Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-09-01 12:12:03 INFO
TEST-RUNNER
Test instance 7wJV1p472HE1buo created
baseUrl
https://www.certification.openid.net/test/7wJV1p472HE1buo
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "client_registration": "dynamic_client",
  "response_mode": "default"
}
alias

                                
description
test suite runner for openid-client
planId
7n4X1Ncvmepka
config
{
  "description": "test suite runner for openid-client",
  "waitTimeoutSeconds": 2
}
testName
oidcc-client-test-discovery-issuer-mismatch
2020-09-01 12:12:03 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/7wJV1p472HE1buo/",
  "authorization_endpoint": "https://www.certification.openid.net/test/7wJV1p472HE1buo/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/7wJV1p472HE1buo/token",
  "jwks_uri": "https://www.certification.openid.net/test/7wJV1p472HE1buo/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/7wJV1p472HE1buo/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/7wJV1p472HE1buo/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:12:03
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/7wJV1p472HE1buo/",
  "authorization_endpoint": "https://www.certification.openid.net/test/7wJV1p472HE1buo/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/7wJV1p472HE1buo/token",
  "jwks_uri": "https://www.certification.openid.net/test/7wJV1p472HE1buo/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/7wJV1p472HE1buo/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/7wJV1p472HE1buo/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:12:04
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "8sa_j_IKWBGHh8iqzK03iYTGMWPVogqVOQ_lQpMWjK9a7NCzLOBX02oFcSu2ghWXXaBi1PPVcd5Eb-a8B3OsIJLZWzhy8ytdnavW9NLNY0L1zl-aqv2GLD6qNOW1zOTWb5LNnx0JTJ5Q47Pe1IHkAfbcjLDuXPbtiXNjNK3o8FU",
      "kty": "RSA",
      "q": "keiSrrxdHhggJxNutTCYAGdup8XXjnHV_2koLVdFBoRe5w-pTjpC2Vq_dnv_czf8cRHDEsZsQTCS9hSinIhKDhFa9xjOGLOyZamTnhXXvXwE5Z1KLhb61yKZZZCzGQJKL8PJURCq3J_xq5HQcBdnOoWMssqWGJG-CJMZQiS8VWc",
      "d": "XGwaXFZESv7FdGKxHF6VYihCOd5GBtWjhWi6A4oB7nKJlb3CJTOCestQifN0eRzkS_-zYmitJ9FyiE4iuM0LCa8n_pgH8nLAt9BWjbno8v8Y6GagIuMgTWfFq8WMpF7_hOu4Lf65rAs9zD33B_g1wUprbHgB-W474NCd0Y0UPng7W3IAjQN0p5blh3Lc0Eo2PZL8p_UY3ITGPj7SWzUYSRYEBmF5yk7MwpbPI0nWM-R3Yb-IOyiamD0s0c6GkVV77zKHTa-ZyvLtZH18bZeUA0U2d66OHMTER-DQgGRyuuRPhs_JPFbM04WsEpL0-jA7uA8iR88V9dGo8p0jyd7dEQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "b1c724b2-5f75-4940-ab0d-f6b905286332",
      "qi": "nyJ8Tyq5YgPIqlwZsDGAaTLWy6biWaDt7eRwxzY79lDsEnh6NuTakZGgX24jhZmODCqB9_6z41NzP6PGQMkfutHGKiZ54XANEMP4K4R-wt8AWCZ-VDo5xssaNGRLEmf1v-QUmbSAkss_gF56blOoPuLWCg-sAFEEIIAoMQszZmE",
      "dp": "WiaTW9B1Jt7bhQBu7DImPVqgfhakbdegMeBFMcOMzBERon6dCj0EX-0uuCeTThrWal30VT92MyJmJ2d2yw2ZDT96lvUPOl0QFkyJNcBRpFppDIlT1cru198tNRdXuw3-0s-gq0UM_vaK8wMH68GP-WrB2zyYRs0qx6-hVx59MUE",
