Test Summary

Test Results

Expand All Collapse All
All times are UTC
2021-07-29 05:58:16 INFO
TEST-RUNNER
Test instance m8zdy7Rzo3nWuH9 created
baseUrl
https://www.certification.openid.net/test/a/caos
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "response_mode": "default",
  "client_registration": "static_client"
}
alias
caos
description
RP Certification
planId
uoprP0OO8Z4Qo
config
{
  "alias": "caos",
  "description": "RP Certification",
  "publish": "summary",
  "client": {
    "client_id": "93634749943374746@openid_certification",
    "client_secret": "myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*\u003d@JhYacA4^qC]B{ZK}",
    "redirect_uri": "http://localhost:4200/auth/callback"
  }
}
testName
oidcc-client-test-missing-sub
2021-07-29 05:58:16 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/caos/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/caos/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/caos/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/caos/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/caos/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/caos/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-07-29 05:58:16
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/caos/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/caos/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/caos/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/caos/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/caos/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/caos/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-07-29 05:58:17
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "_6xsDKQDhk9JbMuKf35WioGZWdHVk4R92e2Gdo2SzMHEnGH6l9gZH4miLbJWULl1ybqGDIaWzGrYVaG8crTINncO6JD-YA29Rjuw2m-6fwXJEfIQVQ8Dw2Mu4uVZgoySYYvJW85aquC6uxNocF5ConkWiKoEaiJUngE1tORsBfs",
      "kty": "RSA",
      "q": "jhpuWH6SHlIxZEk0uJB_DTQRzMEQzMbrQCob9FZxr4gZxr--OGfx5e3jW3BNv4jrgD1bjWDd7dbgV1SpQSQxlQg-wqUcj6PwJclDy-aLCr125kNDWzhMzn9izq25LaI3wrXD1CX0pX2HxMyXHwHq_nce82HgOTGViYhT1pYD15U",
      "d": "awUvUcI2jMfzt2cb0hwj0ut7rxhBitBQ28ujmTvP5I4vGu_GSieRItaofuetjAK7QKNsFfzXYvCtUE76RVANqPA4pIHtNq8d9W2LNRIMc6DXv2RDIE5r4NDC91_iCNCAdG8JMqF5ObDgm385sCpH2706RWWKU5t0lo5PXg169QSHzsmDVITrxtqNOxThuWrK0rD-BwDH98MyK1NkiHshporHD8jR-qOl5nOoAuOD1Wyim3SHYQJLvHqN2VMjnUTtRzpm6Vg0wJRZ2gmrDhTwJxwgsAnFn7PSn3QTouj_jYoBTLC4bQ8cYnIA7y6Sa88vECkgxswzzOmsvOStsLyGYQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "9f0bcf45-4c60-4397-8895-a85dfeabdf78",
      "qi": "_Ca0irqvO-GY973-h2Q6dsj0Z7qM9FdEExaqwVz14IYYDNAyb1v9OHrblPfRW-2gkzjCQx4ydcy5wGlF4oaSS_tb1GPigoG5d3TlbJ5PfXA9W-gx1M2yDqKQoX7cWxND7bWPXwgkFPCMZYli6s_t6Sfqf-VqWGnDG-DFMYUAhsM",
