Test Summary

Test Results

Expand All Collapse All
All times are UTC
2021-06-13 21:16:38 INFO
TEST-RUNNER
Test instance uYIx3ezSY1j865x created
baseUrl
https://www.certification.openid.net/test/a/MSTR_M2021_UP1
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "response_mode": "default",
  "client_registration": "static_client"
}
alias
MSTR_M2021_UP1
description
planId
iEllghTC7G18K
config
{
  "alias": "MSTR_M2021_UP1",
  "client": {
    "client_id": "87654321",
    "client_secret": "12345678",
    "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
  }
}
testName
oidcc-client-test-idtoken-sig-none
2021-06-13 21:16:38 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-06-13 21:16:38
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-06-13 21:16:38
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "_SuPjbC3YcF9VHNX6go77kBKSeA3vc0QJaSOvOmV1e5ZNLScBZyoH8L-AtwIkjUJZrxTNUqyU7fFdESFliAe6Y8Mn9cm7G3GnoHE7XY63BaViVoYr2IT0KXAoka-0oaJIhyJbITqqQ9mZNO9gxcwga6tegIIZsPuQJwt2_lAgsE",
      "kty": "RSA",
      "q": "ppHnGYCJ8dQAKyBwvd9fcT1BptkePwpie1jJz5TdAKgxV1xP6FndEc6nEBiGtgMSlVpramjtzQiOVWKu4EdA41V82ukilsF6NqnXByJqN1Itx5pm_Aof0sD_ORuPkC5Kq5ZZaRCazh6WotOtkqVNG-751i9XO_MSp8pXJaSMlvE",
      "d": "MfYVkMl9xkNQgGkb6-9RoaMCvqAL82ghseSt1TKaJtAynC6g31BvnIgMvnoC-RimYBDgpwAQvlvBDCg7HOid2TkktklcChUC7mrrB1Hma4UjkwQkcYNNV9XnIDRngV_CWRtuis6zlyXrvrKa1Q73tcaTclLsvPTfcjBtjsKHn6inosNhC4AW6bIw70LW_goxjV-icd9NTVRl5ojtWYwArd7GJlL0GrLfjFR-1DuYMD-jp_YnTYnMMxZJvbYohonRpifmWtB3bQDkluz8R7KqlT-FTD69YNB7WzcRoAVKmUfEijhADxtUX5uQgLd-CiZ4RiOYTmmFmpTX-NGiPeLkAQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "beae258c-05c6-44cc-b4fe-f0f5413a3bbc",
      "qi": "4jccRe2OhDLDUbMMZ_MfrvgH5dkrIYJ7BaoPwz_SHywEXQuqMKj3h6aq6HyGNj72U4lis5llIiX-V3cZIMfvswQLs_EMOnlgar2BqrcZXqcJrZgRlG1BtyBmM97heKkG8rq8_NUJjkDTswtupD0HQHM_U5igGq9GJmETxIZsmOY",
      "dp": "SEXoPEXHhCOteK9Y2JpFU5WM35wfrZJd2rEogmuYd7MMSkyJAd0f7blHtF9GHx7-6RI4Gs2RLO8YckGhdSMEUB6jNvo_xVztR5C6PCP1V6Em3UgYJfE0wOqgnHLfxM_dVBybapxjNRINZBlCT6sOEOdh5KOx7ExgtpcfTF3SecE",
      "dq": "lj9nUKaUR1EucbhKWcqiAbf6fzC7SqvoV1CogRjLHKuaDi4TWgetFEHuieNFp-ovmg68c3iAgABmuvhPu7gp_KWBAMloTMnqnmImtqXBX3M-HhzVJiVPvUAfN3j3z1siOZJdxhqXOLN4txjvKSb33el67Es5ibbhLf6jCy5ZLlE",
      "n": "pLqJTbbAE8vmjBG53490tfc4pqQxCXeflinamOG9BUWn_QcpWrmghqke06QPpk3pktobEg2SRk0WWCLQ48CeSIxohTKbSlBNUcSlPkht51fwwMW28desYIhnNyE8zMUZjPXIQwoW7E0ob5BvK0I4zo9237Dbqo3ohaIOSRPnP6VqV8T7YdmkLeQnXEwat1rKmei4RJ8Kb_JURG_Yhqg9A8aNNq9MvJBF3oIsZrAT91m2qi7vFcrHzlVRcElk74miarGkuITJH-5cpPbpO5Q4divqUVHT4iXO50bKVUV3389bnVYh78Vdj-U0bPw6_cGVsKld5Xyw-TVb7DARl-QtsQ"
    },
    {
      "kty": "EC",
      "d": "3C2v1YpB9qnxE0KnVq3kSO6HFCv4U-HSIgbQDXMNl1w",
      "use": "sig",
      "crv": "P-256",
      "kid": "f270a5af-c898-472b-a023-bafc6ada6f1c",
      "x": "ynYP7JI8Scj44ctn8X9OqBsqsJqCEh1SjOYyeM1TMsI",
      "y": "6yMdGqJws3j9L-zooqmD-XHTl9DuRWFRM9hEI1gT3Ws"
    },
    {
      "kty": "EC",
      "d": "B032Lnb9b-vdBJpYpqXy1M5iONTCQJD5Lsjg4kFeZoU",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "c5d96fd8-4ad0-4fae-9219-8d20179567dd",
