Test Summary

Test Results

Expand All Collapse All
All times are UTC
2021-07-29 06:22:02 INFO
TEST-RUNNER
Test instance 5wvaexTEQIXxa2W created
baseUrl
https://www.certification.openid.net/test/a/caos
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "client_registration": "static_client",
  "response_mode": "default"
}
alias
caos
description
RP Certification Config "Basic Auth"
planId
AYSdLbzmWbu9X
config
{
  "alias": "caos",
  "description": "RP Certification Config \"Basic Auth\"",
  "publish": "summary",
  "client": {
    "client_id": "93634749943374746@openid_certification",
    "client_secret": "myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*\u003d@JhYacA4^qC]B{ZK}",
    "redirect_uri": "http://localhost:4200/auth/callback"
  }
}
testName
oidcc-client-test-signing-key-rotation
2021-07-29 06:22:02 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/caos/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/caos/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/caos/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/caos/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/caos/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/caos/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-07-29 06:22:02
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/caos/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/caos/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/caos/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/caos/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/caos/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/caos/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-07-29 06:22:02
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "8eWQvG_tbwHUXkRzVVeVUAi16VTNDWF-fUS4XrTkQ1PhtZOJFrjCfZH_LjvuWFZQHSBLuxxeNUVg_zPVG7a4XXT49m_ng-mDpislBybnaYx7UcwEIcxt8dYfjaE8NQm4ePaBy5gBZFPsN9XZ45ErLwoir2TYI6Nkr07Zdt7SjCs",
      "kty": "RSA",
      "q": "6ucrB-3Snx1XxekbV4ct9jwjNsXKcBnk7eAszNc1QCPJdiTCifSlrpThIxN9JWC8QdGKIt2ng9lKdCsIuRuB_M2z_PHxz3F0EZ1z0BtcqE3Ys7gooxRogiS7RY99Sc6mrNorivjCLH7TcTHXafVl5xlPXPo2q6UVcaPLbH1KEqU",
      "d": "O22zpPb2Ix4iaF-sLy7NU6r4rRBFQYfHZRl41y_cl-HuyFXVzJkszQUqrV3AycIFF4n9c2N1w2nsU_LHnz13kSjdvZNfaReUA4ZBMVa6kZz-tVIi7V5ICebsGXhebtSSmR6IWI0R96b5gKXvXkAw3y86id4l8Q-0tlmYpr8EXZCtvM7MIJ1HrXz5RDrfsj2ANOFBG-iVuEwRhTcmt8hWkLE1MmEaglNrPBod8LPX-zky4OQ5S2C9OPefmGSXTGhs9mveo0RO3gKNcdgCJTvEgNE4_oxZf-X5wWqNIt4kFUU_0jM58N1e8prhWmFzk3D9yalcdzE9Ff-OW87BKsRH-Q",
      "e": "AQAB",
      "use": "sig",
      "kid": "0b14f6bc-b22c-40bd-a774-642d6963ea70",
      "qi": "2DBgmCNSdCoSDOI8vO-o3BIC9lcMGf8HOiGhDKf2F-hxgXns20PezuP1XzMlUH_bAF0_pGveNyXs10MllqJnfiwORWbrNlzqKQrfex3EblWCaF78vdHAocZsU-SQcMkpZ6SaCpCmL1b9yg0aB8YHaIIIHw9ZEfX44Prf1CuYiS0",
