Test Summary

Test Results

Expand All Collapse All
All times are UTC
2021-06-13 20:43:52 INFO
TEST-RUNNER
Test instance mT2k9kCELswXJUp created
baseUrl
https://www.certification.openid.net/test/a/MSTR_M2021_UP1
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "response_mode": "default",
  "client_registration": "static_client"
}
alias
MSTR_M2021_UP1
description
planId
iEllghTC7G18K
config
{
  "alias": "MSTR_M2021_UP1",
  "client": {
    "client_id": "87654321",
    "client_secret": "12345678",
    "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
  }
}
testName
oidcc-client-test-missing-iat
2021-06-13 20:43:52 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-06-13 20:43:52
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-06-13 20:43:52
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "9k1L9lFBCqBM6lMzg5fhxKE0AXk4CXmkiLGN-dULoYkvBL9IGi6ErN7gjpiNACJWK4L_pvI1M7JzLjYsSxPt3kDSgZUdFFcc-d5BnKDUvYGungRqLNChU1808NbGQP-eSxQ2qPD6efxwbUnTSFFCJ_PiNKeekEk_NHiG4toI0JM",
      "kty": "RSA",
      "q": "mhweou6ketiY79mcVCtzTEg9lvLJ59HJK4mNs7H6VZlfzLlFWT4nB9cTOTfq5vPl-ckp6x2FPCvFUPnUpEyb3R7oyi9xSMsLiGbbBZMZ-MN4gAJD8AQQZ-ZYHULS4_aLAbjkKekujwj3isTRKmvanyULVMnG2oKK6rfGBYaA-F0",
      "d": "WeIkLgZEuqQ58x5mswT5ZTO_gNhN4tzUbLBaDNAA7yYEnm8i_t9jVgpA_to4xpfZ_oAvIpQaHvm1i3JVaNRf03XkHY8yrMRfHTYOpJye45jf-6Emljso-X5Kl-ZAoq4istVpMzXESM4FuD0Vs9R0POK_naFwZG0T2gMlUR82BsxBgeOyn30FeB9zRaWQyf-L0wZKzZg3p-zaes_eokugwqW7ZtZO2Xtfc-56roXRWkDZ-u-bZR1KNlVL3ILUDQhMgPCfpfKH1L85md845myr61CA-0IwGgCW9re6jk9u6XuzvF_XTUFAOuetrxbCtWARx37zzv-30dzWxStzxqbi-Q",
      "e": "AQAB",
      "use": "sig",
      "kid": "1f3bce46-d081-407e-b834-2b3c9cf896da",
      "qi": "0RYqyBvOc-Us6pHaGuCR-rgwBjaKuPYAFCDnhhQEVdFQBnVlhtLxmHGRzqVVZGuB5a9HgcGoGzaJPJl_12L1uaE-Y03kqICggbbx7LQxn0KYi96rBnYfxqv40yrkPrzXwSTnyKARrt7OWw03VNvAy416VHonp_HevmsGyxOdrxs",
      "dp": "5NCihU6vMgQB8J8i-FmdcGKiQcwvdv3_EM6Cq1p017juaWaawVf-Aet8inzGYR2FGB83Cg1xx3k87-178LOvBA8MgT3aKg9T5_3Gzo_Lk9JqOnq3eLLJbP7B3AxrWe8fS3iX3xMgXztZ5u3yzvhOkXdM6sXd1QV3JnPiO9V64uk",
      "dq": "WYt9Qa7oY3j3ZGZNL5sPo4NWRh9MsiZzfZivfXosuxAjWhFM-k3i3-tYgCa9lvSg7EK22KaOhCfqvuJrbAwXhKQxH0nxyRox2U_qc5LFxIXPvpGSaCP0ZGqzSE1LvKnEm3uTF8cmBnZvX3J9FukUXuRncRzNLqorjba6mPtOdQE",
      "n": "lEWNoE09DzuGG4rdtaanqkFUkFzHzKyo2_3NEF-pL4PkyO_4kGeg0tIlrT7a_9R_CFHlgjO4pl_E2szMO5OfNxkOgEnsUiM4YsAIa3Mc2YKxp6OWI79t8H3o2wnHSfjA2hsGYHRyTR6hTJ0idcqBVTKrcT28n8_oBhOLtOVqGEmhxZ0Rkrvh185Sk0wUTgcXGfpkoi319fTrmVyZvXK3HnnMoqjzTChQGfoI6iL8xSzRV3zYE49qMFKU_dnGLpHZEwVOHfGTSabaFArSZi1l6UTc9N723A6v_0zfIEEja8ZfOV5MrTM02hQR5rUcNS6bupC0gW5uQOuMlSoV-sItZw"
    },
    {
      "kty": "EC",
      "d": "YuVpqeG9VBxPvWH3mlBnEeB3UaNia7GmroMdjTysgzM",
      "use": "sig",
      "crv": "P-256",
      "kid": "8c791c87-ba4f-4bc5-a581-56637eee6e2a",
      "x": "yZ0IsZsqUsT4AnHbg4_peMhuyUdOF6AX_xq_2WHZzvo",
      "y": "JMSVCrzs3MewEE0LHfcHhRX24JcsXBdbs5YFrqGcp8c"
    },
    {
      "kty": "EC",
      "d": "2O6BUryCTVm24ZqHjVbbv8ZLrcwGL4t2a785WNxbmeQ",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "a5b7639a-b417-4a82-b5b1-cb1e661300fc",
