Test Summary

Test Results

Expand All Collapse All
All times are UTC
2021-07-29 05:59:56 INFO
TEST-RUNNER
Test instance TLcZoVmEAT37MXd created
baseUrl
https://www.certification.openid.net/test/a/caos
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "response_mode": "default",
  "client_registration": "static_client"
}
alias
caos
description
RP Certification
planId
uoprP0OO8Z4Qo
config
{
  "alias": "caos",
  "description": "RP Certification",
  "publish": "summary",
  "client": {
    "client_id": "93634749943374746@openid_certification",
    "client_secret": "myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*\u003d@JhYacA4^qC]B{ZK}",
    "redirect_uri": "http://localhost:4200/auth/callback"
  }
}
testName
oidcc-client-test-idtoken-sig-rs256
2021-07-29 05:59:56 SUCCESS
OIDCCGenerateServerConfigurationIdTokenSigningAlgRS256Only
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/caos/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/caos/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/caos/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/caos/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/caos/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/caos/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "RS256"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-07-29 05:59:56
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/caos/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/caos/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/caos/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/caos/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/caos/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/caos/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "RS256"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-07-29 05:59:56
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "0oGpvK5wnJ41DIqm54chGJ-q_Re5EOYeYSTZzAHdPf5DUlihI1vsWuUmwHvunF-F1CNLd-pPGQNtJld5NGjixe1pz0OGvL0CMue7e2AIdte8kpncCJ-uwxKb6zvfaSWhOxefS5ZBkDVhFcQ7dD4sZCuQdEpTmaKdkUlKdpOI4iU",
      "kty": "RSA",
      "q": "wUcyEBF1VPHm3fU_anhOMbVKznTUx0fgIzlFhmLa4YxaIHWy3GHTErliG-e5u09S6LxwDd-tdTUx_hvUWBuS5V-iKXMvsj7_iJryh3hE0qJ3Tn9zZYlW_mry5qdzFc3ilggAQJd_2rTTC0JRVJH5LGxF9kyB193gSyzq5DtqBnE",
      "d": "P4Cjst0JAyKtK484aab9QXprcpGqj6YTjGdxyNVuFKT6zuqd_h1-CS9QPdl7VmlM92igIlANekqvE-0sP1mJaWGfkI60onsFZHwcYF01rFXrU_U1m1Y-Y6K2jfsgYwu_FJGU10ltXQj83Hb84-1INgaUYK6BQodmvQG6ZbmKBJKdek7We05aNQtYYfBM2b6ZuwIMH19z1IgPoq-EPqdGb0v8keQmuR6z0dTgplhkR9KAP-wwmgBMybcxNMaBZ0j8xIN84X1rzdutPVn3PtWOpuXWvsVSOaVnlg-vGCdRbyi8rHzPJXRm3OGedF49ByWpWwXh_tttC1Fwk0ORIvU9gQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "34f68af1-8700-4669-a093-f73547d26e48",
      "qi": "aiQfob9QkCjjmTvGZQBSx5wzAOSIdBG508Y0SH1I8thGtctgfCmAmiJ_2YTo131li2LW4WfaY2Rh13X8jvnEVczMVcvFdG8dURYzBo7C6a5Zrcbm9AaxCCMsDRBWYRrOsFl8YNtdDybVy8MV1GYTTE0G94SvLSKky04_acbpTqI",
      "dp": "aXHB0F2g0xL8h7e8OyWZEniIcha8ARcECK0o2-PjKvZ-SnVS4h9dmXpHmwt5TqMaqlSzrPGVhXYN6rLOZ85SKcruwX-Vsl0LCOzDIN3N35nZP6YKbddu9xAPQhnPox_ST4NZq8csOExEwV52WZf7LIIV7ep9TewC-Y-42QS2AHE",
      "dq": "duROvWef32L2ey6zldDveNBmdd2UTgm-rKw8QlBpCDmH71O3dK2QY4I6AaRnsfs3qwbPfxlK4ECawg9obdJ4aDSN0iWS_3iVQ_jcm8y1uURLU7Q-zgTPyK0NQilbN9xwN44waYtIEMcO02w2D2nD9zmbR8kETj-kC1pUG5UYwWE",
