Test Summary

Test Results

Expand All Collapse All
All times are UTC
2021-06-13 20:28:52 INFO
TEST-RUNNER
Test instance QEHzQXejBoBoHt6 created
baseUrl
https://www.certification.openid.net/test/a/MSTR_M2021_UP1
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "response_mode": "default",
  "client_registration": "static_client"
}
alias
MSTR_M2021_UP1
description
planId
iEllghTC7G18K
config
{
  "alias": "MSTR_M2021_UP1",
  "client": {
    "client_id": "87654321",
    "client_secret": "12345678",
    "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
  }
}
testName
oidcc-client-test
2021-06-13 20:28:52 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-06-13 20:28:52
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-06-13 20:28:52
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "1zJeOQkEcVfYYpjrvnLGAqsPZFcc2RVOMBFKqPlgb5fQ2DHg49wR3uW89HpR_0rPGHb-9UAcd1WrX_6KEbsuCzdzZJAFhi8flEpuSilXlBvnTx17VWeWnoyDGfbVuZJ9RxZMCUugyBMAwQpUaT08j6x_kgEb6_zflMxpzutlFqc",
      "kty": "RSA",
      "q": "wHnKN5yN8wiAAnXyIxKE-g9F8ij4BFkk9pn_AuCNfdlHFPqwnKKCWJhI5jRIjoJmG8MsbhQgsFTBW5Tr8RbISO6YLAmAPwPi-PiuuwqwZO3aHglxnnFZuFu-3mNH-lDSEpMLmmmdvdU3cI2lUYUXKuE21TtZqvm8f8bKqlfCFxE",
      "d": "XEndAD70WWzUJjud_anfVrs0RwrmbXue5BoOhkNwnxLDsEbnRK5Xvec0iU1xlWQF2X2X7tOQs-W5btd9dnQlIw-QyyAY4PsmHw0ya_S5kUKUrGq9oBsPyLK2yA-RA2r2lTG63xiK9k8T_6eTOsFrJbjvBSZ5Bae1fYHWsd0urVap5nosQhcPX1k6DS1Hp3YWMS0L_11nAzZxxo-VFR8EW7N_OJJfAHTPgBLl_1Sr_LgPj_blQ3JSqhs1CvdrjIMesZMv_soUVOZCp_eq1N46QGeqFTDVsFhyBqZX4UgMhB4qMn_C4y6858mKSIPSKGe268LiFkYvJJ6C3cM2XMO6QQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "891ce829-1481-468f-8c73-fd5250c3bfd7",
      "qi": "Ip4I8gN_TAR-uUYF6qaDXdhuKTaezmS8fxSNvs8ScFlcKMNStM2jeFm_8RWOspT4MromdC4oyPc_PoopkhCp-1PV4rMvlGnyBIHmUqr_XdCZ5DdIJugWL9XI0Aa2uYVxJ1UTr1uc12H2Ua7RkwsbcaO7LEgpOUocfeAJQZYsWiw",
      "dp": "D2-ofJTeAbdYaTIo7t9SvsxAbWUmR5gUpLQI0_gXZ8nPDEL_q7iUe5WlKTBBA3v9QPcAMN1pbVHy2g7rHnx7wAg5OcRu8QIeVMfGA4HVq2UZAX7O4wBsOHFB0jH3gLk2TUwXJi-Ll-5tBmvURDxFRNUNzY5Qz2uzKfxDtrkB5k8",
      "dq": "o_8hbYDW8dysNWyJg5ij9OxOjKabrBjIhdVwkuMBq9kV16pCETPmG9alRoAF0mcI2V7S3HgJ4jRVC9M3tZPT01B4GA2AWDDXk4tQVc4lvdlrn2wsgvPRnmONna66BW4Xj_v6Rvb2kGi7dAs8cNkVhFOghM6s-CERm02mIL3lggE",
      "n": "ocwndc192-6BueZqpjEKQ0RTIBXJkrBpn_6X802cK5PtOrT7RZpEC6mCklGfg6y_dYZ3ta4CizomhKuCQK-A1j6QdgO5t6DUv3-zsP4-XBiHpID6xhUegBQoV182FItjem8-LHtkPH9We_ooXZsZBHqynaD2Ljd9-XLRjalOJ8oy6mij5o6GqUvtSRlwT6DnDhhzm6l5TRFhBdSa_uyU6beJi_YSaH_BBjINl99KqFLb1KQW4L9sJpwByP1j2-INc9ANCBgm2QrLRHi1r3h7o05BpPPnE6SEwbfta3EHx5tTlbcO7hv3s143KyF0K1KyZo2WPI6b7UszDSwXok2CFw"
    },
    {
      "kty": "EC",
      "d": "J8P9_-RYwRuE-2lBR4vcFGmlU1Em3y1gXbnu6-lyul8",
      "use": "sig",
      "crv": "P-256",
      "kid": "14d6d12f-b6ba-4a78-84c3-e7e82dde4d9b",
      "x": "vZCFM-677eNpSEEofkEkxInZY-AdAeLWV46LQo0mOAo",
      "y": "9fkIELPm2Hg7nmliPm8ek04seUSjMhTYa8QX-ifAMn0"
    },
    {
      "kty": "EC",
      "d": "oKo2128wiyPXO3v4cphh-z0fE_5gjeAT5gX5xoz-zG8",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "c678cd11-e846-4af4-a384-d25f1d405c04",
      "x": "xUkmisHGlLAayUlZ6MVYN1JjntsYUSZAfPnE84d_LdU",
      "y": "O9Y10pbC_NZvlTWsy_dlt2ac9nNAXi--Oppef9wjelw"
    },
    {
      "kty": "OKP",