      "x": "gxYm9P_btNnLz_QvkDSPMfSe1ihi_1irzFVVXpbQ7VY",
      "y": "Zipe7XubUBUU8Vh6380ES1GREKRYXjri8BtLAVfNFpM"
    },
    {
      "kty": "OKP",
      "d": "fdw4aqqQ9UvothyRdiMW32BT7G0Hz8U1n4m0INivYEk",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "9591c796-41ab-4673-8a08-75e3fc3ed120",
      "x": "n__lU2DWjkYLVKa8V9KR7fXcEtWn0VYaiBS0oSBmvhE"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "4EM8N-wYUh5pTGn8MtjR7vx4Eow9LZWcMNXZmhaDsSQ_CE1I0I7jiaLhb2076S5K3_d9O_c8ndksKRyH9mHYeyxOuNzgetSZVrIIy-pOiyi39DZ-iCchhSlBlcQBCVOpBd3DVf5-txJYhwTwblYgijQlLo8tbNGZwm8up2PIzEs",
      "kty": "RSA",
      "q": "r1YwwMNQrVqqb2tSR4aY7ptevY_uKu0PpaXdNfn8DRvZIZ-kbp_HijHolk7C4ekcbkgT3VPyiBUkwYoOvLAclFqtamlFwVbSm7uXARX6r2XbJ42CLjv-FOjPFR80T6YvQuJioQhyIuA9hemxhTPQCEId21ow73l5tg40RoZQ5YE",
      "d": "TmUGlLkhIJw-HBfNNnN3TO3J4HTTbLAAyzqt24p1gLu9KIaTRDWxKMe1bRLB5zYAcnIXlapgUNHgP6L_gLbNZBXpRg97WX3eeijmoEFA5JXovfnvIqaM_BmVCcJTK4wyTmwI-SZnLcRzed85IYmMxtXtE08hSP2QEi6bAqG6FncwsMkbIM7F-FYpJECyAdJL5v8xovm20Fn3ucpooYFP6FIlikDalwRaTa4joFPVLGbgUwV3ytwCpKla3pPKubUspuDHc4VMz65LO8TdxzTgbRQ7HLniC3uBsgrvUZ_Xh_2mimzffu1Y-l17L__TMD2B6bcm_BOv-s7sGilJ-EpvAQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "d558fee0-ebff-4213-af1a-64d94cf4daac",
      "qi": "DOerzzFQCW3gH-9hKVGLGY4EwbVPCtK0Wh-yQO1BKslY1TvPNC9iGbzFeTa1DG5tzZD4EU91FoPYxHWWvzu5JVkJT_dAcHp6U5t9Y1KIemTEHo05LzCb4LNE9yWgU2acBDOmF9v8wXqWAl4-FB6Qg1zO-rAbQk__m8AqPTPF4HI",
      "dp": "IudUAAAm6OEC0nnMXr2QLvnsVjatbuLSJGekLm9Cn9dcWBZvNsaGc21-WLFPmcMytBj4zNR2ArtCPEPMhXRFFSaYOf1mkrd0BiI_bD1TbCUyPDgfCWHNvcPmCUEwSBtVOyyAsmmhnyyjyp_iK8oL1na3Mr_l-gHFRJW5VSQapHE",
      "alg": "RSA-OAEP",
      "dq": "XGvRPPp3HzmIVzy53SvslvFc6gzhHM1ijw0z4kzH-Fzygg-1S_563rRaBkiz3wLSUqs5lVO3ptWGT2InTHyERArcGBgvha7vStmByje8sRG-iEXGFfrXfkwNQ_PzzfwqM1ZDaOCb0RhkNZ8uTKk4AfJf7IzI-KIObtFj6rzIDYE",
      "n": "mZl3de3_ekJIyWww_9BZByI5hnAnEyMKiG0dpLo7RwKvftalmIxQOhyQcRazLqG28ZPPqLRcYt5fDVGh97S8oi-40qDmxiguKnD0nOUHyEYVx-Pf3CoHqI5c3KDpwB6Y66bwnjUKdqvj-b6tijvp3oOP3wfRlyeB7jf0rrAUopsJX4C7YWXZxd9rH4k6UzRyj91uK5QQ8Y9vvdk50a3ZxPNvD-X5jtVVpqxCsKAzWyb2CLClFhkvx0So7CXxkm1cNxYV4f6Xvi9UwKJceR2vfGMvHvDiJQzzppHWYuZPyGuaCdLRPZPaiONQ9aqOI4y2D1DftGGdGUgxzaDNAF4Iyw"
    },
    {
      "kty": "EC",
      "d": "kAoDDa119ewlrfkPISnEN-PQEByhrM-S5e39_0BuuDc",
      "use": "enc",
      "crv": "P-256",
      "kid": "9c920671-792d-43b6-a51e-efa9cb60434a",
      "x": "DV0o9WIcYD2zskpTzkMyVzH6ShTsXlzEVvNNdbj0P4s",
      "y": "xTHZIzt0gCESQ1wZywngvooFZ3NkxBqg3zhDasTcqU8",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "1f3bce46-d081-407e-b834-2b3c9cf896da",
      "n": "lEWNoE09DzuGG4rdtaanqkFUkFzHzKyo2_3NEF-pL4PkyO_4kGeg0tIlrT7a_9R_CFHlgjO4pl_E2szMO5OfNxkOgEnsUiM4YsAIa3Mc2YKxp6OWI79t8H3o2wnHSfjA2hsGYHRyTR6hTJ0idcqBVTKrcT28n8_oBhOLtOVqGEmhxZ0Rkrvh185Sk0wUTgcXGfpkoi319fTrmVyZvXK3HnnMoqjzTChQGfoI6iL8xSzRV3zYE49qMFKU_dnGLpHZEwVOHfGTSabaFArSZi1l6UTc9N723A6v_0zfIEEja8ZfOV5MrTM02hQR5rUcNS6bupC0gW5uQOuMlSoV-sItZw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "6d144a90-055b-4a6d-bfe5-b091b6dbeb7b",
