Test Summary

Test Results

Expand All Collapse All
All times are UTC
2021-06-13 20:33:36 INFO
TEST-RUNNER
Test instance sgTXSjhYcpnNEF4 created
baseUrl
https://www.certification.openid.net/test/a/MSTR_M2021_UP1
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "response_mode": "default",
  "client_registration": "static_client"
}
alias
MSTR_M2021_UP1
description
planId
iEllghTC7G18K
config
{
  "alias": "MSTR_M2021_UP1",
  "client": {
    "client_id": "87654321",
    "client_secret": "12345678",
    "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
  }
}
testName
oidcc-client-test-invalid-iss
2021-06-13 20:33:36 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-06-13 20:33:36
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-06-13 20:33:37
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "9i0LvwWigObgjUPHrp6KbQprKMcFy6KXz9soJh7DVcioLiNbVaBJU2qD-9uwCOhO_wEIn-9prspwnI_LVst8kvboPls_LnbKxeS1eek9FI9M-d7cL4mzn8UIBG3fzs1hWIiBZr1lLlrRBveGw4QComUZJkJdYpxv4gmzVcuoQKk",
      "kty": "RSA",
      "q": "42i4Nd2x9Wc8GBvdvebzQsjCn4dOivN2x6TExlgZf7GR3ZqAmcNUFf6aw234oPFV9k8f_3iQ9UMN3dyFRgMfWq3pMZUEuv81H0MLd0sDYkBmjNYEXF0Gw_sWzgp561lTe0t7MXLCfxKGRvGEJW3gYaWnmAxnqiY6_sp8BClvlaU",
      "d": "RovMlw0CBOahHygX2qrRnt6rMRX5PWxtvRy-ns3lo0I6djvbcLw1jbbf4nNonrqNiS-ZpIZT9TK7R4We52qStRqdX3BOszDVC8Rgzt36N6k9OdrW_aHt2UxKTxU9TKUnkJRDRMQ-VrJ-TPzs7THqruE8RBAb3l_5dSeb7VauYeakTxP5_3iD8lcpvueYU1SdCXicilfS20wlV71IbweppAq6Y_4Shmoazz0JDaJI6k6WyJqRnyeQ53VdVHhUFyawGRKa3Ey2wKAmcdXeedfuVGLy4uPVBv9i0hXQQGeTQtMGMypfTan1EiknRgypSieJLfd7mAAfUQMvdJQfkih_wQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "c2f1eec8-8618-4791-bafd-2e48d521722e",
      "qi": "cCCCU5fcyj1twn72Kv2iMFHr-BbhMcwSgGbv-JrTvQxhbe1pDBmf9AbG1SXVhY9lz62SC5fqK8c0U5bDgyutfqxQVThG4hpSipJBRPsbNNkToVBZXJ60mYhjWgS9V8l3Ovq1ZqyiNzpgP4k5Jy4w_0ML5UYU-hMf2JydzpugQ8I",
      "dp": "G1aZTVdk2ofJPCbg0AWPPdjAWcDwZdLipRSjeshDzQ0BkE4g4HtyaS8VBS06eWLDExKcUJaX1-9nXhuh6zuh0_hThkk_1PsgPaXOeYFrZRMc60rSjPzv07hf0Y4aIq8wNlLCfBRgXit7txhaAPByEnLDvjn0gPT6f9Gv9sEtKDE",
      "dq": "GVybdr5z02ehBxtMfppcNO2I7xu7AbonXBqfK3O13EzkdK9_eiaToSRVBEimeuSPbrniWq6KlB_XUw_9-RHuFEHjCPmSnnxJ42OpyrMd_H4sMbbIo7hoQcEmCPKYKEw9CDoh0iD3Wg6p1Q2obDg11w4Pg-CWSx6aY8IXVKt-W1U",
      "n": "2q6k21SOIS93SpRXsx5Y_pMexu8mFhs1wbHrpu93CqE144x0r4WiTYAOQXmI7Pq_gaX-pTWZN2rT7YJLLsgC5vOCe5_7AVOHKdcg2oVzLDCXJxyP8-cMzTGqKqpMypUVZ5-QtdEay6082f5swsoEtTEsvrDVSWaCZik7E8TC6DbQxD3hBfFJIE5wBiGmGNDHzQwxfimumuNrl7CsY68MG51XdAz7MFSa_97LCopycsm1fbQRatngLBVoyn3PAMW31I8Ia8SRAwDHqJfNC1qYuCETdHfUkBuxMM-KA9Czwz_xhUmoxv61-iqwfSd6bW2_gFXeGT8MPcs2v6TIS1sJ7Q"
    },
    {
      "kty": "EC",
      "d": "5HVamLQoVFp4avcg1W-ZJvUnd1dfH4tul7gUdGZ_cLg",
      "use": "sig",
      "crv": "P-256",
      "kid": "385619e8-f44a-409b-9520-edd553428551",
      "x": "FicBKU0rhFo5NokUO-E9L-niCnK8eLNoXVvnmTysRx8",
      "y": "QfiOeiLqUncicR5nWZ6oZnCr1nH5VWtxRINbiNeKiJM"
    },
    {
      "kty": "EC",
      "d": "5noap-_q3DJ0PbCNEljEGVJPMIWyXoSfe7n0tCNSxZg",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "2293d0cd-26bf-41d9-bc2f-3ff2d7134880",