      "n": "nu5MF9xz1I0r6sUWl3KCBzsxu0O4m3y3lR3Wv0EUVdN0Rv1Agrj3rWJ135lSfZxu1ILrKpFFxDXSWd2M4WD3zAUrzJlrh8nMpoXxTRxZ9M_g0AsK-WjMYWHDlvsTjdqs9sIXWqXPnLxY-k8LT2x1bNYpZ6LzC_36m4ZMweuftJQ9lkKOOOqXoqjxLfZNZ0W3fUFqWSWGQTuUuIZGRchXwqMKBfY7RW-f1cvuMacT5ZTfO1IF1vppmYD2YnInHdAtiOs3HXavihvYf0oVn4KK9oCUepWTGq_avzo1T32G2uZrDWAxsVHGvuFRZe74iNiDeul9bOhegRU8LYOMfwqwVQ"
    },
    {
      "kty": "EC",
      "d": "fb1UELP16-5xjuxYptVm1XvOlTF9Hb4_5Hv4XMBfbLU",
      "use": "sig",
      "crv": "P-256",
      "kid": "1aa47598-d9cf-4af5-92d9-f79b8df45ae3",
      "x": "qaV_474yNa-ZPdkFOWXUfVf0LkeeW09MrPIHUBuOKYw",
      "y": "j-bszGyfXbrtTMavUMa8MJ-Gw4ksl0J2jHvQlK69G3o"
    },
    {
      "kty": "EC",
      "d": "PZIgPvfKEcEAw6BoovOZ5kYRwzvP9tOP2lvhac1yKi4",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "86b64bb8-d987-430f-930e-c6a7e262dd01",
      "x": "aEoFNVPPglccFerUCJ4_wu9xkuOkdRxT3l-5tcPF0Z4",
      "y": "oat9FG_uUpElHl6t-agPFL3f9f-06CyN19Fl30vdL5w"
    },
    {
      "kty": "OKP",
      "d": "9F6vaCwaxhLer7KtBKhpL2O3QOh4RZenNFMNdQl8So8",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "214648b1-8d8f-463a-860c-1c78f391461b",
      "x": "iuvIpysaej-TwTLQuPdl-09b3iVbcYCusp2tyy6GTY8"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "9DJXUJt7-1Wvyy4gdyM2CaR6D9kjkPBK-njlfkIrcSPOqc4RpSvJFEMpvZASAJ2_4ufq3HW_aLn2HUQNnTeo_0GvVDeW3PIY_jLseyHNdQKzdTv-dov0Zor8Eik_TSCUy-ZGut2887KO_ERIj9YyP_kiO5ahkzO9r3WZHqQWeik",
      "kty": "RSA",
      "q": "10R3ioJfWFq_3lbjj9N7XKe-oDU1_a9NkYoqmPs4Vh8zfvNRAhCOJWVoJNM28bUPFwqlVxOuBWv76RwoPsHgjKJqZfgNHw5-NONP-Gcf3IO2LuR6KTf22o0NgEa28-Wj44JhbsKCLbWDaN5M-cuIZlZVl21euExJpMCgFiJ4HL8",
      "d": "e4yf3NPOzj_aQkDgUD3oMQ9ppejFsPk_rqHrgUgmUg-m4ueqHJRkYjckGQwVpHneCRGv4eE5eXbo95E0r26TgykGD2iB4xZA7ZWyMnt4JPBeMIhZrRyrvtDtKUNHrcRTHfn_SkZdpNF3-YNp86Q17znYbjdLGcaD8J7ibs6FdIu-g8BlfMNwqWLjdFbgcJvXJQOpPGXoQlxHtM9-I2zdGCyP8Xusy9t4ftOIPA--NOzhNqGnNvjaD792kGYOLW5UcOHVy5dXd5UZHa_7WDYPOyNwJS2BUfbjOPcoLdp70UMMvYGWoSb-kvoSD_TuEWDcRc8ULj_IIl-wXhwFfKstgQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "50c6861e-27cd-48ef-a5e0-a2c26914c46b",
      "qi": "ISrbOP5vGvNY0X0yejovkqeKUY_AhdEpI3Eak4Uuq3dyI-2Dbu-X8Zl1VgR3fsSVijPTSoqqyi9zvaZ2Rz3fHhQh_Ce6_erlj_Xxp9ClE3avr-HJDDImn-Q4udZqJGe6Iz3IVVlU7GzwGteeSjQ4IUr6vXKBlmJYLZu--fYn47U",
      "dp": "uWgLcXFMNiz91zeDgNFkMvgFkUjdPyui0f--xxk4YKO-QqDqNs1C07aW142ujXc4fPB3GsHv_XTMD7Ze29Kp5nyZwUifq8vI_B_v-yFUHJZbaRSPBLUIcF7wOl3E6StmrlV9uF2pHCKje5fgvAz2hCoFOtcIgHpVeAXCp0gQpNk",
      "alg": "RSA-OAEP",
      "dq": "ClmZYch46xeZ6AfHcy_Y25CZIrzMNsFJ-nhpKefSQpnHcRAj0fSX0QZ6JmMdXiu1aQczAefJUyto9kFLUhEiScC5WuO9RcP9n29adfgHWSPgC4sisH6nWMS1ZHiB7WIaKiMnqhqiBa6XfeBKVSxLB5iZDunMRxIr7Ebyq33GxqM",
      "n": "zVeWu2oUegtgq1y5ocYXrULPKU5YW2c0P5T4fWagPdgrikzZIFjsW8vlTirJupu5l3_67ut0W4QyXpeiGeLUiiGcit8hyGA23vV0jIcbRRSJHvH9wA3fdTOMPtjlrKqRiznJ6Koy3hQ8HG6Lp2H24Z146TKYfteGnc3zuk5ZdNJ_5EkFYBVFv9Ut9IprqsnBtpuQvPVLyBWthMws9_gC6zFfBHXOme8RHDV7PL9GY4AfhWjESm19KXyv5iKiFkm6NtNlMxoO5owxfrCJ0TuwRFBD1rRk9_Yx4BBvaXyt25LIp3BAtDokiRu5fqmtMq4DeklNGnbA_yumrJ4Xl1mglw"
    },
    {
      "kty": "EC",
      "d": "UYqrEFiungVlo-r-l9xnwZuGjz0ju3gT0Uiptbxm7io",
      "use": "enc",
      "crv": "P-256",
      "kid": "ca60fc2e-1932-4064-8a73-147a1f8eb4b8",
      "x": "6h8fttdmjkM0dd0n112xlNzqkFQoKR0Rx9hmfqbzu_Y",