      "dp": "Qi7oQdZx5RxgCYa684-qB6LKetO74rxZClciBq-BgLZTnAWIzZGxjP_EDNdS6BJ9iuqKLeCeGf8ogcqhtRpyKQfXEj4d3uamIXHOiL1pNWS9XOzv-HthXXiTW4HQ4kYNlfMEIjstrlCT4db97ZiLcyxXvxtdU6rh4mE1eKOQgc8",
      "dq": "Eer2LlGmujpbwp3oVwHZsKmfqgLmUSy4eKib4jgcOLtCF7_wEuPVa36xuaI37oz1bzPTjJtJttXxRvEtZilB_g2WyBmQb1lhGCLhfaNIqxHdEMBgYSgiXKL-oeyzCtk3f4HYxm35Kbm22TCLFOsCDeGxWw8-8lLSUuvCjZD1AH0",
      "n": "3fZFGuWnLlNE8Tjc7MzXqs1k-UJIxNrppbRPM2ieB01oCnR7z9cNrFCWXbMHVNHlNRtIMZ4BWt9rClwrY54d8lJMGs1nX2KgNSNytd7DlyAHRSbEgwfEelxSWSXjIWjnaZIa3Dueq45HKVpLQTkEYd35N6Os8hdW99laTHkFRnmDtZ35ff-rTfDgKkqV5L9QDKRXQQ88BIaIU7jrZZHlSiz01B8sEhZVjK-l5ZmTB_a1BfwfiRnZxD4RUMahNDTMp1NJAmPH5meRGSqPPAyvQG9yZMEdWhjYJEsKPgFGScPnQyzhcXWrlG9UmuWL-zPdFsFBh04_mH6gn_e57v1dtw"
    },
    {
      "kty": "EC",
      "d": "EGJ0615cVR4_iLusLU1iiZDTmMdV3EoMlRblVLs_es4",
      "use": "sig",
      "crv": "P-256",
      "kid": "7ec31f02-b6ff-4a50-9625-471831c2ad7f",
      "x": "OFRvrLrxIMURvaC6dZAjbitVFT1Unmb7Dbp9YhJIs04",
      "y": "02hnlszosvrhQjFF0Wa7L4UZBUmSjWRqD696OEvEa_w"
    },
    {
      "kty": "EC",
      "d": "POglYmL4TM4I0ENtSg3Kxkl5_xCOznh9camTtK3qu90",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "1e901347-e38c-49ad-afbd-779d3af25f80",
      "x": "MP2QXySTmeSwEqSJNd82nwQ2ulXaxvGNwWLpGIZql_g",
      "y": "mWuCGMnLXJ4AiHLi2ZISYHbcoSbgdqv7pZ0P7Mx7UaM"
    },
    {
      "kty": "OKP",
      "d": "DQ6w5m-1q5lJQOCJ19eSqURy1e7j540clee1iOi914A",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "5f02ffba-3b49-48d8-a15d-de5f159c0bf7",
      "x": "bwwhTPIakkrlZF8meZxxt-4HFoyXE43TOTprc-jDtvk"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "3_jfTyiPJcejsui1z1kgySKViQMoS2yhxukLK-8EUk9-b5PMaAN9ueHsm5wXEaG7wYa1FQw_C8EVHa4lFfpGCscxGWMlWIMiHfqgwNS3UcFZLI7GLMiLBJl5OT5iWpp9jrywHkfXpCgtPD8oqozQAau2e94BZ8B7qBWBtRUB0JE",
      "kty": "RSA",
      "q": "u-b7MLsi7cQ7n28k7VIMqUnrIIiGQ4kZu1PF3FO1SLA-Y03yP_PHrH_2b5Y8megFfEyj2jIqNcJsWwPsTg-8mUcitNnNyLMd6JzRMTeSqqa0zryuQ_z0ZOglHVIWg1ey9zffSWPzP9_Wzhw--FZvJ0Ke1erQP-HOEs2rOw_LXT8",
      "d": "obwxckppy2MRhqN24dkbNuLN7UcLahEIHafSdXMnkUeUQz2OYmhXg5LcvTUV9sbh1l-LAM2WLPwJ5wduczGvK7G-jxfVNdWDDjoI-kAR6OOGQllIoWPfTX5sKIqkNq10p_krhBUc54pkaokcBOdbJsBj04WSUOdbf8X0huZstNtYjnwmg9xTs2HFfV_2D0P7FnCNudSX9LAueBoZoxsmeuFEVhIENMEXqpavq6QfNYZdAWBhMZEjk0koqsqGhttx1iu31sGmAyDgoRxSeG-H3VRj3JUMkeDAvnsqMOgwi3mWxlmw9P4wUE1yY56Vh5otm9aiB2K0khpJmPcBs2qrYQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "52a03e0f-52fe-42ee-b662-0d521434f920",
      "qi": "tU0hjLJSKauLaeuoS7pJJJjKLmEC91S4FWeVRpy0hCxIpYNQFVmSVXiA1OpmF2T6oN2DJ35mqUZxJKVCqyBetWLq2ifClxbK7Rrm-p-BzpYt4MySujXIBWMy5xS5gKsvntizmoYnZOwNmgU8-JaHOZeWHQEq6uCmlCG02xveBmw",
      "dp": "er4dQ3hq2r2KDOZTnQqvWQtHAAtm7c7e6e-VW8Jlj-ZY2DUbdHVVVaVm0fC9A8Cq8OguHRbVBlAOjnF9iYnbENURJ2SaduOGsv9DUepBfOCFSlIEcU6GQUMKmECEDjtUTAFEU5PzrdcG01mZo73_0KqWG1QTWRS3r-n5Z4_XqsE",
      "alg": "RSA-OAEP",
