Test Name | fapi-rw-id2-ensure-signed-request-object-with-RS256-fails |
---|---|
Variant | client_auth_type=private_key_jwt, fapi_auth_request_method=by_value, fapi_profile=consumerdataright_au, fapi_response_mode=plain_response |
Test ID | CEfWn5dVwzJyj9X https://www.certification.openid.net/log-detail.html?public=true&log=CEfWn5dVwzJyj9X |
Created | 2021-04-14T09:45:26.870497Z |
Description | Authlete automated FAPI-RW-ID2 with private_key client auth |
Test Version | 4.1.10 |
Test Owner | ci https://www.certification.openid.net |
Plan ID | oo3zFUEGalE0R https://www.certification.openid.net/plan-detail.html?public=true&plan=oo3zFUEGalE0R |
Exported From | https://www.certification.openid.net |
Exported By | 1620690 https://gitlab.com |
Suite Version | 4.1.10 |
Exported | 2021-05-10 20:11:26 (UTC) |
Status: FINISHED Result: REVIEW |
SUCCESS 47 FAILURE 0 WARNING 0 REVIEW 1 INFO 4 |
2021-04-14 09:45:26 |
INFO
|
TEST-RUNNER
Test instance CEfWn5dVwzJyj9X created
|
||||||||||||||
|
2021-04-14 09:45:26 |
SUCCESS
|
CreateRedirectUri
Created redirect URI
|
||
|
2021-04-14 09:45:26 |
|
GetDynamicServerConfiguration
HTTP request
|
||||||||
|
2021-04-14 09:45:27 |
RESPONSE
|
GetDynamicServerConfiguration
HTTP response
|
||||||||
|
2021-04-14 09:45:27 |
|
GetDynamicServerConfiguration
Downloaded server configuration
|
||
|
2021-04-14 09:45:27 |
SUCCESS
|
GetDynamicServerConfiguration
Successfully parsed server configuration
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
2021-04-14 09:45:27 | INFO |
AddMTLSEndpointAliasesToEnvironment
The mtls_endpoint_aliases is not present in the server configuration
|
||
|
2021-04-14 09:45:27 |
SUCCESS
|
CheckServerConfiguration
Found required server configuration keys
|
||
|
2021-04-14 09:45:27 |
SUCCESS
|
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
|
||||||||
|
2021-04-14 09:45:27 |
|
FetchServerKeys
Fetching server key
|
||
|
2021-04-14 09:45:27 |
|
FetchServerKeys
HTTP request
|
||||||||
|
2021-04-14 09:45:27 |
RESPONSE
|
FetchServerKeys
HTTP response
|
||||||||
|
2021-04-14 09:45:27 |
|
FetchServerKeys
Found JWK set string
|
||
|
2021-04-14 09:45:27 |
SUCCESS
|
FetchServerKeys
Found server JWK set
|
||
|
2021-04-14 09:45:27 |
SUCCESS
|
CheckServerKeysIsValid
Server JWKs is valid
|
||
|
2021-04-14 09:45:27 | SUCCESS |
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
|
|
2021-04-14 09:45:27 | SUCCESS |
CheckForKeyIdInServerJWKs
All keys contain kids
|
|
2021-04-14 09:45:27 | SUCCESS |
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
|
|
2021-04-14 09:45:27 | SUCCESS |
FAPIEnsureMinimumServerKeyLength
Validated minimum key lengths for server_jwks
|
||
|
2021-04-14 09:45:27 |
SUCCESS
|
GetStaticClientConfiguration
Found a static client object
|
||||||
|
2021-04-14 09:45:27 |
|
ValidateMTLSCertificatesHeader
No certificate authority found for MTLS
|
|
2021-04-14 09:45:27 |
SUCCESS
|
ValidateMTLSCertificatesHeader
MTLS certificates header is valid
|
|
2021-04-14 09:45:27 |
|
ExtractMTLSCertificatesFromConfiguration
No certificate authority found for MTLS
|
|
2021-04-14 09:45:27 |
SUCCESS
|
ExtractMTLSCertificatesFromConfiguration
Mutual TLS authentication credentials loaded
|
||||
|
2021-04-14 09:45:27 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2021-04-14 09:45:27 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2021-04-14 09:45:27 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2021-04-14 09:45:27 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2021-04-14 09:45:27 | SUCCESS |
FAPICheckKeyAlgInClientJWKs
Found a key with alg PS256 or ES256
|
|
2021-04-14 09:45:27 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2021-04-14 09:45:27 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
Verify configuration of second client |
2021-04-14 09:45:27 |
SUCCESS
|
GetStaticClient2Configuration
Found a static second client object
|
||||||
|
2021-04-14 09:45:27 |
|
ValidateMTLSCertificates2Header
No certificate authority found for MTLS
|
|
2021-04-14 09:45:27 |
SUCCESS
|
ValidateMTLSCertificates2Header
MTLS certificates header is valid
|
|
2021-04-14 09:45:27 |
|
ExtractMTLSCertificates2FromConfiguration
No certificate authority found for MTLS
|
|
2021-04-14 09:45:27 |
SUCCESS
|
ExtractMTLSCertificates2FromConfiguration
Mutual TLS authentication credentials loaded