      "d": "8I5LpIBMJzA_B4Kw1m9XYuVMsmcsE2cFzqsOovgL-5M",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "c3f9c25a-b8c7-4020-a50f-dc32eb7c6fb9",
      "x": "IPzjjJ3WDbpdgbUJdnccjuk8jdyOj07GfIZ-fRHnPEE"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "2PdfQc5sezcVnQfwOA0ZMifk02VsfLjmAtZ-WJatwXYVfkVfx9d1spQwjHfaGT0cTm6bQgPR2WtNL8q4Ua6iHa9jJUQ6aSXpyqBwJfFPM3WZQznc4bCxIHuUWHYtEpIbktyT0TaNh4SIvTWjVakOH4YOG3ZzIeAUyjzgeysxUa8",
      "kty": "RSA",
      "q": "uMWXiXCUQjynt_8r_BDonR8KFZxxH0D9USSPTgCfMz2GD70EV6Kfz1yuken0lowj7WGkdB2gD1WUhUOWpQusOQ5CXBxIgxsRTKws_GTPWHlgVZ_hW_V4qqtgHgaHfK94Tp-SGdUNKiHVyxms1LVY2a7S6ysl6eArzoqXPu282bs",
      "d": "m-feVTMnboRqkDqE2TElycJtefnPvuB8Hm5aA3IYJEN2hDZQqNWZYlye0Id6i_tCaH2WERjxT_5fHrNdmiRbAZ7cohfQgnZkdninMnnb9EQL4FUsqNvuFyhTQPxA7cPI3H0gPP8mHt9J80dBMfwnhTu8LKIOFR3ah71Y3nJKioMIQsKjTp0qqYgCIY3fnNZxSbMeTRgwP_XGixCurQHYlYV4bU1ig4aZdbN9StNatT1-pw6ZP5gKXjTsOg-ug0khOCYdpq0hFlkwdhbHJ6pX4MlMvEz-IK1rf4V62zU-rlK-zA5NU2PP6YmSpSsFODZOiJJzusZfX4H8b8-Pj2vwFQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "2686a0b6-09e6-4e94-bb29-97b25194e015",
      "qi": "Gz1a6L3HwqlPl4Z8iobgv3J9RlxyyLFoY9OkzsZFLfoB9pBOKOXUJRnuZ9jLFvugRuDRNKGZuXPbpAxhvzDGrqmZRnCI_fxyfy13rIC2Fr8ZtIgalER20i-JAW6sSV-bymOSNOVAwzpTDhD-SEKkYqVWrr4mDn8u_GJ_3zhsL0Y",
      "dp": "zBdmM7DJut4GJsDg5tjrapK8XV56vpfvRZwfHZYfvGwnq6_2eTXkMSfUw026iyNBDUZeJasSK0MUSHCZEb0EIoho6xVTHLXdRg3FcOudZPqqQOKdNG_RLo0Q7mW74EwwQ-XZ5mM6ns-9EL7z9hAgiObBPnQduS_gXp0FTNdEfWE",
      "alg": "RSA-OAEP",
      "dq": "nhBqkii8q-03jS-9cOUGGWN0PQiXvSTbj463CQN_LVZ0WQJZtJ5qF_oxXKHHmwJHucrN5IdzZarQYzBursJNkoGgQyvu3DlLk0u3MDMNLaKnxpf_MavMjjQNBaKQRRnW0WuwkGix2lkXi6drMovwdkgYJxXCWVBsKURmHm9CHw",
      "n": "nJlDQf79fdbosVVGWB96hDd53Pm_qg82KxEWvHbdxrjxkGDSLGpmVXyCvL1c2UcXpXHD_O-M1u5SJ9FvvKXsder8iAoF6vUlrGS7Yqtx-cr-TXZ_xEUpBmakSMWpDd1dhts6NtdMKwH2CVG5u-p9OMBShYb4FTvoRs_RNvo5d68_lAF0WSe8wKXTJw5FjmfAfGCmaOVpIKIX1wAtHtyDWwSZiy9cuyURfjqls-L-Pmq0pzekU4m_oLOrhIZTzVh5sGDcr2G9jr4nUPlLnyuDHSXmYt_G79F9pGUM90UGO3VmMcQL8G4nq_RSl2k5CzOS7Usyyq2GBCidpsPOWsgB1Q"
    },
    {
      "kty": "EC",
      "d": "CDIe1BAVSE-Qg6EjwCukBfWqu0luID2iqnoySKnafbU",
      "use": "enc",
      "crv": "P-256",
      "kid": "f30c62db-49ce-4907-9a55-42abe718bbe8",
      "x": "C-gNl0UzJJ-StjfD5PrZKtxzmpYJ9_yXapC7zSseDHw",
      "y": "lAKK9rd7XWsxk4KjyV-tuIAgrNJE2E5u8cTWZucgvGk",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "891ce829-1481-468f-8c73-fd5250c3bfd7",
      "n": "ocwndc192-6BueZqpjEKQ0RTIBXJkrBpn_6X802cK5PtOrT7RZpEC6mCklGfg6y_dYZ3ta4CizomhKuCQK-A1j6QdgO5t6DUv3-zsP4-XBiHpID6xhUegBQoV182FItjem8-LHtkPH9We_ooXZsZBHqynaD2Ljd9-XLRjalOJ8oy6mij5o6GqUvtSRlwT6DnDhhzm6l5TRFhBdSa_uyU6beJi_YSaH_BBjINl99KqFLb1KQW4L9sJpwByP1j2-INc9ANCBgm2QrLRHi1r3h7o05BpPPnE6SEwbfta3EHx5tTlbcO7hv3s143KyF0K1KyZo2WPI6b7UszDSwXok2CFw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "424ab69f-dc23-4a60-a4f6-d2668c972197",
      "n": "uFa94V5NLLYx8hjVKZKZBSOMbUqjUtwwZDHJlvApU9h-K2CKYJjNk5KL0FHW5dYiNWKkKExgOpvEGzyIt1wVcrWo6qhMEgq-E12y64XJs9FtxNa99Hi7Bss_k_zbZM3p7iQL8GxC-Sg5EYqhoVbEJGXKxo4na4gaBlG0_nz5fPTj17h3Roooytth4WaTAfX36oNX25_ugaL6b-katrZ5Z1qLEwv4F1ONeZft4Xe8oJ0REyHQjoeFW4JkpYvDfP70AHOt7F-sXDqZXgkl1LpZSwdRKAbKiCyOQ1S0SmnubtMLr5HbwNHb3-xZCbqXRrkPzVRDg_2-Ojta8MjQNPwGYQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "14d6d12f-b6ba-4a78-84c3-e7e82dde4d9b",