      "x": "nxtqBznrqh5F5gcoQKq75ddokzBhgziFmuHCCm9dKvI",
      "y": "aGQAKZJu-wX4p8syHoq7VJ_D8eELYE6Bezn43zwokRk"
    },
    {
      "kty": "OKP",
      "d": "uES4YKWHfi78KjjvM20bGRIHcG15lVhkDFthVNQNAWI",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "8082be25-daad-4ac4-8023-b7ab81483c85",
      "x": "lCtoHsUJH3LIhqIVzv6o98iIl06ie8nLC9w2ZZgsgrs"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "8qfqRHslzQuD1ZdOOVrAlOsIHghq5d5KFDeqS_udi2ysx5yQ1f6fUF_17S1hRWTGYWDbS45a8dM60Bl02aRmIGSbt7bXaBrR84wSIhkbwS4bL64__T-U_-IYmfBCdORDueKgiafS85101GkdQXiyuutbtKCv305IhAfHovJk-Ac",
      "kty": "RSA",
      "q": "jCHlwnBbIgibiOfOSK1Ft6E0EZmeJrY_NcUrXVqFmCpni-CS128KT9Kn5gcJrphq9zvtmdJkFgXW91rD5b__PpadAcWtLsthJlskeB7cAxfZZgyJ2MkD-DVn4CgTL25ULbC4jzhUyPMK7tyYN15ap4AebHi2k7wekLBwwJbN_0c",
      "d": "E93H2dpiIiBkXATxavh6F0WxXsDDhensIkKE6_3UGNshp8RTlCt3rkN2vI-zoWhIBk2CKZUiBtvQs8NWCXF71MUCiuylCARuCFWfA4N0hRDajl0DoYRFGabx5G4E4o_AgPeUw9-Ztaywe-o5WraambIbIErO0UDGHgBieYfgcItlKD2waHn8__nhdFrin_AEFtTv4dBL2pJTGK22jEU0Rmj590UJByLwmKoCpxVKjUdCzd5z1XnF1z_TZZ_swBUtSq198ADDm_qjcbYN0-fhT9Gb64Gc-W8dfuwZEqpR6VQB6gr2AQojVrg2UtIo99ri7PyxwF4QmLEtwXR2Q3I1aQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "c84a89e7-bcac-41d6-844e-a1d5057678a3",
      "qi": "uYGc-WeAcMz_rFa7j3Mq1TwN-5SuIb6bMFfhYkbMA5g0_vt9zL3r4_pIg8ve3IVtSQILt4MGNldw6GGXKV9_I7dMoP_epK2N_9GH6cmgc7FQza6xeUnjeC1nb3BwMWg76uidl_5saRmsOaWkP0kCudNIVCufI2suVgKpqmDCtwA",
      "dp": "yUahGoavl0I663ui5g4x-hRuWkMPMHbPKa_2sSoXxyOwua5TsT2QNmIyorZmneH2b6WgoS6Gn1pfyWekNjeYgrwRMjUWvgKpLgR8sg3zqKyu3kECUPVhiVKop1_UMBN7Xf_uu-AaKfrsgphiLQGJ92PsYIp895R-sA2n-bBoMhc",
      "alg": "RSA-OAEP",
      "dq": "hWNy4C2xIelNm_kDS_zboxrohGRUvYa3DojbaWZUSm7615PyUu1YxHjB510Fo1NkZmh-F_DD4o62fAfC9zxWS450b45p9mQT2r3hLhI53RvjjZcb0-YsSCUV9rJO6NQ9fqx8UaAOXKW033_NyM6gvlZfH2Ocb24fLh01hq1F8ts",
      "n": "hNP1iyh7LoCPp6dYAy78fma1k-5Mv_JDfcwOy65O1t8bFK8tMhFWfizyk5K7IcsSZtZG6Qz_AeBVpzPqZTepqdXhmRPLrbeNawTXPBTlAi1vFO9I7s_16rCKMgm_-dpd75nFRkO8prCbrH72XHQZSgjL_C9nyoBgFDpOTAKPB0MX-1pO2c588iQbidQIS3nKJBtZcKBc8GvEm4saXvVYBfQAwZelLgpbSljA5itf3hvGivQWAZCuWFsHRRazYOT2glHdg8v7yG681LWSYeeAXGNQjGRo5DFO9VR-3klUZSJo9gqXIDK3NOu0udaVQYB6FCGp7azi5NcilAcShKrC8Q"
    },
    {
      "kty": "EC",
      "d": "XQb_awwtlqyGHQkTT9IawnnicJy-KyDjVKUla5k1SX0",
      "use": "enc",
      "crv": "P-256",
      "kid": "b09c959d-d782-4602-8a7c-e83ff3cc020c",
      "x": "-RkogA7D5Z1eEjZyeaRWgJFHixwJ9Q1xprHk5P4OxrM",
      "y": "oNqA0nXS8-tIawCMHAN5UXs85Fi-v7OX_dRcAPhdxAw",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "c2f1eec8-8618-4791-bafd-2e48d521722e",
      "n": "2q6k21SOIS93SpRXsx5Y_pMexu8mFhs1wbHrpu93CqE144x0r4WiTYAOQXmI7Pq_gaX-pTWZN2rT7YJLLsgC5vOCe5_7AVOHKdcg2oVzLDCXJxyP8-cMzTGqKqpMypUVZ5-QtdEay6082f5swsoEtTEsvrDVSWaCZik7E8TC6DbQxD3hBfFJIE5wBiGmGNDHzQwxfimumuNrl7CsY68MG51XdAz7MFSa_97LCopycsm1fbQRatngLBVoyn3PAMW31I8Ia8SRAwDHqJfNC1qYuCETdHfUkBuxMM-KA9Czwz_xhUmoxv61-iqwfSd6bW2_gFXeGT8MPcs2v6TIS1sJ7Q"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "79142a02-b4e4-4fbc-82ee-93799d5ffcb8",
