Test Summary

Test Results

Expand All Collapse All
All times are UTC
2021-07-29 06:18:19 INFO
TEST-RUNNER
Test instance GB3UxaKAaWhjuBm created
baseUrl
https://www.certification.openid.net/test/a/caos
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "client_registration": "static_client",
  "response_mode": "default"
}
alias
caos
description
RP Certification Config "Basic Auth"
planId
AYSdLbzmWbu9X
config
{
  "alias": "caos",
  "description": "RP Certification Config \"Basic Auth\"",
  "publish": "summary",
  "client": {
    "client_id": "93634749943374746@openid_certification",
    "client_secret": "myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*\u003d@JhYacA4^qC]B{ZK}",
    "redirect_uri": "http://localhost:4200/auth/callback"
  }
}
testName
oidcc-client-test-discovery-jwks-uri-keys
2021-07-29 06:18:19 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/caos/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/caos/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/caos/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/caos/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/caos/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/caos/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-07-29 06:18:19
AddRandomJwksUriToServerConfiguration
Added random jwks_uri to server configuration
jwks_uri
https://www.certification.openid.net/test/a/caos/jwksAAUwStuXDb
2021-07-29 06:18:19
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/caos/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/caos/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/caos/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/caos/jwksAAUwStuXDb",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/caos/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/caos/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-07-29 06:18:19
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "wNZYazHOVEs9nRH8WSuJTtuEQPc51ZSQ5bvaxlbENdtmko_CMMD6XLj-NBYNcf-ApuE6rTQILb9aAnnV-B9MIyVF-JsSrvqWbpKeBnHlucC5RFT9C9AoU1oblyv939ZQj3Ar0PzH2Amimd9bM6EC-zgb3i2zC_ydgfn87i5g-OM",
      "kty": "RSA",
      "q": "rb2-Ytcd3OqSsVATzwIeNH6lCJ-btNF8GeH-WZECg1WVweafWDAuehcViZ1BqDhdn2ToqxB4jD9iMCMvHKrJ9qTvvk_NY_Y_iR6T3aUfaNB6y0P8n7FB93gWiXSDZgItJFF_R3ig_DGQhekOPXnsBRUgmdE0MHM4wF1RmjTXz5U",
      "d": "x-MBrsFiClX-5fBcd7eWWydh7NDCOQ1WhPt57Fq-tMtzl_W9oyZzJS8wZq9EUlmCaapyU415mWjQJYaQTrDT2k-6SwXRm7PKOGSsTVxgeqs7qFzqW03CSew4e7foU1Ftai4E_Z_VS8_a_cu3Iu-oC2tZZzGk8fj9YnthmJr4vaofp7Z_mUNsZ3gZiFpWEVuKJJfRlDje5Q_Aomt5ufgFarbtZ9qD97WNu8hVRZCZqoQy0RteTmFpE6Q6kE5q23z3B2P9SiNNktFPOhSM0r9i7Nc2geAz4dz4EDcpQVW3u_EJgEX33Qqwm8ZIz6klqnCXJBG7fnQUk-GrNSVcIGCZ",
      "e": "AQAB",
      "use": "sig",
      "kid": "e4ece404-7cd6-4387-ac71-c5b261dbd24b",
      "qi": "MMY1U7PESWNUjW8tf8DyNu5Z6p5O2va5aPJf-TbltP7WdJd1tkg7TU5iMaDP3-eMePSyLjRUZ9PLsCH5elB-K3O7Je3Lo7jjjsWNxg80oU4DOKTxLjsllsldlMeh_8FymGf2yNCqEEt08AmGvzEGuFYkjxzQqFmCBLl7xqlk3dA",
      "dp": "tC3TEd3IrwRafo-WnO7L7i24Bke59zFIrg93nEjoLnZhAeJnDMzTYZ3Mj3hnebPFTqg1_i4W0j_v505Vue_sYQ5rsZ2buHkV5B0EoHr9rjFAKnPKuKX3d-JC015caTBDt7KUjkISrG5cSq_i9HumYHsNtuw2VqXjudWOGjKlkwc",
