Test Summary

Test Results

Expand All Collapse All
All times are UTC
2021-04-19 08:45:49 INFO
TEST-RUNNER
Test instance NPeyoBokNdsiKN7 created
baseUrl
https://www.certification.openid.net/test/a/IPv280-2
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "server_metadata": "static",
  "response_mode": "default",
  "client_registration": "static_client"
}
alias
IPv280-2
description
planId
odzMiiAMuf9ja
config
{
  "alias": "IPv280-2",
  "server": {
    "issuer": "https://v280-oidc4.ipdev.themistruct.com/oauth/v2",
    "jwks_uri": "https://v280-oidc4.ipdev.themistruct.com/oauth/v2/jwk",
    "authorization_endpoint": "https://v280-oidc4.ipdev.themistruct.com/oauth/v2/authz",
    "token_endpoint": "https://v280-oidc4.ipdev.themistruct.com/oauth/v2/token",
    "userinfo_endpoint": "https://v280-oidc4.ipdev.themistruct.com/oauth/v2/userinfo",
    "acr_values": "default Privilege",
    "login_hint": "certTest"
  },
  "client": {
    "client_id": "jeenLlI8aao5OOW1rpaqKeTWwYsnfycF",
    "client_secret": "9QtOZj84IqUyOAnzq0u3HyFkyUkQwoag"
  },
  "client_secret_post": {
    "client_id": "jeenLlI8aao5OOW1rpaqKeTWwYsnfycF",
    "client_secret": "9QtOZj84IqUyOAnzq0u3HyFkyUkQwoag"
  },
  "client2": {
    "client_id": "HRpacgTGerr51MkV8ejJImomBDekx6lr",
    "client_secret": "8ym27IthyQzWQBb8AqAXpcoqow5PH0yF"
  }
}
testName
oidcc-prompt-none-not-logged-in
2021-04-19 08:45:49 SUCCESS
CreateRedirectUri
Created redirect URI
redirect_uri
https://www.certification.openid.net/test/a/IPv280-2/callback
2021-04-19 08:45:49 SUCCESS
GetStaticServerConfiguration
Found a static server object
issuer
https://v280-oidc4.ipdev.themistruct.com/oauth/v2
jwks_uri
https://v280-oidc4.ipdev.themistruct.com/oauth/v2/jwk
authorization_endpoint
https://v280-oidc4.ipdev.themistruct.com/oauth/v2/authz
token_endpoint
https://v280-oidc4.ipdev.themistruct.com/oauth/v2/token
userinfo_endpoint
https://v280-oidc4.ipdev.themistruct.com/oauth/v2/userinfo
acr_values
default Privilege
login_hint
certTest
2021-04-19 08:45:49 SUCCESS
CheckServerConfiguration
Found required server configuration keys
required
[
  "authorization_endpoint",
  "token_endpoint",
  "issuer"
]
2021-04-19 08:45:49 SUCCESS
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
registration_endpoint
authorization_endpoint
{
  "testHost": "v280-oidc4.ipdev.themistruct.com",
  "testPort": 443
}
token_endpoint
{
  "testHost": "v280-oidc4.ipdev.themistruct.com",
  "testPort": 443
}
userinfo_endpoint
{
  "testHost": "v280-oidc4.ipdev.themistruct.com",
  "testPort": 443
}
2021-04-19 08:45:49
FetchServerKeys
Fetching server key
jwks_uri
https://v280-oidc4.ipdev.themistruct.com/oauth/v2/jwk
2021-04-19 08:45:49
FetchServerKeys
HTTP request
request_uri
https://v280-oidc4.ipdev.themistruct.com/oauth/v2/jwk
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/cbor, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2021-04-19 08:45:50 RESPONSE