      "n": "orMb8SnhRfZlyTajUEy7NnMCEz2c7FmwEZd_YCkkfETQVinAU_KK5t6XrEcIx3QKJg3HHwhruhExDgs_5Hi6VT3si98dQE6ng4TYqLosiTsfg0PJWVsuDH-h0EvvzfcEY0jOa3XDZeuQFV1cetJqSPxwOx6vgVvOVrIsRbf-W6x81Td1xFay1fcSe_5BpxrWexqWl8EAkGLd9r900mfRzUfdl_r9RSL2UYn1cu36BlURpbfBRWo5X1lroNSliZrFbBJucHQ6RDNuPC_ruobvp0aJQ38TClRxGiItY8tFOB7GzzC9FSuWVYMlNw0N93ZyL4QearTlc4CepZ7WB_FdNw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "8c791c87-ba4f-4bc5-a581-56637eee6e2a",
      "x": "yZ0IsZsqUsT4AnHbg4_peMhuyUdOF6AX_xq_2WHZzvo",
      "y": "JMSVCrzs3MewEE0LHfcHhRX24JcsXBdbs5YFrqGcp8c"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "29172298-8459-4f70-a2d4-2e869d6663cd",
      "x": "AcAqB41Wu6Ebz-WSjvTgwKJwuIV_FUG-mcEVdiHabno",
      "y": "3fq-ODaDjNVJNWJ2VCtyBxP-k1XzepRSfqBGLQ-fDjc"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "a5b7639a-b417-4a82-b5b1-cb1e661300fc",
      "x": "gxYm9P_btNnLz_QvkDSPMfSe1ihi_1irzFVVXpbQ7VY",
      "y": "Zipe7XubUBUU8Vh6380ES1GREKRYXjri8BtLAVfNFpM"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "9591c796-41ab-4673-8a08-75e3fc3ed120",
      "x": "n__lU2DWjkYLVKa8V9KR7fXcEtWn0VYaiBS0oSBmvhE"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "d558fee0-ebff-4213-af1a-64d94cf4daac",
      "alg": "RSA-OAEP",
      "n": "mZl3de3_ekJIyWww_9BZByI5hnAnEyMKiG0dpLo7RwKvftalmIxQOhyQcRazLqG28ZPPqLRcYt5fDVGh97S8oi-40qDmxiguKnD0nOUHyEYVx-Pf3CoHqI5c3KDpwB6Y66bwnjUKdqvj-b6tijvp3oOP3wfRlyeB7jf0rrAUopsJX4C7YWXZxd9rH4k6UzRyj91uK5QQ8Y9vvdk50a3ZxPNvD-X5jtVVpqxCsKAzWyb2CLClFhkvx0So7CXxkm1cNxYV4f6Xvi9UwKJceR2vfGMvHvDiJQzzppHWYuZPyGuaCdLRPZPaiONQ9aqOI4y2D1DftGGdGUgxzaDNAF4Iyw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "9c920671-792d-43b6-a51e-efa9cb60434a",
      "x": "DV0o9WIcYD2zskpTzkMyVzH6ShTsXlzEVvNNdbj0P4s",
      "y": "xTHZIzt0gCESQ1wZywngvooFZ3NkxBqg3zhDasTcqU8",
      "alg": "ECDH-ES"
    }
  ]
}
2021-06-13 20:43:52 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2021-06-13 20:43:52 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2021-06-13 20:43:52 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": 1580000000
}
2021-06-13 20:43:52 SUCCESS
OIDCCGetStaticClientConfigurationForRPTests
Found a static client object
client_id
87654321
client_secret
12345678
redirect_uris
[
  "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
]
2021-06-13 20:43:52 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "client_id": "87654321",
  "client_secret": "12345678",
  "redirect_uris": [
    "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
  ]
}
2021-06-13 20:43:52 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2021-06-13 20:43:52 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2021-06-13 20:43:52 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
]