      "x": "vZCFM-677eNpSEEofkEkxInZY-AdAeLWV46LQo0mOAo",
      "y": "9fkIELPm2Hg7nmliPm8ek04seUSjMhTYa8QX-ifAMn0"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "49a3c1e8-b61c-4114-99b5-53760ac5a85a",
      "x": "5c523Nr7PH-jwVZpxJpUAm1VpnUKvlBA2puqEO4y9AI",
      "y": "xn1LZQ7wVQyfuY4DlCYaegV_98totH2BYuVpagxMdCU"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "c678cd11-e846-4af4-a384-d25f1d405c04",
      "x": "xUkmisHGlLAayUlZ6MVYN1JjntsYUSZAfPnE84d_LdU",
      "y": "O9Y10pbC_NZvlTWsy_dlt2ac9nNAXi--Oppef9wjelw"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "c3f9c25a-b8c7-4020-a50f-dc32eb7c6fb9",
      "x": "IPzjjJ3WDbpdgbUJdnccjuk8jdyOj07GfIZ-fRHnPEE"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "2686a0b6-09e6-4e94-bb29-97b25194e015",
      "alg": "RSA-OAEP",
      "n": "nJlDQf79fdbosVVGWB96hDd53Pm_qg82KxEWvHbdxrjxkGDSLGpmVXyCvL1c2UcXpXHD_O-M1u5SJ9FvvKXsder8iAoF6vUlrGS7Yqtx-cr-TXZ_xEUpBmakSMWpDd1dhts6NtdMKwH2CVG5u-p9OMBShYb4FTvoRs_RNvo5d68_lAF0WSe8wKXTJw5FjmfAfGCmaOVpIKIX1wAtHtyDWwSZiy9cuyURfjqls-L-Pmq0pzekU4m_oLOrhIZTzVh5sGDcr2G9jr4nUPlLnyuDHSXmYt_G79F9pGUM90UGO3VmMcQL8G4nq_RSl2k5CzOS7Usyyq2GBCidpsPOWsgB1Q"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "f30c62db-49ce-4907-9a55-42abe718bbe8",
      "x": "C-gNl0UzJJ-StjfD5PrZKtxzmpYJ9_yXapC7zSseDHw",
      "y": "lAKK9rd7XWsxk4KjyV-tuIAgrNJE2E5u8cTWZucgvGk",
      "alg": "ECDH-ES"
    }
  ]
}
2021-06-13 20:28:52 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2021-06-13 20:28:52 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2021-06-13 20:28:52 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": 1580000000
}
2021-06-13 20:28:52 SUCCESS
OIDCCGetStaticClientConfigurationForRPTests
Found a static client object
client_id
87654321
client_secret
12345678
redirect_uris
[
  "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
]
2021-06-13 20:28:52 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "client_id": "87654321",
  "client_secret": "12345678",
  "redirect_uris": [
    "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
  ]
}
2021-06-13 20:28:52 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2021-06-13 20:28:52 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2021-06-13 20:28:52 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
]
2021-06-13 20:28:52 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2021-06-13 20:28:52 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2021-06-13 20:28:52 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2021-06-13 20:28:52 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2021-06-13 20:28:52 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2021-06-13 20:28:52 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2021-06-13 20:28:52 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2021-06-13 20:28:52 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-06-13 20:28:52 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2021-06-13 20:28:52 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2021-06-13 20:28:52 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2021-06-13 20:28:52 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2021-06-13 20:28:52 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2021-06-13 20:28:52 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2021-06-13 20:28:52 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2021-06-13 20:28:52 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2021-06-13 20:28:52 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2021-06-13 20:28:52 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2021-06-13 20:28:52