      "dq": "TX6xKY1yB6HYsehoTGPa15wX8ZPqwQVFG7rGVA6d4rA7l42B5sKa7sZ8GnoRWyjJM2Szry0kIhuicoDTPUBF1OLy5XqPPB91CPngJX6Eb2eHUk0QMRqTb-A4iPEprobA0E20hxHLLhLlULLJej9z3GlCKVPgFHyT6gn2yGKqhNE",
      "n": "il8huTGDxI2fhdfd10Vtuohh-1kFYAma1_brkWAMTqxJ7FKffJCo4v3bC_Eo4eO_6KFoQ0FAfEE7rH3HICzv0P4-YCsUxpMW7aeKvlnAMIRhN8cQmykhs1eK3oIvDeertwh8gcb9VnQoC6vx88LWc4nYw32xSpbkSRsLvoRSFT_b_DW9l_VuWApcWuct1ZIZt6xXKZHfDZrIZE8puayF6nwKti5T5WyG51dgub2dzOWkpgA1GoLz03sJqurxCiBX9Q2KAWJmzXysyc0QMhZG556yhPPyZiB6F0Rgp3Jg9Q1iXAw9-Of-roZ9frv0uwKW0b3crS1Cw9Ee1yO2wvDrMw"
    },
    {
      "kty": "EC",
      "d": "sK2gsqQ4bcSVpqrrswboJUQelkOeQXBuxihyy860TaM",
      "use": "sig",
      "crv": "P-256",
      "kid": "2a5d1b30-b8f8-46aa-8fee-382454f6fe80",
      "x": "4t8m_Utz65O5RtB9dbqg-UqqzPe1PtUGoNW_1-STzX0",
      "y": "Zfxxs3bdooIaKJrwNVg0lNEBJ_n9h_7fLRuPclIx3cE"
    },
    {
      "kty": "EC",
      "d": "zPVazJ-fDF6oVZQz5-Ads3fmOzsxP3jIKzjeEnEIQFI",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "118db147-d111-4b06-8600-f4cb49d3779a",
      "x": "bSGDV5HwKRnrdokHZYsSwkPLOejF78G0AR6erbwIcu4",
      "y": "J9TR0KVtk61OgdHTTFSKYrCxS3PRRjKF5adwsAKIVAc"
    },
    {
      "kty": "OKP",
      "d": "i76haoTsdrwq_OrkWBKok70RXfHWlrcQLNvm1x5QvS4",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "8dbc3f0f-b135-42a6-b7d2-fc09cbfbd0eb",
      "x": "necgibixjskyFBxiXZ69hpHnX8vE9GEYV_tXSZyBPp0"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "0iRgnEnIlguRiCBULaUfsjLyNN4WT7v4N6HokfyOZKOHct0FaYd-vkL4IsC1ltRHEsXzOgfpBjesG8Sj48kDeF5Ktb49Xxcdovo4x0l5keTphSRLQW5LkdAaR7yk-Og88_1PRXSgiB1KU89MXzjEk8cHrsWU9r4lWLnhUgvfuNk",
      "kty": "RSA",
      "q": "vHHgxovBSBHxu192Q_aM9DWIno-2yp9yR-gZHYYDnjPHPWXUCZPNxFfkpksxLyW-AUNaJR8bvii9ntBPsFqPVzRIdKVt3tibGKAH0UloBVBOe1WdIgtTDBPvPVnKm-LNa4I20FoD25EU4zq-PwFy4668rmdNCXlMfr4dZwhfi-k",
      "d": "TqrGM9nYXEs3Hj0MmJMT08yLaViru-T7VDavHalwBKT7Ilqt0nvFsn62kZ7qHHOFVCoVO-NYw_AyqKqVmyLQqYGK65RIgfrL4B5D9OGnminoijzzROpRTYo0w-vamhgxd-dI_a2h732Cg6-bAsPo-UgYzaAPIFao7U9ZtJM_pY27VelCjuK0LOZ6xybQPuPSEwi-7vxsdtQzSM3OYAYCKACfBfoSSL8jvVdg5iILcQEpSPHyfYelu5GJECXXoW65HAdsKDT0sQwpmwsBi4p1Gh8pW3p56JZVPqTzgeJy2EMt-h-NNJWSHeK-p_sOiADUtcGUw8IsksbMkSA20OF_wQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "71f7b768-96dc-4950-8643-74f3e48f7157",
      "qi": "CTT_HBzoOFgJiKbZkuScmDwB8SD57cbnMq2rA8xJNyPYzynEyQjpG04hcYZ6nnhFmGd6SnhDJm0LxWi-f-xeCqCO-Vx08DZPqnkEwrNAx05FdPo2KxlYJF3tCei_dSr4-Z6ekTFx3f5CrtYrgzmsPMcVbOQ4PxAnRSxCUkVHXgs",
      "dp": "ks007Jmi1ic4wKcNB2IeVWe_ym0HmyYOThb-mNWdR_Lxka2TtVghk5rHK8gCU17yU8wTkYurH1vPEQr7DwsDMJh2iqZey0ojuxIgjh_nHKOU-x0SsZ_yjOebJFhFy1i6FBz2vuetqckEfq4HhVHsCex1koOXABRvlJ8uKBoBbWk",
      "alg": "RSA-OAEP",
      "dq": "J8Z9pErRZC3tcRhINTYwMEewa494DLK1A3p4-qNT1iulrU71_4OEFiJbL8KFQidcQJX_zAAR8gRVadUcTOQAh26QsJZOZ5AexIbav5EX9K8rsZqzjQEI6W63u6JdQqQPqdaVTUsCr3CjEQdQKqpanrY-Oy2wtAQ3YjUsrZe12yk",