2021-06-13 20:43:52 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2021-06-13 20:43:52 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2021-06-13 20:43:52 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2021-06-13 20:43:52 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2021-06-13 20:43:52 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2021-06-13 20:43:52 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2021-06-13 20:43:52 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2021-06-13 20:43:52 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-06-13 20:43:52 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2021-06-13 20:43:52 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2021-06-13 20:43:52 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2021-06-13 20:43:52 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2021-06-13 20:43:52 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2021-06-13 20:43:52 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2021-06-13 20:43:52 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2021-06-13 20:43:52 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2021-06-13 20:43:52 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2021-06-13 20:43:52 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2021-06-13 20:43:52
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2021-06-13 20:43:52
oidcc-client-test-missing-iat
Setup Done
2021-06-13 20:44:58 INCOMING
oidcc-client-test-missing-iat
Incoming HTTP request to test instance mT2k9kCELswXJUp
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "application/xml, text/xml, application/json, application/*+xml, application/*+json",
  "user-agent": "Java/11.0.8",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2021-06-13 20:44:58 OUTGOING
oidcc-client-test-missing-iat
Response to HTTP request to test instance mT2k9kCELswXJUp
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2021-06-13 20:45:39 INCOMING
oidcc-client-test-missing-iat
Incoming HTTP request to test instance mT2k9kCELswXJUp
incoming_headers
{
  "host": "www.certification.openid.net",
  "cache-control": "max-age\u003d0",
  "upgrade-insecure-requests": "1",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "cross-site",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "sec-ch-ua": "\" Not A;Brand\";v\u003d\"99\", \"Chromium\";v\u003d\"90\", \"Google Chrome\";v\u003d\"90\"",
  "sec-ch-ua-mobile": "?0",
  "referer": "https://env-239211.customer.cloud.microstrategy.com/",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en-GB,en-GB-oxendict;q\u003d0.9,en;q\u003d0.8,tr;q\u003d0.7,eu;q\u003d0.6",
  "cookie": "__utmc\u003d201319536; __utmz\u003d201319536.1623336640.30.8.utmcsr\u003dcertification.openid.net|utmccn\u003d(referral)|utmcmd\u003dreferral|utmcct\u003d/; __utma\u003d201319536.763838286.1615572732.1623353581.1623411213.32; JSESSIONID\u003d32A224047A3267CDD9D4EE876688B2EF",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "response_type": "code",
  "client_id": "87654321",
  "scope": "openid profile email offline_access",
  "state": "m5lT_sw0RucHBc0yWUnH_LTfDQVJClR3XrMS5B_H75E\u003d",
  "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login",
  "nonce": "71iKTUBEjHfVwXPRBzv21pXcVrch1DNnNbnDLwM442I"