      "x": "RSeALM9gGDJq__IlHhzh_Qv2GKlsenILPCnNecTrbkA",
      "y": "gmFGLNR1yWeoI7-OWsTw64z7Y3yrG8ZQCgwog7mV7VU"
    },
    {
      "kty": "OKP",
      "d": "vO4sn1qZdsSoSCCMu3K69NjXryu6Leov8ZwHcovm0hQ",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "5ee6e0da-262b-45ea-8ab5-65c89022c930",
      "x": "kFOqy9_wQwql62wla-gwfE92S8pw2EKyaEi14hLOxmk"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "3LoKdc4hTGpiqXu8GqQcoDOg6SIMui1IrsM6YKjMHw5lqOe5pYX4wdKGy1jHwaAjnP6MFv2y99BjttTPYaZwnPlCnF9DkVtB3v1JwpmhNn0a_Wid-6lHjwmkcO4MvizN9J8JDBNsOz1FUncNf368GcFxkPuP92Dr1YGjji25Nd0",
      "kty": "RSA",
      "q": "1blrb3-wcwx5XWD5Z5d7QIBbq_kVar4icgKVPTVGVa9E58SmDsHVN0mUgHsFQo-KIC_RIML4-aJ9P47HQoJOPf3UIW4KNHBtMQrPyGUCPVqlvI0P0PLBQxdU9xPaFaevSBQclKhf6vRej-sgth40P2q9S0dDZ-kCikQ8gaMN1NM",
      "d": "DUwECkG7vXvDvnwyX2-yPvzKFw6iHh_2hFSE93GUa7EGdRL23x4vkF54A010XX22GLC1kikCMu5n_q4MfClen-Pq6oR3U9sCQjkNzJou-ZTUkCU7vmV0g7TKrBnt6kocwH6bNEC57WGtGaeRi4nCWVZHzTc6R4vJ5H_T1aHAea7hzuV9MdoV7Ni4PNJqmfA9Kvm8aY9dZrLi1HTtiV1PLC0lejd8ViOlANbABr6DSK--zh8U5wm6GVSUtYSfSp40kD6T0AUYJjHbtZ6H8jYU8xJYLe52OF9ng2V1mk-aPBGT8kshafPG4G-fjtbova2t0mtRX2NZxQ7FdOneDywWuQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "264cd6fa-a9ff-43fd-8b40-bdf335d4986c",
      "qi": "oOIQykD8N04lr1k88fK4imS5nQY6WkEIkg_lK6YrfNS0LCkovtERe_wiynQ4tN27TCOqPjJszeX3zsWG2YfQ9KAGdUaIeuP3sMCjl8UOxZ5nKORckdh73QidiDXdqELyyea3dbtp3RR0kcpncwu241B32f1Uve3lYRtShMc5Vx8",
      "dp": "ASiY1XV3h0cnrWwQ2LLz04Nx3Mdo-bEzKHet3sQEDkWtEu3kc5H4dEv-mSKmKcYFadWMNrKuNc7KNzN2wzR0ct58EwYM_L5V4i3CLVtRFVAizCG4cpG45m9Ohak6N-VUT2xmR8HyV31C1-P4Fis8IYZ6aiBn6QyBMGW1zhE_X6E",
      "alg": "RSA-OAEP",
      "dq": "CoRiVg1JiI_PlRnFjCR3KzhlynOqayNKHKQl5eouON80G9egeE9vh5X2WdAz9Q-NM4JG3z7Y86fcU_lZstsosIJCIxcAJ450wRoQGYNm9c_1Ie8rHRQlEIEgbDws2i3zQS_ELEiQ18YItTpT1MJtvcUp5X9vQLjFqDotZA-7CYM",
      "n": "uEapx3jF3yr-qQDbw7LJodzfBigDuN9InBIK7t570b1QnGqIbBvcoFjM8G9IGoejPGcxlGmwa29LryBF2CZC3qDuGuzh3V9WFfDzsWV6fh8wZQDOVsmlAmYCUmyzvKihPn13aYDnKIZjB3PbktP7ns8tt0yuPsyYrHS7KpTEJrtZcU-ul8gZmAZBhMbM5yKu6U2yPwMfkFON3xQYjRRFghT5VYpyKZjEWvFjnnQvEjs3yZ1QVgHqXDu_VwwaE39rhwn4B0a-jqzWg1JqETU-h28NO5nHIgzSEFqF0qdblJnSGlSnjxfRwZwWs7tQcPNaUJGW9BmJ3DsOSLwdg3tpJw"
    },
    {
      "kty": "EC",
      "d": "5LKYnM7Tdqp5hW71zacoSfr8ONlo4kXYKHPs-y77CSw",
      "use": "enc",
      "crv": "P-256",
      "kid": "4e97bfec-7db4-48be-bf08-93323c290c6b",
      "x": "xKxLRIj46fwT1wSURIGdvvvRuEzL9BV-lAbJCxaukfs",
      "y": "lRLhRY_3cTCxlzr1LlBwcCVEljDDCHBG9vKsPU5Mfh0",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "beae258c-05c6-44cc-b4fe-f0f5413a3bbc",
      "n": "pLqJTbbAE8vmjBG53490tfc4pqQxCXeflinamOG9BUWn_QcpWrmghqke06QPpk3pktobEg2SRk0WWCLQ48CeSIxohTKbSlBNUcSlPkht51fwwMW28desYIhnNyE8zMUZjPXIQwoW7E0ob5BvK0I4zo9237Dbqo3ohaIOSRPnP6VqV8T7YdmkLeQnXEwat1rKmei4RJ8Kb_JURG_Yhqg9A8aNNq9MvJBF3oIsZrAT91m2qi7vFcrHzlVRcElk74miarGkuITJH-5cpPbpO5Q4divqUVHT4iXO50bKVUV3389bnVYh78Vdj-U0bPw6_cGVsKld5Xyw-TVb7DARl-QtsQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "de32cbca-26d5-4909-ae82-a2b8054f7b20",