      "n": "mrAxhDqPwjX2UVfSwYsVOrVvOkqu1tfQkkL9D5LZvdfzFz-7CJeIOXzc4JqSAssFwCqYHUDypxGxpSSxuIYb0rL0hojEvjzVF-GdUsZvQ_sS_wk0quYntazFYyS2JZTgn7WIKyA78323BjrvGNMKhkG4ImrhElknx5fG0nOKDoikUFEa4TFQWgtGvNv5kTKy08JIL4qwVpUDbfbFsvqcwMMOS-fyGF40CDHWwNmY38s6KmbEttisKPs2OG7hSf0mlrQiRIX5E4eArO317NVaIg6DRe3eO7hklSmaxRQRVpq9Pz7cn4phFK6IfIZJPNS7njeo5a_qZPz6WPo6qIQQgQ"
    },
    {
      "kty": "EC",
      "d": "_7YlvjCUqtuXpICAwOsEYTYsz66xshkSRIJPvUSGzJo",
      "use": "enc",
      "crv": "P-256",
      "kid": "7dc9a6fb-2403-4caa-b9ba-9be65f1ab42a",
      "x": "pBwwgm-8gX56EI5N2FsHEVkPPCrF_DFJ3qLxfC6T978",
      "y": "F0I3DPROjMOrUcIQsbo82sP_19_6nBH1wmzPuLI_srA",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "b1c724b2-5f75-4940-ab0d-f6b905286332",
      "n": "il8huTGDxI2fhdfd10Vtuohh-1kFYAma1_brkWAMTqxJ7FKffJCo4v3bC_Eo4eO_6KFoQ0FAfEE7rH3HICzv0P4-YCsUxpMW7aeKvlnAMIRhN8cQmykhs1eK3oIvDeertwh8gcb9VnQoC6vx88LWc4nYw32xSpbkSRsLvoRSFT_b_DW9l_VuWApcWuct1ZIZt6xXKZHfDZrIZE8puayF6nwKti5T5WyG51dgub2dzOWkpgA1GoLz03sJqurxCiBX9Q2KAWJmzXysyc0QMhZG556yhPPyZiB6F0Rgp3Jg9Q1iXAw9-Of-roZ9frv0uwKW0b3crS1Cw9Ee1yO2wvDrMw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "890e9f09-42ca-4304-8c32-e396badfdd6a",
      "n": "s9IVrpnGhFK_0ceMLBhDZWxLa_kx5_aV9Eewe8CFPqIbkGBx8nFhqH4jJDUMHc9iILEmK9NFN3a3_-SebGr0rqEasFEAE83hAgdqTnMk-01bUWOEa2qgM9uM3wxu5PoAKb43vW8SCBY_L3GkjlArhykd19C-0ReI7zEdAzfh9Z83HLiIaymmomXgJZcr-s20jQfe6K9ZynFvJ4KfOqVPDnWAAIVOqVqJUy-1_tmJQFLbpeNEY5ebfgkm7YVDYPr0X6_hA6rWtupF8DNadpI4UTCnxx2YaKs-SoPor2up5V_68hSFMuhuc5ia4l6YFc410HxM5XGJGvy1XJnX7nKYAw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "2a5d1b30-b8f8-46aa-8fee-382454f6fe80",
      "x": "4t8m_Utz65O5RtB9dbqg-UqqzPe1PtUGoNW_1-STzX0",
      "y": "Zfxxs3bdooIaKJrwNVg0lNEBJ_n9h_7fLRuPclIx3cE"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "6c659b73-74ac-45f9-afea-7050b49edba1",
      "x": "tLnob_4CD1t3MTFdUB_fDqWgXGDU-bwb8meErOWyU4c",
      "y": "bn-pBIdKLWsh8g5uq12XxI10ZxnUgZEIHyK_syx5VO4"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "118db147-d111-4b06-8600-f4cb49d3779a",
      "x": "bSGDV5HwKRnrdokHZYsSwkPLOejF78G0AR6erbwIcu4",
      "y": "J9TR0KVtk61OgdHTTFSKYrCxS3PRRjKF5adwsAKIVAc"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "8dbc3f0f-b135-42a6-b7d2-fc09cbfbd0eb",
      "x": "necgibixjskyFBxiXZ69hpHnX8vE9GEYV_tXSZyBPp0"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "71f7b768-96dc-4950-8643-74f3e48f7157",
      "alg": "RSA-OAEP",
      "n": "mrAxhDqPwjX2UVfSwYsVOrVvOkqu1tfQkkL9D5LZvdfzFz-7CJeIOXzc4JqSAssFwCqYHUDypxGxpSSxuIYb0rL0hojEvjzVF-GdUsZvQ_sS_wk0quYntazFYyS2JZTgn7WIKyA78323BjrvGNMKhkG4ImrhElknx5fG0nOKDoikUFEa4TFQWgtGvNv5kTKy08JIL4qwVpUDbfbFsvqcwMMOS-fyGF40CDHWwNmY38s6KmbEttisKPs2OG7hSf0mlrQiRIX5E4eArO317NVaIg6DRe3eO7hklSmaxRQRVpq9Pz7cn4phFK6IfIZJPNS7njeo5a_qZPz6WPo6qIQQgQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "7dc9a6fb-2403-4caa-b9ba-9be65f1ab42a",
      "x": "pBwwgm-8gX56EI5N2FsHEVkPPCrF_DFJ3qLxfC6T978",
      "y": "F0I3DPROjMOrUcIQsbo82sP_19_6nBH1wmzPuLI_srA",
