Test Summary

Test Results

Expand All Collapse All
All times are UTC
2021-07-29 05:59:03 INFO
TEST-RUNNER
Test instance nup9TL3dFptfStY created
baseUrl
https://www.certification.openid.net/test/a/caos
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "response_mode": "default",
  "client_registration": "static_client"
}
alias
caos
description
RP Certification
planId
uoprP0OO8Z4Qo
config
{
  "alias": "caos",
  "description": "RP Certification",
  "publish": "summary",
  "client": {
    "client_id": "93634749943374746@openid_certification",
    "client_secret": "myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*\u003d@JhYacA4^qC]B{ZK}",
    "redirect_uri": "http://localhost:4200/auth/callback"
  }
}
testName
oidcc-client-test-missing-iat
2021-07-29 05:59:04 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/caos/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/caos/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/caos/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/caos/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/caos/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/caos/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-07-29 05:59:04
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/caos/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/caos/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/caos/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/caos/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/caos/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/caos/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-07-29 05:59:04
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "v1wnN6E795Bbg-dDASgpcAF9O66lN2Ac4koH6nEcI3mjGHralb-UuPgQvIHYRnfxvEzQt1BW10Gi5d8PPePErMiWtLNhb7qePuT42LJvfNnKnRpVK2IKNMP0_L-fI3kwO1nJW_elBfq8MoRkdQSCcZqXNYviYbn64YH5wIhRfJU",
      "kty": "RSA",
      "q": "smZhn-j2DFSmxI2OG1Zpg0aSIKLYL5EUGahHyDeeozpZO0SFTWlait-vpEJG6tzX9g3cmHF2EZJW40hoKlaQTTIuqdluA84CqGyTW-EpJflGEcbU4kDbi-A8i82HgtJ5AMaDe_bmPY8WNmkOuSECj7aL6qU9D2gkBMH7BdzdAqM",
      "d": "V6JfSzlLUPZKJWhVgwGArV4QRhwLGYMwR62SGhY6OZ0FcGM2o51rmL0MK7bC3T75PEc8F1usUXqn_Jwp6ykVGMUNSvIO1csSpGuGPnZMD_bMB1KQpSXfQIu4CToed22ZOt2kcItAEdi_k0rgoqajOf4qrYft-07t9tlLF6Fl3GT1FlgT2WqwxBTLMkA6dzIzZ2G6Vo2xgTcjp7sDwLLekToeWNONHsdnfRVFfKXZJkttQneOpuDqP8yh_qZAcmIjkqW2S_hts1vNHlaKeB__vgtr6ENVfr8QIoAMG0941cR-qV6GU0WXFFwY_EnlEMJsvVjjX1sbxFB-GM0EhVyzYQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "e20c7d9b-2373-4156-b32c-4a0f1ea2d724",
      "qi": "ravOc3oDPHKJRmzEKqEGSodTuWnrj_yPpfaLcpOyAQWdSAh2BvHajVTKFdi4LIhrR57FruJ8VsOx28yDnBj96sSz1bQCb5aP__TrFD-Q70jzH-lq-jHcIbJvBwvsL4whnyPlPVrSn_i-7-0M6YwPJ_IBvHiDK9FlVcOh-hZ9kvA",
      "dp": "vNoPgiFHc00uZADJ6cxfCMEPfOUg_IOIPfNd2IuEf6Y9xZ0JOBx4hAudSMzEStd45KLSoPdSnOGUCFSZUDUHFpZn1THrCT8diWikBggjaw3tnhosz8HT3Ls_fmkGfxXM-eXkiTTf0gTf0uNB2RJ4QfGVJS1GX7gR1phViSN_d_k",
      "dq": "qJFO649vdkVCcvSiczhaaJ11E_trNL7r9DZq5UeQ0QEgMX1US8ohsJkd2KJ7ag6UzT1Z1H1ZJ89T5FyVeHPk09x39Suq5VNydXxqXOXLQMNiLwfmPYc1K90MuLjSs412ooHw2WB5O2-JeI4aSFllly_Q0z2hDX7Eke5M58RC3Os",