      "y": "d60eCDZ-9cajgE7dPrlDpUJX3HBa7Y6dka-TmvPCIJc",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "34f68af1-8700-4669-a093-f73547d26e48",
      "n": "nu5MF9xz1I0r6sUWl3KCBzsxu0O4m3y3lR3Wv0EUVdN0Rv1Agrj3rWJ135lSfZxu1ILrKpFFxDXSWd2M4WD3zAUrzJlrh8nMpoXxTRxZ9M_g0AsK-WjMYWHDlvsTjdqs9sIXWqXPnLxY-k8LT2x1bNYpZ6LzC_36m4ZMweuftJQ9lkKOOOqXoqjxLfZNZ0W3fUFqWSWGQTuUuIZGRchXwqMKBfY7RW-f1cvuMacT5ZTfO1IF1vppmYD2YnInHdAtiOs3HXavihvYf0oVn4KK9oCUepWTGq_avzo1T32G2uZrDWAxsVHGvuFRZe74iNiDeul9bOhegRU8LYOMfwqwVQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "d5eec2c3-7c01-43af-8551-7c75654e3416",
      "n": "jLH0S6PT6q29-G-HtHYJfvhjduGxDYicb19UCwa0Q6Np_p3np6qf5-SIQA4ZdBUq6UcvPR_5bCXVgH5oxlLBkCVRzJy5L22CT6ci1tGeUkoWi4Znt-NQnX7Qs1HYwKChYSqdks350z0ONV6rBbtex_MvlWrHLcLrpqfVzM7TLAMMoJiBiIaYDeUurlRUbO47-IEKnqQL2YYT0ainDimI0e9mrQtE8GGf6E7Wfv5Le_JAKVY4f3BkFZAaGdHk1vjp2Q2KLrtySJUSRVlkEF9RiBDBQMR5PCOs_jt4z_-LddcSFW0fNLIbfy79N-cqjeMXN3lvU-hmWP4D7Ixs0xg_Yw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "1aa47598-d9cf-4af5-92d9-f79b8df45ae3",
      "x": "qaV_474yNa-ZPdkFOWXUfVf0LkeeW09MrPIHUBuOKYw",
      "y": "j-bszGyfXbrtTMavUMa8MJ-Gw4ksl0J2jHvQlK69G3o"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "278d415a-d1ce-4bb9-9bce-74acdc4c3756",
      "x": "_-cpojCHTiPyK9gGDfWhSDc-8-s9V25X_UFJ0oF8hYk",
      "y": "PDQZe0p2VznNXFGP3jS4NClGq7wfe8jg0ySMFc0L1Ac"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "86b64bb8-d987-430f-930e-c6a7e262dd01",
      "x": "aEoFNVPPglccFerUCJ4_wu9xkuOkdRxT3l-5tcPF0Z4",
      "y": "oat9FG_uUpElHl6t-agPFL3f9f-06CyN19Fl30vdL5w"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "214648b1-8d8f-463a-860c-1c78f391461b",
      "x": "iuvIpysaej-TwTLQuPdl-09b3iVbcYCusp2tyy6GTY8"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "50c6861e-27cd-48ef-a5e0-a2c26914c46b",
      "alg": "RSA-OAEP",
      "n": "zVeWu2oUegtgq1y5ocYXrULPKU5YW2c0P5T4fWagPdgrikzZIFjsW8vlTirJupu5l3_67ut0W4QyXpeiGeLUiiGcit8hyGA23vV0jIcbRRSJHvH9wA3fdTOMPtjlrKqRiznJ6Koy3hQ8HG6Lp2H24Z146TKYfteGnc3zuk5ZdNJ_5EkFYBVFv9Ut9IprqsnBtpuQvPVLyBWthMws9_gC6zFfBHXOme8RHDV7PL9GY4AfhWjESm19KXyv5iKiFkm6NtNlMxoO5owxfrCJ0TuwRFBD1rRk9_Yx4BBvaXyt25LIp3BAtDokiRu5fqmtMq4DeklNGnbA_yumrJ4Xl1mglw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "ca60fc2e-1932-4064-8a73-147a1f8eb4b8",
      "x": "6h8fttdmjkM0dd0n112xlNzqkFQoKR0Rx9hmfqbzu_Y",
      "y": "d60eCDZ-9cajgE7dPrlDpUJX3HBa7Y6dka-TmvPCIJc",
      "alg": "ECDH-ES"
    }
  ]
}
2021-07-29 05:59:56 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2021-07-29 05:59:56 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2021-07-29 05:59:56 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": 1580000000
}
2021-07-29 05:59:56 SUCCESS
OIDCCGetStaticClientConfigurationForRPTests
Found a static client object
client_id
93634749943374746@openid_certification
client_secret
myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*=@JhYacA4^qC]B{ZK}
redirect_uris
[
  "http://localhost:4200/auth/callback"
]
2021-07-29 05:59:56 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "client_id": "93634749943374746@openid_certification",
  "client_secret": "myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*\u003d@JhYacA4^qC]B{ZK}",
  "redirect_uris": [
    "http://localhost:4200/auth/callback"