      "n": "xsli6_gVvjP1u7thB6UR_yDcxZCT8bHzUtMWPUiEBidz0b68GarO8Zh1Y5IDCw7IfMCSqNJuXs_Z3QhvQvExZrsEj_qyPkurvbMtQxMerR8FEK5sxi0livD8r1TFCl-IO0OMdISnClRFNpU8Fqyr1KfX2vidnA-GC_tnqBrcHN-r0U72vE88YqrT0zLMg4vT0DB1ffrpbzGcgLukvypuXEf7TBeAm9eJdvT2CFb4e-1gAhK1BjZMGrDs9kfRDbZQ1-4BvMDvx-ytA5Uow90gu8L2KsbUgUX5y6DPK9sjUwki0SaM66FmphkB9GbFI1Rz_VUjq3olT9HDSBfL4DRwIQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "385619e8-f44a-409b-9520-edd553428551",
      "x": "FicBKU0rhFo5NokUO-E9L-niCnK8eLNoXVvnmTysRx8",
      "y": "QfiOeiLqUncicR5nWZ6oZnCr1nH5VWtxRINbiNeKiJM"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "9891bca2-6bcc-498f-b0a7-3b82d767b945",
      "x": "r3WOu2AoWYeR1XwAN_0Cmf-EHf29nLBnv_QoojVPfVQ",
      "y": "YXui6V35qvfUSCu0FJd_TtHt3N9Q5f_uc4Q8IEZJIsg"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "2293d0cd-26bf-41d9-bc2f-3ff2d7134880",
      "x": "nxtqBznrqh5F5gcoQKq75ddokzBhgziFmuHCCm9dKvI",
      "y": "aGQAKZJu-wX4p8syHoq7VJ_D8eELYE6Bezn43zwokRk"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "8082be25-daad-4ac4-8023-b7ab81483c85",
      "x": "lCtoHsUJH3LIhqIVzv6o98iIl06ie8nLC9w2ZZgsgrs"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "c84a89e7-bcac-41d6-844e-a1d5057678a3",
      "alg": "RSA-OAEP",
      "n": "hNP1iyh7LoCPp6dYAy78fma1k-5Mv_JDfcwOy65O1t8bFK8tMhFWfizyk5K7IcsSZtZG6Qz_AeBVpzPqZTepqdXhmRPLrbeNawTXPBTlAi1vFO9I7s_16rCKMgm_-dpd75nFRkO8prCbrH72XHQZSgjL_C9nyoBgFDpOTAKPB0MX-1pO2c588iQbidQIS3nKJBtZcKBc8GvEm4saXvVYBfQAwZelLgpbSljA5itf3hvGivQWAZCuWFsHRRazYOT2glHdg8v7yG681LWSYeeAXGNQjGRo5DFO9VR-3klUZSJo9gqXIDK3NOu0udaVQYB6FCGp7azi5NcilAcShKrC8Q"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "b09c959d-d782-4602-8a7c-e83ff3cc020c",
      "x": "-RkogA7D5Z1eEjZyeaRWgJFHixwJ9Q1xprHk5P4OxrM",
      "y": "oNqA0nXS8-tIawCMHAN5UXs85Fi-v7OX_dRcAPhdxAw",
      "alg": "ECDH-ES"
    }
  ]
}
2021-06-13 20:33:37 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2021-06-13 20:33:37 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2021-06-13 20:33:37 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": 1580000000
}
2021-06-13 20:33:37 SUCCESS
OIDCCGetStaticClientConfigurationForRPTests
Found a static client object
client_id
87654321
client_secret
12345678
redirect_uris
[
  "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
]
2021-06-13 20:33:37 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "client_id": "87654321",
  "client_secret": "12345678",
  "redirect_uris": [
    "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
  ]
}
2021-06-13 20:33:37 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2021-06-13 20:33:37 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2021-06-13 20:33:37 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
]