      "dp": "DCL8MhFrFWoYGzECTxEJPKPwSqI6WDlW3Ax5cJFB4bRlB-NiyOh6MNQQvciUblqPa9cN2_RbnjKIOHBoCK3qPyOhsoqHeLnOPVJCD-xz1unIZLCv88m1rQW9SQoIGLlhjX3cPh5qkWf_lTfTolnnId1Lo4smkH82sxVtnjuloRc",
      "dq": "LWozE-M3rasVD_j5eXbss_qNKcQWK2vzaWlLz9YEtVWo70T-dSZ7P8G8ZM_KeUk4Ap8ZcGCh7M48mox7H0-C7R9ad3ivXRTGvjzJhxPiIgeVRVf_4dpnaaN6n5UT1oq-iWLv-BA9VNp-lp3QOl-xi6vkX2JLd9vp7697I9yD09U",
      "n": "jewJpnRd-3mm25FJgFzGactnjY-oU82AtyZZqVgrw2dZ8-9Y4S1_i9cyu0V_mCapDdrkwpGmh0NHwnuW7bdJdXPlqw9SPgSKhLYYAfmVpq5mZrX6rYUw_-uheXTuqSH3nPQ9QgyzacnOtU1gPi5_IT23M8d5MwXSzHEp8JvyVmhE1mvCYyE3iXTJnAU3bXI4EnldBuLjyey6RhOsnXE3XE_hhLkiJ6njGkm_3vc6eLYTqSOxbgB9f5ATZz7WBH3Gq5TFe8MySxi-yfEM0Y7Gg9jX4qpZh7NLLvVVR-HSV9LxFzr0Og1ZCZE70JRsZC-CJPwSxBTY1WISWoe2z9ZIFw"
    },
    {
      "kty": "EC",
      "d": "8QJtSXny3ieW11Q-BYFHqYlG-sIRrugOuxFA3947y7k",
      "use": "sig",
      "crv": "P-256",
      "kid": "59ebe66b-bdc8-414a-a620-8c89af5c53d2",
      "x": "gZp2QoZ0f3xAneo5UPLmGpSqrKlmtgoKVefJFxnIlAs",
      "y": "wQp2bkR4-W1ETXLT76bkA419UMu-98mcyiF15i0MUKo"
    },
    {
      "kty": "EC",
      "d": "ZEAHtuJDzdK4SjPlD3b5_2K_vDGfpja0uiTMhr_z0C4",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "0cee10ef-1ad2-4d68-bdc7-bfd2bf9db0ce",
      "x": "HrXiBz_jPiMnogFV7dl6IoGQwykFu5XpRur_qXb7NXk",
      "y": "aY9Im5gBHlXJfbjK-bf_tUdb8_EpwB5GFWtu2BeNwLQ"
    },
    {
      "kty": "OKP",
      "d": "FZLqaSfcCIZhIIHW-uPvPWIL3CWkEctSkV6Pm6wkopc",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "956bdcd6-c873-4dff-bc14-50667ea2d708",
      "x": "SLwQZUKYAEypbJrf5GnBNm_t9zAYVJfiuW9LLiXUoyY"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "6KNqajAi6pHbhILs-UoImxROBDo0kPL7Hg0AbiYkuhQzk8YW7NFP91y8H3gQVvQRQFJ_cPfTpP0iNsIAOdKNcU9sYMpI0uNIkEm0_UQ_6ARrzR37FllzPotqlNN1GFVT0wjdJOc_YHPPCSudA7CDKa2TOtHzpNmDsbvYxqDkaT8",
      "kty": "RSA",
      "q": "vpWt6DcuvBQCg3X1Z5QFlrl1T7unvfW9xXC6ho6zXb0Nx9fNW5sFLGuIBgHJ7ZPwqe7Y_Y8p7ne9qPMrUZKJsCxUPcS0viyBeVgh4wHkyHnMpiuOd4U35AfiQ-IOEf3dz6dFRRgpYGumzLTB9Xd_VPpA9N4YD6DKTHYBSsuFV9M",
      "d": "E6KRXwZgHUhwVbVD6iMyfFJwWYgwXV_qWMeGVM-iiGypTWqDmIgKpb8tp1YpTRb1rkxuQVwrC1DG6fum2YiLvgq1J9E1hRhrHMsL1CdjkIqNT9GoNzeEn_vhmxdMzI1vYDPWCxzKrctZGTnhPxEQeuf8hjf1zaRJsHFvD_vHWiJo2SRQHITlKZCd5YUymRVPTvueHOCyREMwQQcs5UvazTSSJS8e6YALc4QzcKlGjyvyrixEwyQFNnJW1fc4kbROhpCyO2hOeCDDwMOeiX0VHWpn9PDBm7E6pM9IJrgQYxOFi9OrbkhUXLC1SkdRkiL7joqXTk7zgHqaVe5WXJBVKQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "1e0203f6-a07d-449e-8d1e-926d7095a22b",
      "qi": "lsolCrdo49_h4M9Pl4U9i2E3tX3_LWqlu2OkTIkoBY6nzXP2-D00QrR4I36n_XmyMIrMO7zbpbRIpaY7Mgkq9GOVDAFQN-VcJttXsvKlJUOlbH6quq203BSlj21cGHrlUdaj_PtbJWWkOS8OyAAs97qsS6am9MqC4D4_dEp1ZRs",