      "dq": "pv83jWe5k4uA_p-6uoINqGWGmbhYgL_Oak54HX0tjjFoZd0XkjuVoNKpaAHYhynOi5QBs9N8G0odRam78fETeVhl_GZWRFwAC_txI11AyI2DSfeKTbCieIxcFTkBx74Vx8_x6C_BhUba5GvzvRGA1A3PrSmR4XQOu4-3DOL4ANU",
      "n": "gt_HaUGEHz45HWuLuVcdgsbeAXBoIJzZFyAUPB_dVsckQ7Tsv8PSXLt42pj9Yp0GZEnkfwRz_KaSXoDK24BqbB8nBmJIbv2kSXMptBLG7wHGmPFRAMxaFg1tmyGlrP8u9zs1zLKgW24YGKbDuGf3edRkDsJ8fXUnhJCK2qvpT6UGr3sUS4ydrY8puCEYFeIukJdB2FWB9rO5XHzhJZynxCCQxsUApAxfSWwsYrXPuuQUE-x39xSCpGqOaP3d5i2OBA8Y6vVp1MLnWl7r4i6FN6diUlKGBwYFXxV3XBU5c3B1MS0KJOJRDlPKZYLy9LBQjyQpJFg51prXBf-uilVpHw"
    },
    {
      "kty": "EC",
      "d": "LQKjIqwl_cz0Nffi-o9FlRvJzDzSj0R72gjmDEojjVQ",
      "use": "sig",
      "crv": "P-256",
      "kid": "4a1b96b3-42f6-49de-a5c1-58b6ffd1f29d",
      "x": "a9BhdRM-5pPr9hSoXdOKj7nU09ItOFDimFZGXzw6SgU",
      "y": "8zPBhA7UtEiyer0xUJO7k1ncgDtPoPZNb_m4_5W_ECg"
    },
    {
      "kty": "EC",
      "d": "9qF2TvtThgiHQqulDbHmpyq1GM8-MnMoAtEkIHk9hAs",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "08b665aa-aea3-4e26-a000-e9de3c1dccdb",
      "x": "OCCb7lVF8B7a7BcQ5pGOaOhMq55cqmrcdN_9Z13KDfE",
      "y": "bg3-g1fwUJYAjjlFSokRZX4hi5zwgZ1PFdr3MXOSzg0"
    },
    {
      "kty": "OKP",
      "d": "1U6kefAIAxDhdbJhu44zp_jnMZeMC0rFYNqpZY8GUYw",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "62cf7dcb-6af9-4235-b6f9-39a5df46e224",
      "x": "wqYo2ohWnrZQ2PYjgau7O3-tiCI8gjgYKiV9VlcXwNM"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "9iVuTbqPXuQvx-ImOlsm067PWV6zSGsUktd6KGZW_uUf_SKKykn_mv2g7gXQaJxs0aT2WF5FWwcyKnUMvMNYZCHFf2O9HafE_CjMNdW6kmQ9ykTYJXrlvmh_8tODoG3POsePPkI9KssDjAX1KI6rHm4XcSArqAPeVwwgcXivoHk",
      "kty": "RSA",
      "q": "lSoSfmX6lg3ltETFV-Sx9G20PvCQwGhKnq9W369QDPx93en2pm-QE97LLVTm370ibDJNPT9EPL0HriOUZ1ab1bhKeYIVwpWoR2RC3pCxQoiIwIqTdivMvg0bC3bIPvUDoeG3nA0PtgmRwEmqtIodPQGIDMIuBsjskEMj2PiKz1k",
      "d": "ZjVMmdaV3ULNQ9QlASih6CViTo6Xm5DDda8aajpRg-pzYhpE3uLy2Z1lrQ1XDyNqb4KoqXWF5GJZOQlaoEzWtPnMMEfr0fxmT2AtJc4j6NRseWp2l-ovQPBkMbP4fF8FaVcnyp6-7RjQnRdJ9H0G7BvRcFuaCaz7hTxpBqZlCGtc-wqX9Yx5Ukw8DFPN_GnE4FzYS58TVZQeWz5naS4fPguhrg9rQ8cDExHxK6k1lId9--KYKt2bTyOZCVIIxgnFSC2DUSnyqNA10jg6ymH1k_Nz4N-kao455pPV9YRL0UFIfO6HabKlh2toSar7ke9T2eRZCnwqaaLwB6fh4hgMAQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "24b9d44a-cc3f-46cc-a269-82a8d9162831",
      "qi": "QnXF46Rr-4uMKeW6zO8JvZqZ9rO3-5N2N_sovPtgXVkq5HIyij2CnGyvYBkUTxSIX6lko1kbjszBof8JGykiNSAwHoRnKkEaQa8j8gaxh7cJp1zvqKvLZtkL98AlYvhdAD7VS1FvnxG52dyuufvoD1_MfOsuIcdfdE1x4XTzV4g",
      "dp": "8VeuGWRsorvV5YRlux4YqcFi6NujqcPkPj4sNmRxtCbwAIDX2JRJnKxGGFt3BrspLz0xlV-JXUFm_J4byRE4H6XFQayHhwYybJOL9tUCw_qpYyOxUr53eQR5P5wIGUrRv25fksnbs5OufKJyyDtqqMGFFpRWebyhSnRHczrD6PE",
      "alg": "RSA-OAEP",
      "dq": "P8LCMQGKggXiwJH9ATsizmbue1D9ryFldDtjGS6pO0Pa0bcm1bIuli_QDcqS_eStCC7gUWPv2T68P7W5xAqDhnHGc_YlMw4h5pJ2-whCnTwbqKITspm6ZSrY-qeFpVO6f8IqaCw1IQ0qHlXfAFlhcihrbXi7j-7nICty8VYcj9E",
      "n": "j2w9H4CRhHn2Y6Lo4D07dznaOOxNDrEmtitppLqa3uodXGycxbi1WO4xWGteb1mu5HIk5qT2aDv5fByF4pLDO6O-oU4e1mMPaYpJLPcFH_gMWqIo4b9Q1XaDNmtm9pHE72fYMX_VREYmAcwelagZIfSV3EoTrIv_7KlXdHbPwgDfRplew7ADUmkOIkVvFRdR25_h2YX66Bw2FWaqHEKstFWtDw4TmocJxllcrbz9cMjJkUgUVG0fr4XAown0nI4dtdtqHOKYbYC535M6pvOX1Fs9IXC5Qyu2uCiGMNTeihkTjW0dRVuFJmniZU36uRKVi3ghQ-cVh6tiUytCsQqhEQ"