      "dq": "Tg6pQNgsrWs8fYH1bCUOn3DWnWA5rmqQ5vHpGxsnDvgwIp6pyQljZHSQElDuAd2SEc3gr27xe_21d6XMj60X4vDbKRfl1b8a6JvkhzaX1g6Ew_E7z4CQoi6R5HlKYuuWq_5o4psD3QAGwv6W5iE58axKQYFXW4JZUhRgUpvAFo8",
      "n": "pGTgexkU1wJLZ6KzkiWObCdr42KZkmUKJ7ImELzaP0LXCmHEDfyVy5ODiTJeiO1GJnJsuBYaadYHQxvyFQ04DDuEdcmldR402FgLa4bbBPsJnqrn-ESEH-3OY71lOxUThS2_vW0720NTdzOhIZE72KzdrOu49JVyoE6ZcZvrmut-z3ReZy7YPT6IEkJKegYnOt35uLs8L5oI7EFXmBydJ6_UWCG-IsCRUCkRHyox0N8Ad0Jgf91Z6NlviBwDTDNsjVbFhFj4Q6NMAZT0c_7-fITkYqhVl_-EDq_Of63HRxTUpggE7P7C6YCTNptjHaBeQ_rbb0Hl6LXoFWRFtjIArw"
    },
    {
      "kty": "EC",
      "d": "7QpNjo4KTYdlaghHiEAAws13mhxt5wavfO9shZr-itI",
      "use": "enc",
      "crv": "P-256",
      "kid": "cbddb2ec-c264-449f-964d-0aaf57e28360",
      "x": "vOka2awax4fnz8MLy5C2M4opi7cF-K5ZjfXYl_5ti_s",
      "y": "zcNdD0Z69D3eSnj-J98ZvEavtpWbHtDyKzrlW1nyRE0",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "0b14f6bc-b22c-40bd-a774-642d6963ea70",
      "n": "3fZFGuWnLlNE8Tjc7MzXqs1k-UJIxNrppbRPM2ieB01oCnR7z9cNrFCWXbMHVNHlNRtIMZ4BWt9rClwrY54d8lJMGs1nX2KgNSNytd7DlyAHRSbEgwfEelxSWSXjIWjnaZIa3Dueq45HKVpLQTkEYd35N6Os8hdW99laTHkFRnmDtZ35ff-rTfDgKkqV5L9QDKRXQQ88BIaIU7jrZZHlSiz01B8sEhZVjK-l5ZmTB_a1BfwfiRnZxD4RUMahNDTMp1NJAmPH5meRGSqPPAyvQG9yZMEdWhjYJEsKPgFGScPnQyzhcXWrlG9UmuWL-zPdFsFBh04_mH6gn_e57v1dtw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "3bb264b0-444c-453f-b937-8179703405f5",
      "n": "hAwQAmNFxYrsrmG3637GBSPXDLwxHLhmg1-K-68JpKi7oyXFVWjPcaQ8ITNr1yjgiZo6Ly0OK_1vNHlLcuNw4MVfyuhdrDSEbaj8gfsRxPkNZsCCNnVCalahJ60H5uoWnp2as5-fWYvQ-pAclqk6sERRp6WCGUMBwUW60KvnJuuNq_HRfnyikhghPhFjW7sh676jtbAGEjupS3Fd919tRo1SXjVBmMQ88WAZZ1ulqhx8yyLsWr6eWItTyhX6MDZJ1JLbz5L85OZPgeLNz9cvvj3Hc_ioqJXnZN8vFjMcUNI9_p7xjieuKEI7mnTMM5Q_XHsqcUA5thor-e43iEwpYw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "7ec31f02-b6ff-4a50-9625-471831c2ad7f",
      "x": "OFRvrLrxIMURvaC6dZAjbitVFT1Unmb7Dbp9YhJIs04",
      "y": "02hnlszosvrhQjFF0Wa7L4UZBUmSjWRqD696OEvEa_w"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "9b188ff1-b6e5-4fb2-ac84-a64facd8ea64",
      "x": "q6pvzK1Kw7hoNcQX8YnnbZZby6RkZXbhdRVNgjdVs5c",
      "y": "_v1QhZw3QxkXBIssrpm76aT3nSmZoBVJT9WNtAYfJt8"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "1e901347-e38c-49ad-afbd-779d3af25f80",
      "x": "MP2QXySTmeSwEqSJNd82nwQ2ulXaxvGNwWLpGIZql_g",
      "y": "mWuCGMnLXJ4AiHLi2ZISYHbcoSbgdqv7pZ0P7Mx7UaM"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "5f02ffba-3b49-48d8-a15d-de5f159c0bf7",
      "x": "bwwhTPIakkrlZF8meZxxt-4HFoyXE43TOTprc-jDtvk"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "52a03e0f-52fe-42ee-b662-0d521434f920",
      "alg": "RSA-OAEP",
      "n": "pGTgexkU1wJLZ6KzkiWObCdr42KZkmUKJ7ImELzaP0LXCmHEDfyVy5ODiTJeiO1GJnJsuBYaadYHQxvyFQ04DDuEdcmldR402FgLa4bbBPsJnqrn-ESEH-3OY71lOxUThS2_vW0720NTdzOhIZE72KzdrOu49JVyoE6ZcZvrmut-z3ReZy7YPT6IEkJKegYnOt35uLs8L5oI7EFXmBydJ6_UWCG-IsCRUCkRHyox0N8Ad0Jgf91Z6NlviBwDTDNsjVbFhFj4Q6NMAZT0c_7-fITkYqhVl_-EDq_Of63HRxTUpggE7P7C6YCTNptjHaBeQ_rbb0Hl6LXoFWRFtjIArw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "cbddb2ec-c264-449f-964d-0aaf57e28360",