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2021-06-13 20:28:52
oidcc-client-test
Setup Done
2021-06-13 20:30:26 INCOMING
oidcc-client-test
Incoming HTTP request to test instance QEHzQXejBoBoHt6
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "application/xml, text/xml, application/json, application/*+xml, application/*+json",
  "user-agent": "Java/11.0.8",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2021-06-13 20:30:26 OUTGOING
oidcc-client-test
Response to HTTP request to test instance QEHzQXejBoBoHt6
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2021-06-13 20:31:33 INCOMING
oidcc-client-test
Incoming HTTP request to test instance QEHzQXejBoBoHt6
incoming_headers
{
  "host": "www.certification.openid.net",
  "cache-control": "max-age\u003d0",
  "upgrade-insecure-requests": "1",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "cross-site",
  "sec-fetch-mode": "navigate",
  "sec-fetch-dest": "document",
  "sec-ch-ua": "\" Not A;Brand\";v\u003d\"99\", \"Chromium\";v\u003d\"90\", \"Google Chrome\";v\u003d\"90\"",
  "sec-ch-ua-mobile": "?0",
  "referer": "https://env-239211.customer.cloud.microstrategy.com/",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en-GB,en-GB-oxendict;q\u003d0.9,en;q\u003d0.8,tr;q\u003d0.7,eu;q\u003d0.6",
  "cookie": "__utmc\u003d201319536; __utmz\u003d201319536.1623336640.30.8.utmcsr\u003dcertification.openid.net|utmccn\u003d(referral)|utmcmd\u003dreferral|utmcct\u003d/; __utma\u003d201319536.763838286.1615572732.1623353581.1623411213.32; JSESSIONID\u003d32A224047A3267CDD9D4EE876688B2EF",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "response_type": "code",
  "client_id": "87654321",
  "scope": "openid profile email offline_access",
  "state": "dOVKpIcW7_QhOHEYtFbILALU6qTFr4GxUzI3ISQ5J84\u003d",
  "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login",
  "nonce": "P4vQ4z4EXLb2o0gE1RhrbVMDJqk595PPH3iQO4WArXI"
}
incoming_body
Authorization endpoint
2021-06-13 20:31:33 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2021-06-13 20:31:33 SUCCESS
EnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "profile",
  "email",
  "offline_access"
]
expected
openid
2021-06-13 20:31:33 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "response_type": "code",
  "client_id": "87654321",
  "scope": "openid profile email offline_access",
  "state": "dOVKpIcW7_QhOHEYtFbILALU6qTFr4GxUzI3ISQ5J84\u003d",
  "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login",
  "nonce": "P4vQ4z4EXLb2o0gE1RhrbVMDJqk595PPH3iQO4WArXI"
}
2021-06-13 20:31:33 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid profile email offline_access
2021-06-13 20:31:33 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
P4vQ4z4EXLb2o0gE1RhrbVMDJqk595PPH3iQO4WArXI
2021-06-13 20:31:33 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2021-06-13 20:31:33 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