2021-06-13 20:33:37 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2021-06-13 20:33:37 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2021-06-13 20:33:37 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2021-06-13 20:33:37 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2021-06-13 20:33:37 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2021-06-13 20:33:37 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2021-06-13 20:33:37 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2021-06-13 20:33:37 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-06-13 20:33:37 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2021-06-13 20:33:37 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2021-06-13 20:33:37 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2021-06-13 20:33:37 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2021-06-13 20:33:37 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2021-06-13 20:33:37 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2021-06-13 20:33:37 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2021-06-13 20:33:37 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2021-06-13 20:33:37 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2021-06-13 20:33:37 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2021-06-13 20:33:37
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2021-06-13 20:33:37
oidcc-client-test-invalid-iss
Setup Done
2021-06-13 20:35:54 INCOMING
oidcc-client-test-invalid-iss
Incoming HTTP request to test instance sgTXSjhYcpnNEF4
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "application/xml, text/xml, application/json, application/*+xml, application/*+json",
  "user-agent": "Java/11.0.8",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2021-06-13 20:35:54 OUTGOING
oidcc-client-test-invalid-iss
Response to HTTP request to test instance sgTXSjhYcpnNEF4
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2021-06-13 20:36:28 INCOMING
oidcc-client-test-invalid-iss
Incoming HTTP request to test instance sgTXSjhYcpnNEF4
incoming_headers
{
  "host": "www.certification.openid.net",
  "cache-control": "max-age\u003d0",
  "upgrade-insecure-requests": "1",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "cross-site",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "sec-ch-ua": "\" Not A;Brand\";v\u003d\"99\", \"Chromium\";v\u003d\"90\", \"Google Chrome\";v\u003d\"90\"",
  "sec-ch-ua-mobile": "?0",
  "referer": "https://env-239211.customer.cloud.microstrategy.com/",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en-GB,en-GB-oxendict;q\u003d0.9,en;q\u003d0.8,tr;q\u003d0.7,eu;q\u003d0.6",
  "cookie": "__utmc\u003d201319536; __utmz\u003d201319536.1623336640.30.8.utmcsr\u003dcertification.openid.net|utmccn\u003d(referral)|utmcmd\u003dreferral|utmcct\u003d/; __utma\u003d201319536.763838286.1615572732.1623353581.1623411213.32; JSESSIONID\u003d32A224047A3267CDD9D4EE876688B2EF",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "response_type": "code",
  "client_id": "87654321",
  "scope": "openid profile email offline_access",
  "state": "S5YLeYwh6E0EzdpCsWkOPLrRqVmW6XrDTSlpcVPTBcY\u003d",
  "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login",
  "nonce": "bXKudDr6V0py9arhDG7aqemQQa4TnhK4dLocwV0ElTU"
}
incoming_body
Authorization endpoint