      "n": "hVqa9cGBzvuSghJHEEfr7REIm6ppjW9zTv78-nZKCeLwjcIs-ldx2qCdWz9O16mWc8srz7uLw6ZG2WNaRlkpsOKTvwoFOtuZ2pCr0dpyyCqVWhSK5lYk5DkdQCM8F5AQmUFzwZvnuxnadRbfVyLR2pWUvjnwqOOMGdETt1GPz2A_33ovWtL-fXLJ13APfD92lXuHi5-LmUtDIE-HQ_siaLa7MTQIExxuBmGk_esP1MeHyDIb8GZGDzIrj2sJvpFPCEKCiJ4-gtwcCx6-bIXH1ScLZDcLrNzy17G0FQGtoEPnEMHqm1-yHCkVKm37NakhXbl930aMfxZ5I8H5B3x83w"
    },
    {
      "kty": "EC",
      "d": "KIxTYfEG3CQwlsZDq1ktN_22Koc5VEXtmTLGmPhl1xU",
      "use": "sig",
      "crv": "P-256",
      "kid": "47f19752-8d50-41f2-80f9-0ac34f441fa0",
      "x": "V81SMWZeef7Bd9ilkLBFbIAg4QlgPnoa85tt9cP6QY4",
      "y": "OCruix3WdCLOeoQSDA63dkgSm0u7tUzi-DFNd6XZp2Y"
    },
    {
      "kty": "EC",
      "d": "tKvuvDH9tLmEhPdTO_mTGwrYrO3y3FU7BlWw9wLKtME",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "cb79f42b-bc62-49b5-a507-689dfdf2ae9f",
      "x": "4Fpy-05vIKiYuK71g-QqUBrKRchQSyxM5PL3gde1SaA",
      "y": "N4Ezx-7sJcLhFAEJ-XgQKA8T5AcD9ND2Gc19F_5jS8Q"
    },
    {
      "kty": "OKP",
      "d": "UQ2FSCySKyqZK05-eUSku8vwvnfPf8exDBSL__qcYCI",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "e3aa329a-ca07-4ec4-a507-188aa525f802",
      "x": "w13TJ8I9zbYDcnM1bqd59krUi3mOymhU5SSflzHY-ws"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "7Zawh047bOHwqCdWGGZyVvN5hv071Jr-IhC07wKXyhIyMSy5nrFVHp_WqaO9qfRIoBc6FrKJ9a0Z-ihtSzwmgdkW9fgK8k8DmmtMPMD-5TohWzCur5WcVq4EndGh353XGk13fxo4fUQW3ojoDWz-Gnf3Kl84HM2f0gs5pPl4joE",
      "kty": "RSA",
      "q": "6Ez5WnWMth6mB1UDNrrMxL1vPod7EvUJhW9Yr7awZgGzJli2UFojb5qFAln5Y_Rt0uNlW3Ayafenjf27C5I5mISZbno6Cis8bzpddxJ2jEXjahd8evC34goNdZ46cHQKhSz2HP7jFOGuwmp8IV_qD4glXGvw8kvua7FEbGx5z58",
      "d": "phP0fqkKG14TLiuORpOjqSwBURpiS0CPppQwK-dYAjwerHb3zkz9aYP86OJuZk3ChOFnzWUZHZZZaqFaEm1D2KAH0IQCHUJ4W6mYkTO1e3fhQ1QH7zrbYHtRydmpQYYFjtjbs3cDjGBO61V_L9fcf2jUzUtLxxRiBstHoHJpmTbN8bsgUx6dNRjWcijDroKd-xZtV2i4sK4R9pMzZbCwn-9YN-A1XdE5_OPI6pizn0c2leYiuhKwUjCZ1MgE_tjSdEnGL8aJw5VVoKtUzRZWT2eMcr91zDhzAzSSrnamNtkWuzcMGbA4nM-RaSRKFiSPPZJkTU0uVohN9lUem2rPAQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "7694a719-f93d-4a36-a059-7696234ce57b",
      "qi": "0n8XcngK04iRTHXNPuOJn51GgUkmWs7Z4kR5X-StOmAvItlqPIxM6XaabmTsIulxN-_Fkv_GHtUt-43C4s0y7elnpcSHDCYe_86FESjsP3tmP7pe-NoKqrJDxeTYOmkxQwG3B8yKGd4XLJjMHVUVKey9S7TX78HxDOPutBn4c4Y",
      "dp": "ew1b2ohLQOZ4dS8CaVrOB3jMzXxku4WW79_FRjEKmq737f4jGSzxUA4q6OuUdOy_nKLLBCxuRZ7k4GqFyLybmQ7t1HEmgj8oN5cxAhpXKjQESK2bG_eZ5E72tyJ2-1FNsiLDLEJRVZepXJJ91U5JAT529iwg7NIW33vO3EIVDYE",
      "alg": "RSA-OAEP",
      "dq": "JHAujOnzcH3OPUgwgN08UYAFeyF1RLv7Cls05hsaAGYz28f-kQwSkucCBiRm4i7tKy9QLs-imMyoE7XBKUd-kVX7W0EA6adui2P0VUEoJ0ivK20TsZUgwuwgwFpZgFozbEBpOpMgu53K8-QQJIwPAvCwK5ci7F7Mv0fHG9rIILE",
      "n": "15gAIozXNRZW9zdMqpJTGC5W7fOSzaLNk5hoNz_GcbLL4UyqwDfg_-aOi4PXs254yj5yCVhSKSmCe2g-iDqmgTGMlLdFw_61x3hoWerEU9udlOad6Vj9o4ML4G-8ZEwJiZvYFY35AmM7dBaWifjU46p8pCchv4fOmynSNYxIxkH6Hi-rpnostNS1mJbbmllkhta7VdxIMa5e5P5fN2Im5xhW_rfRn8PJARzO2D6whlu94re1MXQUvfKH_R0YkPohZlX_VQJt8p8ht-HS0ilNUtZD9RfQRyCsQCyYgBbAlBimOAjuLERQ_3aBPx4KFwUlTOrL4w53P3AXtVu1NBPRHw"