}
incoming_body
Authorization endpoint
2021-06-13 20:45:39 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2021-06-13 20:45:39 SUCCESS
EnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "profile",
  "email",
  "offline_access"
]
expected
openid
2021-06-13 20:45:39 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "response_type": "code",
  "client_id": "87654321",
  "scope": "openid profile email offline_access",
  "state": "m5lT_sw0RucHBc0yWUnH_LTfDQVJClR3XrMS5B_H75E\u003d",
  "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login",
  "nonce": "71iKTUBEjHfVwXPRBzv21pXcVrch1DNnNbnDLwM442I"
}
2021-06-13 20:45:39 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid profile email offline_access
2021-06-13 20:45:39 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
71iKTUBEjHfVwXPRBzv21pXcVrch1DNnNbnDLwM442I
2021-06-13 20:45:39 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2021-06-13 20:45:39 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
87654321
2021-06-13 20:45:39 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login
expected
[
  "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
]
2021-06-13 20:45:39 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "profile",
  "email",
  "offline_access"
]
expected
openid
2021-06-13 20:45:39 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2021-06-13 20:45:39 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
JtQmuk7PiM
2021-06-13 20:45:39 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
GIilrdUjrbjuMxJ6X2saIg
2021-06-13 20:45:39 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login",
  "state": "m5lT_sw0RucHBc0yWUnH_LTfDQVJClR3XrMS5B_H75E\u003d"
}
2021-06-13 20:45:39 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login",
  "state": "m5lT_sw0RucHBc0yWUnH_LTfDQVJClR3XrMS5B_H75E\u003d",
  "code": "JtQmuk7PiM"
}
2021-06-13 20:45:39
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login?state=m5lT_sw0RucHBc0yWUnH_LTfDQVJClR3XrMS5B_H75E%3D&code=JtQmuk7PiM
2021-06-13 20:45:39 OUTGOING
oidcc-client-test-missing-iat
Response to HTTP request to test instance mT2k9kCELswXJUp
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login?state=m5lT_sw0RucHBc0yWUnH_LTfDQVJClR3XrMS5B_H75E%3D&code=JtQmuk7PiM]
outgoing_path
authorize
2021-06-13 20:45:39 INCOMING
oidcc-client-test-missing-iat
Incoming HTTP request to test instance mT2k9kCELswXJUp
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "application/json;charset\u003dUTF-8",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "authorization": "Basic ODc2NTQzMjE6MTIzNDU2Nzg\u003d",
  "user-agent": "Java/11.0.8",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "161",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "grant_type": "authorization_code",
  "code": "JtQmuk7PiM",
  "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
grant_type=authorization_code&code=JtQmuk7PiM&redirect_uri=https%3A%2F%2Fenv-239211.customer.cloud.microstrategy.com%2FMicroStrategyLibrary%2Fauth%2Foidc%2Flogin