      "dp": "vk3n4EPOXErC4yxjBC6eyZWbmHOwyp4p9FQ4dOK5Cos6Afl6iXFUVArFTYze-PKhJhgWbmgc9wunsFmU67gkwntxMeBoIDOTCY1yA_iPupHbSajr3EWCM7jCkEpGsIgkkS7gEK8mthUmWN8Xi4waT77RAL387G6O_5al5x54mus",
      "alg": "RSA-OAEP",
      "dq": "ohO8v70eG4iQ0qegOaPiVNoHb_VQo_W2m5BQsFnvJArBC3D1DbB559rS5PjkdwzXIE0lcA0uRcTDIEkcT9TlD1PDmHwOkaRbv4w51Uoo_GzIo5BrKi266EvkGoLGIHrbBdtkx2vS1FL4mSInyM8FFIl2cEfoAnJlWD0KwEbwcU0",
      "n": "rTFOITSvtVIgmXLKb72674_5zA-AS4jqCq01aqvWp_lxtDFf0hfzy7ECOQ0Lwf16FSi-qpEADRYyZjZ3qxUPu0_6Bd6xl1Ln2rmqHF0oCMFswKLnbebpT78A_4yA2zXQ7A7S9zVUOl4XuYn5R4oCwWCF5htJ_tTohuUtUpU8XK6U8kuz8I2Xb0h6b6dTpXowks7fqF1qb-eO8jy14H1pPIa6SlkE-1p6hk64-QQRsPUXvWpzDhSsR7kfLyR3GS6RbEow25FfvLn6P8JRHhf2PzhtwIAQQzydgwjvPhlbooGF_8RlPcOq7QDlEhNxYponmyeP2Q5RKLgSv4253sIn7Q"
    },
    {
      "kty": "EC",
      "d": "ci6PvTDvW86Hd4_1UGuBcRA95H0hZHH8Bt7dDU19mew",
      "use": "enc",
      "crv": "P-256",
      "kid": "48567e79-3551-4fc0-8714-8c3e49170fd0",
      "x": "xX_CIA3Dncs6Y1ROg8KG7IQfjlHxLO6YPMpFhwBcqlE",
      "y": "YIEiwM1aWwuAYa1F3OjJKONBdGOLOCdTCKgQmXWL1M0",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "9f0bcf45-4c60-4397-8895-a85dfeabdf78",
      "n": "jewJpnRd-3mm25FJgFzGactnjY-oU82AtyZZqVgrw2dZ8-9Y4S1_i9cyu0V_mCapDdrkwpGmh0NHwnuW7bdJdXPlqw9SPgSKhLYYAfmVpq5mZrX6rYUw_-uheXTuqSH3nPQ9QgyzacnOtU1gPi5_IT23M8d5MwXSzHEp8JvyVmhE1mvCYyE3iXTJnAU3bXI4EnldBuLjyey6RhOsnXE3XE_hhLkiJ6njGkm_3vc6eLYTqSOxbgB9f5ATZz7WBH3Gq5TFe8MySxi-yfEM0Y7Gg9jX4qpZh7NLLvVVR-HSV9LxFzr0Og1ZCZE70JRsZC-CJPwSxBTY1WISWoe2z9ZIFw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "f9d5da48-40a6-4fba-a0a3-e57957d03269",
      "n": "sLljWvH_PoELRbK566OpZsrBpvHxgTaAEk5W5K2p5TqUKQO3ds8Q86FKYaU8DY0H7M0RwE5znA7S0euQg9joMx4izl28OkwJNhi0qws73Vx8aOI3VYGqfPW3-qN2Wzu7acT8byAElD4GMVSdUnEXs9QYwHOgOUvkS-zFiqzhNn6aLJjs5n7jZVCnAAIc4r0ZaGEm_wKIHY523vZD4-rnSorxY6Y4kIgnZ-Kl9zx2qrTEOquiacA-Gv-FthnsX8c89UqLS_dwxlwT3cGtVG8BAlKO5ktnXxhLJ6Fm8pLYf5TY3ETPzSR1uiS7B5p9gxraCmQdfIcuaLZDhvU0lbLIww"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "59ebe66b-bdc8-414a-a620-8c89af5c53d2",
      "x": "gZp2QoZ0f3xAneo5UPLmGpSqrKlmtgoKVefJFxnIlAs",
      "y": "wQp2bkR4-W1ETXLT76bkA419UMu-98mcyiF15i0MUKo"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "18e32eb2-7a95-4c74-b710-c559e77dabb9",
      "x": "upItdRQxdaFZvZ86SVoksYcmH7T7KO9VMimFTjoPfuI",
      "y": "y_Esb1G0LK3QSt0BpQBvrPCxyU7v5CKLGjUcmE-YZio"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "0cee10ef-1ad2-4d68-bdc7-bfd2bf9db0ce",
      "x": "HrXiBz_jPiMnogFV7dl6IoGQwykFu5XpRur_qXb7NXk",