    },
    {
      "kty": "EC",
      "d": "OfTBozEm9WoMITp2JIlGj_ibxncPaPTkU8yBNTNxkg4",
      "use": "enc",
      "crv": "P-256",
      "kid": "676efcd4-06ef-4924-bcd5-b5f6fbe6b4ce",
      "x": "mObc9M6-Qrk0Y2kv_bBBCQZw3x1w_ahRDlU_WS5q-p4",
      "y": "j4zi-raViOakmcRCto3LJWPtM-vkaMTEzpABEMejrvY",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "e20c7d9b-2373-4156-b32c-4a0f1ea2d724",
      "n": "hVqa9cGBzvuSghJHEEfr7REIm6ppjW9zTv78-nZKCeLwjcIs-ldx2qCdWz9O16mWc8srz7uLw6ZG2WNaRlkpsOKTvwoFOtuZ2pCr0dpyyCqVWhSK5lYk5DkdQCM8F5AQmUFzwZvnuxnadRbfVyLR2pWUvjnwqOOMGdETt1GPz2A_33ovWtL-fXLJ13APfD92lXuHi5-LmUtDIE-HQ_siaLa7MTQIExxuBmGk_esP1MeHyDIb8GZGDzIrj2sJvpFPCEKCiJ4-gtwcCx6-bIXH1ScLZDcLrNzy17G0FQGtoEPnEMHqm1-yHCkVKm37NakhXbl930aMfxZ5I8H5B3x83w"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "0d09798b-cfe0-4591-bde1-6492f88720e3",
      "n": "zjuydAPe2HLWzRoptmJ-bBpLsf9A9pCF8rV3V33fku1VV0zmZmoUFpMZaLQAxmZXY-35Ive-cGgecVMCzW0T-kQdYXwTaYQOBQxmu4FxZMLsTLNc6q7jd-_gdRLq4PZzJw-mg0xqISMr5U0DZg78jd1xmxSc1DWWOmUfI6pRfq6VQMXrznwa-8tPhHqVo2rZtSxiGeG99ANo6F12Jq24xHoC8dGZtuebIMktzpOxcaWV1MhpVF2Ef_CIhVUxbQM6EQeCPwnWUIm5sqKvL--ToJyeoShToBjOdcFN0Ih0o5BvU8R-oyHremx54EJD84Ch_pzOqXbbTFwS3FfoRJBAhQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "47f19752-8d50-41f2-80f9-0ac34f441fa0",
      "x": "V81SMWZeef7Bd9ilkLBFbIAg4QlgPnoa85tt9cP6QY4",
      "y": "OCruix3WdCLOeoQSDA63dkgSm0u7tUzi-DFNd6XZp2Y"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "322f0f3d-8c00-423d-a37c-41a0e9d32d74",
      "x": "8tCjdZgU6eUVus7DTYdy3XOiPu9giKiezrbp_wjsmZ8",
      "y": "CQFmINGyonlXNg71pF6ZtffA9Nw1Sdr01IYD6NppQyw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "cb79f42b-bc62-49b5-a507-689dfdf2ae9f",
      "x": "4Fpy-05vIKiYuK71g-QqUBrKRchQSyxM5PL3gde1SaA",
      "y": "N4Ezx-7sJcLhFAEJ-XgQKA8T5AcD9ND2Gc19F_5jS8Q"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "e3aa329a-ca07-4ec4-a507-188aa525f802",
      "x": "w13TJ8I9zbYDcnM1bqd59krUi3mOymhU5SSflzHY-ws"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "7694a719-f93d-4a36-a059-7696234ce57b",
      "alg": "RSA-OAEP",
      "n": "15gAIozXNRZW9zdMqpJTGC5W7fOSzaLNk5hoNz_GcbLL4UyqwDfg_-aOi4PXs254yj5yCVhSKSmCe2g-iDqmgTGMlLdFw_61x3hoWerEU9udlOad6Vj9o4ML4G-8ZEwJiZvYFY35AmM7dBaWifjU46p8pCchv4fOmynSNYxIxkH6Hi-rpnostNS1mJbbmllkhta7VdxIMa5e5P5fN2Im5xhW_rfRn8PJARzO2D6whlu94re1MXQUvfKH_R0YkPohZlX_VQJt8p8ht-HS0ilNUtZD9RfQRyCsQCyYgBbAlBimOAjuLERQ_3aBPx4KFwUlTOrL4w53P3AXtVu1NBPRHw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "676efcd4-06ef-4924-bcd5-b5f6fbe6b4ce",
      "x": "mObc9M6-Qrk0Y2kv_bBBCQZw3x1w_ahRDlU_WS5q-p4",
      "y": "j4zi-raViOakmcRCto3LJWPtM-vkaMTEzpABEMejrvY",
      "alg": "ECDH-ES"
    }
  ]
}
2021-07-29 05:59:04 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2021-07-29 05:59:04 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2021-07-29 05:59:04 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": 1580000000