Token endpoint
2021-06-13 20:45:39 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
87654321
client_secret
12345678
method
client_secret_basic
2021-06-13 20:45:39 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2021-06-13 20:45:39 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
JtQmuk7PiM
2021-06-13 20:45:39 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login
2021-06-13 20:45:39 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
1PPSybjptbKov8YC5qJw9GVKe6sqnmqqgKPrVu1hazCG8hav0T
2021-06-13 20:45:39 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
zMXnNCr-DxrwCsXDc6S0mA
2021-06-13 20:45:39 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/MSTR_M2021_UP1/
sub
user-subject-1234531
aud
87654321
nonce
71iKTUBEjHfVwXPRBzv21pXcVrch1DNnNbnDLwM442I
iat
1623617139
exp
1623617439
2021-06-13 20:45:39 SUCCESS
RemoveIatFromIdToken
Removed iat from ID token claims
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/",
  "sub": "user-subject-1234531",
  "aud": "87654321",
  "nonce": "71iKTUBEjHfVwXPRBzv21pXcVrch1DNnNbnDLwM442I",
  "exp": 1623617439
}
2021-06-13 20:45:39 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
zMXnNCr-DxrwCsXDc6S0mA
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/",
  "sub": "user-subject-1234531",
  "aud": "87654321",
  "nonce": "71iKTUBEjHfVwXPRBzv21pXcVrch1DNnNbnDLwM442I",
  "exp": 1623617439,
  "at_hash": "zMXnNCr-DxrwCsXDc6S0mA"
}
2021-06-13 20:45:39 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiIxZjNiY2U0Ni1kMDgxLTQwN2UtYjgzNC0yYjNjOWNmODk2ZGEiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiek1Ybk5Dci1EeHJ3Q3NYRGM2UzBtQSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiODc2NTQzMjEiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvTVNUUl9NMjAyMV9VUDFcLyIsImV4cCI6MTYyMzYxNzQzOSwibm9uY2UiOiI3MWlLVFVCRWpIZlZ3WFBSQnp2MjFwWGNWcmNoMURObk5ibkRMd000NDJJIn0.ZG_K35SXuJYCkYb6yi5IRSEVXtcK2qJYSHyjRSq67mvViTB4NABqZMksoPe8Sqom67duvLL7DSFZzTWm8U4QFKKS0fycXdkMy8Ke1Qd9Z8NEe205GsrT17DzZchh-CSO9AdLRBChdesfAC_RYq240VQE7voRJvuwJI_ayCOmL5UlGwuDxyusIWhsmzdkzxsZCDgXvZSqWtRIYLz85bFa0MqASA_TKAFkFZ6WZcg992NjNygZra2I563eRjNuJse65YpdPq7cUMxZFzztsLrwjdI_fSjlYXFI2tKZSQKbOUa51nNhED4z7gJfS4yUTxY1tf0mdV-OmuK_u7cW6Ojrvw
key
{"p":"9k1L9lFBCqBM6lMzg5fhxKE0AXk4CXmkiLGN-dULoYkvBL9IGi6ErN7gjpiNACJWK4L_pvI1M7JzLjYsSxPt3kDSgZUdFFcc-d5BnKDUvYGungRqLNChU1808NbGQP-eSxQ2qPD6efxwbUnTSFFCJ_PiNKeekEk_NHiG4toI0JM","kty":"RSA","q":"mhweou6ketiY79mcVCtzTEg9lvLJ59HJK4mNs7H6VZlfzLlFWT4nB9cTOTfq5vPl-ckp6x2FPCvFUPnUpEyb3R7oyi9xSMsLiGbbBZMZ-MN4gAJD8AQQZ-ZYHULS4_aLAbjkKekujwj3isTRKmvanyULVMnG2oKK6rfGBYaA-F0","d":"WeIkLgZEuqQ58x5mswT5ZTO_gNhN4tzUbLBaDNAA7yYEnm8i_t9jVgpA_to4xpfZ_oAvIpQaHvm1i3JVaNRf03XkHY8yrMRfHTYOpJye45jf-6Emljso-X5Kl-ZAoq4istVpMzXESM4FuD0Vs9R0POK_naFwZG0T2gMlUR82BsxBgeOyn30FeB9zRaWQyf-L0wZKzZg3p-zaes_eokugwqW7ZtZO2Xtfc-56roXRWkDZ-u-bZR1KNlVL3ILUDQhMgPCfpfKH1L85md845myr61CA-0IwGgCW9re6jk9u6XuzvF_XTUFAOuetrxbCtWARx37zzv-30dzWxStzxqbi-Q","e":"AQAB","use":"sig","kid":"1f3bce46-d081-407e-b834-2b3c9cf896da","