      "y": "aY9Im5gBHlXJfbjK-bf_tUdb8_EpwB5GFWtu2BeNwLQ"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "956bdcd6-c873-4dff-bc14-50667ea2d708",
      "x": "SLwQZUKYAEypbJrf5GnBNm_t9zAYVJfiuW9LLiXUoyY"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "1e0203f6-a07d-449e-8d1e-926d7095a22b",
      "alg": "RSA-OAEP",
      "n": "rTFOITSvtVIgmXLKb72674_5zA-AS4jqCq01aqvWp_lxtDFf0hfzy7ECOQ0Lwf16FSi-qpEADRYyZjZ3qxUPu0_6Bd6xl1Ln2rmqHF0oCMFswKLnbebpT78A_4yA2zXQ7A7S9zVUOl4XuYn5R4oCwWCF5htJ_tTohuUtUpU8XK6U8kuz8I2Xb0h6b6dTpXowks7fqF1qb-eO8jy14H1pPIa6SlkE-1p6hk64-QQRsPUXvWpzDhSsR7kfLyR3GS6RbEow25FfvLn6P8JRHhf2PzhtwIAQQzydgwjvPhlbooGF_8RlPcOq7QDlEhNxYponmyeP2Q5RKLgSv4253sIn7Q"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "48567e79-3551-4fc0-8714-8c3e49170fd0",
      "x": "xX_CIA3Dncs6Y1ROg8KG7IQfjlHxLO6YPMpFhwBcqlE",
      "y": "YIEiwM1aWwuAYa1F3OjJKONBdGOLOCdTCKgQmXWL1M0",
      "alg": "ECDH-ES"
    }
  ]
}
2021-07-29 05:58:17 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2021-07-29 05:58:17 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2021-07-29 05:58:17 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": 1580000000
}
2021-07-29 05:58:17 SUCCESS
OIDCCGetStaticClientConfigurationForRPTests
Found a static client object
client_id
93634749943374746@openid_certification
client_secret
myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*=@JhYacA4^qC]B{ZK}
redirect_uris
[
  "http://localhost:4200/auth/callback"
]
2021-07-29 05:58:17 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "client_id": "93634749943374746@openid_certification",
  "client_secret": "myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*\u003d@JhYacA4^qC]B{ZK}",
  "redirect_uris": [
    "http://localhost:4200/auth/callback"
  ]
}
2021-07-29 05:58:17 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2021-07-29 05:58:17 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2021-07-29 05:58:17 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "http://localhost:4200/auth/callback"
]
2021-07-29 05:58:17 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2021-07-29 05:58:17 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2021-07-29 05:58:17 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2021-07-29 05:58:17 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2021-07-29 05:58:17 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2021-07-29 05:58:17 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2021-07-29 05:58:17 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2021-07-29 05:58:17 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-07-29 05:58:17 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2021-07-29 05:58:17 