}
2021-07-29 05:59:04 SUCCESS
OIDCCGetStaticClientConfigurationForRPTests
Found a static client object
client_id
93634749943374746@openid_certification
client_secret
myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*=@JhYacA4^qC]B{ZK}
redirect_uris
[
  "http://localhost:4200/auth/callback"
]
2021-07-29 05:59:04 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "client_id": "93634749943374746@openid_certification",
  "client_secret": "myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*\u003d@JhYacA4^qC]B{ZK}",
  "redirect_uris": [
    "http://localhost:4200/auth/callback"
  ]
}
2021-07-29 05:59:04 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2021-07-29 05:59:04 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2021-07-29 05:59:04 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "http://localhost:4200/auth/callback"
]
2021-07-29 05:59:04 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2021-07-29 05:59:04 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2021-07-29 05:59:04 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2021-07-29 05:59:04 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2021-07-29 05:59:04 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2021-07-29 05:59:04 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2021-07-29 05:59:04 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2021-07-29 05:59:04 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-07-29 05:59:04 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2021-07-29 05:59:04 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2021-07-29 05:59:04 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2021-07-29 05:59:04 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2021-07-29 05:59:04 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2021-07-29 05:59:04 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2021-07-29 05:59:04 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2021-07-29 05:59:04 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2021-07-29 05:59:04 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2021-07-29 05:59:04 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2021-07-29 05:59:04
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2021-07-29 05:59:04
oidcc-client-test-missing-iat
Setup Done
2021-07-29 05:59:10 INCOMING
oidcc-client-test-missing-iat
Incoming HTTP request to test instance nup9TL3dFptfStY
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,*/*;q\u003d0.8",
  "upgrade-insecure-requests": "1",
  "cookie": "JSESSIONID\u003d0340D2A012AC78B6C2939CF389A64905",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.1 Safari/605.1.15",
  "accept-language": "en-gb",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "93634749943374746@openid_certification",
  "redirect_uri": "http://localhost:4200/auth/callback",
  "response_type": "code",
  "scope": "openid profile",
  "state": "0e47021f-9ce7-43b9-bd54-31ef85ec3850"
}