FetchServerKeys
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "content-type": "application/json; charset\u003dutf-8",
  "content-length": "462",
  "connection": "keep-alive",
  "date": "Mon, 19 Apr 2021 08:45:50 GMT",
  "x-amzn-requestid": "807722b4-60ff-4dab-9cfd-ed74f14e093b",
  "x-amzn-remapped-content-length": "462",
  "x-amzn-remapped-connection": "close",
  "x-amz-apigw-id": "eBdxyEVfNjMFv2w\u003d",
  "cache-control": "no-cache, no-store",
  "x-amzn-trace-id": "Root\u003d1-607d433e-64101497434725a118fd217d;Sampled\u003d0",
  "pragma": "no-cache",
  "x-amzn-remapped-date": "Mon, 19 Apr 2021 08:45:50 GMT",
  "access-control-allow-credentials": "true",
  "via": "1.1 bfc010d7a2d10333bff157410781201d.cloudfront.net (CloudFront), 1.1 776776097c9c5473638771d24267cf4f.cloudfront.net (CloudFront)",
  "x-amz-cf-pop": [
    "MIA3-C4",
    "MIA3-C5"
  ],
  "x-cache": "Miss from cloudfront",
  "x-amz-cf-id": "T5qcuZw7aSXLl3VEKNCXQV4js8Z09fZ8pMRfmhs5MEAVDIJgYOwx-w\u003d\u003d"
}
response_body
{"keys":[{"kty":"RSA","n":"jLZco5YAJ5O-C9xmLpHwApw1Undb1h6lw3RWjHtIBlXbTBNIJnShFZjzzEeaj_61dbKanNajaBWhw7GR7qpMY3Rdmpa53YctVqQpsFjsc4Y7pkVs5ntY_abbG-AVQnc2SnB4cGTOBFCsczHutFZ8tmSrgTBw9vYR1LAXeHQub0idF3_X_xy3V3OzpfCg5aRbfVGhwC1H2mC3Ls3G0iCmDGVYcaMqO-HCVK9xoEo76KtvjP-o9nIeIR2UHRQDUyv87NmGY7q-kI30MpAww2DuQKcYImMXxe-r8VC-MEwmbvXueQC4Pk7SBKBps8hDBYBayBY2hQ2JXg41QY34lbgrTQ","e":"AQAB","alg":"RS256","use":"sig","kid":"N6juwc4ZaH0TL+KQUdymKdFk4sSVi6FB1fQTOjPwaI8"}]}
2021-04-19 08:45:50
FetchServerKeys
Found JWK set string
jwk_string
{"keys":[{"kty":"RSA","n":"jLZco5YAJ5O-C9xmLpHwApw1Undb1h6lw3RWjHtIBlXbTBNIJnShFZjzzEeaj_61dbKanNajaBWhw7GR7qpMY3Rdmpa53YctVqQpsFjsc4Y7pkVs5ntY_abbG-AVQnc2SnB4cGTOBFCsczHutFZ8tmSrgTBw9vYR1LAXeHQub0idF3_X_xy3V3OzpfCg5aRbfVGhwC1H2mC3Ls3G0iCmDGVYcaMqO-HCVK9xoEo76KtvjP-o9nIeIR2UHRQDUyv87NmGY7q-kI30MpAww2DuQKcYImMXxe-r8VC-MEwmbvXueQC4Pk7SBKBps8hDBYBayBY2hQ2JXg41QY34lbgrTQ","e":"AQAB","alg":"RS256","use":"sig","kid":"N6juwc4ZaH0TL+KQUdymKdFk4sSVi6FB1fQTOjPwaI8"}]}
2021-04-19 08:45:50 SUCCESS
FetchServerKeys
Found server JWK set
server_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "n": "jLZco5YAJ5O-C9xmLpHwApw1Undb1h6lw3RWjHtIBlXbTBNIJnShFZjzzEeaj_61dbKanNajaBWhw7GR7qpMY3Rdmpa53YctVqQpsFjsc4Y7pkVs5ntY_abbG-AVQnc2SnB4cGTOBFCsczHutFZ8tmSrgTBw9vYR1LAXeHQub0idF3_X_xy3V3OzpfCg5aRbfVGhwC1H2mC3Ls3G0iCmDGVYcaMqO-HCVK9xoEo76KtvjP-o9nIeIR2UHRQDUyv87NmGY7q-kI30MpAww2DuQKcYImMXxe-r8VC-MEwmbvXueQC4Pk7SBKBps8hDBYBayBY2hQ2JXg41QY34lbgrTQ",
      "e": "AQAB",
      "alg": "RS256",
      "use": "sig",
      "kid": "N6juwc4ZaH0TL+KQUdymKdFk4sSVi6FB1fQTOjPwaI8"
    }
  ]
}
2021-04-19 08:45:50 SUCCESS
CheckServerKeysIsValid
Server JWKs is valid