      "x": "vOka2awax4fnz8MLy5C2M4opi7cF-K5ZjfXYl_5ti_s",
      "y": "zcNdD0Z69D3eSnj-J98ZvEavtpWbHtDyKzrlW1nyRE0",
      "alg": "ECDH-ES"
    }
  ]
}
2021-07-29 06:22:02 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2021-07-29 06:22:02 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2021-07-29 06:22:02 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": 1580000000
}
2021-07-29 06:22:02 SUCCESS
OIDCCGetStaticClientConfigurationForRPTests
Found a static client object
client_id
93634749943374746@openid_certification
client_secret
myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*=@JhYacA4^qC]B{ZK}
redirect_uris
[
  "http://localhost:4200/auth/callback"
]
2021-07-29 06:22:02 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "client_id": "93634749943374746@openid_certification",
  "client_secret": "myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*\u003d@JhYacA4^qC]B{ZK}",
  "redirect_uris": [
    "http://localhost:4200/auth/callback"
  ]
}
2021-07-29 06:22:02 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2021-07-29 06:22:02 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2021-07-29 06:22:02 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "http://localhost:4200/auth/callback"
]
2021-07-29 06:22:02 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2021-07-29 06:22:02 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2021-07-29 06:22:02 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2021-07-29 06:22:02 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2021-07-29 06:22:02 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2021-07-29 06:22:02 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2021-07-29 06:22:02 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2021-07-29 06:22:02 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-07-29 06:22:02 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2021-07-29 06:22:02 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2021-07-29 06:22:02 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2021-07-29 06:22:02 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2021-07-29 06:22:02 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2021-07-29 06:22:02 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2021-07-29 06:22:02 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2021-07-29 06:22:02 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2021-07-29 06:22:02 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2021-07-29 06:22:02 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2021-07-29 06:22:02
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2021-07-29 06:22:02