incoming_body
Authorization endpoint
2021-07-29 05:59:10 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2021-07-29 05:59:10 SUCCESS
EnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "profile"
]
expected
openid
2021-07-29 05:59:10 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "93634749943374746@openid_certification",
  "redirect_uri": "http://localhost:4200/auth/callback",
  "response_type": "code",
  "scope": "openid profile",
  "state": "0e47021f-9ce7-43b9-bd54-31ef85ec3850"
}
2021-07-29 05:59:10 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid profile
2021-07-29 05:59:10 INFO
ExtractNonceFromAuthorizationRequest
Couldn't find 'nonce' in authorization endpoint parameters
2021-07-29 05:59:10 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2021-07-29 05:59:10 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
93634749943374746@openid_certification
2021-07-29 05:59:10 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
http://localhost:4200/auth/callback
expected
[
  "http://localhost:4200/auth/callback"
]
2021-07-29 05:59:10 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "profile"
]
expected
openid
2021-07-29 05:59:10 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2021-07-29 05:59:10 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
qCAeCiDr2g
2021-07-29 05:59:10 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
CVcOdvWjf6WIoPkLp8vT9Q
2021-07-29 05:59:10 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "http://localhost:4200/auth/callback",
  "state": "0e47021f-9ce7-43b9-bd54-31ef85ec3850"
}
2021-07-29 05:59:10 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "http://localhost:4200/auth/callback",
  "state": "0e47021f-9ce7-43b9-bd54-31ef85ec3850",
  "code": "qCAeCiDr2g"
}
2021-07-29 05:59:10
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
http://localhost:4200/auth/callback?state=0e47021f-9ce7-43b9-bd54-31ef85ec3850&code=qCAeCiDr2g
2021-07-29 05:59:10 OUTGOING
oidcc-client-test-missing-iat
Response to HTTP request to test instance nup9TL3dFptfStY
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [http://localhost:4200/auth/callback?state=0e47021f-9ce7-43b9-bd54-31ef85ec3850&code=qCAeCiDr2g]
outgoing_path
authorize
2021-07-29 05:59:10 INCOMING
oidcc-client-test-missing-iat
Incoming HTTP request to test instance nup9TL3dFptfStY
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Go-http-client/1.1",
  "authorization": "Basic OTM2MzQ3NDk5NDMzNzQ3NDYlNDBvcGVuaWRfY2VydGlmaWNhdGlvbjpteWNsUSU2MFJCX0Y1JTdDSEElM0ElNDA3JTIxcjdIJTI4RExsdEtBJTI5UH51JTIzJTI5QWclMjNMUThadyUyQ2ttJTJBJTNEJTQwSmhZYWNBNCU1RXFDJTVEQiU3QlpLJTdE",
  "content-type": "application/x-www-form-urlencoded",
  "accept-encoding": "gzip",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "106",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "code": "qCAeCiDr2g",
  "grant_type": "authorization_code",
  "redirect_uri": "http://localhost:4200/auth/callback"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