  ]
}
2021-07-29 05:59:56 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2021-07-29 05:59:56 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2021-07-29 05:59:56 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "http://localhost:4200/auth/callback"
]
2021-07-29 05:59:56 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2021-07-29 05:59:56 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2021-07-29 05:59:56 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2021-07-29 05:59:56 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2021-07-29 05:59:56 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2021-07-29 05:59:56 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2021-07-29 05:59:56 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2021-07-29 05:59:56 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-07-29 05:59:56 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2021-07-29 05:59:56 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2021-07-29 05:59:56 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2021-07-29 05:59:56 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2021-07-29 05:59:56 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2021-07-29 05:59:56 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2021-07-29 05:59:56 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2021-07-29 05:59:56 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2021-07-29 05:59:56 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2021-07-29 05:59:56
SetServerSigningAlgToRS256
Successfully set signing algorithm to RS256
2021-07-29 05:59:56
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2021-07-29 05:59:56
oidcc-client-test-idtoken-sig-rs256
Setup Done
2021-07-29 06:00:01 INCOMING
oidcc-client-test-idtoken-sig-rs256
Incoming HTTP request to test instance TLcZoVmEAT37MXd
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,*/*;q\u003d0.8",
  "upgrade-insecure-requests": "1",
  "cookie": "JSESSIONID\u003d0340D2A012AC78B6C2939CF389A64905",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.1 Safari/605.1.15",
  "accept-language": "en-gb",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "93634749943374746@openid_certification",
  "redirect_uri": "http://localhost:4200/auth/callback",
  "response_type": "code",
  "scope": "openid profile",
  "state": "6d442dd6-ccff-4799-b73b-bb75db2f6fce"
}
incoming_body
Authorization endpoint
2021-07-29 06:00:01 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2021-07-29 06:00:01 SUCCESS
EnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "profile"
]
expected
openid
2021-07-29 06:00:01 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "93634749943374746@openid_certification",
  "redirect_uri": "http://localhost:4200/auth/callback",
  "response_type": "code",
  "scope": "openid profile",
  "state": "6d442dd6-ccff-4799-b73b-bb75db2f6fce"
}
2021-07-29 06:00:01 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid profile
2021-07-29 06:00:01 INFO
ExtractNonceFromAuthorizationRequest
Couldn't find 'nonce' in authorization endpoint parameters
2021-07-29 06:00:01 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2021-07-29 06:00:01 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