87654321
2021-06-13 20:31:33 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login
expected
[
  "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
]
2021-06-13 20:31:33 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "profile",
  "email",
  "offline_access"
]
expected
openid
2021-06-13 20:31:33 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2021-06-13 20:31:33 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
i5AQITE7Hq
2021-06-13 20:31:33 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
3KY-JV6-pTs5WYxex8knNw
2021-06-13 20:31:33 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login",
  "state": "dOVKpIcW7_QhOHEYtFbILALU6qTFr4GxUzI3ISQ5J84\u003d"
}
2021-06-13 20:31:33 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login",
  "state": "dOVKpIcW7_QhOHEYtFbILALU6qTFr4GxUzI3ISQ5J84\u003d",
  "code": "i5AQITE7Hq"
}
2021-06-13 20:31:33
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login?state=dOVKpIcW7_QhOHEYtFbILALU6qTFr4GxUzI3ISQ5J84%3D&code=i5AQITE7Hq
2021-06-13 20:31:33 OUTGOING
oidcc-client-test
Response to HTTP request to test instance QEHzQXejBoBoHt6
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login?state=dOVKpIcW7_QhOHEYtFbILALU6qTFr4GxUzI3ISQ5J84%3D&code=i5AQITE7Hq]
outgoing_path
authorize
2021-06-13 20:31:33 INCOMING
oidcc-client-test
Incoming HTTP request to test instance QEHzQXejBoBoHt6
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "application/json;charset\u003dUTF-8",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "authorization": "Basic ODc2NTQzMjE6MTIzNDU2Nzg\u003d",
  "user-agent": "Java/11.0.8",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "161",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "grant_type": "authorization_code",
  "code": "i5AQITE7Hq",
  "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
grant_type=authorization_code&code=i5AQITE7Hq&redirect_uri=https%3A%2F%2Fenv-239211.customer.cloud.microstrategy.com%2FMicroStrategyLibrary%2Fauth%2Foidc%2Flogin
Token endpoint
2021-06-13 20:31:33 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
87654321
client_secret
12345678
method
client_secret_basic
2021-06-13 20:31:33 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2021-06-13 20:31:33 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
i5AQITE7Hq
2021-06-13 20:31:33 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login
2021-06-13 20:31:33 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
woSOwso5RyMxqP82OvKwx6woLtYZRGHwrhJW2CotypVZqRpyxz
2021-06-13 20:31:33 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
gZI7B2SukFPUeVZhQ92MNg
2021-06-13 20:31:33 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/MSTR_M2021_UP1/
sub
user-subject-1234531
aud
87654321
nonce
P4vQ4z4EXLb2o0gE1RhrbVMDJqk595PPH3iQO4WArXI
iat
1623616293
exp
1623616593
2021-06-13 20:31:33 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
gZI7B2SukFPUeVZhQ92MNg
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/",
  "sub": "user-subject-1234531",
  "aud": "87654321",
  "nonce": "P4vQ4z4EXLb2o0gE1RhrbVMDJqk595PPH3iQO4WArXI",
  "iat": 1623616293,
  "exp": 1623616593,
  "at_hash": "gZI7B2SukFPUeVZhQ92MNg"
}