2021-06-13 20:36:28 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2021-06-13 20:36:28 SUCCESS
EnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "profile",
  "email",
  "offline_access"
]
expected
openid
2021-06-13 20:36:28 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "response_type": "code",
  "client_id": "87654321",
  "scope": "openid profile email offline_access",
  "state": "S5YLeYwh6E0EzdpCsWkOPLrRqVmW6XrDTSlpcVPTBcY\u003d",
  "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login",
  "nonce": "bXKudDr6V0py9arhDG7aqemQQa4TnhK4dLocwV0ElTU"
}
2021-06-13 20:36:28 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid profile email offline_access
2021-06-13 20:36:28 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
bXKudDr6V0py9arhDG7aqemQQa4TnhK4dLocwV0ElTU
2021-06-13 20:36:28 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2021-06-13 20:36:28 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
87654321
2021-06-13 20:36:28 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login
expected
[
  "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
]
2021-06-13 20:36:28 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "profile",
  "email",
  "offline_access"
]
expected
openid
2021-06-13 20:36:28 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2021-06-13 20:36:28 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
zPNze5VjWf
2021-06-13 20:36:28 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
qqfwcIu2h7sbVv7yzllj2g
2021-06-13 20:36:28 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login",
  "state": "S5YLeYwh6E0EzdpCsWkOPLrRqVmW6XrDTSlpcVPTBcY\u003d"
}
2021-06-13 20:36:28 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login",
  "state": "S5YLeYwh6E0EzdpCsWkOPLrRqVmW6XrDTSlpcVPTBcY\u003d",
  "code": "zPNze5VjWf"
}
2021-06-13 20:36:28
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login?state=S5YLeYwh6E0EzdpCsWkOPLrRqVmW6XrDTSlpcVPTBcY%3D&code=zPNze5VjWf
2021-06-13 20:36:28 OUTGOING
oidcc-client-test-invalid-iss
Response to HTTP request to test instance sgTXSjhYcpnNEF4
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login?state=S5YLeYwh6E0EzdpCsWkOPLrRqVmW6XrDTSlpcVPTBcY%3D&code=zPNze5VjWf]
outgoing_path
authorize
2021-06-13 20:36:29 INCOMING
oidcc-client-test-invalid-iss
Incoming HTTP request to test instance sgTXSjhYcpnNEF4
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "application/json;charset\u003dUTF-8",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "authorization": "Basic ODc2NTQzMjE6MTIzNDU2Nzg\u003d",
  "user-agent": "Java/11.0.8",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "161",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "grant_type": "authorization_code",
  "code": "zPNze5VjWf",
  "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
grant_type=authorization_code&code=zPNze5VjWf&redirect_uri=https%3A%2F%2Fenv-239211.customer.cloud.microstrategy.com%2FMicroStrategyLibrary%2Fauth%2Foidc%2Flogin
Token endpoint
2021-06-13 20:36:29 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
87654321
client_secret