server_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "n": "jLZco5YAJ5O-C9xmLpHwApw1Undb1h6lw3RWjHtIBlXbTBNIJnShFZjzzEeaj_61dbKanNajaBWhw7GR7qpMY3Rdmpa53YctVqQpsFjsc4Y7pkVs5ntY_abbG-AVQnc2SnB4cGTOBFCsczHutFZ8tmSrgTBw9vYR1LAXeHQub0idF3_X_xy3V3OzpfCg5aRbfVGhwC1H2mC3Ls3G0iCmDGVYcaMqO-HCVK9xoEo76KtvjP-o9nIeIR2UHRQDUyv87NmGY7q-kI30MpAww2DuQKcYImMXxe-r8VC-MEwmbvXueQC4Pk7SBKBps8hDBYBayBY2hQ2JXg41QY34lbgrTQ",
      "e": "AQAB",
      "alg": "RS256",
      "use": "sig",
      "kid": "N6juwc4ZaH0TL+KQUdymKdFk4sSVi6FB1fQTOjPwaI8"
    }
  ]
}
2021-04-19 08:45:50 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2021-04-19 08:45:50 SUCCESS
CheckForKeyIdInServerJWKs
All keys contain kids
2021-04-19 08:45:50 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2021-04-19 08:45:50 SUCCESS
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
2021-04-19 08:45:50 SUCCESS
GetStaticClientConfiguration
Found a static client object
client_id
jeenLlI8aao5OOW1rpaqKeTWwYsnfycF
client_secret
9QtOZj84IqUyOAnzq0u3HyFkyUkQwoag
2021-04-19 08:45:50
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
scope
openid
2021-04-19 08:45:50 SUCCESS
SetProtectedResourceUrlToUserInfoEndpoint
userinfo_endpoint will be used to test access token. The user info is not a mandatory to implement feature in the OpenID Connect specification, but is mandatory for certification.
protected_resource_url
https://v280-oidc4.ipdev.themistruct.com/oauth/v2/userinfo
2021-04-19 08:45:50
oidcc-prompt-none-not-logged-in
Setup Done
Make request to authorization endpoint
2021-04-19 08:45:50 SUCCESS
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
client_id
jeenLlI8aao5OOW1rpaqKeTWwYsnfycF
redirect_uri
https://www.certification.openid.net/test/a/IPv280-2/callback
scope
openid
2021-04-19 08:45:50
CreateRandomStateValue
Created state value
requested_state_length
128
state
TK6DCsqcQQDe7nacpvqPsGhG6l8R8DHUBe1uavDStdps68bL4GjjqZdJ3yZxQzvmwliAN7W4LbaVJbGLFw4QxxnUHSUlRv7Cifz6ozlQiMcQJGyTheRXEhgn6O0V9N3Q
2021-04-19 08:45:50 SUCCESS
AddStateToAuthorizationEndpointRequest
Added state parameter to request
client_id
jeenLlI8aao5OOW1rpaqKeTWwYsnfycF
redirect_uri
https://www.certification.openid.net/test/a/IPv280-2/callback
scope
openid
state
TK6DCsqcQQDe7nacpvqPsGhG6l8R8DHUBe1uavDStdps68bL4GjjqZdJ3yZxQzvmwliAN7W4LbaVJbGLFw4QxxnUHSUlRv7Cifz6ozlQiMcQJGyTheRXEhgn6O0V9N3Q
2021-04-19 08:45:50
CreateRandomNonceValue
Created nonce value
requested_nonce_length
10
nonce
M8qP5INKfr
2021-04-19 08:45:50 SUCCESS
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
client_id
jeenLlI8aao5OOW1rpaqKeTWwYsnfycF
redirect_uri
https://www.certification.openid.net/test/a/IPv280-2/callback
scope
openid
state
TK6DCsqcQQDe7nacpvqPsGhG6l8R8DHUBe1uavDStdps68bL4GjjqZdJ3yZxQzvmwliAN7W4LbaVJbGLFw4QxxnUHSUlRv7Cifz6ozlQiMcQJGyTheRXEhgn6O0V9N3Q
nonce
M8qP5INKfr
2021-04-19 08:45:50 SUCCESS
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
client_id
jeenLlI8aao5OOW1rpaqKeTWwYsnfycF
redirect_uri
https://www.certification.openid.net/test/a/IPv280-2/callback