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2021-07-29 05:58:17 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2021-07-29 05:58:17 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2021-07-29 05:58:17 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2021-07-29 05:58:17 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2021-07-29 05:58:17 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2021-07-29 05:58:17 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2021-07-29 05:58:17 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2021-07-29 05:58:17 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2021-07-29 05:58:17
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2021-07-29 05:58:17
oidcc-client-test-missing-sub
Setup Done
2021-07-29 05:58:21 INCOMING
oidcc-client-test-missing-sub
Incoming HTTP request to test instance m8zdy7Rzo3nWuH9
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,*/*;q\u003d0.8",
  "upgrade-insecure-requests": "1",
  "cookie": "JSESSIONID\u003d0340D2A012AC78B6C2939CF389A64905",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.1 Safari/605.1.15",
  "accept-language": "en-gb",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "93634749943374746@openid_certification",
  "redirect_uri": "http://localhost:4200/auth/callback",
  "response_type": "code",
  "scope": "openid profile",
  "state": "4a6d192e-9b9c-461c-ab62-023c35864881"
}
incoming_body
Authorization endpoint
2021-07-29 05:58:21 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2021-07-29 05:58:21 SUCCESS
EnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "profile"
]
expected
openid
2021-07-29 05:58:21 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "93634749943374746@openid_certification",
  "redirect_uri": "http://localhost:4200/auth/callback",
  "response_type": "code",
  "scope": "openid profile",
  "state": "4a6d192e-9b9c-461c-ab62-023c35864881"
}
2021-07-29 05:58:21 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid profile
2021-07-29 05:58:21 INFO
ExtractNonceFromAuthorizationRequest
Couldn't find 'nonce' in authorization endpoint parameters
2021-07-29 05:58:21 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2021-07-29 05:58:21 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
93634749943374746@openid_certification
2021-07-29 05:58:21 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
http://localhost:4200/auth/callback
expected
[
  "http://localhost:4200/auth/callback"
]
2021-07-29 05:58:21 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "profile"
]
expected
openid
