpnJ4cmpNGDafEkRmgf9zqJ0c-eKw"}
algorithm
RS256
2020-09-01 12:12:38 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-09-01 12:12:38 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
sficYt6qbi0Rkh57nkWjsDRSeDRHbmDICgDfGrWa62LDe7QhxF
token_type
Bearer
id_token
eyJraWQiOiI5N2MzZGVmMi00NjVlLTQ5MTgtODA2ZS0yMzhkMWI1ZWE4ZWQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiRWQzU09XamZvLVBOR2IwUG9RRUNqUSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X3l2UFpXSHlvTHhKQlJVRDk5NzAyfCYsPD8iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvVW5VcGFKSDAxcVFpd3RXXC8iLCJleHAiOjE1OTg5NjI2NTgsImlhdCI6MTU5ODk2MjM1OH0.Rht-PaWtmqwmGXVR1sAug6bWtFRlbQsWwbh_E4NCKmTxzSLALxo98vwB8PRk2-BUh7bjC8M0tO_Ka0BhDzcc3XLCewucXZaEyyDIZnoU5tAk2xeYjo1gDpYkCBl9RiMlfOPjACR8qtzDfT75BvUmE3T8xkdDu_rLPZBGsPpEJWw9ayn9uwxKP85M_01N207KRrFJmJhBSF1wAwJIDjPnecpfIBured2uWA2TIW4mkhk_e3ebHcCO0x7pjvwAnkvVJWOnGacRYIrZfakBTyCYGL4tnCrlqwJtrzC1R3p5g5bFRK-2THmdEFhJHogjE0mJTj5ITbsE4GdcAmpkxg-LvA
scope
openid
2020-09-01 12:12:38 OUTGOING
oidcc-client-test-signing-key-rotation
Response to HTTP request to test instance UnUpaJH01qQiwtW
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "sficYt6qbi0Rkh57nkWjsDRSeDRHbmDICgDfGrWa62LDe7QhxF",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiI5N2MzZGVmMi00NjVlLTQ5MTgtODA2ZS0yMzhkMWI1ZWE4ZWQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiRWQzU09XamZvLVBOR2IwUG9RRUNqUSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X3l2UFpXSHlvTHhKQlJVRDk5NzAyfCYsPD8iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvVW5VcGFKSDAxcVFpd3RXXC8iLCJleHAiOjE1OTg5NjI2NTgsImlhdCI6MTU5ODk2MjM1OH0.Rht-PaWtmqwmGXVR1sAug6bWtFRlbQsWwbh_E4NCKmTxzSLALxo98vwB8PRk2-BUh7bjC8M0tO_Ka0BhDzcc3XLCewucXZaEyyDIZnoU5tAk2xeYjo1gDpYkCBl9RiMlfOPjACR8qtzDfT75BvUmE3T8xkdDu_rLPZBGsPpEJWw9ayn9uwxKP85M_01N207KRrFJmJhBSF1wAwJIDjPnecpfIBured2uWA2TIW4mkhk_e3ebHcCO0x7pjvwAnkvVJWOnGacRYIrZfakBTyCYGL4tnCrlqwJtrzC1R3p5g5bFRK-2THmdEFhJHogjE0mJTj5ITbsE4GdcAmpkxg-LvA",
  "scope": "openid"
}
outgoing_path
token
2020-09-01 12:12:38 INCOMING
oidcc-client-test-signing-key-rotation
Incoming HTTP request to test instance UnUpaJH01qQiwtW
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2020-09-01 12:12:38 OUTGOING
oidcc-client-test-signing-key-rotation
Response to HTTP request to test instance UnUpaJH01qQiwtW
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "97c3def2-465e-4918-806e-238d1b5ea8ed",
      "n": "8vgDqZ32Amgb4aY_jB2PzNvRjls6LLG4_3Ks1hmgz5DKji2gCGIis0wkFEplXTlIjV1BVk0nhCqf5eVk8jS3Coquq3iFpOmrxHdOBwTvIe0fmFxXNfy7DdaIqyZzQD8JMdPSvp6dpFVr4GvQ0eZGkFZjoPE1imHMLEt380_8EWXBdJzS2AWv6xcxtIqVCYGvDCM_ukHCcnA0qwaFmMjNS-KgUviQzTQ9ZB0WYMfUgBYIFQ0x_KUQFz1VD6iBC566JognwFWsq3uLwVL7iV3ErG7nzvAah8Eca5u-03PvQao1ptGpvXf4HF465TpnJ4cmpNGDafEkRmgf9zqJ0c-eKw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "e6544643-2a19-459d-bb6d-9312937fdffc",
      "n": "vVlGUaDRAEapMC3evqXd6PQSRTh3rByRcSZFgC5QScj9dSC6jl4XII8sw4GZLBjkcjWVwSVY5V57y6TIWEj9Y30u4QsS-s9nRrOx6co2161zZ2hnK8Wdr40mB_8J9kKYI7YTVCTkUeyP5Jg1rnzacI1m8-zKgJnyHxlJ9XDQVCrQoYSAq6Xj_YBsc2qZOqhwPv4tOZDvMcAJ1KdC_uH1hgWMdcE0dyhw718dqbezVl5q4Jq_OXyTmUILOYImqGH64PEaKDFmFEVBQWJzmHcgYxrLi-Aag5Mbdl3ZXQDbYjVQGX4faGrj7e3Yicub8hoTVVlWPJ6YAeMY8u9WftnWlw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "b8edfdfc-a672-4041-9502-22deb2e3b914",