      "n": "im229o_ffJMgsVu6RGiNk_TrojWFVL5D8cSiMbMVO_8NyIRI27RI6wXr9Xne2BOPwX9R_MC6sYTGtoywBg534c-tE9fewKT9YSmw5bqRi6SXhGAwwBAv9d_8XvDSYnbEbI8GTwm7RS4cAh3oEgL6xGzP2wHLnsDliEa6nJAnB5iaWrSyEraNDmJGbICE0-p45WQBNvfHVjUKXRM3GNEKnO_kSLlvJw1URdiX4xikQ7E8bx5sqJ7CC274DvrsenRkze00_xYmn9zujP6UjES6cI31ZMez1uID785wx4pROFzsU1eJzsWnLqK09wZguUHOtlRhmEXb_5y-Dv65qVrCBQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "f270a5af-c898-472b-a023-bafc6ada6f1c",
      "x": "ynYP7JI8Scj44ctn8X9OqBsqsJqCEh1SjOYyeM1TMsI",
      "y": "6yMdGqJws3j9L-zooqmD-XHTl9DuRWFRM9hEI1gT3Ws"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "d2ee332c-0c05-45da-8cd0-f2b84635c670",
      "x": "dzIDMfYlc-ZS7kOhyyXgMhQFPED2FFl05U4NuAVGIiM",
      "y": "gA8-vBBK-FGQHkW3-YNQNIePllmDA6JrpS_OPx-31og"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "c5d96fd8-4ad0-4fae-9219-8d20179567dd",
      "x": "RSeALM9gGDJq__IlHhzh_Qv2GKlsenILPCnNecTrbkA",
      "y": "gmFGLNR1yWeoI7-OWsTw64z7Y3yrG8ZQCgwog7mV7VU"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "5ee6e0da-262b-45ea-8ab5-65c89022c930",
      "x": "kFOqy9_wQwql62wla-gwfE92S8pw2EKyaEi14hLOxmk"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "264cd6fa-a9ff-43fd-8b40-bdf335d4986c",
      "alg": "RSA-OAEP",
      "n": "uEapx3jF3yr-qQDbw7LJodzfBigDuN9InBIK7t570b1QnGqIbBvcoFjM8G9IGoejPGcxlGmwa29LryBF2CZC3qDuGuzh3V9WFfDzsWV6fh8wZQDOVsmlAmYCUmyzvKihPn13aYDnKIZjB3PbktP7ns8tt0yuPsyYrHS7KpTEJrtZcU-ul8gZmAZBhMbM5yKu6U2yPwMfkFON3xQYjRRFghT5VYpyKZjEWvFjnnQvEjs3yZ1QVgHqXDu_VwwaE39rhwn4B0a-jqzWg1JqETU-h28NO5nHIgzSEFqF0qdblJnSGlSnjxfRwZwWs7tQcPNaUJGW9BmJ3DsOSLwdg3tpJw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "4e97bfec-7db4-48be-bf08-93323c290c6b",
      "x": "xKxLRIj46fwT1wSURIGdvvvRuEzL9BV-lAbJCxaukfs",
      "y": "lRLhRY_3cTCxlzr1LlBwcCVEljDDCHBG9vKsPU5Mfh0",
      "alg": "ECDH-ES"
    }
  ]
}
2021-06-13 21:16:38 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2021-06-13 21:16:38 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2021-06-13 21:16:38 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": 1580000000
}
2021-06-13 21:16:38 SUCCESS
OIDCCGetStaticClientConfigurationForRPTests
Found a static client object
client_id
87654321
client_secret
12345678
redirect_uris
[
  "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
]
2021-06-13 21:16:38 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "client_id": "87654321",
  "client_secret": "12345678",
  "redirect_uris": [
    "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
  ]
}
2021-06-13 21:16:38 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2021-06-13 21:16:38 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2021-06-13 21:16:38 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
]