12345678
method
client_secret_basic
2021-06-13 20:36:29 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2021-06-13 20:36:29 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
zPNze5VjWf
2021-06-13 20:36:29 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login
2021-06-13 20:36:29 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
gay5wCVdKQX9Fw6skUuCyxgvdc2ZyEHu5p6lIcaRH7EPR1jPXZ
2021-06-13 20:36:29 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
u5MPKHUy_f96OCvJa6TSfQ
2021-06-13 20:36:29 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/MSTR_M2021_UP1/
sub
user-subject-1234531
aud
87654321
nonce
bXKudDr6V0py9arhDG7aqemQQa4TnhK4dLocwV0ElTU
iat
1623616589
exp
1623616889
2021-06-13 20:36:29 SUCCESS
AddInvalidIssValueToIdToken
Added invalid iss to ID token claims
iss
https://www.certification.openid.net/test/a/MSTR_M2021_UP1/1
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/1",
  "sub": "user-subject-1234531",
  "aud": "87654321",
  "nonce": "bXKudDr6V0py9arhDG7aqemQQa4TnhK4dLocwV0ElTU",
  "iat": 1623616589,
  "exp": 1623616889
}
2021-06-13 20:36:29 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
u5MPKHUy_f96OCvJa6TSfQ
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/1",
  "sub": "user-subject-1234531",
  "aud": "87654321",
  "nonce": "bXKudDr6V0py9arhDG7aqemQQa4TnhK4dLocwV0ElTU",
  "iat": 1623616589,
  "exp": 1623616889,
  "at_hash": "u5MPKHUy_f96OCvJa6TSfQ"
}
2021-06-13 20:36:29 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiJjMmYxZWVjOC04NjE4LTQ3OTEtYmFmZC0yZTQ4ZDUyMTcyMmUiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoidTVNUEtIVXlfZjk2T0N2SmE2VFNmUSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiODc2NTQzMjEiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvTVNUUl9NMjAyMV9VUDFcLzEiLCJleHAiOjE2MjM2MTY4ODksIm5vbmNlIjoiYlhLdWREcjZWMHB5OWFyaERHN2FxZW1RUWE0VG5oSzRkTG9jd1YwRWxUVSIsImlhdCI6MTYyMzYxNjU4OX0.k5mYc1uyd3RDfEmvuafwfAnsn6B6SuN3h4im5cU_87MrMfMLFwzGRa3dIsBmCufzwhH7EOOgINLhsEodrdLEEeuHMZraLCSvVG3cziL4m6pi8v2txcMK1seAqVIm7qoMx5uiLhtuLErT_tpVGPjWtfk7naEvg4SeHqthPwkwnOAdyo0DFJ4pAtsMZGstjRh6PkI8x3y9_rrsapH9D_KyuZRQpgYLq5uJ5iscZJQ86ozCVnx-6G6dQ_-L2HDsdWXkhCiejE-zOjqnfv8tNdk_J8Dy5i6dzH-RMNdd-l8rh8Dd-0a5OUSGqTvOdwjgvjZNXjzU6O_LCcoZExIlRjPfrA
key
{"p":"9i0LvwWigObgjUPHrp6KbQprKMcFy6KXz9soJh7DVcioLiNbVaBJU2qD-9uwCOhO_wEIn-9prspwnI_LVst8kvboPls_LnbKxeS1eek9FI9M-d7cL4mzn8UIBG3fzs1hWIiBZr1lLlrRBveGw4QComUZJkJdYpxv4gmzVcuoQKk","kty":"RSA","q":"42i4Nd2x9Wc8GBvdvebzQsjCn4dOivN2x6TExlgZf7GR3ZqAmcNUFf6aw234oPFV9k8f_3iQ9UMN3dyFRgMfWq3pMZUEuv81H0MLd0sDYkBmjNYEXF0Gw_sWzgp561lTe0t7MXLCfxKGRvGEJW3gYaWnmAxnqiY6_sp8BClvlaU","d":"RovMlw0CBOahHygX2qrRnt6rMRX5PWxtvRy-ns3lo0I6djvbcLw1jbbf4nNonrqNiS-ZpIZT9TK7R4We52qStRqdX3BOszDVC8Rgzt36N6k9OdrW_aHt2UxKTxU9TKUnkJRDRMQ-VrJ-TPzs7THqruE8RBAb3l_5dSeb7VauYeakTxP5_3iD8lcpvueYU1SdCXicilfS20wlV71IbweppAq6Y_4Shmoazz0JDaJI6k6WyJqRnyeQ53VdVHhUFyawGRKa3Ey2wKAmcdXeedfuVGLy4uPVBv9i0hXQQGeTQtMGMypfTan1EiknRgypSieJLfd7mAAfUQMvdJQfkih_wQ","e":"AQAB","use":"sig","kid":"c2f1eec8-8618-4791-bafd-2e48d521722e","