2021-07-29 05:58:21 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2021-07-29 05:58:21 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
3PcoKYx8gu
2021-07-29 05:58:21 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
MqEz52HXeoSyKUWkq_u3gg
2021-07-29 05:58:21 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "http://localhost:4200/auth/callback",
  "state": "4a6d192e-9b9c-461c-ab62-023c35864881"
}
2021-07-29 05:58:21 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "http://localhost:4200/auth/callback",
  "state": "4a6d192e-9b9c-461c-ab62-023c35864881",
  "code": "3PcoKYx8gu"
}
2021-07-29 05:58:21
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
http://localhost:4200/auth/callback?state=4a6d192e-9b9c-461c-ab62-023c35864881&code=3PcoKYx8gu
2021-07-29 05:58:21 OUTGOING
oidcc-client-test-missing-sub
Response to HTTP request to test instance m8zdy7Rzo3nWuH9
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [http://localhost:4200/auth/callback?state=4a6d192e-9b9c-461c-ab62-023c35864881&code=3PcoKYx8gu]
outgoing_path
authorize
2021-07-29 05:58:21 INCOMING
oidcc-client-test-missing-sub
Incoming HTTP request to test instance m8zdy7Rzo3nWuH9
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Go-http-client/1.1",
  "authorization": "Basic OTM2MzQ3NDk5NDMzNzQ3NDYlNDBvcGVuaWRfY2VydGlmaWNhdGlvbjpteWNsUSU2MFJCX0Y1JTdDSEElM0ElNDA3JTIxcjdIJTI4RExsdEtBJTI5UH51JTIzJTI5QWclMjNMUThadyUyQ2ttJTJBJTNEJTQwSmhZYWNBNCU1RXFDJTVEQiU3QlpLJTdE",
  "content-type": "application/x-www-form-urlencoded",
  "accept-encoding": "gzip",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "106",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "code": "3PcoKYx8gu",
  "grant_type": "authorization_code",
  "redirect_uri": "http://localhost:4200/auth/callback"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
code=3PcoKYx8gu&grant_type=authorization_code&redirect_uri=http%3A%2F%2Flocalhost%3A4200%2Fauth%2Fcallback
Token endpoint
2021-07-29 05:58:21 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
93634749943374746@openid_certification
client_secret
myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*=@JhYacA4^qC]B{ZK}
method
client_secret_basic
2021-07-29 05:58:21 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2021-07-29 05:58:21 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
3PcoKYx8gu
2021-07-29 05:58:21 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
http://localhost:4200/auth/callback
2021-07-29 05:58:21 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
JQeTHeadHENF3KRLkpP2Vq8Wa2KXQ8JAWebEY38UwLLSswZ7ky
2021-07-29 05:58:21 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
kEO6xzTs92_A-Gk3xhwXQg