2021-06-13 21:16:38 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2021-06-13 21:16:38 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2021-06-13 21:16:38 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2021-06-13 21:16:38 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2021-06-13 21:16:38 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2021-06-13 21:16:38 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2021-06-13 21:16:38 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2021-06-13 21:16:38 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-06-13 21:16:38 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2021-06-13 21:16:38 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2021-06-13 21:16:38 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2021-06-13 21:16:38 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2021-06-13 21:16:38 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2021-06-13 21:16:38 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2021-06-13 21:16:38 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2021-06-13 21:16:38 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2021-06-13 21:16:38 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2021-06-13 21:16:38
SetServerSigningAlgToNone
Successfully set signing algorithm to none
signing_algorithm
none
2021-06-13 21:16:38
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
none
2021-06-13 21:16:38
oidcc-client-test-idtoken-sig-none
Setup Done
2021-06-13 21:17:34 INCOMING
oidcc-client-test-idtoken-sig-none
Incoming HTTP request to test instance uYIx3ezSY1j865x
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "application/xml, text/xml, application/json, application/*+xml, application/*+json",
  "user-agent": "Java/11.0.8",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2021-06-13 21:17:34 OUTGOING
oidcc-client-test-idtoken-sig-none
Response to HTTP request to test instance uYIx3ezSY1j865x
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/MSTR_M2021_UP1/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2021-06-13 21:18:21 INCOMING
oidcc-client-test-idtoken-sig-none
Incoming HTTP request to test instance uYIx3ezSY1j865x
incoming_headers
{
  "host": "www.certification.openid.net",
  "cache-control": "max-age\u003d0",
  "upgrade-insecure-requests": "1",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/90.0.4430.212 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/avif,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "cross-site",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "sec-ch-ua": "\" Not A;Brand\";v\u003d\"99\", \"Chromium\";v\u003d\"90\", \"Google Chrome\";v\u003d\"90\"",
  "sec-ch-ua-mobile": "?0",
  "referer": "https://env-239211.customer.cloud.microstrategy.com/",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en-GB,en-GB-oxendict;q\u003d0.9,en;q\u003d0.8,tr;q\u003d0.7,eu;q\u003d0.6",
  "cookie": "__utmc\u003d201319536; __utmz\u003d201319536.1623336640.30.8.utmcsr\u003dcertification.openid.net|utmccn\u003d(referral)|utmcmd\u003dreferral|utmcct\u003d/; __utma\u003d201319536.763838286.1615572732.1623353581.1623411213.32; JSESSIONID\u003d32A224047A3267CDD9D4EE876688B2EF",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "response_type": "code",
  "client_id": "87654321",
  "scope": "openid profile email offline_access",