      "alg": "ECDH-ES"
    }
  ]
}
2020-09-01 12:12:04 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-09-01 12:12:04 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-09-01 12:12:04 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": "1580000000"
}
2020-09-01 12:12:04 SUCCESS
GetDynamicClientConfiguration
No client details on configuration, created an empty dynamic_client_registration_template object.
2020-09-01 12:12:04
oidcc-client-test-discovery-issuer-mismatch
Setup Done
2020-09-01 12:12:07 INCOMING
oidcc-client-test-discovery-issuer-mismatch
Incoming HTTP request to test instance 7wJV1p472HE1buo
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
/.well-known/webfinger
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "resource": "acct:7wJV1p472HE1buo.oidcc-client-test-discovery-issuer-mismatch@www.certification.openid.net",
  "rel": "http://openid.net/specs/connect/1.0/issuer"
}
incoming_body
Webfinger Request
2020-09-01 12:12:07
CreateWebfingerResponse
Created webfinger response
webfinger_response
{
  "subject": "acct:7wJV1p472HE1buo.oidcc-client-test-discovery-issuer-mismatch@www.certification.openid.net",
  "links": [
    {
      "rel": "http://openid.net/specs/connect/1.0/issuer",
      "href": "https://www.certification.openid.net/test/7wJV1p472HE1buo/"
    }
  ]
}
2020-09-01 12:12:07 OUTGOING
oidcc-client-test-discovery-issuer-mismatch
Response to HTTP request to test instance 7wJV1p472HE1buo
outgoing
{"subject":"acct:7wJV1p472HE1buo.oidcc-client-test-discovery-issuer-mismatch@www.certification.openid.net","links":[{"rel":"http://openid.net/specs/connect/1.0/issuer","href":"https://www.certification.openid.net/test/7wJV1p472HE1buo/"}]}
outgoing_path
/.well-known/webfinger
2020-09-01 12:12:08 INCOMING
oidcc-client-test-discovery-issuer-mismatch
Incoming HTTP request to test instance 7wJV1p472HE1buo
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
2020-09-01 12:12:08
ChangeIssuerInServerConfigurationToBeInvalid
Added invalid issuer to server configuration
issuer
https://www.certification.openid.net/test/7wJV1p472HE1buo/INVALID
Discovery endpoint
2020-09-01 12:12:08 OUTGOING
oidcc-client-test-discovery-issuer-mismatch
Response to HTTP request to test instance 7wJV1p472HE1buo
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/7wJV1p472HE1buo/INVALID",
  "authorization_endpoint": "https://www.certification.openid.net/test/7wJV1p472HE1buo/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/7wJV1p472HE1buo/token",
  "jwks_uri": "https://www.certification.openid.net/test/7wJV1p472HE1buo/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/7wJV1p472HE1buo/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/7wJV1p472HE1buo/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2020-09-01 12:12:10 FINISHED
oidcc-client-test-discovery-issuer-mismatch
Test has run to completion
testmodule_result
PASSED
Test Results