qi":"cCCCU5fcyj1twn72Kv2iMFHr-BbhMcwSgGbv-JrTvQxhbe1pDBmf9AbG1SXVhY9lz62SC5fqK8c0U5bDgyutfqxQVThG4hpSipJBRPsbNNkToVBZXJ60mYhjWgS9V8l3Ovq1ZqyiNzpgP4k5Jy4w_0ML5UYU-hMf2JydzpugQ8I","dp":"G1aZTVdk2ofJPCbg0AWPPdjAWcDwZdLipRSjeshDzQ0BkE4g4HtyaS8VBS06eWLDExKcUJaX1-9nXhuh6zuh0_hThkk_1PsgPaXOeYFrZRMc60rSjPzv07hf0Y4aIq8wNlLCfBRgXit7txhaAPByEnLDvjn0gPT6f9Gv9sEtKDE","dq":"GVybdr5z02ehBxtMfppcNO2I7xu7AbonXBqfK3O13EzkdK9_eiaToSRVBEimeuSPbrniWq6KlB_XUw_9-RHuFEHjCPmSnnxJ42OpyrMd_H4sMbbIo7hoQcEmCPKYKEw9CDoh0iD3Wg6p1Q2obDg11w4Pg-CWSx6aY8IXVKt-W1U","n":"2q6k21SOIS93SpRXsx5Y_pMexu8mFhs1wbHrpu93CqE144x0r4WiTYAOQXmI7Pq_gaX-pTWZN2rT7YJLLsgC5vOCe5_7AVOHKdcg2oVzLDCXJxyP8-cMzTGqKqpMypUVZ5-QtdEay6082f5swsoEtTEsvrDVSWaCZik7E8TC6DbQxD3hBfFJIE5wBiGmGNDHzQwxfimumuNrl7CsY68MG51XdAz7MFSa_97LCopycsm1fbQRatngLBVoyn3PAMW31I8Ia8SRAwDHqJfNC1qYuCETdHfUkBuxMM-KA9Czwz_xhUmoxv61-iqwfSd6bW2_gFXeGT8MPcs2v6TIS1sJ7Q"}
algorithm
RS256
2021-06-13 20:36:29 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2021-06-13 20:36:29 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
gay5wCVdKQX9Fw6skUuCyxgvdc2ZyEHu5p6lIcaRH7EPR1jPXZ
token_type
Bearer
id_token
eyJraWQiOiJjMmYxZWVjOC04NjE4LTQ3OTEtYmFmZC0yZTQ4ZDUyMTcyMmUiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoidTVNUEtIVXlfZjk2T0N2SmE2VFNmUSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiODc2NTQzMjEiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvTVNUUl9NMjAyMV9VUDFcLzEiLCJleHAiOjE2MjM2MTY4ODksIm5vbmNlIjoiYlhLdWREcjZWMHB5OWFyaERHN2FxZW1RUWE0VG5oSzRkTG9jd1YwRWxUVSIsImlhdCI6MTYyMzYxNjU4OX0.k5mYc1uyd3RDfEmvuafwfAnsn6B6SuN3h4im5cU_87MrMfMLFwzGRa3dIsBmCufzwhH7EOOgINLhsEodrdLEEeuHMZraLCSvVG3cziL4m6pi8v2txcMK1seAqVIm7qoMx5uiLhtuLErT_tpVGPjWtfk7naEvg4SeHqthPwkwnOAdyo0DFJ4pAtsMZGstjRh6PkI8x3y9_rrsapH9D_KyuZRQpgYLq5uJ5iscZJQ86ozCVnx-6G6dQ_-L2HDsdWXkhCiejE-zOjqnfv8tNdk_J8Dy5i6dzH-RMNdd-l8rh8Dd-0a5OUSGqTvOdwjgvjZNXjzU6O_LCcoZExIlRjPfrA
scope
openid profile email offline_access
2021-06-13 20:36:29 OUTGOING
oidcc-client-test-invalid-iss
Response to HTTP request to test instance sgTXSjhYcpnNEF4
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "gay5wCVdKQX9Fw6skUuCyxgvdc2ZyEHu5p6lIcaRH7EPR1jPXZ",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiJjMmYxZWVjOC04NjE4LTQ3OTEtYmFmZC0yZTQ4ZDUyMTcyMmUiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoidTVNUEtIVXlfZjk2T0N2SmE2VFNmUSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiODc2NTQzMjEiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvTVNUUl9NMjAyMV9VUDFcLzEiLCJleHAiOjE2MjM2MTY4ODksIm5vbmNlIjoiYlhLdWREcjZWMHB5OWFyaERHN2FxZW1RUWE0VG5oSzRkTG9jd1YwRWxUVSIsImlhdCI6MTYyMzYxNjU4OX0.k5mYc1uyd3RDfEmvuafwfAnsn6B6SuN3h4im5cU_87MrMfMLFwzGRa3dIsBmCufzwhH7EOOgINLhsEodrdLEEeuHMZraLCSvVG3cziL4m6pi8v2txcMK1seAqVIm7qoMx5uiLhtuLErT_tpVGPjWtfk7naEvg4SeHqthPwkwnOAdyo0DFJ4pAtsMZGstjRh6PkI8x3y9_rrsapH9D_KyuZRQpgYLq5uJ5iscZJQ86ozCVnx-6G6dQ_-L2HDsdWXkhCiejE-zOjqnfv8tNdk_J8Dy5i6dzH-RMNdd-l8rh8Dd-0a5OUSGqTvOdwjgvjZNXjzU6O_LCcoZExIlRjPfrA",
  "scope": "openid profile email offline_access"
}
outgoing_path
token
2021-06-13 20:36:29 INCOMING