  "state": "qM1k82Au0v-CMuv9Rieu4k0fzj5AiV_HojU5VMkppuY\u003d",
  "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login",
  "nonce": "O6AeKdGZsdX-rSiWpu53rG0QrxSHF3KKEo2OVkEmqSM"
}
incoming_body
Authorization endpoint
2021-06-13 21:18:21 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2021-06-13 21:18:21 SUCCESS
EnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "profile",
  "email",
  "offline_access"
]
expected
openid
2021-06-13 21:18:21 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "response_type": "code",
  "client_id": "87654321",
  "scope": "openid profile email offline_access",
  "state": "qM1k82Au0v-CMuv9Rieu4k0fzj5AiV_HojU5VMkppuY\u003d",
  "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login",
  "nonce": "O6AeKdGZsdX-rSiWpu53rG0QrxSHF3KKEo2OVkEmqSM"
}
2021-06-13 21:18:21 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid profile email offline_access
2021-06-13 21:18:21 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
O6AeKdGZsdX-rSiWpu53rG0QrxSHF3KKEo2OVkEmqSM
2021-06-13 21:18:21 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2021-06-13 21:18:21 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
87654321
2021-06-13 21:18:21 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login
expected
[
  "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
]
2021-06-13 21:18:21 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "profile",
  "email",
  "offline_access"
]
expected
openid
2021-06-13 21:18:21 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2021-06-13 21:18:21 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
7ibay4ah3r
2021-06-13 21:18:21 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login",
  "state": "qM1k82Au0v-CMuv9Rieu4k0fzj5AiV_HojU5VMkppuY\u003d"
}
2021-06-13 21:18:21 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login",
  "state": "qM1k82Au0v-CMuv9Rieu4k0fzj5AiV_HojU5VMkppuY\u003d",
  "code": "7ibay4ah3r"
}
2021-06-13 21:18:21
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login?state=qM1k82Au0v-CMuv9Rieu4k0fzj5AiV_HojU5VMkppuY%3D&code=7ibay4ah3r
2021-06-13 21:18:21 OUTGOING
oidcc-client-test-idtoken-sig-none
Response to HTTP request to test instance uYIx3ezSY1j865x
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login?state=qM1k82Au0v-CMuv9Rieu4k0fzj5AiV_HojU5VMkppuY%3D&code=7ibay4ah3r]
outgoing_path
authorize
2021-06-13 21:18:21 INCOMING
oidcc-client-test-idtoken-sig-none
Incoming HTTP request to test instance uYIx3ezSY1j865x
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "application/json;charset\u003dUTF-8",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "authorization": "Basic ODc2NTQzMjE6MTIzNDU2Nzg\u003d",
  "user-agent": "Java/11.0.8",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "161",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "grant_type": "authorization_code",
  "code": "7ibay4ah3r",
  "redirect_uri": "https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
grant_type=authorization_code&code=7ibay4ah3r&redirect_uri=https%3A%2F%2Fenv-239211.customer.cloud.microstrategy.com%2FMicroStrategyLibrary%2Fauth%2Foidc%2Flogin