2021-06-13 20:31:33 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiI4OTFjZTgyOS0xNDgxLTQ2OGYtOGM3My1mZDUyNTBjM2JmZDciLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiZ1pJN0IyU3VrRlBVZVZaaFE5Mk1OZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiODc2NTQzMjEiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvTVNUUl9NMjAyMV9VUDFcLyIsImV4cCI6MTYyMzYxNjU5Mywibm9uY2UiOiJQNHZRNHo0RVhMYjJvMGdFMVJocmJWTURKcWs1OTVQUEgzaVFPNFdBclhJIiwiaWF0IjoxNjIzNjE2MjkzfQ.Nmg_1p6VgttZCDJ_UhCyb1vyzAy3ULEDzC80uat7XzINyaI6_LkP29c5Y-dzctRrt0BYjXvNhuDqGW6ANRUoWfXxrKm6IpO1-aHWCZLE5TfxCuUsMi6MpXKzI-MzyvWEuACiRn3drM3jomQLodWOQDNKeYzbPXjIkfJpkcVHaTGiOKTwzMGzLOIPQV-ePr2rikoZAM0FEcVcSF4G1JGl5YvvmKHa0aShLTuyaoAxbSlYFvogAJcOG9MVKHOwOzwOmaGnalK7NtlwDMy6DoHmqRVsBoxxMdbYtWY-ROa4Rfq72BwdS0aJq0IwiHtwO5MGe6lC3xxboCAp3-tNjrm_sQ
key
{"p":"1zJeOQkEcVfYYpjrvnLGAqsPZFcc2RVOMBFKqPlgb5fQ2DHg49wR3uW89HpR_0rPGHb-9UAcd1WrX_6KEbsuCzdzZJAFhi8flEpuSilXlBvnTx17VWeWnoyDGfbVuZJ9RxZMCUugyBMAwQpUaT08j6x_kgEb6_zflMxpzutlFqc","kty":"RSA","q":"wHnKN5yN8wiAAnXyIxKE-g9F8ij4BFkk9pn_AuCNfdlHFPqwnKKCWJhI5jRIjoJmG8MsbhQgsFTBW5Tr8RbISO6YLAmAPwPi-PiuuwqwZO3aHglxnnFZuFu-3mNH-lDSEpMLmmmdvdU3cI2lUYUXKuE21TtZqvm8f8bKqlfCFxE","d":"XEndAD70WWzUJjud_anfVrs0RwrmbXue5BoOhkNwnxLDsEbnRK5Xvec0iU1xlWQF2X2X7tOQs-W5btd9dnQlIw-QyyAY4PsmHw0ya_S5kUKUrGq9oBsPyLK2yA-RA2r2lTG63xiK9k8T_6eTOsFrJbjvBSZ5Bae1fYHWsd0urVap5nosQhcPX1k6DS1Hp3YWMS0L_11nAzZxxo-VFR8EW7N_OJJfAHTPgBLl_1Sr_LgPj_blQ3JSqhs1CvdrjIMesZMv_soUVOZCp_eq1N46QGeqFTDVsFhyBqZX4UgMhB4qMn_C4y6858mKSIPSKGe268LiFkYvJJ6C3cM2XMO6QQ","e":"AQAB","use":"sig","kid":"891ce829-1481-468f-8c73-fd5250c3bfd7","qi":"Ip4I8gN_TAR-uUYF6qaDXdhuKTaezmS8fxSNvs8ScFlcKMNStM2jeFm_8RWOspT4MromdC4oyPc_PoopkhCp-1PV4rMvlGnyBIHmUqr_XdCZ5DdIJugWL9XI0Aa2uYVxJ1UTr1uc12H2Ua7RkwsbcaO7LEgpOUocfeAJQZYsWiw","dp":"D2-ofJTeAbdYaTIo7t9SvsxAbWUmR5gUpLQI0_gXZ8nPDEL_q7iUe5WlKTBBA3v9QPcAMN1pbVHy2g7rHnx7wAg5OcRu8QIeVMfGA4HVq2UZAX7O4wBsOHFB0jH3gLk2TUwXJi-Ll-5tBmvURDxFRNUNzY5Qz2uzKfxDtrkB5k8","dq":"o_8hbYDW8dysNWyJg5ij9OxOjKabrBjIhdVwkuMBq9kV16pCETPmG9alRoAF0mcI2V7S3HgJ4jRVC9M3tZPT01B4GA2AWDDXk4tQVc4lvdlrn2wsgvPRnmONna66BW4Xj_v6Rvb2kGi7dAs8cNkVhFOghM6s-CERm02mIL3lggE","n":"ocwndc192-6BueZqpjEKQ0RTIBXJkrBpn_6X802cK5PtOrT7RZpEC6mCklGfg6y_dYZ3ta4CizomhKuCQK-A1j6QdgO5t6DUv3-zsP4-XBiHpID6xhUegBQoV182FItjem8-LHtkPH9We_ooXZsZBHqynaD2Ljd9-XLRjalOJ8oy6mij5o6GqUvtSRlwT6DnDhhzm6l5TRFhBdSa_uyU6beJi_YSaH_BBjINl99KqFLb1KQW4L9sJpwByP1j2-INc9ANCBgm2QrLRHi1r3h7o05BpPPnE6SEwbfta3EHx5tTlbcO7hv3s143KyF0K1KyZo2WPI6b7UszDSwXok2CFw"}
algorithm
RS256
2021-06-13 20:31:33 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2021-06-13 20:31:33 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
woSOwso5RyMxqP82OvKwx6woLtYZRGHwrhJW2CotypVZqRpyxz
token_type
Bearer
id_token
eyJraWQiOiI4OTFjZTgyOS0xNDgxLTQ2OGYtOGM3My1mZDUyNTBjM2JmZDciLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiZ1pJN0IyU3VrRlBVZVZaaFE5Mk1OZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiODc2NTQzMjEiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvTVNUUl9NMjAyMV9VUDFcLyIsImV4cCI6MTYyMzYxNjU5Mywibm9uY2UiOiJQNHZRNHo0RVhMYjJvMGdFMVJocmJWTURKcWs1OTVQUEgzaVFPNFdBclhJIiwiaWF0IjoxNjIzNjE2MjkzfQ.Nmg_1p6VgttZCDJ_UhCyb1vyzAy3ULEDzC80uat7XzINyaI6_LkP29c5Y-dzctRrt0BYjXvNhuDqGW6ANRUoWfXxrKm6IpO1-aHWCZLE5TfxCuUsMi6MpXKzI-MzyvWEuACiRn3drM3jomQLodWOQDNKeYzbPXjIkfJpkcVHaTGiOKTwzMGzLOIPQV-ePr2rikoZAM0FEcVcSF4G1JGl5YvvmKHa0aShLTuyaoAxbSlYFvogAJcOG9MVKHOwOzwOmaGnalK7NtlwDMy6DoHmqRVsBoxxMdbYtWY-ROa4Rfq72BwdS0aJq0IwiHtwO5MGe6lC3xxboCAp3-tNjrm_sQ