qi":"0RYqyBvOc-Us6pHaGuCR-rgwBjaKuPYAFCDnhhQEVdFQBnVlhtLxmHGRzqVVZGuB5a9HgcGoGzaJPJl_12L1uaE-Y03kqICggbbx7LQxn0KYi96rBnYfxqv40yrkPrzXwSTnyKARrt7OWw03VNvAy416VHonp_HevmsGyxOdrxs","dp":"5NCihU6vMgQB8J8i-FmdcGKiQcwvdv3_EM6Cq1p017juaWaawVf-Aet8inzGYR2FGB83Cg1xx3k87-178LOvBA8MgT3aKg9T5_3Gzo_Lk9JqOnq3eLLJbP7B3AxrWe8fS3iX3xMgXztZ5u3yzvhOkXdM6sXd1QV3JnPiO9V64uk","dq":"WYt9Qa7oY3j3ZGZNL5sPo4NWRh9MsiZzfZivfXosuxAjWhFM-k3i3-tYgCa9lvSg7EK22KaOhCfqvuJrbAwXhKQxH0nxyRox2U_qc5LFxIXPvpGSaCP0ZGqzSE1LvKnEm3uTF8cmBnZvX3J9FukUXuRncRzNLqorjba6mPtOdQE","n":"lEWNoE09DzuGG4rdtaanqkFUkFzHzKyo2_3NEF-pL4PkyO_4kGeg0tIlrT7a_9R_CFHlgjO4pl_E2szMO5OfNxkOgEnsUiM4YsAIa3Mc2YKxp6OWI79t8H3o2wnHSfjA2hsGYHRyTR6hTJ0idcqBVTKrcT28n8_oBhOLtOVqGEmhxZ0Rkrvh185Sk0wUTgcXGfpkoi319fTrmVyZvXK3HnnMoqjzTChQGfoI6iL8xSzRV3zYE49qMFKU_dnGLpHZEwVOHfGTSabaFArSZi1l6UTc9N723A6v_0zfIEEja8ZfOV5MrTM02hQR5rUcNS6bupC0gW5uQOuMlSoV-sItZw"}
algorithm
RS256
2021-06-13 20:45:39 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2021-06-13 20:45:39 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
1PPSybjptbKov8YC5qJw9GVKe6sqnmqqgKPrVu1hazCG8hav0T
token_type
Bearer
id_token
eyJraWQiOiIxZjNiY2U0Ni1kMDgxLTQwN2UtYjgzNC0yYjNjOWNmODk2ZGEiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiek1Ybk5Dci1EeHJ3Q3NYRGM2UzBtQSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiODc2NTQzMjEiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvTVNUUl9NMjAyMV9VUDFcLyIsImV4cCI6MTYyMzYxNzQzOSwibm9uY2UiOiI3MWlLVFVCRWpIZlZ3WFBSQnp2MjFwWGNWcmNoMURObk5ibkRMd000NDJJIn0.ZG_K35SXuJYCkYb6yi5IRSEVXtcK2qJYSHyjRSq67mvViTB4NABqZMksoPe8Sqom67duvLL7DSFZzTWm8U4QFKKS0fycXdkMy8Ke1Qd9Z8NEe205GsrT17DzZchh-CSO9AdLRBChdesfAC_RYq240VQE7voRJvuwJI_ayCOmL5UlGwuDxyusIWhsmzdkzxsZCDgXvZSqWtRIYLz85bFa0MqASA_TKAFkFZ6WZcg992NjNygZra2I563eRjNuJse65YpdPq7cUMxZFzztsLrwjdI_fSjlYXFI2tKZSQKbOUa51nNhED4z7gJfS4yUTxY1tf0mdV-OmuK_u7cW6Ojrvw
scope
openid profile email offline_access
2021-06-13 20:45:39 OUTGOING
oidcc-client-test-missing-iat
Response to HTTP request to test instance mT2k9kCELswXJUp
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "1PPSybjptbKov8YC5qJw9GVKe6sqnmqqgKPrVu1hazCG8hav0T",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiIxZjNiY2U0Ni1kMDgxLTQwN2UtYjgzNC0yYjNjOWNmODk2ZGEiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiek1Ybk5Dci1EeHJ3Q3NYRGM2UzBtQSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiODc2NTQzMjEiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvTVNUUl9NMjAyMV9VUDFcLyIsImV4cCI6MTYyMzYxNzQzOSwibm9uY2UiOiI3MWlLVFVCRWpIZlZ3WFBSQnp2MjFwWGNWcmNoMURObk5ibkRMd000NDJJIn0.ZG_K35SXuJYCkYb6yi5IRSEVXtcK2qJYSHyjRSq67mvViTB4NABqZMksoPe8Sqom67duvLL7DSFZzTWm8U4QFKKS0fycXdkMy8Ke1Qd9Z8NEe205GsrT17DzZchh-CSO9AdLRBChdesfAC_RYq240VQE7voRJvuwJI_ayCOmL5UlGwuDxyusIWhsmzdkzxsZCDgXvZSqWtRIYLz85bFa0MqASA_TKAFkFZ6WZcg992NjNygZra2I563eRjNuJse65YpdPq7cUMxZFzztsLrwjdI_fSjlYXFI2tKZSQKbOUa51nNhED4z7gJfS4yUTxY1tf0mdV-OmuK_u7cW6Ojrvw",
  "scope": "openid profile email offline_access"
}
outgoing_path
token
2021-06-13 20:45:40 INCOMING
oidcc-client-test-missing-iat