oidcc-client-test-signing-key-rotation
Setup Done
2021-07-29 06:22:08 INCOMING
oidcc-client-test-signing-key-rotation
Incoming HTTP request to test instance 5wvaexTEQIXxa2W
incoming_headers
{
  "host": "www.certification.openid.net",
  "cookie": "JSESSIONID\u003d0340D2A012AC78B6C2939CF389A64905",
  "if-none-match": "W/\"5467-qF3YidmbWPgqwn+XONzgMps1HKQ\"",
  "upgrade-insecure-requests": "1",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,*/*;q\u003d0.8",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.1 Safari/605.1.15",
  "accept-language": "en-gb",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "93634749943374746@openid_certification",
  "redirect_uri": "http://localhost:4200/auth/callback",
  "response_type": "code",
  "scope": "openid profile",
  "state": "1e1ad859-7741-4219-bbca-a6e88682bc6a"
}
incoming_body
Authorization endpoint
2021-07-29 06:22:08 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2021-07-29 06:22:08 SUCCESS
EnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "profile"
]
expected
openid
2021-07-29 06:22:08 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "93634749943374746@openid_certification",
  "redirect_uri": "http://localhost:4200/auth/callback",
  "response_type": "code",
  "scope": "openid profile",
  "state": "1e1ad859-7741-4219-bbca-a6e88682bc6a"
}
2021-07-29 06:22:08 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid profile
2021-07-29 06:22:08 INFO
ExtractNonceFromAuthorizationRequest
Couldn't find 'nonce' in authorization endpoint parameters
2021-07-29 06:22:08 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2021-07-29 06:22:08 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
93634749943374746@openid_certification
2021-07-29 06:22:08 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
http://localhost:4200/auth/callback
expected
[
  "http://localhost:4200/auth/callback"
]
2021-07-29 06:22:08 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "profile"
]
expected
openid
2021-07-29 06:22:08 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2021-07-29 06:22:08 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
5X1NUHRwBg
2021-07-29 06:22:08 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
AjM_q_jZdDGmBDr88gl1wA
2021-07-29 06:22:08 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "http://localhost:4200/auth/callback",
  "state": "1e1ad859-7741-4219-bbca-a6e88682bc6a"
}
2021-07-29 06:22:08 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "http://localhost:4200/auth/callback",
  "state": "1e1ad859-7741-4219-bbca-a6e88682bc6a",
  "code": "5X1NUHRwBg"
}
2021-07-29 06:22:08
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
http://localhost:4200/auth/callback?state=1e1ad859-7741-4219-bbca-a6e88682bc6a&code=5X1NUHRwBg
2021-07-29 06:22:08 OUTGOING