scope
openid profile email offline_access
2021-06-13 20:31:33 OUTGOING
oidcc-client-test
Response to HTTP request to test instance QEHzQXejBoBoHt6
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "woSOwso5RyMxqP82OvKwx6woLtYZRGHwrhJW2CotypVZqRpyxz",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiI4OTFjZTgyOS0xNDgxLTQ2OGYtOGM3My1mZDUyNTBjM2JmZDciLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiZ1pJN0IyU3VrRlBVZVZaaFE5Mk1OZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiODc2NTQzMjEiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvTVNUUl9NMjAyMV9VUDFcLyIsImV4cCI6MTYyMzYxNjU5Mywibm9uY2UiOiJQNHZRNHo0RVhMYjJvMGdFMVJocmJWTURKcWs1OTVQUEgzaVFPNFdBclhJIiwiaWF0IjoxNjIzNjE2MjkzfQ.Nmg_1p6VgttZCDJ_UhCyb1vyzAy3ULEDzC80uat7XzINyaI6_LkP29c5Y-dzctRrt0BYjXvNhuDqGW6ANRUoWfXxrKm6IpO1-aHWCZLE5TfxCuUsMi6MpXKzI-MzyvWEuACiRn3drM3jomQLodWOQDNKeYzbPXjIkfJpkcVHaTGiOKTwzMGzLOIPQV-ePr2rikoZAM0FEcVcSF4G1JGl5YvvmKHa0aShLTuyaoAxbSlYFvogAJcOG9MVKHOwOzwOmaGnalK7NtlwDMy6DoHmqRVsBoxxMdbYtWY-ROa4Rfq72BwdS0aJq0IwiHtwO5MGe6lC3xxboCAp3-tNjrm_sQ",
  "scope": "openid profile email offline_access"
}
outgoing_path
token
2021-06-13 20:31:33 INCOMING
oidcc-client-test
Incoming HTTP request to test instance QEHzQXejBoBoHt6
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "application/json, application/jwk-set+json",
  "user-agent": "Java/11.0.8",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2021-06-13 20:31:33 OUTGOING
oidcc-client-test
Response to HTTP request to test instance QEHzQXejBoBoHt6
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "891ce829-1481-468f-8c73-fd5250c3bfd7",
      "n": "ocwndc192-6BueZqpjEKQ0RTIBXJkrBpn_6X802cK5PtOrT7RZpEC6mCklGfg6y_dYZ3ta4CizomhKuCQK-A1j6QdgO5t6DUv3-zsP4-XBiHpID6xhUegBQoV182FItjem8-LHtkPH9We_ooXZsZBHqynaD2Ljd9-XLRjalOJ8oy6mij5o6GqUvtSRlwT6DnDhhzm6l5TRFhBdSa_uyU6beJi_YSaH_BBjINl99KqFLb1KQW4L9sJpwByP1j2-INc9ANCBgm2QrLRHi1r3h7o05BpPPnE6SEwbfta3EHx5tTlbcO7hv3s143KyF0K1KyZo2WPI6b7UszDSwXok2CFw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "424ab69f-dc23-4a60-a4f6-d2668c972197",
      "n": "uFa94V5NLLYx8hjVKZKZBSOMbUqjUtwwZDHJlvApU9h-K2CKYJjNk5KL0FHW5dYiNWKkKExgOpvEGzyIt1wVcrWo6qhMEgq-E12y64XJs9FtxNa99Hi7Bss_k_zbZM3p7iQL8GxC-Sg5EYqhoVbEJGXKxo4na4gaBlG0_nz5fPTj17h3Roooytth4WaTAfX36oNX25_ugaL6b-katrZ5Z1qLEwv4F1ONeZft4Xe8oJ0REyHQjoeFW4JkpYvDfP70AHOt7F-sXDqZXgkl1LpZSwdRKAbKiCyOQ1S0SmnubtMLr5HbwNHb3-xZCbqXRrkPzVRDg_2-Ojta8MjQNPwGYQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "14d6d12f-b6ba-4a78-84c3-e7e82dde4d9b",
      "x": "vZCFM-677eNpSEEofkEkxInZY-AdAeLWV46LQo0mOAo",
      "y": "9fkIELPm2Hg7nmliPm8ek04seUSjMhTYa8QX-ifAMn0"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "49a3c1e8-b61c-4114-99b5-53760ac5a85a",
      "x": "5c523Nr7PH-jwVZpxJpUAm1VpnUKvlBA2puqEO4y9AI",
      "y": "xn1LZQ7wVQyfuY4DlCYaegV_98totH2BYuVpagxMdCU"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "c678cd11-e846-4af4-a384-d25f1d405c04",
      "x": "xUkmisHGlLAayUlZ6MVYN1JjntsYUSZAfPnE84d_LdU",