|
||||
|
2021-04-14 09:45:27 | SUCCESS |
ValidateClientJWKsPrivatePart
Valid client JWKs: keys are valid JSON, contain the required fields, the private/public exponents match and are correctly encoded using unpadded base64url
|
|
2021-04-14 09:45:27 |
SUCCESS
|
ExtractJWKsFromStaticClientConfiguration
Extracted client JWK
|
||||
|
2021-04-14 09:45:27 | SUCCESS |
CheckForKeyIdInClientJWKs
All keys contain kids
|
|
2021-04-14 09:45:27 | SUCCESS |
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
|
||
|
2021-04-14 09:45:27 | SUCCESS |
FAPICheckKeyAlgInClientJWKs
Found a key with alg PS256 or ES256
|
|
2021-04-14 09:45:27 | SUCCESS |
FAPIEnsureMinimumClientKeyLength
Validated minimum key lengths for client_jwks
|
||
|
2021-04-14 09:45:27 |
SUCCESS
|
ValidateMTLSCertificatesAsX509
Mutual TLS authentication cert validated as X.509
|
|
2021-04-14 09:45:27 |
SUCCESS
|
GetResourceEndpointConfiguration
Found a resource endpoint object
|
||||||
|
2021-04-14 09:45:27 |
SUCCESS
|
SetProtectedResourceUrlToSingleResourceEndpoint
Set protected resource URL
|
||
|
2021-04-14 09:45:27 |
SUCCESS
|
ExtractTLSTestValuesFromResourceConfiguration
Extracted TLS information from resource endpoint
|
||
|
2021-04-14 09:45:27 |
SUCCESS
|
ExtractTLSTestValuesFromOBResourceConfiguration
Extracted TLS information from resource endpoint
|
||||
|
2021-04-14 09:45:27 |
|
fapi-rw-id2-ensure-signed-request-object-with-RS256-fails
Setup Done
|
|
Make request to authorization endpoint |
2021-04-14 09:45:27 |
SUCCESS
|
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
|
||||||
|
2021-04-14 09:45:27 | SUCCESS |
AddCdrAcrClaimToAuthorizationEndpointRequest
Added acr claim to authorization_endpoint_request
|
||
|
2021-04-14 09:45:27 | SUCCESS |
AddCdrSharingDurationClaimToAuthorizationEndpointRequest
Added sharing_duration claim to authorization_endpoint_request
|
||
|
2021-04-14 09:45:27 |
|
CreateRandomStateValue
Created state value
|
||||
|
2021-04-14 09:45:27 |
SUCCESS
|
AddStateToAuthorizationEndpointRequest
Added state parameter to request
|
||||||||||
|
2021-04-14 09:45:27 |
|
CreateRandomNonceValue
Created nonce value
|
||||
|
2021-04-14 09:45:27 |
SUCCESS
|
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
|
||||||||||||
|
2021-04-14 09:45:27 |
SUCCESS
|
SetAuthorizationEndpointRequestResponseTypeToCodeIdtoken
Added response_type parameter to request
|
||||||||||||||
|
2021-04-14 09:45:27 |
SUCCESS
|
ConvertAuthorizationEndpointRequestToRequestObject
Created request object claims
|
||
|
2021-04-14 09:45:27 |
SUCCESS
|
AddExpToRequestObject
Added exp to request object claims
|
||
|
2021-04-14 09:45:27 | SUCCESS |
ChangeClientJwksAlgToRS256
Added RS256 as algorithm
|
||
|
2021-04-14 09:45:27 |
SUCCESS
|
AddAudToRequestObject
Added aud to request object claims
|
||
|
2021-04-14 09:45:27 |
SUCCESS
|
AddIssToRequestObject
Added iss to request object claims
|
||
|
2021-04-14 09:45:27 |
SUCCESS
|
SignRequestObject
Signed the request object
|
||||||||
|
2021-04-14 09:45:27 |
SUCCESS
|
BuildRequestObjectByValueRedirectToAuthorizationEndpoint
Sending to authorization endpoint
|
||
|
2021-04-14 09:45:27 |
REDIRECT
|
fapi-rw-id2-ensure-signed-request-object-with-RS256-fails
Redirecting to authorization endpoint
|
||
|
2021-04-14 09:45:27 | REVIEW |
ExpectSignedRS256RequestObjectErrorPage
If the server does not return an invalid_request_object error back to the client, it must show an error page saying the request object is invalid as the algorithm in the JWS header of the request object passed by 'request' parameter does not match the registered.
|
||||
|
2021-04-14 09:45:27 |
|
WebRunner
Scripted browser HTTP request
|
||||||
|
2021-04-14 09:45:28 |
RESPONSE
|
WebRunner
Scripted browser HTTP response
|
||||||||
|
2021-04-14 09:45:28 |
INFO
|
WebRunner
Waiting
|
||||||||||||||||
|
2021-04-14 09:45:28 |
|
BROWSER
Updated placeholder from scripted browser
|
||
|
2021-04-14 09:45:28 |
|
BROWSER
All placeholders filled by scripted browser
|
|
2021-04-14 09:45:28 |
INFO
|
WebRunner
Completed processing of webpage
|
||||||||||||
|
2021-04-14 09:45:28 |
FINISHED
|
fapi-rw-id2-ensure-signed-request-object-with-RS256-fails
Test has run to completion
|
||
|
2021-04-14 09:45:29 |
|
TEST-RUNNER
Alias has now been claimed by another test
|
||||
|