code=qCAeCiDr2g&grant_type=authorization_code&redirect_uri=http%3A%2F%2Flocalhost%3A4200%2Fauth%2Fcallback
Token endpoint
2021-07-29 05:59:10 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
93634749943374746@openid_certification
client_secret
myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*=@JhYacA4^qC]B{ZK}
method
client_secret_basic
2021-07-29 05:59:10 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2021-07-29 05:59:10 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
qCAeCiDr2g
2021-07-29 05:59:10 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
http://localhost:4200/auth/callback
2021-07-29 05:59:10 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
bsZTk0ShFbPShMqhZQ37pYoev4tHncb6drZRIMwvkVicjtScII
2021-07-29 05:59:10 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
sBxDnEItd4BpxZeoQp32zg
2021-07-29 05:59:10 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/caos/
sub
user-subject-1234531
aud
93634749943374746@openid_certification
iat
1627538350
exp
1627538650
2021-07-29 05:59:10 SUCCESS
RemoveIatFromIdToken
Removed iat from ID token claims
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/caos/",
  "sub": "user-subject-1234531",
  "aud": "93634749943374746@openid_certification",
  "exp": 1627538650
}
2021-07-29 05:59:10 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
sBxDnEItd4BpxZeoQp32zg
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/caos/",
  "sub": "user-subject-1234531",
  "aud": "93634749943374746@openid_certification",
  "exp": 1627538650,
  "at_hash": "sBxDnEItd4BpxZeoQp32zg"
}
2021-07-29 05:59:10 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiJlMjBjN2Q5Yi0yMzczLTQxNTYtYjMyYy00YTBmMWVhMmQ3MjQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoic0J4RG5FSXRkNEJweFplb1FwMzJ6ZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiOTM2MzQ3NDk5NDMzNzQ3NDZAb3BlbmlkX2NlcnRpZmljYXRpb24iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvY2Fvc1wvIiwiZXhwIjoxNjI3NTM4NjUwfQ.NANlzDX1M_G39iw7_djvrjCK_6Yi1YF7TAKaXXcKCVKdueLIrp8NJDIFAJlZgaYPSoRGN_hC0RKQ78cCWWG8wwWv_XYsTgY815MnpoQgyFb7qFs98ekZji1uYXuwYxquUhowH9sslCatDGHyNrWbOfBZZNZbgPP0M2o99bdJLDZfJHZCSvbtA1wke1YmFdZmD2C6G1Uj75I8rtbXwZJUeSidE64kn1m6RHRGS2_2jgNMTgBuEY2U-HoHe9TeazvqG1fjlpARV85usd2WQLgnsQrHRlRUhcQ2vCGYPhutCby19wNGpLp1thBjUGLFQE08ZzFQaUbb6MS1FMJP-KekBA
key
{"p":"v1wnN6E795Bbg-dDASgpcAF9O66lN2Ac4koH6nEcI3mjGHralb-UuPgQvIHYRnfxvEzQt1BW10Gi5d8PPePErMiWtLNhb7qePuT42LJvfNnKnRpVK2IKNMP0_L-fI3kwO1nJW_elBfq8MoRkdQSCcZqXNYviYbn64YH5wIhRfJU","kty":"RSA","q":"smZhn-j2DFSmxI2OG1Zpg0aSIKLYL5EUGahHyDeeozpZO0SFTWlait-vpEJG6tzX9g3cmHF2EZJW40hoKlaQTTIuqdluA84CqGyTW-EpJflGEcbU4kDbi-A8i82HgtJ5AMaDe_bmPY8WNmkOuSECj7aL6qU9D2gkBMH7BdzdAqM","d":"V6JfSzlLUPZKJWhVgwGArV4QRhwLGYMwR62SGhY6OZ0FcGM2o51rmL0MK7bC3T75PEc8F1usUXqn_Jwp6ykVGMUNSvIO1csSpGuGPnZMD_bMB1KQpSXfQIu4CToed22ZOt2kcItAEdi_k0rgoqajOf4qrYft-07t9tlLF6Fl3GT1FlgT2WqwxBTLMkA6dzIzZ2G6Vo2xgTcjp7sDwLLekToeWNONHsdnfRVFfKXZJkttQneOpuDqP8yh_qZAcmIjkqW2S_hts1vNHlaKeB__vgtr6ENVfr8QIoAMG0941cR-qV6GU0WXFFwY_EnlEMJsvVjjX1sbxFB-GM0EhVyzYQ","e":"AQAB","use":"sig","kid":"e20c7d9b-2373-4156-b32c-4a0f1ea2d724","qi":"ravOc3oDPHKJRmzEKqEGSodTuWnrj_yPpfaLcpOyAQWdSAh2BvHajVTKFdi4LIhrR57FruJ8VsOx28yDnBj96sSz1bQCb5aP__TrFD-Q70jzH-lq-jHcIbJvBwvsL4whnyPlPVrSn_i-7-0M6YwPJ_IBvHiDK9FlVcOh-hZ9kvA","dp":"vNoPgiFHc00uZADJ6cxfCMEPfOUg_IOIPfNd2IuEf6Y9xZ0JOBx4hAudSMzEStd45KLSoPdSnOGUCFSZUDUHFpZn1THrCT8diWikBggjaw3tnhosz8HT3Ls_fmkGfxXM-eXkiTTf0gTf0uNB2RJ4QfGVJS1GX7gR1phViSN_d_k","dq":"qJFO649vdkVCcvSiczhaaJ11E_trNL7r9DZq5UeQ0QEgMX1US8ohsJkd2KJ7ag6UzT1Z1H1ZJ89T5FyVeHPk09x39Suq5VNydXxqXOXLQMNiLwfmPYc1K90MuLjSs412ooHw2WB5O2-JeI4aSFllly_Q0z2hDX7Eke5M58RC3Os","n":"hVqa9cGBzvuSghJHEEfr7REIm6ppjW9zTv78-nZKCeLwjcIs-ldx2qCdWz9O16mWc8srz7uLw6ZG2WNaRlkpsOKTvwoFOtuZ2pCr0dpyyCqVWhSK5lYk5DkdQCM8F5AQmUFzwZvnuxnadRbfVyLR2pWUvjnwqOOMGdETt1GPz2A_33ovWtL-fXLJ13APfD92lXuHi5-LmUtDIE-HQ_siaLa7MTQIExxuBmGk_esP1MeHyDIb8GZGDzIrj2sJvpFPCEKCiJ4-gtwcCx6-bIXH1ScLZDcLrNzy17G0FQGtoEPnEMHqm1-yHCkVKm37NakhXbl930aMfxZ5I8H5B3x83w"}
algorithm
RS256
2021-07-29 05:59:10 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2021-07-29 05:59:10 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
bsZTk0ShFbPShMqhZQ37pYoev4tHncb6drZRIMwvkVicjtScII
token_type
Bearer
id_token
eyJraWQiOiJlMjBjN2Q5Yi0yMzczLTQxNTYtYjMyYy00YTBmMWVhMmQ3MjQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoic0J4RG5FSXRkNEJweFplb1FwMzJ6ZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiOTM2MzQ3NDk5NDMzNzQ3NDZAb3BlbmlkX2NlcnRpZmljYXRpb24iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvY2Fvc1wvIiwiZXhwIjoxNjI3NTM4NjUwfQ.NANlzDX1M_G39iw7_djvrjCK_6Yi1YF7TAKaXXcKCVKdueLIrp8NJDIFAJlZgaYPSoRGN_hC0RKQ78cCWWG8wwWv_XYsTgY815MnpoQgyFb7qFs98ekZji1uYXuwYxquUhowH9sslCatDGHyNrWbOfBZZNZbgPP0M2o99bdJLDZfJHZCSvbtA1wke1YmFdZmD2C6G1Uj75I8rtbXwZJUeSidE64kn1m6RHRGS2_2jgNMTgBuEY2U-HoHe9TeazvqG1fjlpARV85usd2WQLgnsQrHRlRUhcQ2vCGYPhutCby19wNGpLp1thBjUGLFQE08ZzFQaUbb6MS1FMJP-KekBA
scope
openid profile
2021-07-29 05:59:10 OUTGOING
oidcc-client-test-missing-iat
Response to HTTP request to test instance nup9TL3dFptfStY
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "bsZTk0ShFbPShMqhZQ37pYoev4tHncb6drZRIMwvkVicjtScII",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiJlMjBjN2Q5Yi0yMzczLTQxNTYtYjMyYy00YTBmMWVhMmQ3MjQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoic0J4RG5FSXRkNEJweFplb1FwMzJ6ZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiOTM2MzQ3NDk5NDMzNzQ3NDZAb3BlbmlkX2NlcnRpZmljYXRpb24iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvY2Fvc1wvIiwiZXhwIjoxNjI3NTM4NjUwfQ.NANlzDX1M_G39iw7_djvrjCK_6Yi1YF7TAKaXXcKCVKdueLIrp8NJDIFAJlZgaYPSoRGN_hC0RKQ78cCWWG8wwWv_XYsTgY815MnpoQgyFb7qFs98ekZji1uYXuwYxquUhowH9sslCatDGHyNrWbOfBZZNZbgPP0M2o99bdJLDZfJHZCSvbtA1wke1YmFdZmD2C6G1Uj75I8rtbXwZJUeSidE64kn1m6RHRGS2_2jgNMTgBuEY2U-HoHe9TeazvqG1fjlpARV85usd2WQLgnsQrHRlRUhcQ2vCGYPhutCby19wNGpLp1thBjUGLFQE08ZzFQaUbb6MS1FMJP-KekBA",
  "scope": "openid profile"
}
outgoing_path
token
2021-07-29 05:59:11 INCOMING