    },
    {
      "kty": "EC",
      "d": "zdFM6CRVcWcjGzONStDrbAvTiWAPl2DzzclHCT90C_0",
      "use": "enc",
      "crv": "P-256",
      "kid": "671738bd-f45e-4e26-ab80-5874e7b7587d",
      "x": "RTkSn_H6y97jWL7M_qmkuw_dgpc9lFhZ9pVsZk5V0CM",
      "y": "vKmIlrm7U4ngTMSGHcih4p5Xo6h53x_rO2upzYuhflw",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "e4ece404-7cd6-4387-ac71-c5b261dbd24b",
      "n": "gt_HaUGEHz45HWuLuVcdgsbeAXBoIJzZFyAUPB_dVsckQ7Tsv8PSXLt42pj9Yp0GZEnkfwRz_KaSXoDK24BqbB8nBmJIbv2kSXMptBLG7wHGmPFRAMxaFg1tmyGlrP8u9zs1zLKgW24YGKbDuGf3edRkDsJ8fXUnhJCK2qvpT6UGr3sUS4ydrY8puCEYFeIukJdB2FWB9rO5XHzhJZynxCCQxsUApAxfSWwsYrXPuuQUE-x39xSCpGqOaP3d5i2OBA8Y6vVp1MLnWl7r4i6FN6diUlKGBwYFXxV3XBU5c3B1MS0KJOJRDlPKZYLy9LBQjyQpJFg51prXBf-uilVpHw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "d08fb927-ade7-4479-9d7e-a0ebb288027a",
      "n": "vedw0DJZsjGDGZZjDxyyGqRhkhwpWE0sxdWCHnYo3mR7c_RjrfHfo4iEVsmq41XBuXkUZ-0jK5llvZTVKHEWDbq5vzlRAxjF9AU1ujuoqGa535DG2ZM5VzP6VemeaXa89_yVOzObwchNqIpTGEzQ3TzaKtbzXEAMvUFTQhWSzNAMPv2kmAXMFxd_3jM5h1-Kca3ApUT9en5txC6pgfDr6vhrJkRRw10vUOL36IRKgxeK-aBflf0fqVHzCrrvb99wF4MccUoecN3MS3Sr-KbOe6A_50kSoiq14MrIpfnpznO3xwdngVn9p4ur4S0LJ-OjOYw1EI5GncGpmlGr5SMvSw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "4a1b96b3-42f6-49de-a5c1-58b6ffd1f29d",
      "x": "a9BhdRM-5pPr9hSoXdOKj7nU09ItOFDimFZGXzw6SgU",
      "y": "8zPBhA7UtEiyer0xUJO7k1ncgDtPoPZNb_m4_5W_ECg"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "99b649bf-c123-46b1-bcdf-ef5f02362a9b",
      "x": "O-7MHLgku84SL3UAqv4q99tkp6KeHQBBuFqiyWAAIC4",
      "y": "BO1MsSOXLFZlnzZBETM5kBy3xU7uREypPPTt6Cco_w0"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "08b665aa-aea3-4e26-a000-e9de3c1dccdb",
      "x": "OCCb7lVF8B7a7BcQ5pGOaOhMq55cqmrcdN_9Z13KDfE",
      "y": "bg3-g1fwUJYAjjlFSokRZX4hi5zwgZ1PFdr3MXOSzg0"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "62cf7dcb-6af9-4235-b6f9-39a5df46e224",
      "x": "wqYo2ohWnrZQ2PYjgau7O3-tiCI8gjgYKiV9VlcXwNM"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "24b9d44a-cc3f-46cc-a269-82a8d9162831",
      "alg": "RSA-OAEP",
      "n": "j2w9H4CRhHn2Y6Lo4D07dznaOOxNDrEmtitppLqa3uodXGycxbi1WO4xWGteb1mu5HIk5qT2aDv5fByF4pLDO6O-oU4e1mMPaYpJLPcFH_gMWqIo4b9Q1XaDNmtm9pHE72fYMX_VREYmAcwelagZIfSV3EoTrIv_7KlXdHbPwgDfRplew7ADUmkOIkVvFRdR25_h2YX66Bw2FWaqHEKstFWtDw4TmocJxllcrbz9cMjJkUgUVG0fr4XAown0nI4dtdtqHOKYbYC535M6pvOX1Fs9IXC5Qyu2uCiGMNTeihkTjW0dRVuFJmniZU36uRKVi3ghQ-cVh6tiUytCsQqhEQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "671738bd-f45e-4e26-ab80-5874e7b7587d",
      "x": "RTkSn_H6y97jWL7M_qmkuw_dgpc9lFhZ9pVsZk5V0CM",
      "y": "vKmIlrm7U4ngTMSGHcih4p5Xo6h53x_rO2upzYuhflw",
      "alg": "ECDH-ES"
    }
  ]
}
2021-07-29 06:18:19 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2021-07-29 06:18:19 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2021-07-29 06:18:19 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": 1580000000
}
2021-07-29 06:18:19 SUCCESS
OIDCCGetStaticClientConfigurationForRPTests
Found a static client object
client_id