2021-07-29 05:58:21 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/caos/
sub
user-subject-1234531
aud
93634749943374746@openid_certification
iat
1627538301
exp
1627538601
2021-07-29 05:58:21
RemoveSubFromIdToken
Removed sub value from ID token claims
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/caos/",
  "aud": "93634749943374746@openid_certification",
  "iat": 1627538301,
  "exp": 1627538601
}
2021-07-29 05:58:21 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
kEO6xzTs92_A-Gk3xhwXQg
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/caos/",
  "aud": "93634749943374746@openid_certification",
  "iat": 1627538301,
  "exp": 1627538601,
  "at_hash": "kEO6xzTs92_A-Gk3xhwXQg"
}
2021-07-29 05:58:21 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiI5ZjBiY2Y0NS00YzYwLTQzOTctODg5NS1hODVkZmVhYmRmNzgiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoia0VPNnh6VHM5Ml9BLUdrM3hod1hRZyIsImF1ZCI6IjkzNjM0NzQ5OTQzMzc0NzQ2QG9wZW5pZF9jZXJ0aWZpY2F0aW9uIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL2FcL2Nhb3NcLyIsImV4cCI6MTYyNzUzODYwMSwiaWF0IjoxNjI3NTM4MzAxfQ.icXm9Z0U4u2Y7nSkk31ZYFDqf_iu9NFilQLkBpn-aZSdeoqe-1kNJIuVjl6in-Je2zwZiJE2_aJPTa6pq40Kuq7ehoMCcqoh9LSDbLUBpRuMBvgclySCNHsLBEoDYr7hf1mLY4SsuNt_qiDqphsn3wp_pxGHBybVyQDs3QhMRWVtk-lj7a5FU85NqiHKS_JKX2Vr6rDYbhzBykBvWg2WsL1SS9m0seXObzyRL__hLpFvcY_H3ZuRlhiBKmu-2ApuJ_JhqE1gDrjYSzl-5HAnLhHX_JA00NmoZa5LJgSL8SdzHti8C6a_Lx4KhKgW3YJCoSoxEHF-01w-3YVxcfNWIQ
key
{"p":"_6xsDKQDhk9JbMuKf35WioGZWdHVk4R92e2Gdo2SzMHEnGH6l9gZH4miLbJWULl1ybqGDIaWzGrYVaG8crTINncO6JD-YA29Rjuw2m-6fwXJEfIQVQ8Dw2Mu4uVZgoySYYvJW85aquC6uxNocF5ConkWiKoEaiJUngE1tORsBfs","kty":"RSA","q":"jhpuWH6SHlIxZEk0uJB_DTQRzMEQzMbrQCob9FZxr4gZxr--OGfx5e3jW3BNv4jrgD1bjWDd7dbgV1SpQSQxlQg-wqUcj6PwJclDy-aLCr125kNDWzhMzn9izq25LaI3wrXD1CX0pX2HxMyXHwHq_nce82HgOTGViYhT1pYD15U","d":"awUvUcI2jMfzt2cb0hwj0ut7rxhBitBQ28ujmTvP5I4vGu_GSieRItaofuetjAK7QKNsFfzXYvCtUE76RVANqPA4pIHtNq8d9W2LNRIMc6DXv2RDIE5r4NDC91_iCNCAdG8JMqF5ObDgm385sCpH2706RWWKU5t0lo5PXg169QSHzsmDVITrxtqNOxThuWrK0rD-BwDH98MyK1NkiHshporHD8jR-qOl5nOoAuOD1Wyim3SHYQJLvHqN2VMjnUTtRzpm6Vg0wJRZ2gmrDhTwJxwgsAnFn7PSn3QTouj_jYoBTLC4bQ8cYnIA7y6Sa88vECkgxswzzOmsvOStsLyGYQ","e":"AQAB","use":"sig","kid":"9f0bcf45-4c60-4397-8895-a85dfeabdf78","qi":"_Ca0irqvO-GY973-h2Q6dsj0Z7qM9FdEExaqwVz14IYYDNAyb1v9OHrblPfRW-2gkzjCQx4ydcy5wGlF4oaSS_tb1GPigoG5d3TlbJ5PfXA9W-gx1M2yDqKQoX7cWxND7bWPXwgkFPCMZYli6s_t6Sfqf-VqWGnDG-DFMYUAhsM","dp":"DCL8MhFrFWoYGzECTxEJPKPwSqI6WDlW3Ax5cJFB4bRlB-NiyOh6MNQQvciUblqPa9cN2_RbnjKIOHBoCK3qPyOhsoqHeLnOPVJCD-xz1unIZLCv88m1rQW9SQoIGLlhjX3cPh5qkWf_lTfTolnnId1Lo4smkH82sxVtnjuloRc","dq":"LWozE-M3rasVD_j5eXbss_qNKcQWK2vzaWlLz9YEtVWo70