Token endpoint
2021-06-13 21:18:21 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
87654321
client_secret
12345678
method
client_secret_basic
2021-06-13 21:18:21 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2021-06-13 21:18:21 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
7ibay4ah3r
2021-06-13 21:18:21 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://env-239211.customer.cloud.microstrategy.com/MicroStrategyLibrary/auth/oidc/login
2021-06-13 21:18:21 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
GdtHRvR8w2oIHzQlLAySBn4xbmLcpZb81kjbJQmul0HPnix7y2
2021-06-13 21:18:21 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/MSTR_M2021_UP1/
sub
user-subject-1234531
aud
87654321
nonce
O6AeKdGZsdX-rSiWpu53rG0QrxSHF3KKEo2OVkEmqSM
iat
1623619101
exp
1623619401
2021-06-13 21:18:21 INFO
AddAtHashToIdTokenClaims
Skipped evaluation due to missing required string: at_hash
expected
at_hash
2021-06-13 21:18:21 SUCCESS
SignIdTokenWithAlgNone
Created id_token with alg none
id_token
eyJhbGciOiJub25lIn0.eyJpc3MiOiJodHRwczovL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQvdGVzdC9hL01TVFJfTTIwMjFfVVAxLyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiODc2NTQzMjEiLCJub25jZSI6Ik82QWVLZEdac2RYLXJTaVdwdTUzckcwUXJ4U0hGM0tLRW8yT1ZrRW1xU00iLCJpYXQiOjE2MjM2MTkxMDEsImV4cCI6MTYyMzYxOTQwMX0.
2021-06-13 21:18:21 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2021-06-13 21:18:21 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
GdtHRvR8w2oIHzQlLAySBn4xbmLcpZb81kjbJQmul0HPnix7y2
token_type
Bearer
id_token
eyJhbGciOiJub25lIn0.eyJpc3MiOiJodHRwczovL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQvdGVzdC9hL01TVFJfTTIwMjFfVVAxLyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiODc2NTQzMjEiLCJub25jZSI6Ik82QWVLZEdac2RYLXJTaVdwdTUzckcwUXJ4U0hGM0tLRW8yT1ZrRW1xU00iLCJpYXQiOjE2MjM2MTkxMDEsImV4cCI6MTYyMzYxOTQwMX0.
scope
openid profile email offline_access
2021-06-13 21:18:21 OUTGOING
oidcc-client-test-idtoken-sig-none
Response to HTTP request to test instance uYIx3ezSY1j865x
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "GdtHRvR8w2oIHzQlLAySBn4xbmLcpZb81kjbJQmul0HPnix7y2",
  "token_type": "Bearer",
  "id_token": "eyJhbGciOiJub25lIn0.eyJpc3MiOiJodHRwczovL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXQvdGVzdC9hL01TVFJfTTIwMjFfVVAxLyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiODc2NTQzMjEiLCJub25jZSI6Ik82QWVLZEdac2RYLXJTaVdwdTUzckcwUXJ4U0hGM0tLRW8yT1ZrRW1xU00iLCJpYXQiOjE2MjM2MTkxMDEsImV4cCI6MTYyMzYxOTQwMX0.",
  "scope": "openid profile email offline_access"
}
outgoing_path
token
2021-06-13 21:18:26 WARNING
ClientDidNotContinueAfterReceivingUnsignedIdToken
Client did not send a userinfo request after receiving an unsigned id_token.
2021-06-13 21:18:26 FINISHED
oidcc-client-test-idtoken-sig-none
Test has run to completion
testmodule_result
WARNING
2021-06-13 21:20:08
TEST-RUNNER
Alias has now been claimed by another test
alias
MSTR_M2021_UP1
new_test_id
T5lk1gGF4WuUWZN
Test Results