93634749943374746@openid_certification
2021-07-29 06:00:01 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
http://localhost:4200/auth/callback
expected
[
  "http://localhost:4200/auth/callback"
]
2021-07-29 06:00:01 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "profile"
]
expected
openid
2021-07-29 06:00:01 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2021-07-29 06:00:01 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
z2Cn4rdesu
2021-07-29 06:00:01 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
itrqfzqWsXLGHayi2KU33Q
2021-07-29 06:00:01 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "http://localhost:4200/auth/callback",
  "state": "6d442dd6-ccff-4799-b73b-bb75db2f6fce"
}
2021-07-29 06:00:01 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "http://localhost:4200/auth/callback",
  "state": "6d442dd6-ccff-4799-b73b-bb75db2f6fce",
  "code": "z2Cn4rdesu"
}
2021-07-29 06:00:01
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
http://localhost:4200/auth/callback?state=6d442dd6-ccff-4799-b73b-bb75db2f6fce&code=z2Cn4rdesu
2021-07-29 06:00:01 OUTGOING
oidcc-client-test-idtoken-sig-rs256
Response to HTTP request to test instance TLcZoVmEAT37MXd
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [http://localhost:4200/auth/callback?state=6d442dd6-ccff-4799-b73b-bb75db2f6fce&code=z2Cn4rdesu]
outgoing_path
authorize
2021-07-29 06:00:02 INCOMING
oidcc-client-test-idtoken-sig-rs256
Incoming HTTP request to test instance TLcZoVmEAT37MXd
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Go-http-client/1.1",
  "authorization": "Basic OTM2MzQ3NDk5NDMzNzQ3NDYlNDBvcGVuaWRfY2VydGlmaWNhdGlvbjpteWNsUSU2MFJCX0Y1JTdDSEElM0ElNDA3JTIxcjdIJTI4RExsdEtBJTI5UH51JTIzJTI5QWclMjNMUThadyUyQ2ttJTJBJTNEJTQwSmhZYWNBNCU1RXFDJTVEQiU3QlpLJTdE",
  "content-type": "application/x-www-form-urlencoded",
  "accept-encoding": "gzip",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "106",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "code": "z2Cn4rdesu",
  "grant_type": "authorization_code",
  "redirect_uri": "http://localhost:4200/auth/callback"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
code=z2Cn4rdesu&grant_type=authorization_code&redirect_uri=http%3A%2F%2Flocalhost%3A4200%2Fauth%2Fcallback
Token endpoint
2021-07-29 06:00:02 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
93634749943374746@openid_certification
client_secret
myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*=@JhYacA4^qC]B{ZK}
method
client_secret_basic
2021-07-29 06:00:02 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2021-07-29 06:00:02 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
z2Cn4rdesu
2021-07-29 06:00:02 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
http://localhost:4200/auth/callback
2021-07-29 06:00:02 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
tgKZFdXVTKgoms1vMnFoW9EzlbS4ExJDDSxbGttr5kUL8C9QM5
2021-07-29 06:00:02 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
VD7NFQXzD9bKUJbDj13XHQ
2021-07-29 06:00:02 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/caos/
sub
user-subject-1234531
aud
93634749943374746@openid_certification
iat
1627538402
exp
1627538702
2021-07-29 06:00:02 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
VD7NFQXzD9bKUJbDj13XHQ