T-dSZ7P8G8ZM_KeUk4Ap8ZcGCh7M48mox7H0-C7R9ad3ivXRTGvjzJhxPiIgeVRVf_4dpnaaN6n5UT1oq-iWLv-BA9VNp-lp3QOl-xi6vkX2JLd9vp7697I9yD09U","n":"jewJpnRd-3mm25FJgFzGactnjY-oU82AtyZZqVgrw2dZ8-9Y4S1_i9cyu0V_mCapDdrkwpGmh0NHwnuW7bdJdXPlqw9SPgSKhLYYAfmVpq5mZrX6rYUw_-uheXTuqSH3nPQ9QgyzacnOtU1gPi5_IT23M8d5MwXSzHEp8JvyVmhE1mvCYyE3iXTJnAU3bXI4EnldBuLjyey6RhOsnXE3XE_hhLkiJ6njGkm_3vc6eLYTqSOxbgB9f5ATZz7WBH3Gq5TFe8MySxi-yfEM0Y7Gg9jX4qpZh7NLLvVVR-HSV9LxFzr0Og1ZCZE70JRsZC-CJPwSxBTY1WISWoe2z9ZIFw"}
algorithm
RS256
2021-07-29 05:58:21 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2021-07-29 05:58:21 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
JQeTHeadHENF3KRLkpP2Vq8Wa2KXQ8JAWebEY38UwLLSswZ7ky
token_type
Bearer
id_token
eyJraWQiOiI5ZjBiY2Y0NS00YzYwLTQzOTctODg5NS1hODVkZmVhYmRmNzgiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoia0VPNnh6VHM5Ml9BLUdrM3hod1hRZyIsImF1ZCI6IjkzNjM0NzQ5OTQzMzc0NzQ2QG9wZW5pZF9jZXJ0aWZpY2F0aW9uIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL2FcL2Nhb3NcLyIsImV4cCI6MTYyNzUzODYwMSwiaWF0IjoxNjI3NTM4MzAxfQ.icXm9Z0U4u2Y7nSkk31ZYFDqf_iu9NFilQLkBpn-aZSdeoqe-1kNJIuVjl6in-Je2zwZiJE2_aJPTa6pq40Kuq7ehoMCcqoh9LSDbLUBpRuMBvgclySCNHsLBEoDYr7hf1mLY4SsuNt_qiDqphsn3wp_pxGHBybVyQDs3QhMRWVtk-lj7a5FU85NqiHKS_JKX2Vr6rDYbhzBykBvWg2WsL1SS9m0seXObzyRL__hLpFvcY_H3ZuRlhiBKmu-2ApuJ_JhqE1gDrjYSzl-5HAnLhHX_JA00NmoZa5LJgSL8SdzHti8C6a_Lx4KhKgW3YJCoSoxEHF-01w-3YVxcfNWIQ
scope
openid profile
2021-07-29 05:58:21 OUTGOING
oidcc-client-test-missing-sub
Response to HTTP request to test instance m8zdy7Rzo3nWuH9
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "JQeTHeadHENF3KRLkpP2Vq8Wa2KXQ8JAWebEY38UwLLSswZ7ky",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiI5ZjBiY2Y0NS00YzYwLTQzOTctODg5NS1hODVkZmVhYmRmNzgiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoia0VPNnh6VHM5Ml9BLUdrM3hod1hRZyIsImF1ZCI6IjkzNjM0NzQ5OTQzMzc0NzQ2QG9wZW5pZF9jZXJ0aWZpY2F0aW9uIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL2FcL2Nhb3NcLyIsImV4cCI6MTYyNzUzODYwMSwiaWF0IjoxNjI3NTM4MzAxfQ.icXm9Z0U4u2Y7nSkk31ZYFDqf_iu9NFilQLkBpn-aZSdeoqe-1kNJIuVjl6in-Je2zwZiJE2_aJPTa6pq40Kuq7ehoMCcqoh9LSDbLUBpRuMBvgclySCNHsLBEoDYr7hf1mLY4SsuNt_qiDqphsn3wp_pxGHBybVyQDs3QhMRWVtk-lj7a5FU85NqiHKS_JKX2Vr6rDYbhzBykBvWg2WsL1SS9m0seXObzyRL__hLpFvcY_H3ZuRlhiBKmu-2ApuJ_JhqE1gDrjYSzl-5HAnLhHX_JA00NmoZa5LJgSL8SdzHti8C6a_Lx4KhKgW3YJCoSoxEHF-01w-3YVxcfNWIQ",
  "scope": "openid profile"
}
outgoing_path
token
2021-07-29 05:58:26 FINISHED
oidcc-client-test-missing-sub
Test has run to completion
testmodule_result
PASSED
2021-07-29 05:58:39
TEST-RUNNER
Alias has now been claimed by another test
alias
caos
new_test_id
ScKVVMZKAgUIiLr
Test Results