93634749943374746@openid_certification
client_secret
myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*=@JhYacA4^qC]B{ZK}
redirect_uris
[
  "http://localhost:4200/auth/callback"
]
2021-07-29 06:18:19 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "client_id": "93634749943374746@openid_certification",
  "client_secret": "myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*\u003d@JhYacA4^qC]B{ZK}",
  "redirect_uris": [
    "http://localhost:4200/auth/callback"
  ]
}
2021-07-29 06:18:19 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2021-07-29 06:18:19 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2021-07-29 06:18:20 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "http://localhost:4200/auth/callback"
]
2021-07-29 06:18:20 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2021-07-29 06:18:20 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2021-07-29 06:18:20 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2021-07-29 06:18:20 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2021-07-29 06:18:20 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2021-07-29 06:18:20 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2021-07-29 06:18:20 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2021-07-29 06:18:20 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-07-29 06:18:20 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2021-07-29 06:18:20 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2021-07-29 06:18:20 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2021-07-29 06:18:20 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2021-07-29 06:18:20 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2021-07-29 06:18:20 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2021-07-29 06:18:20 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2021-07-29 06:18:20 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2021-07-29 06:18:20 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2021-07-29 06:18:20 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2021-07-29 06:18:20
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2021-07-29 06:18:20
oidcc-client-test-discovery-jwks-uri-keys
Setup Done
2021-07-29 06:18:23 INCOMING
oidcc-client-test-discovery-jwks-uri-keys
Incoming HTTP request to test instance GB3UxaKAaWhjuBm
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Go-http-client/1.1",
  "accept-encoding": "gzip",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2021-07-29 06:18:23 OUTGOING
oidcc-client-test-discovery-jwks-uri-keys
Response to HTTP request to test instance GB3UxaKAaWhjuBm
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/a/caos/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/caos/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/caos/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/caos/jwksAAUwStuXDb",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/caos/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/caos/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2021-07-29 06:18:32 INCOMING
oidcc-client-test-discovery-jwks-uri-keys
Incoming HTTP request to test instance GB3UxaKAaWhjuBm