oidcc-client-test-signing-key-rotation
Response to HTTP request to test instance 5wvaexTEQIXxa2W
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [http://localhost:4200/auth/callback?state=1e1ad859-7741-4219-bbca-a6e88682bc6a&code=5X1NUHRwBg]
outgoing_path
authorize
2021-07-29 06:22:08 INCOMING
oidcc-client-test-signing-key-rotation
Incoming HTTP request to test instance 5wvaexTEQIXxa2W
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Go-http-client/1.1",
  "authorization": "Basic OTM2MzQ3NDk5NDMzNzQ3NDYlNDBvcGVuaWRfY2VydGlmaWNhdGlvbjpteWNsUSU2MFJCX0Y1JTdDSEElM0ElNDA3JTIxcjdIJTI4RExsdEtBJTI5UH51JTIzJTI5QWclMjNMUThadyUyQ2ttJTJBJTNEJTQwSmhZYWNBNCU1RXFDJTVEQiU3QlpLJTdE",
  "content-type": "application/x-www-form-urlencoded",
  "accept-encoding": "gzip",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "106",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "code": "5X1NUHRwBg",
  "grant_type": "authorization_code",
  "redirect_uri": "http://localhost:4200/auth/callback"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
code=5X1NUHRwBg&grant_type=authorization_code&redirect_uri=http%3A%2F%2Flocalhost%3A4200%2Fauth%2Fcallback
Token endpoint
2021-07-29 06:22:08 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
93634749943374746@openid_certification
client_secret
myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*=@JhYacA4^qC]B{ZK}
method
client_secret_basic
2021-07-29 06:22:08 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2021-07-29 06:22:08 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
5X1NUHRwBg
2021-07-29 06:22:08 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
http://localhost:4200/auth/callback
2021-07-29 06:22:08 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
tUJ9bNigyd0kADQce4awCC3VdwYbfrBaS1RNynUG2PnQ9p1G4D
2021-07-29 06:22:08 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
Y6Yj8NlsUbuqWGVKszK2-Q
2021-07-29 06:22:08 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/caos/
sub
user-subject-1234531
aud
93634749943374746@openid_certification
iat
1627539728
exp
1627540028
2021-07-29 06:22:08 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
Y6Yj8NlsUbuqWGVKszK2-Q
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/caos/",
  "sub": "user-subject-1234531",
  "aud": "93634749943374746@openid_certification",
  "iat": 1627539728,
  "exp": 1627540028,
  "at_hash": "Y6Yj8NlsUbuqWGVKszK2-Q"
}
2021-07-29 06:22:08 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiIwYjE0ZjZiYy1iMjJjLTQwYmQtYTc3NC02NDJkNjk2M2VhNzAiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiWTZZajhObHNVYnVxV0dWS3N6SzItUSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiOTM2MzQ3NDk5NDMzNzQ3NDZAb3BlbmlkX2NlcnRpZmljYXRpb24iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvY2Fvc1wvIiwiZXhwIjoxNjI3NTQwMDI4LCJpYXQiOjE2Mjc1Mzk3Mjh9.bM7QkJ76izhOoCB-Vll4fsuoZuqWOh0jvAZ45q7cfP1PBVBVmO0yfrQat5bSFeAlPrLG86yTYLHBPAGhvjS8_kOxBLBynU1R4Yd_YOxDllxt19KRHYORQYEbG8rOoeTw_F19S4aHpOvqEV8UJX9Q_pCliVKi2x6BaG9qkmawG2sI8fHEbcC-AyIGkJuvvbGHV3RTDTGQMnQeYW7YBz72ofdqYAKtro35U8yAzUpLsyiOFaNLZe-tsQJ0Ak-UNXq9BxXAAjwi2dl5utKmLtkmuBJrHTI-0oMsi791exda6JPFreYIwTfDZ_hLiX-1jGZhQ9LuFyHq9HqUkhc6Ie91gQ