      "x": "hl2uQB3co4wNnPHhDoJ0x9wpZ0dbcOGNTEOPeYdgPHw",
      "y": "Bl4GpdDLZrXUlfHaUBz-3OIJrgM0EnBbhISHwIOnhfk"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "c952bcce-928b-47c0-a0cc-92687e287b18",
      "x": "RT4f25GN0kiTHVK-L6KrvzDv0Dj8W5gHaFcTIONM25M",
      "y": "m7asCi2eDDAasMOa_je2aV-m8MPdmf6Nedt3GIKpSY4"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "740e47af-6541-418c-8128-3864b4e47f19",
      "x": "aGx5DcW8N9wujJuqn71pp5tAnFW3EHZcONlG3OpyWRc",
      "y": "5J8hX_lWEcmEIG6iY01sG_8XG6GUDPFfYdKTVyhndTw"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "2aa286ca-b153-4d49-b6e4-444883a173c4",
      "x": "WGL3My4xSS5OgQfakBirsYUH3tHHuNZQVBFlhyqSdBM"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "26ecba89-5883-487d-865b-92cdcffa2d75",
      "alg": "RSA-OAEP",
      "n": "z7AkIPnztuS4LanHa6P_SBTvvSxJocOSBqqE3WZ70T_1cUXdZ9IEDjF43gnqHInYfrf2C2eEW8Zv0WavBSK7uILHKHJugx_Qd7jo1lsw2Mi66uG-TmrtBZEP5FtuZQM3qTPsGlHf4ig5l9Co6Aa0He_Ukrsw9wv_XAB-YuNsycZe5U2EvsNDU-zcQoRU62Ps1oTnfg90XSMgTWC_gYU16vWkYJHyW29V3AEuoJpeIxCSF5uiG2Dcp1Hzj_Yu3JhFFKSuA7fSx_5pUDbxstvrp43O07A-F90Jrp-ej-TckxriHJPyEnGYOkz4TQRcPdpWOyx-rgt9_-TfdHBNwthQLQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "38c0794d-4c44-4331-9a05-cb4a9b188993",
      "x": "dWprIumt1lNGVSPplrneUO92Ua1RtF6mCHpzAr2y2qY",
      "y": "7yC2NRyMltHtO-vvwfHR5mOrjSmAkkcb6nL0hJxCluY",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2020-09-01 12:12:39 INCOMING
oidcc-client-test-signing-key-rotation
Incoming HTTP request to test instance UnUpaJH01qQiwtW
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "authorization": "Bearer sficYt6qbi0Rkh57nkWjsDRSeDRHbmDICgDfGrWa62LDe7QhxF",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
userinfo
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Userinfo endpoint
2020-09-01 12:12:39 SUCCESS
OIDCCExtractBearerAccessTokenFromRequest
Found access token on incoming request
access_token
sficYt6qbi0Rkh57nkWjsDRSeDRHbmDICgDfGrWa62LDe7QhxF
2020-09-01 12:12:39 SUCCESS
RequireBearerAccessToken
Found access token in request
actual
sficYt6qbi0Rkh57nkWjsDRSeDRHbmDICgDfGrWa62LDe7QhxF
2020-09-01 12:12:39 SUCCESS
FilterUserInfoForScopes
User info endpoint output
sub
user-subject-1234531
2020-09-01 12:12:39
ClearAccessTokenFromRequest
Condition ran but did not log anything
2020-09-01 12:12:39 INFO
AddIssAndAudToUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:12:39 INFO
SignUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:12:39 INFO
EncryptUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_encrypted_response_alg
path
userinfo_encrypted_response_alg
mapped
object
client
2020-09-01 12:12:39 OUTGOING
oidcc-client-test-signing-key-rotation
Response to HTTP request to test instance UnUpaJH01qQiwtW
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "sub": "user-subject-1234531"
}
outgoing_path
userinfo
2020-09-01 12:12:39 FINISHED
oidcc-client-test-signing-key-rotation
Test has run to completion
testmodule_result
PASSED
Test Results