scope
openid
state
TK6DCsqcQQDe7nacpvqPsGhG6l8R8DHUBe1uavDStdps68bL4GjjqZdJ3yZxQzvmwliAN7W4LbaVJbGLFw4QxxnUHSUlRv7Cifz6ozlQiMcQJGyTheRXEhgn6O0V9N3Q
nonce
M8qP5INKfr
response_type
code
2021-04-19 08:45:50 SUCCESS
AddPromptNoneToAuthorizationEndpointRequest
Added prompt=none to authorization endpoint request
client_id
jeenLlI8aao5OOW1rpaqKeTWwYsnfycF
redirect_uri
https://www.certification.openid.net/test/a/IPv280-2/callback
scope
openid
state
TK6DCsqcQQDe7nacpvqPsGhG6l8R8DHUBe1uavDStdps68bL4GjjqZdJ3yZxQzvmwliAN7W4LbaVJbGLFw4QxxnUHSUlRv7Cifz6ozlQiMcQJGyTheRXEhgn6O0V9N3Q
nonce
M8qP5INKfr
response_type
code
prompt
none
2021-04-19 08:45:50 SUCCESS
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
redirect_to_authorization_endpoint
https://v280-oidc4.ipdev.themistruct.com/oauth/v2/authz?client_id=jeenLlI8aao5OOW1rpaqKeTWwYsnfycF&redirect_uri=https://www.certification.openid.net/test/a/IPv280-2/callback&scope=openid&state=TK6DCsqcQQDe7nacpvqPsGhG6l8R8DHUBe1uavDStdps68bL4GjjqZdJ3yZxQzvmwliAN7W4LbaVJbGLFw4QxxnUHSUlRv7Cifz6ozlQiMcQJGyTheRXEhgn6O0V9N3Q&nonce=M8qP5INKfr&response_type=code&prompt=none
2021-04-19 08:45:50 REDIRECT
oidcc-prompt-none-not-logged-in
Redirecting to authorization endpoint
redirect_to
https://v280-oidc4.ipdev.themistruct.com/oauth/v2/authz?client_id=jeenLlI8aao5OOW1rpaqKeTWwYsnfycF&redirect_uri=https://www.certification.openid.net/test/a/IPv280-2/callback&scope=openid&state=TK6DCsqcQQDe7nacpvqPsGhG6l8R8DHUBe1uavDStdps68bL4GjjqZdJ3yZxQzvmwliAN7W4LbaVJbGLFw4QxxnUHSUlRv7Cifz6ozlQiMcQJGyTheRXEhgn6O0V9N3Q&nonce=M8qP5INKfr&response_type=code&prompt=none
2021-04-19 08:45:59 INCOMING
oidcc-prompt-none-not-logged-in
Incoming HTTP request to test instance NPeyoBokNdsiKN7
incoming_headers
{
  "host": "www.certification.openid.net",
  "upgrade-insecure-requests": "1",
  "user-agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "cross-site",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "referer": "https://www.certification.openid.net/",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "ja,en-US;q\u003d0.9,en;q\u003d0.8",
  "cookie": "__utmz\u003d201319536.1617689751.2.1.utmcsr\u003d(direct)|utmccn\u003d(direct)|utmcmd\u003d(none); __utma\u003d201319536.1249704783.1594777695.1618206939.1618811934.5; __utmc\u003d201319536; JSESSIONID\u003d46CB85AAD88F38D9D965C5ACE08608EB",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
callback
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "error": "login_required",
  "error_description": "you are not loggedin with prompt\u003dnone.",
  "state": "TK6DCsqcQQDe7nacpvqPsGhG6l8R8DHUBe1uavDStdps68bL4GjjqZdJ3yZxQzvmwliAN7W4LbaVJbGLFw4QxxnUHSUlRv7Cifz6ozlQiMcQJGyTheRXEhgn6O0V9N3Q",
  "error_code": "312"
}
incoming_body
2021-04-19 08:45:59 SUCCESS
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
implicit_submit
{
  "path": "implicit/rz5JNOSxFJIGNW3n1ma7",