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,*/*;q\u003d0.8",
  "upgrade-insecure-requests": "1",
  "cookie": "JSESSIONID\u003d0340D2A012AC78B6C2939CF389A64905",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.1 Safari/605.1.15",
  "accept-language": "en-gb",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "93634749943374746@openid_certification",
  "redirect_uri": "http://localhost:4200/auth/callback",
  "response_type": "code",
  "scope": "openid profile",
  "state": "b58817e9-edaf-4ff5-bee0-0d48bb688b25"
}
incoming_body
Authorization endpoint
2021-07-29 06:18:32 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2021-07-29 06:18:32 SUCCESS
EnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "profile"
]
expected
openid
2021-07-29 06:18:32 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "93634749943374746@openid_certification",
  "redirect_uri": "http://localhost:4200/auth/callback",
  "response_type": "code",
  "scope": "openid profile",
  "state": "b58817e9-edaf-4ff5-bee0-0d48bb688b25"
}
2021-07-29 06:18:32 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid profile
2021-07-29 06:18:32 INFO
ExtractNonceFromAuthorizationRequest
Couldn't find 'nonce' in authorization endpoint parameters
2021-07-29 06:18:32 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2021-07-29 06:18:32 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
93634749943374746@openid_certification
2021-07-29 06:18:32 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
http://localhost:4200/auth/callback
expected
[
  "http://localhost:4200/auth/callback"
]
2021-07-29 06:18:32 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "profile"
]
expected
openid
2021-07-29 06:18:32 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2021-07-29 06:18:32 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
BRT0lyoxHB
2021-07-29 06:18:32 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
HefaJfI0Vy6TXm4kUwTSJw
2021-07-29 06:18:32 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "http://localhost:4200/auth/callback",
  "state": "b58817e9-edaf-4ff5-bee0-0d48bb688b25"
}
2021-07-29 06:18:32 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "http://localhost:4200/auth/callback",
  "state": "b58817e9-edaf-4ff5-bee0-0d48bb688b25",
  "code": "BRT0lyoxHB"
}
2021-07-29 06:18:32
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
http://localhost:4200/auth/callback?state=b58817e9-edaf-4ff5-bee0-0d48bb688b25&code=BRT0lyoxHB
2021-07-29 06:18:32 OUTGOING
oidcc-client-test-discovery-jwks-uri-keys
Response to HTTP request to test instance GB3UxaKAaWhjuBm
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [http://localhost:4200/auth/callback?state=b58817e9-edaf-4ff5-bee0-0d48bb688b25&code=BRT0lyoxHB]
outgoing_path
authorize
2021-07-29 06:18:33 INCOMING
oidcc-client-test-discovery-jwks-uri-keys
Incoming HTTP request to test instance GB3UxaKAaWhjuBm
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Go-http-client/1.1",
  "authorization": "Basic OTM2MzQ3NDk5NDMzNzQ3NDYlNDBvcGVuaWRfY2VydGlmaWNhdGlvbjpteWNsUSU2MFJCX0Y1JTdDSEElM0ElNDA3JTIxcjdIJTI4RExsdEtBJTI5UH51JTIzJTI5QWclMjNMUThadyUyQ2ttJTJBJTNEJTQwSmhZYWNBNCU1RXFDJTVEQiU3QlpLJTdE",