oidcc-client-test-invalid-iss
Incoming HTTP request to test instance sgTXSjhYcpnNEF4
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "application/json, application/jwk-set+json",
  "user-agent": "Java/11.0.8",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2021-06-13 20:36:29 OUTGOING
oidcc-client-test-invalid-iss
Response to HTTP request to test instance sgTXSjhYcpnNEF4
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "c2f1eec8-8618-4791-bafd-2e48d521722e",
      "n": "2q6k21SOIS93SpRXsx5Y_pMexu8mFhs1wbHrpu93CqE144x0r4WiTYAOQXmI7Pq_gaX-pTWZN2rT7YJLLsgC5vOCe5_7AVOHKdcg2oVzLDCXJxyP8-cMzTGqKqpMypUVZ5-QtdEay6082f5swsoEtTEsvrDVSWaCZik7E8TC6DbQxD3hBfFJIE5wBiGmGNDHzQwxfimumuNrl7CsY68MG51XdAz7MFSa_97LCopycsm1fbQRatngLBVoyn3PAMW31I8Ia8SRAwDHqJfNC1qYuCETdHfUkBuxMM-KA9Czwz_xhUmoxv61-iqwfSd6bW2_gFXeGT8MPcs2v6TIS1sJ7Q"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "79142a02-b4e4-4fbc-82ee-93799d5ffcb8",
      "n": "xsli6_gVvjP1u7thB6UR_yDcxZCT8bHzUtMWPUiEBidz0b68GarO8Zh1Y5IDCw7IfMCSqNJuXs_Z3QhvQvExZrsEj_qyPkurvbMtQxMerR8FEK5sxi0livD8r1TFCl-IO0OMdISnClRFNpU8Fqyr1KfX2vidnA-GC_tnqBrcHN-r0U72vE88YqrT0zLMg4vT0DB1ffrpbzGcgLukvypuXEf7TBeAm9eJdvT2CFb4e-1gAhK1BjZMGrDs9kfRDbZQ1-4BvMDvx-ytA5Uow90gu8L2KsbUgUX5y6DPK9sjUwki0SaM66FmphkB9GbFI1Rz_VUjq3olT9HDSBfL4DRwIQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "385619e8-f44a-409b-9520-edd553428551",
      "x": "FicBKU0rhFo5NokUO-E9L-niCnK8eLNoXVvnmTysRx8",
      "y": "QfiOeiLqUncicR5nWZ6oZnCr1nH5VWtxRINbiNeKiJM"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "9891bca2-6bcc-498f-b0a7-3b82d767b945",
      "x": "r3WOu2AoWYeR1XwAN_0Cmf-EHf29nLBnv_QoojVPfVQ",
      "y": "YXui6V35qvfUSCu0FJd_TtHt3N9Q5f_uc4Q8IEZJIsg"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "2293d0cd-26bf-41d9-bc2f-3ff2d7134880",
      "x": "nxtqBznrqh5F5gcoQKq75ddokzBhgziFmuHCCm9dKvI",
      "y": "aGQAKZJu-wX4p8syHoq7VJ_D8eELYE6Bezn43zwokRk"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "8082be25-daad-4ac4-8023-b7ab81483c85",
      "x": "lCtoHsUJH3LIhqIVzv6o98iIl06ie8nLC9w2ZZgsgrs"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "c84a89e7-bcac-41d6-844e-a1d5057678a3",
      "alg": "RSA-OAEP",
      "n": "hNP1iyh7LoCPp6dYAy78fma1k-5Mv_JDfcwOy65O1t8bFK8tMhFWfizyk5K7IcsSZtZG6Qz_AeBVpzPqZTepqdXhmRPLrbeNawTXPBTlAi1vFO9I7s_16rCKMgm_-dpd75nFRkO8prCbrH72XHQZSgjL_C9nyoBgFDpOTAKPB0MX-1pO2c588iQbidQIS3nKJBtZcKBc8GvEm4saXvVYBfQAwZelLgpbSljA5itf3hvGivQWAZCuWFsHRRazYOT2glHdg8v7yG681LWSYeeAXGNQjGRo5DFO9VR-3klUZSJo9gqXIDK3NOu0udaVQYB6FCGp7azi5NcilAcShKrC8Q"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "b09c959d-d782-4602-8a7c-e83ff3cc020c",
      "x": "-RkogA7D5Z1eEjZyeaRWgJFHixwJ9Q1xprHk5P4OxrM",
      "y": "oNqA0nXS8-tIawCMHAN5UXs85Fi-v7OX_dRcAPhdxAw",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2021-06-13 20:36:34 FINISHED
oidcc-client-test-invalid-iss
Test has run to completion
testmodule_result
PASSED
2021-06-13 20:37:10
TEST-RUNNER
Alias has now been claimed by another test
alias
MSTR_M2021_UP1
new_test_id
4LHqDRapFpPxUE9
Test Results