oidcc-client-test-missing-iat
Incoming HTTP request to test instance nup9TL3dFptfStY
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Go-http-client/1.1",
  "accept-encoding": "gzip",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2021-07-29 05:59:11 OUTGOING
oidcc-client-test-missing-iat
Response to HTTP request to test instance nup9TL3dFptfStY
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "e20c7d9b-2373-4156-b32c-4a0f1ea2d724",
      "n": "hVqa9cGBzvuSghJHEEfr7REIm6ppjW9zTv78-nZKCeLwjcIs-ldx2qCdWz9O16mWc8srz7uLw6ZG2WNaRlkpsOKTvwoFOtuZ2pCr0dpyyCqVWhSK5lYk5DkdQCM8F5AQmUFzwZvnuxnadRbfVyLR2pWUvjnwqOOMGdETt1GPz2A_33ovWtL-fXLJ13APfD92lXuHi5-LmUtDIE-HQ_siaLa7MTQIExxuBmGk_esP1MeHyDIb8GZGDzIrj2sJvpFPCEKCiJ4-gtwcCx6-bIXH1ScLZDcLrNzy17G0FQGtoEPnEMHqm1-yHCkVKm37NakhXbl930aMfxZ5I8H5B3x83w"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "0d09798b-cfe0-4591-bde1-6492f88720e3",
      "n": "zjuydAPe2HLWzRoptmJ-bBpLsf9A9pCF8rV3V33fku1VV0zmZmoUFpMZaLQAxmZXY-35Ive-cGgecVMCzW0T-kQdYXwTaYQOBQxmu4FxZMLsTLNc6q7jd-_gdRLq4PZzJw-mg0xqISMr5U0DZg78jd1xmxSc1DWWOmUfI6pRfq6VQMXrznwa-8tPhHqVo2rZtSxiGeG99ANo6F12Jq24xHoC8dGZtuebIMktzpOxcaWV1MhpVF2Ef_CIhVUxbQM6EQeCPwnWUIm5sqKvL--ToJyeoShToBjOdcFN0Ih0o5BvU8R-oyHremx54EJD84Ch_pzOqXbbTFwS3FfoRJBAhQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "47f19752-8d50-41f2-80f9-0ac34f441fa0",
      "x": "V81SMWZeef7Bd9ilkLBFbIAg4QlgPnoa85tt9cP6QY4",
      "y": "OCruix3WdCLOeoQSDA63dkgSm0u7tUzi-DFNd6XZp2Y"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "322f0f3d-8c00-423d-a37c-41a0e9d32d74",
      "x": "8tCjdZgU6eUVus7DTYdy3XOiPu9giKiezrbp_wjsmZ8",
      "y": "CQFmINGyonlXNg71pF6ZtffA9Nw1Sdr01IYD6NppQyw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "cb79f42b-bc62-49b5-a507-689dfdf2ae9f",
      "x": "4Fpy-05vIKiYuK71g-QqUBrKRchQSyxM5PL3gde1SaA",
      "y": "N4Ezx-7sJcLhFAEJ-XgQKA8T5AcD9ND2Gc19F_5jS8Q"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "e3aa329a-ca07-4ec4-a507-188aa525f802",
      "x": "w13TJ8I9zbYDcnM1bqd59krUi3mOymhU5SSflzHY-ws"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "7694a719-f93d-4a36-a059-7696234ce57b",
      "alg": "RSA-OAEP",
      "n": "15gAIozXNRZW9zdMqpJTGC5W7fOSzaLNk5hoNz_GcbLL4UyqwDfg_-aOi4PXs254yj5yCVhSKSmCe2g-iDqmgTGMlLdFw_61x3hoWerEU9udlOad6Vj9o4ML4G-8ZEwJiZvYFY35AmM7dBaWifjU46p8pCchv4fOmynSNYxIxkH6Hi-rpnostNS1mJbbmllkhta7VdxIMa5e5P5fN2Im5xhW_rfRn8PJARzO2D6whlu94re1MXQUvfKH_R0YkPohZlX_VQJt8p8ht-HS0ilNUtZD9RfQRyCsQCyYgBbAlBimOAjuLERQ_3aBPx4KFwUlTOrL4w53P3AXtVu1NBPRHw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "676efcd4-06ef-4924-bcd5-b5f6fbe6b4ce",
      "x": "mObc9M6-Qrk0Y2kv_bBBCQZw3x1w_ahRDlU_WS5q-p4",
      "y": "j4zi-raViOakmcRCto3LJWPtM-vkaMTEzpABEMejrvY",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2021-07-29 05:59:15 FINISHED
oidcc-client-test-missing-iat
Test has run to completion
testmodule_result
PASSED
2021-07-29 05:59:28
TEST-RUNNER
Alias has now been claimed by another test
alias
caos
new_test_id
exfYIj47VLAwGp2
Test Results