  "fullUrl": "https://www.certification.openid.net/test/a/IPv280-2/implicit/rz5JNOSxFJIGNW3n1ma7"
}
2021-04-19 08:45:59 OUTGOING
oidcc-prompt-none-not-logged-in
Response to HTTP request to test instance NPeyoBokNdsiKN7
outgoing
ModelAndView [view="implicitCallback"; model={implicitSubmitUrl=https://www.certification.openid.net/test/a/IPv280-2/implicit/rz5JNOSxFJIGNW3n1ma7, returnUrl=/log-detail.html?log=NPeyoBokNdsiKN7}]
outgoing_path
callback
2021-04-19 08:46:00 INCOMING
oidcc-prompt-none-not-logged-in
Incoming HTTP request to test instance NPeyoBokNdsiKN7
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "*/*",
  "x-requested-with": "XMLHttpRequest",
  "user-agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36",
  "content-type": "text/plain",
  "origin": "https://www.certification.openid.net",
  "sec-fetch-site": "same-origin",
  "sec-fetch-mode": "cors",
  "sec-fetch-dest": "empty",
  "referer": "https://www.certification.openid.net/test/a/IPv280-2/callback?error\u003dlogin_required\u0026error_description\u003dyou%20are%20not%20loggedin%20with%20prompt%3Dnone.\u0026state\u003dTK6DCsqcQQDe7nacpvqPsGhG6l8R8DHUBe1uavDStdps68bL4GjjqZdJ3yZxQzvmwliAN7W4LbaVJbGLFw4QxxnUHSUlRv7Cifz6ozlQiMcQJGyTheRXEhgn6O0V9N3Q\u0026error_code\u003d312",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "ja,en-US;q\u003d0.9,en;q\u003d0.8",
  "cookie": "__utmz\u003d201319536.1617689751.2.1.utmcsr\u003d(direct)|utmccn\u003d(direct)|utmcmd\u003d(none); __utma\u003d201319536.1249704783.1594777695.1618206939.1618811934.5; __utmc\u003d201319536; JSESSIONID\u003d46CB85AAD88F38D9D965C5ACE08608EB",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "0",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
implicit/rz5JNOSxFJIGNW3n1ma7
incoming_body_form_params
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
2021-04-19 08:46:00 OUTGOING
oidcc-prompt-none-not-logged-in
Response to HTTP request to test instance NPeyoBokNdsiKN7
outgoing_status_code
204
outgoing_headers
{}
outgoing_body

                                
outgoing_path
implicit/rz5JNOSxFJIGNW3n1ma7
2021-04-19 08:46:00 SUCCESS
ExtractImplicitHashToCallbackResponse
implicit_hash is empty
2021-04-19 08:46:00 REDIRECT-IN
oidcc-prompt-none-not-logged-in
Authorization endpoint response captured
url_query
{
  "error": "login_required",
  "error_description": "you are not loggedin with prompt\u003dnone.",
  "state": "TK6DCsqcQQDe7nacpvqPsGhG6l8R8DHUBe1uavDStdps68bL4GjjqZdJ3yZxQzvmwliAN7W4LbaVJbGLFw4QxxnUHSUlRv7Cifz6ozlQiMcQJGyTheRXEhgn6O0V9N3Q",
  "error_code": "312"
}
headers
{
  "host": "www.certification.openid.net",
  "upgrade-insecure-requests": "1",
  "user-agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.90 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "cross-site",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "referer": "https://www.certification.openid.net/",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "ja,en-US;q\u003d0.9,en;q\u003d0.8",