Incoming HTTP request to test instance mT2k9kCELswXJUp
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "application/json, application/jwk-set+json",
  "user-agent": "Java/11.0.8",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2021-06-13 20:45:40 OUTGOING
oidcc-client-test-missing-iat
Response to HTTP request to test instance mT2k9kCELswXJUp
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "1f3bce46-d081-407e-b834-2b3c9cf896da",
      "n": "lEWNoE09DzuGG4rdtaanqkFUkFzHzKyo2_3NEF-pL4PkyO_4kGeg0tIlrT7a_9R_CFHlgjO4pl_E2szMO5OfNxkOgEnsUiM4YsAIa3Mc2YKxp6OWI79t8H3o2wnHSfjA2hsGYHRyTR6hTJ0idcqBVTKrcT28n8_oBhOLtOVqGEmhxZ0Rkrvh185Sk0wUTgcXGfpkoi319fTrmVyZvXK3HnnMoqjzTChQGfoI6iL8xSzRV3zYE49qMFKU_dnGLpHZEwVOHfGTSabaFArSZi1l6UTc9N723A6v_0zfIEEja8ZfOV5MrTM02hQR5rUcNS6bupC0gW5uQOuMlSoV-sItZw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "6d144a90-055b-4a6d-bfe5-b091b6dbeb7b",
      "n": "orMb8SnhRfZlyTajUEy7NnMCEz2c7FmwEZd_YCkkfETQVinAU_KK5t6XrEcIx3QKJg3HHwhruhExDgs_5Hi6VT3si98dQE6ng4TYqLosiTsfg0PJWVsuDH-h0EvvzfcEY0jOa3XDZeuQFV1cetJqSPxwOx6vgVvOVrIsRbf-W6x81Td1xFay1fcSe_5BpxrWexqWl8EAkGLd9r900mfRzUfdl_r9RSL2UYn1cu36BlURpbfBRWo5X1lroNSliZrFbBJucHQ6RDNuPC_ruobvp0aJQ38TClRxGiItY8tFOB7GzzC9FSuWVYMlNw0N93ZyL4QearTlc4CepZ7WB_FdNw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "8c791c87-ba4f-4bc5-a581-56637eee6e2a",
      "x": "yZ0IsZsqUsT4AnHbg4_peMhuyUdOF6AX_xq_2WHZzvo",
      "y": "JMSVCrzs3MewEE0LHfcHhRX24JcsXBdbs5YFrqGcp8c"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "29172298-8459-4f70-a2d4-2e869d6663cd",
      "x": "AcAqB41Wu6Ebz-WSjvTgwKJwuIV_FUG-mcEVdiHabno",
      "y": "3fq-ODaDjNVJNWJ2VCtyBxP-k1XzepRSfqBGLQ-fDjc"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "a5b7639a-b417-4a82-b5b1-cb1e661300fc",
      "x": "gxYm9P_btNnLz_QvkDSPMfSe1ihi_1irzFVVXpbQ7VY",
      "y": "Zipe7XubUBUU8Vh6380ES1GREKRYXjri8BtLAVfNFpM"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "9591c796-41ab-4673-8a08-75e3fc3ed120",
      "x": "n__lU2DWjkYLVKa8V9KR7fXcEtWn0VYaiBS0oSBmvhE"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "d558fee0-ebff-4213-af1a-64d94cf4daac",
      "alg": "RSA-OAEP",
      "n": "mZl3de3_ekJIyWww_9BZByI5hnAnEyMKiG0dpLo7RwKvftalmIxQOhyQcRazLqG28ZPPqLRcYt5fDVGh97S8oi-40qDmxiguKnD0nOUHyEYVx-Pf3CoHqI5c3KDpwB6Y66bwnjUKdqvj-b6tijvp3oOP3wfRlyeB7jf0rrAUopsJX4C7YWXZxd9rH4k6UzRyj91uK5QQ8Y9vvdk50a3ZxPNvD-X5jtVVpqxCsKAzWyb2CLClFhkvx0So7CXxkm1cNxYV4f6Xvi9UwKJceR2vfGMvHvDiJQzzppHWYuZPyGuaCdLRPZPaiONQ9aqOI4y2D1DftGGdGUgxzaDNAF4Iyw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "9c920671-792d-43b6-a51e-efa9cb60434a",
      "x": "DV0o9WIcYD2zskpTzkMyVzH6ShTsXlzEVvNNdbj0P4s",
      "y": "xTHZIzt0gCESQ1wZywngvooFZ3NkxBqg3zhDasTcqU8",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2021-06-13 20:45:44 FINISHED
oidcc-client-test-missing-iat
Test has run to completion
testmodule_result
PASSED
2021-06-13 20:46:06
TEST-RUNNER
Alias has now been claimed by another test
alias
MSTR_M2021_UP1
new_test_id
iQRdRarZ75jiYDB
Test Results