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/caos/",
  "sub": "user-subject-1234531",
  "aud": "93634749943374746@openid_certification",
  "iat": 1627538402,
  "exp": 1627538702,
  "at_hash": "VD7NFQXzD9bKUJbDj13XHQ"
}
2021-07-29 06:00:02 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiIzNGY2OGFmMS04NzAwLTQ2NjktYTA5My1mNzM1NDdkMjZlNDgiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiVkQ3TkZRWHpEOWJLVUpiRGoxM1hIUSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiOTM2MzQ3NDk5NDMzNzQ3NDZAb3BlbmlkX2NlcnRpZmljYXRpb24iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvY2Fvc1wvIiwiZXhwIjoxNjI3NTM4NzAyLCJpYXQiOjE2Mjc1Mzg0MDJ9.CLxdh3jyiyBpfnwMKdffmTjjQyPNiTcDHbkEZ8ZOadamdBRENQNALVwR2OJXwISXumtOXjNEEc7JVe3t5aTnxxw4u4l9EYgs4qhkjkrn0IbCk1kRv1zDcKx9I6-VehzGjqU2lpkVh2i3lmydKmY1M1kjp2too84p8Xj1eshkfS7uceyj8U4pyUuRrhn2fDMfFZlBzFus5hIJWCTaerv4-lJfcW2gFMaeJhn8N4pJQg6xkE6wOi1NZ-PrWyZZ4ahCW34XsNhsXDGmtEnwFNyfLIJVo5KCm050Y9mDfLFOXVOXcZ2RbyLLrFrqztjNd1m4OaGEKuI7Cf57OwqrOLu_Fg
key
{"p":"0oGpvK5wnJ41DIqm54chGJ-q_Re5EOYeYSTZzAHdPf5DUlihI1vsWuUmwHvunF-F1CNLd-pPGQNtJld5NGjixe1pz0OGvL0CMue7e2AIdte8kpncCJ-uwxKb6zvfaSWhOxefS5ZBkDVhFcQ7dD4sZCuQdEpTmaKdkUlKdpOI4iU","kty":"RSA","q":"wUcyEBF1VPHm3fU_anhOMbVKznTUx0fgIzlFhmLa4YxaIHWy3GHTErliG-e5u09S6LxwDd-tdTUx_hvUWBuS5V-iKXMvsj7_iJryh3hE0qJ3Tn9zZYlW_mry5qdzFc3ilggAQJd_2rTTC0JRVJH5LGxF9kyB193gSyzq5DtqBnE","d":"P4Cjst0JAyKtK484aab9QXprcpGqj6YTjGdxyNVuFKT6zuqd_h1-CS9QPdl7VmlM92igIlANekqvE-0sP1mJaWGfkI60onsFZHwcYF01rFXrU_U1m1Y-Y6K2jfsgYwu_FJGU10ltXQj83Hb84-1INgaUYK6BQodmvQG6ZbmKBJKdek7We05aNQtYYfBM2b6ZuwIMH19z1IgPoq-EPqdGb0v8keQmuR6z0dTgplhkR9KAP-wwmgBMybcxNMaBZ0j8xIN84X1rzdutPVn3PtWOpuXWvsVSOaVnlg-vGCdRbyi8rHzPJXRm3OGedF49ByWpWwXh_tttC1Fwk0ORIvU9gQ","e":"AQAB","use":"sig","kid":"34f68af1-8700-4669-a093-f73547d26e48","qi":"aiQfob9QkCjjmTvGZQBSx5wzAOSIdBG508Y0SH1I8thGtctgfCmAmiJ_2YTo131li2LW4WfaY2Rh13X8jvnEVczMVcvFdG8dURYzBo7C6a5Zrcbm9AaxCCMsDRBWYRrOsFl8YNtdDybVy8MV1GYTTE0G94SvLSKky04_acbpTqI","dp":"aXHB0F2g0xL8h7e8OyWZEniIcha8ARcECK0o2-PjKvZ-SnVS4h9dmXpHmwt5TqMaqlSzrPGVhXYN6rLOZ85SKcruwX-Vsl0LCOzDIN3N35nZP6YKbddu9xAPQhnPox_ST4NZq8csOExEwV52WZf7LIIV7ep9TewC-Y-42QS2AHE","dq":"duROvWef32L2ey6zldDveNBmdd2UTgm-rKw8QlBpCDmH71O3dK2QY4I6AaRnsfs3qwbPfxlK4ECawg9obdJ4aDSN0iWS_3iVQ_jcm8y1uURLU7Q-zgTPyK0NQilbN9xwN44waYtIEMcO02w2D2nD9zmbR8kETj-kC1pUG5UYwWE","n":"nu5MF9xz1I0r6sUWl3KCBzsxu0O4m3y3lR3Wv0EUVdN0Rv1Agrj3rWJ135lSfZxu1ILrKpFFxDXSWd2M4WD3zAUrzJlrh8nMpoXxTRxZ9M_g0AsK-WjMYWHDlvsTjdqs9sIXWqXPnLxY-k8LT2x1bNYpZ6LzC_36m4ZMweuftJQ9lkKOOOqXoqjxLfZNZ0W3fUFqWSWGQTuUuIZGRchXwqMKBfY7RW-f1cvuMacT5ZTfO1IF1vppmYD2YnInHdAtiOs3HXavihvYf0oVn4KK9oCUepWTGq_avzo1T32G2uZrDWAxsVHGvuFRZe74iNiDeul9bOhegRU8LYOMfwqwVQ"}
algorithm
RS256
2021-07-29 06:00:02 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2021-07-29 06:00:02 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
tgKZFdXVTKgoms1vMnFoW9EzlbS4ExJDDSxbGttr5kUL8C9QM5
token_type
Bearer
id_token