      "y": "O9Y10pbC_NZvlTWsy_dlt2ac9nNAXi--Oppef9wjelw"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "c3f9c25a-b8c7-4020-a50f-dc32eb7c6fb9",
      "x": "IPzjjJ3WDbpdgbUJdnccjuk8jdyOj07GfIZ-fRHnPEE"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "2686a0b6-09e6-4e94-bb29-97b25194e015",
      "alg": "RSA-OAEP",
      "n": "nJlDQf79fdbosVVGWB96hDd53Pm_qg82KxEWvHbdxrjxkGDSLGpmVXyCvL1c2UcXpXHD_O-M1u5SJ9FvvKXsder8iAoF6vUlrGS7Yqtx-cr-TXZ_xEUpBmakSMWpDd1dhts6NtdMKwH2CVG5u-p9OMBShYb4FTvoRs_RNvo5d68_lAF0WSe8wKXTJw5FjmfAfGCmaOVpIKIX1wAtHtyDWwSZiy9cuyURfjqls-L-Pmq0pzekU4m_oLOrhIZTzVh5sGDcr2G9jr4nUPlLnyuDHSXmYt_G79F9pGUM90UGO3VmMcQL8G4nq_RSl2k5CzOS7Usyyq2GBCidpsPOWsgB1Q"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "f30c62db-49ce-4907-9a55-42abe718bbe8",
      "x": "C-gNl0UzJJ-StjfD5PrZKtxzmpYJ9_yXapC7zSseDHw",
      "y": "lAKK9rd7XWsxk4KjyV-tuIAgrNJE2E5u8cTWZucgvGk",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2021-06-13 20:31:33 INCOMING
oidcc-client-test
Incoming HTTP request to test instance QEHzQXejBoBoHt6
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "application/json",
  "authorization": "Bearer woSOwso5RyMxqP82OvKwx6woLtYZRGHwrhJW2CotypVZqRpyxz",
  "user-agent": "Java/11.0.8",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
userinfo
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Userinfo endpoint
2021-06-13 20:31:33 SUCCESS
OIDCCExtractBearerAccessTokenFromRequest
Found access token on incoming request
access_token
woSOwso5RyMxqP82OvKwx6woLtYZRGHwrhJW2CotypVZqRpyxz
2021-06-13 20:31:33 SUCCESS
RequireBearerAccessToken
Found access token in request
actual
woSOwso5RyMxqP82OvKwx6woLtYZRGHwrhJW2CotypVZqRpyxz
2021-06-13 20:31:33 SUCCESS
FilterUserInfoForScopes
User info endpoint output
sub
user-subject-1234531
website
https://openid.net/
zoneinfo
America/Los_Angeles
birthdate
2000-02-03
gender
female
preferred_username
d.tu
given_name
Demo
middle_name
Theresa
locale
en-US
updated_at
1580000000
name
Demo T. User
nickname
Dee
family_name
User
email
user@example.com
email_verified
false
2021-06-13 20:31:33
ClearAccessTokenFromRequest
Condition ran but did not log anything
2021-06-13 20:31:33 INFO
AddIssAndAudToUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-06-13 20:31:33 INFO
SignUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-06-13 20:31:33 INFO
EncryptUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_encrypted_response_alg
path
userinfo_encrypted_response_alg
mapped
object
client
2021-06-13 20:31:33 OUTGOING
oidcc-client-test
Response to HTTP request to test instance QEHzQXejBoBoHt6
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "sub": "user-subject-1234531",
  "website": "https://openid.net/",
  "zoneinfo": "America/Los_Angeles",
  "birthdate": "2000-02-03",
  "gender": "female",
  "preferred_username": "d.tu",
  "given_name": "Demo",
  "middle_name": "Theresa",
  "locale": "en-US",
  "updated_at": 1580000000,
  "name": "Demo T. User",
  "nickname": "Dee",
  "family_name": "User",
  "email": "user@example.com",
  "email_verified": false
}
outgoing_path
userinfo
2021-06-13 20:31:33 FINISHED
oidcc-client-test
Test has run to completion
testmodule_result
PASSED
2021-06-13 20:32:59
TEST-RUNNER
Alias has now been claimed by another test
alias
MSTR_M2021_UP1
new_test_id
VvEfvIJbiluqj8g
Test Results