  "content-type": "application/x-www-form-urlencoded",
  "accept-encoding": "gzip",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "106",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "code": "BRT0lyoxHB",
  "grant_type": "authorization_code",
  "redirect_uri": "http://localhost:4200/auth/callback"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
code=BRT0lyoxHB&grant_type=authorization_code&redirect_uri=http%3A%2F%2Flocalhost%3A4200%2Fauth%2Fcallback
Token endpoint
2021-07-29 06:18:33 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
93634749943374746@openid_certification
client_secret
myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*=@JhYacA4^qC]B{ZK}
method
client_secret_basic
2021-07-29 06:18:33 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2021-07-29 06:18:33 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
BRT0lyoxHB
2021-07-29 06:18:33 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
http://localhost:4200/auth/callback
2021-07-29 06:18:33 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
fOba3JHO4xYFE1wFyTjAyRfbvisny0WfJXVbKi8yw60fK7Yw9Y
2021-07-29 06:18:33 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
GYYexeLa7Z899_XyMqy0Ug
2021-07-29 06:18:33 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/caos/
sub
user-subject-1234531
aud
93634749943374746@openid_certification
iat
1627539513
exp
1627539813
2021-07-29 06:18:33 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
GYYexeLa7Z899_XyMqy0Ug
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/caos/",
  "sub": "user-subject-1234531",
  "aud": "93634749943374746@openid_certification",
  "iat": 1627539513,
  "exp": 1627539813,
  "at_hash": "GYYexeLa7Z899_XyMqy0Ug"
}
2021-07-29 06:18:33 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiJlNGVjZTQwNC03Y2Q2LTQzODctYWM3MS1jNWIyNjFkYmQyNGIiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiR1lZZXhlTGE3Wjg5OV9YeU1xeTBVZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiOTM2MzQ3NDk5NDMzNzQ3NDZAb3BlbmlkX2NlcnRpZmljYXRpb24iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvY2Fvc1wvIiwiZXhwIjoxNjI3NTM5ODEzLCJpYXQiOjE2Mjc1Mzk1MTN9.CMvoLhC2lK_DsbetBB3A1jd18og414cdOeecRAhiqDja8DVusLKSsYZuQ8HUGIE9KZFW7CZrNGDdLnTMhjBMrd_g4L3C32ebu4y7Im8Fwd_llhdr7reGaN73ODF-LSmD-rzjVAS5IYJi6KyBQjlgAunj0QPy1zvrg0_VWVw9P2vaMi6PAIfLsqIilLiDbmRgZx-64IipjYUxgGDJSZZOdN8uQXOLifdJyJWeh4vHfSkeMpP5jL1oLxeCWI4fPDinzDZy9NQ7HrA5edJwtnn9eee_z6o9IjFsh5W-pR8feTVakstMN2K0utWLoP5bhdvEBeGaDhU4dmpTWEbrdlCSEw
key
{"p":"wNZYazHOVEs9nRH8WSuJTtuEQPc51ZSQ5bvaxlbENdtmko_CMMD6XLj-NBYNcf-ApuE6rTQILb9aAnnV-B9MIyVF-JsSrvqWbpKeBnHlucC5RFT9C9AoU1oblyv939ZQj3Ar0PzH2Amimd9bM6EC-zgb3i2zC_ydgfn87i5g-OM","kty":"RSA","q":"rb2-Ytcd3OqSsVATzwIeNH6lCJ-btNF8GeH-WZECg1WVweafWDAuehcViZ1BqDhdn2ToqxB4jD9iMCMvHKrJ9qTvvk_NY_Y_iR6T3aUfaNB6y0P8n7FB93gWiXSDZgItJFF_R3ig_DGQhekOPXnsBRUgmdE0MHM4wF1RmjTXz5U","d":"x-MBrsFiClX-5fBcd7eWWydh7NDCOQ1WhPt57Fq-tMtzl_W9oyZzJS8wZq9EUlmCaapyU415mWjQJYaQTrDT2k-6SwXRm7PKOGSsTVxgeqs7qFzqW03CSew4e7foU1Ftai4E_Z_VS8_a_cu3Iu-oC2tZZzGk8fj9YnthmJr4vaofp7Z_mUNsZ3gZiFpWEVuKJJfRlDje5Q_Aomt5ufgFarbtZ9qD97WNu8hVRZCZqoQy0RteTmFpE6Q6kE5q23z3B2P9SiNNktFPOhSM0r9i7Nc2geAz4dz4EDcpQVW3u_EJgEX33Qqwm8ZIz6klqnCXJBG7fnQUk-GrNSVcIGCZ","e":"AQAB","use":"sig","kid":"e4ece404-7cd6-4387-ac71-c5b261dbd24b","qi":"MMY1U7PESWNUjW8tf8DyNu5Z6p5O2va5aPJf-TbltP7WdJd1tkg7TU5iMaDP3-eMePSyLjRUZ9PLsCH5elB-K3O7Je3Lo7jjjsWNxg80oU4DOKTxLjsllsldlMeh_8FymGf2yNCqEEt08AmGvzEGuFYkjxzQqFmCBLl7xqlk3dA","dp":"tC3TEd3IrwRafo-WnO7L7i24Bke59zFIrg93nEjoLnZhAeJnDMzTYZ3Mj3hnebPFTqg1_i4W0j_v505Vue_sYQ5rsZ2buHkV5B0EoHr9rjFAKnPKuKX3d-JC015caTBDt7KUjkISrG5cSq_i9HumYHsNtuw2VqXjudWOGjKlkwc","dq":"pv83jWe5k4uA_p-6uoINqGWGmbhYgL_Oak54HX0tjjFoZd0XkjuVoNKpaAHYhynOi5QBs9N8G0odRam78fETeVhl_GZWRFwAC_txI11AyI2DSfeKTbCieIxcFTkBx74Vx8_x6C_BhUba5GvzvRGA1A3PrSmR4XQOu4-3DOL4ANU","n":"gt_HaUGEHz45HWuLuVcdgsbeAXBoIJzZFyAUPB_dVsckQ7Tsv8PSXLt42pj9Yp0GZEnkfwRz_KaSXoDK24BqbB8nBmJIbv2kSXMptBLG7wHGmPFRAMxaFg1tmyGlrP8u9zs1zLKgW24YGKbDuGf3edRkDsJ8fXUnhJCK2qvpT6UGr3sUS4ydrY8puCEYFeIukJdB2FWB9rO5XHzhJZynxCCQxsUApAxfSWwsYrXPuuQUE-x39xSCpGqOaP3d5i2OBA8Y6vVp1MLnWl7r4i6FN6diUlKGBwYFXxV3XBU5c3B1MS0KJOJRDlPKZYLy9LBQjyQpJFg51prXBf-uilVpHw"}
algorithm
RS256
2021-07-29 06:18:33 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2021-07-29 06:18:33 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
fOba3JHO4xYFE1wFyTjAyRfbvisny0WfJXVbKi8yw60fK7Yw9Y
token_type
Bearer
id_token
eyJraWQiOiJlNGVjZTQwNC03Y2Q2LTQzODctYWM3MS1jNWIyNjFkYmQyNGIiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiR1lZZXhlTGE3Wjg5OV9YeU1xeTBVZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiOTM2MzQ3NDk5NDMzNzQ3NDZAb3BlbmlkX2NlcnRpZmljYXRpb24iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvY2Fvc1wvIiwiZXhwIjoxNjI3NTM5ODEzLCJpYXQiOjE2Mjc1Mzk1MTN9.CMvoLhC2lK_DsbetBB3A1jd18og414cdOeecRAhiqDja8DVusLKSsYZuQ8HUGIE9KZFW7CZrNGDdLnTMhjBMrd_g4L3C32ebu4y7Im8Fwd_llhdr7reGaN73ODF-LSmD-rzjVAS5IYJi6KyBQjlgAunj0QPy1zvrg0_VWVw9P2vaMi6PAIfLsqIilLiDbmRgZx-64IipjYUxgGDJSZZOdN8uQXOLifdJyJWeh4vHfSkeMpP5jL1oLxeCWI4fPDinzDZy9NQ7HrA5edJwtnn9eee_z6o9IjFsh5W-pR8feTVakstMN2K0utWLoP5bhdvEBeGaDhU4dmpTWEbrdlCSEw
scope
openid profile
2021-07-29 06:18:33 OUTGOING
oidcc-client-test-discovery-jwks-uri-keys
Response to HTTP request to test instance GB3UxaKAaWhjuBm
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "fOba3JHO4xYFE1wFyTjAyRfbvisny0WfJXVbKi8yw60fK7Yw9Y",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiJlNGVjZTQwNC03Y2Q2LTQzODctYWM3MS1jNWIyNjFkYmQyNGIiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiR1lZZXhlTGE3Wjg5OV9YeU1xeTBVZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiOTM2MzQ3NDk5NDMzNzQ3NDZAb3BlbmlkX2NlcnRpZmljYXRpb24iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvY2Fvc1wvIiwiZXhwIjoxNjI3NTM5ODEzLCJpYXQiOjE2Mjc1Mzk1MTN9.CMvoLhC2lK_DsbetBB3A1jd18og414cdOeecRAhiqDja8DVusLKSsYZuQ8HUGIE9KZFW7CZrNGDdLnTMhjBMrd_g4L3C32ebu4y7Im8Fwd_llhdr7reGaN73ODF-LSmD-rzjVAS5IYJi6KyBQjlgAunj0QPy1zvrg0_VWVw9P2vaMi6PAIfLsqIilLiDbmRgZx-64IipjYUxgGDJSZZOdN8uQXOLifdJyJWeh4vHfSkeMpP5jL1oLxeCWI4fPDinzDZy9NQ7HrA5edJwtnn9eee_z6o9IjFsh5W-pR8feTVakstMN2K0utWLoP5bhdvEBeGaDhU4dmpTWEbrdlCSEw",
  "scope": "openid profile"
}
outgoing_path
token