eyJraWQiOiIzNGY2OGFmMS04NzAwLTQ2NjktYTA5My1mNzM1NDdkMjZlNDgiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiVkQ3TkZRWHpEOWJLVUpiRGoxM1hIUSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiOTM2MzQ3NDk5NDMzNzQ3NDZAb3BlbmlkX2NlcnRpZmljYXRpb24iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvY2Fvc1wvIiwiZXhwIjoxNjI3NTM4NzAyLCJpYXQiOjE2Mjc1Mzg0MDJ9.CLxdh3jyiyBpfnwMKdffmTjjQyPNiTcDHbkEZ8ZOadamdBRENQNALVwR2OJXwISXumtOXjNEEc7JVe3t5aTnxxw4u4l9EYgs4qhkjkrn0IbCk1kRv1zDcKx9I6-VehzGjqU2lpkVh2i3lmydKmY1M1kjp2too84p8Xj1eshkfS7uceyj8U4pyUuRrhn2fDMfFZlBzFus5hIJWCTaerv4-lJfcW2gFMaeJhn8N4pJQg6xkE6wOi1NZ-PrWyZZ4ahCW34XsNhsXDGmtEnwFNyfLIJVo5KCm050Y9mDfLFOXVOXcZ2RbyLLrFrqztjNd1m4OaGEKuI7Cf57OwqrOLu_Fg
scope
openid profile
2021-07-29 06:00:02 OUTGOING
oidcc-client-test-idtoken-sig-rs256
Response to HTTP request to test instance TLcZoVmEAT37MXd
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "tgKZFdXVTKgoms1vMnFoW9EzlbS4ExJDDSxbGttr5kUL8C9QM5",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiIzNGY2OGFmMS04NzAwLTQ2NjktYTA5My1mNzM1NDdkMjZlNDgiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiVkQ3TkZRWHpEOWJLVUpiRGoxM1hIUSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiOTM2MzQ3NDk5NDMzNzQ3NDZAb3BlbmlkX2NlcnRpZmljYXRpb24iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvY2Fvc1wvIiwiZXhwIjoxNjI3NTM4NzAyLCJpYXQiOjE2Mjc1Mzg0MDJ9.CLxdh3jyiyBpfnwMKdffmTjjQyPNiTcDHbkEZ8ZOadamdBRENQNALVwR2OJXwISXumtOXjNEEc7JVe3t5aTnxxw4u4l9EYgs4qhkjkrn0IbCk1kRv1zDcKx9I6-VehzGjqU2lpkVh2i3lmydKmY1M1kjp2too84p8Xj1eshkfS7uceyj8U4pyUuRrhn2fDMfFZlBzFus5hIJWCTaerv4-lJfcW2gFMaeJhn8N4pJQg6xkE6wOi1NZ-PrWyZZ4ahCW34XsNhsXDGmtEnwFNyfLIJVo5KCm050Y9mDfLFOXVOXcZ2RbyLLrFrqztjNd1m4OaGEKuI7Cf57OwqrOLu_Fg",
  "scope": "openid profile"
}
outgoing_path
token
2021-07-29 06:00:02 INCOMING
oidcc-client-test-idtoken-sig-rs256
Incoming HTTP request to test instance TLcZoVmEAT37MXd
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Go-http-client/1.1",
  "accept-encoding": "gzip",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2021-07-29 06:00:02 OUTGOING
oidcc-client-test-idtoken-sig-rs256
Response to HTTP request to test instance TLcZoVmEAT37MXd
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "34f68af1-8700-4669-a093-f73547d26e48",
      "n": "nu5MF9xz1I0r6sUWl3KCBzsxu0O4m3y3lR3Wv0EUVdN0Rv1Agrj3rWJ135lSfZxu1ILrKpFFxDXSWd2M4WD3zAUrzJlrh8nMpoXxTRxZ9M_g0AsK-WjMYWHDlvsTjdqs9sIXWqXPnLxY-k8LT2x1bNYpZ6LzC_36m4ZMweuftJQ9lkKOOOqXoqjxLfZNZ0W3fUFqWSWGQTuUuIZGRchXwqMKBfY7RW-f1cvuMacT5ZTfO1IF1vppmYD2YnInHdAtiOs3HXavihvYf0oVn4KK9oCUepWTGq_avzo1T32G2uZrDWAxsVHGvuFRZe74iNiDeul9bOhegRU8LYOMfwqwVQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "d5eec2c3-7c01-43af-8551-7c75654e3416",
      "n": "jLH0S6PT6q29-G-HtHYJfvhjduGxDYicb19UCwa0Q6Np_p3np6qf5-SIQA4ZdBUq6UcvPR_5bCXVgH5oxlLBkCVRzJy5L22CT6ci1tGeUkoWi4Znt-NQnX7Qs1HYwKChYSqdks350z0ONV6rBbtex_MvlWrHLcLrpqfVzM7TLAMMoJiBiIaYDeUurlRUbO47-IEKnqQL2YYT0ainDimI0e9mrQtE8GGf6E7Wfv5Le_JAKVY4f3BkFZAaGdHk1vjp2Q2KLrtySJUSRVlkEF9RiBDBQMR5PCOs_jt4z_-LddcSFW0fNLIbfy79N-cqjeMXN3lvU-hmWP4D7Ixs0xg_Yw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "1aa47598-d9cf-4af5-92d9-f79b8df45ae3",
      "x": "qaV_474yNa-ZPdkFOWXUfVf0LkeeW09MrPIHUBuOKYw",
      "y": "j-bszGyfXbrtTMavUMa8MJ-Gw4ksl0J2jHvQlK69G3o"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "278d415a-d1ce-4bb9-9bce-74acdc4c3756",
      "x": "_-cpojCHTiPyK9gGDfWhSDc-8-s9V25X_UFJ0oF8hYk",
      "y": "PDQZe0p2VznNXFGP3jS4NClGq7wfe8jg0ySMFc0L1Ac"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "86b64bb8-d987-430f-930e-c6a7e262dd01",
      "x": "aEoFNVPPglccFerUCJ4_wu9xkuOkdRxT3l-5tcPF0Z4",