  "cookie": "__utmz\u003d201319536.1617689751.2.1.utmcsr\u003d(direct)|utmccn\u003d(direct)|utmcmd\u003d(none); __utma\u003d201319536.1249704783.1594777695.1618206939.1618811934.5; __utmc\u003d201319536; JSESSIONID\u003d46CB85AAD88F38D9D965C5ACE08608EB",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
http_method
GET
url_fragment
{}
post_body
Verify authorization endpoint response
2021-04-19 08:46:00 SUCCESS
CheckStateInAuthorizationResponse
State in response correctly returned
state
TK6DCsqcQQDe7nacpvqPsGhG6l8R8DHUBe1uavDStdps68bL4GjjqZdJ3yZxQzvmwliAN7W4LbaVJbGLFw4QxxnUHSUlRv7Cifz6ozlQiMcQJGyTheRXEhgn6O0V9N3Q
2021-04-19 08:46:00
ValidateIssInAuthorizationResponse
No 'iss' value in authorization response.
2021-04-19 08:46:00 SUCCESS
EnsureErrorFromAuthorizationEndpointResponse
Authorization endpoint returned an error
error
login_required
error_description
you are not loggedin with prompt=none.
state
TK6DCsqcQQDe7nacpvqPsGhG6l8R8DHUBe1uavDStdps68bL4GjjqZdJ3yZxQzvmwliAN7W4LbaVJbGLFw4QxxnUHSUlRv7Cifz6ozlQiMcQJGyTheRXEhgn6O0V9N3Q
error_code
312
2021-04-19 08:46:00 SUCCESS
RejectAuthCodeInAuthorizationEndpointResponse
Authorization code is not present in authorization endpoint response
2021-04-19 08:46:00 WARNING
CheckForUnexpectedParametersInErrorResponseFromAuthorizationEndpoint
error response includes unexpected parameters. This may be because the server supports extensions the test suite is unaware of, or the server may be returning values it should not.
error_code
312
2021-04-19 08:46:00 SUCCESS
CheckErrorDescriptionFromAuthorizationEndpointResponseErrorContainsCRLFTAB
authorization_endpoint_response 'error_description' field does not include CR/LF/TAB
error_description
you are not loggedin with prompt=none.
2021-04-19 08:46:00 SUCCESS
ValidateErrorDescriptionFromAuthorizationEndpointResponseError
authorization_endpoint_response error returned valid 'error_description' field
error_description
you are not loggedin with prompt=none.
2021-04-19 08:46:00 SUCCESS
ValidateErrorUriFromAuthorizationEndpointResponseError
authorization_endpoint_response did not include optional 'error_uri' field
2021-04-19 08:46:00 SUCCESS
CheckErrorFromAuthorizationEndpointIsOneThatRequiredAUserInterface
Authorization endpoint returned one of the permitted errors
actual
login_required
permitted
[
  "interaction_required",
  "login_required",
  "account_selection_required",
  "consent_required"
]
2021-04-19 08:46:00 FINISHED
oidcc-prompt-none-not-logged-in
Test has run to completion
testmodule_result
WARNING
Unregister dynamically registered client
2021-04-19 08:46:00 INFO
UnregisterDynamicallyRegisteredClient
Skipped evaluation due to missing required string: registration_client_uri
expected
registration_client_uri
Test Results