2021-07-29 06:18:33 INCOMING
oidcc-client-test-discovery-jwks-uri-keys
Incoming HTTP request to test instance GB3UxaKAaWhjuBm
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Go-http-client/1.1",
  "accept-encoding": "gzip",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwksAAUwStuXDb
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2021-07-29 06:18:33 OUTGOING
oidcc-client-test-discovery-jwks-uri-keys
Response to HTTP request to test instance GB3UxaKAaWhjuBm
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "e4ece404-7cd6-4387-ac71-c5b261dbd24b",
      "n": "gt_HaUGEHz45HWuLuVcdgsbeAXBoIJzZFyAUPB_dVsckQ7Tsv8PSXLt42pj9Yp0GZEnkfwRz_KaSXoDK24BqbB8nBmJIbv2kSXMptBLG7wHGmPFRAMxaFg1tmyGlrP8u9zs1zLKgW24YGKbDuGf3edRkDsJ8fXUnhJCK2qvpT6UGr3sUS4ydrY8puCEYFeIukJdB2FWB9rO5XHzhJZynxCCQxsUApAxfSWwsYrXPuuQUE-x39xSCpGqOaP3d5i2OBA8Y6vVp1MLnWl7r4i6FN6diUlKGBwYFXxV3XBU5c3B1MS0KJOJRDlPKZYLy9LBQjyQpJFg51prXBf-uilVpHw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "d08fb927-ade7-4479-9d7e-a0ebb288027a",
      "n": "vedw0DJZsjGDGZZjDxyyGqRhkhwpWE0sxdWCHnYo3mR7c_RjrfHfo4iEVsmq41XBuXkUZ-0jK5llvZTVKHEWDbq5vzlRAxjF9AU1ujuoqGa535DG2ZM5VzP6VemeaXa89_yVOzObwchNqIpTGEzQ3TzaKtbzXEAMvUFTQhWSzNAMPv2kmAXMFxd_3jM5h1-Kca3ApUT9en5txC6pgfDr6vhrJkRRw10vUOL36IRKgxeK-aBflf0fqVHzCrrvb99wF4MccUoecN3MS3Sr-KbOe6A_50kSoiq14MrIpfnpznO3xwdngVn9p4ur4S0LJ-OjOYw1EI5GncGpmlGr5SMvSw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "4a1b96b3-42f6-49de-a5c1-58b6ffd1f29d",
      "x": "a9BhdRM-5pPr9hSoXdOKj7nU09ItOFDimFZGXzw6SgU",
      "y": "8zPBhA7UtEiyer0xUJO7k1ncgDtPoPZNb_m4_5W_ECg"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "99b649bf-c123-46b1-bcdf-ef5f02362a9b",
      "x": "O-7MHLgku84SL3UAqv4q99tkp6KeHQBBuFqiyWAAIC4",
      "y": "BO1MsSOXLFZlnzZBETM5kBy3xU7uREypPPTt6Cco_w0"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "08b665aa-aea3-4e26-a000-e9de3c1dccdb",
      "x": "OCCb7lVF8B7a7BcQ5pGOaOhMq55cqmrcdN_9Z13KDfE",
      "y": "bg3-g1fwUJYAjjlFSokRZX4hi5zwgZ1PFdr3MXOSzg0"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "62cf7dcb-6af9-4235-b6f9-39a5df46e224",
      "x": "wqYo2ohWnrZQ2PYjgau7O3-tiCI8gjgYKiV9VlcXwNM"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "24b9d44a-cc3f-46cc-a269-82a8d9162831",
      "alg": "RSA-OAEP",
      "n": "j2w9H4CRhHn2Y6Lo4D07dznaOOxNDrEmtitppLqa3uodXGycxbi1WO4xWGteb1mu5HIk5qT2aDv5fByF4pLDO6O-oU4e1mMPaYpJLPcFH_gMWqIo4b9Q1XaDNmtm9pHE72fYMX_VREYmAcwelagZIfSV3EoTrIv_7KlXdHbPwgDfRplew7ADUmkOIkVvFRdR25_h2YX66Bw2FWaqHEKstFWtDw4TmocJxllcrbz9cMjJkUgUVG0fr4XAown0nI4dtdtqHOKYbYC535M6pvOX1Fs9IXC5Qyu2uCiGMNTeihkTjW0dRVuFJmniZU36uRKVi3ghQ-cVh6tiUytCsQqhEQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "671738bd-f45e-4e26-ab80-5874e7b7587d",
      "x": "RTkSn_H6y97jWL7M_qmkuw_dgpc9lFhZ9pVsZk5V0CM",
      "y": "vKmIlrm7U4ngTMSGHcih4p5Xo6h53x_rO2upzYuhflw",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwksAAUwStuXDb
2021-07-29 06:18:33 FINISHED
oidcc-client-test-discovery-jwks-uri-keys
Test has run to completion
testmodule_result
PASSED
2021-07-29 06:19:12
TEST-RUNNER
Alias has now been claimed by another test
alias
caos
new_test_id
v0buZs8n8bJQ8NV
Test Results