      "y": "oat9FG_uUpElHl6t-agPFL3f9f-06CyN19Fl30vdL5w"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "214648b1-8d8f-463a-860c-1c78f391461b",
      "x": "iuvIpysaej-TwTLQuPdl-09b3iVbcYCusp2tyy6GTY8"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "50c6861e-27cd-48ef-a5e0-a2c26914c46b",
      "alg": "RSA-OAEP",
      "n": "zVeWu2oUegtgq1y5ocYXrULPKU5YW2c0P5T4fWagPdgrikzZIFjsW8vlTirJupu5l3_67ut0W4QyXpeiGeLUiiGcit8hyGA23vV0jIcbRRSJHvH9wA3fdTOMPtjlrKqRiznJ6Koy3hQ8HG6Lp2H24Z146TKYfteGnc3zuk5ZdNJ_5EkFYBVFv9Ut9IprqsnBtpuQvPVLyBWthMws9_gC6zFfBHXOme8RHDV7PL9GY4AfhWjESm19KXyv5iKiFkm6NtNlMxoO5owxfrCJ0TuwRFBD1rRk9_Yx4BBvaXyt25LIp3BAtDokiRu5fqmtMq4DeklNGnbA_yumrJ4Xl1mglw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "ca60fc2e-1932-4064-8a73-147a1f8eb4b8",
      "x": "6h8fttdmjkM0dd0n112xlNzqkFQoKR0Rx9hmfqbzu_Y",
      "y": "d60eCDZ-9cajgE7dPrlDpUJX3HBa7Y6dka-TmvPCIJc",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2021-07-29 06:00:02 INCOMING
oidcc-client-test-idtoken-sig-rs256
Incoming HTTP request to test instance TLcZoVmEAT37MXd
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Go-http-client/1.1",
  "authorization": "Bearer tgKZFdXVTKgoms1vMnFoW9EzlbS4ExJDDSxbGttr5kUL8C9QM5",
  "accept-encoding": "gzip",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
userinfo
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Userinfo endpoint
2021-07-29 06:00:02 SUCCESS
OIDCCExtractBearerAccessTokenFromRequest
Found access token on incoming request
access_token
tgKZFdXVTKgoms1vMnFoW9EzlbS4ExJDDSxbGttr5kUL8C9QM5
2021-07-29 06:00:02 SUCCESS
RequireBearerAccessToken
Found access token in request
actual
tgKZFdXVTKgoms1vMnFoW9EzlbS4ExJDDSxbGttr5kUL8C9QM5
2021-07-29 06:00:02 SUCCESS
FilterUserInfoForScopes
User info endpoint output
sub
user-subject-1234531
website
https://openid.net/
zoneinfo
America/Los_Angeles
birthdate
2000-02-03
gender
female
preferred_username
d.tu
given_name
Demo
middle_name
Theresa
locale
en-US
updated_at
1580000000
name
Demo T. User
nickname
Dee
family_name
User
2021-07-29 06:00:02
ClearAccessTokenFromRequest
Condition ran but did not log anything
2021-07-29 06:00:02 INFO
AddIssAndAudToUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-07-29 06:00:02 INFO
SignUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-07-29 06:00:02 INFO
EncryptUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_encrypted_response_alg
path
userinfo_encrypted_response_alg
mapped
object
client
2021-07-29 06:00:02 OUTGOING
oidcc-client-test-idtoken-sig-rs256
Response to HTTP request to test instance TLcZoVmEAT37MXd
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "sub": "user-subject-1234531",
  "website": "https://openid.net/",
  "zoneinfo": "America/Los_Angeles",
  "birthdate": "2000-02-03",
  "gender": "female",
  "preferred_username": "d.tu",
  "given_name": "Demo",
  "middle_name": "Theresa",
  "locale": "en-US",
  "updated_at": 1580000000,
  "name": "Demo T. User",
  "nickname": "Dee",
  "family_name": "User"
}
outgoing_path
userinfo
2021-07-29 06:00:02 FINISHED
oidcc-client-test-idtoken-sig-rs256
Test has run to completion
testmodule_result
PASSED
2021-07-29 06:00:09
TEST-RUNNER
Alias has now been claimed by another test
alias
caos
new_test_id
lc4eNBORBv3MGWj
Test Results