key
{"p":"8eWQvG_tbwHUXkRzVVeVUAi16VTNDWF-fUS4XrTkQ1PhtZOJFrjCfZH_LjvuWFZQHSBLuxxeNUVg_zPVG7a4XXT49m_ng-mDpislBybnaYx7UcwEIcxt8dYfjaE8NQm4ePaBy5gBZFPsN9XZ45ErLwoir2TYI6Nkr07Zdt7SjCs","kty":"RSA","q":"6ucrB-3Snx1XxekbV4ct9jwjNsXKcBnk7eAszNc1QCPJdiTCifSlrpThIxN9JWC8QdGKIt2ng9lKdCsIuRuB_M2z_PHxz3F0EZ1z0BtcqE3Ys7gooxRogiS7RY99Sc6mrNorivjCLH7TcTHXafVl5xlPXPo2q6UVcaPLbH1KEqU","d":"O22zpPb2Ix4iaF-sLy7NU6r4rRBFQYfHZRl41y_cl-HuyFXVzJkszQUqrV3AycIFF4n9c2N1w2nsU_LHnz13kSjdvZNfaReUA4ZBMVa6kZz-tVIi7V5ICebsGXhebtSSmR6IWI0R96b5gKXvXkAw3y86id4l8Q-0tlmYpr8EXZCtvM7MIJ1HrXz5RDrfsj2ANOFBG-iVuEwRhTcmt8hWkLE1MmEaglNrPBod8LPX-zky4OQ5S2C9OPefmGSXTGhs9mveo0RO3gKNcdgCJTvEgNE4_oxZf-X5wWqNIt4kFUU_0jM58N1e8prhWmFzk3D9yalcdzE9Ff-OW87BKsRH-Q","e":"AQAB","use":"sig","kid":"0b14f6bc-b22c-40bd-a774-642d6963ea70","qi":"2DBgmCNSdCoSDOI8vO-o3BIC9lcMGf8HOiGhDKf2F-hxgXns20PezuP1XzMlUH_bAF0_pGveNyXs10MllqJnfiwORWbrNlzqKQrfex3EblWCaF78vdHAocZsU-SQcMkpZ6SaCpCmL1b9yg0aB8YHaIIIHw9ZEfX44Prf1CuYiS0","dp":"Qi7oQdZx5RxgCYa684-qB6LKetO74rxZClciBq-BgLZTnAWIzZGxjP_EDNdS6BJ9iuqKLeCeGf8ogcqhtRpyKQfXEj4d3uamIXHOiL1pNWS9XOzv-HthXXiTW4HQ4kYNlfMEIjstrlCT4db97ZiLcyxXvxtdU6rh4mE1eKOQgc8","dq":"Eer2LlGmujpbwp3oVwHZsKmfqgLmUSy4eKib4jgcOLtCF7_wEuPVa36xuaI37oz1bzPTjJtJttXxRvEtZilB_g2WyBmQb1lhGCLhfaNIqxHdEMBgYSgiXKL-oeyzCtk3f4HYxm35Kbm22TCLFOsCDeGxWw8-8lLSUuvCjZD1AH0","n":"3fZFGuWnLlNE8Tjc7MzXqs1k-UJIxNrppbRPM2ieB01oCnR7z9cNrFCWXbMHVNHlNRtIMZ4BWt9rClwrY54d8lJMGs1nX2KgNSNytd7DlyAHRSbEgwfEelxSWSXjIWjnaZIa3Dueq45HKVpLQTkEYd35N6Os8hdW99laTHkFRnmDtZ35ff-rTfDgKkqV5L9QDKRXQQ88BIaIU7jrZZHlSiz01B8sEhZVjK-l5ZmTB_a1BfwfiRnZxD4RUMahNDTMp1NJAmPH5meRGSqPPAyvQG9yZMEdWhjYJEsKPgFGScPnQyzhcXWrlG9UmuWL-zPdFsFBh04_mH6gn_e57v1dtw"}
algorithm
RS256
2021-07-29 06:22:08 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2021-07-29 06:22:08 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
tUJ9bNigyd0kADQce4awCC3VdwYbfrBaS1RNynUG2PnQ9p1G4D
token_type
Bearer
id_token
eyJraWQiOiIwYjE0ZjZiYy1iMjJjLTQwYmQtYTc3NC02NDJkNjk2M2VhNzAiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiWTZZajhObHNVYnVxV0dWS3N6SzItUSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiOTM2MzQ3NDk5NDMzNzQ3NDZAb3BlbmlkX2NlcnRpZmljYXRpb24iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvY2Fvc1wvIiwiZXhwIjoxNjI3NTQwMDI4LCJpYXQiOjE2Mjc1Mzk3Mjh9.bM7QkJ76izhOoCB-Vll4fsuoZuqWOh0jvAZ45q7cfP1PBVBVmO0yfrQat5bSFeAlPrLG86yTYLHBPAGhvjS8_kOxBLBynU1R4Yd_YOxDllxt19KRHYORQYEbG8rOoeTw_F19S4aHpOvqEV8UJX9Q_pCliVKi2x6BaG9qkmawG2sI8fHEbcC-AyIGkJuvvbGHV3RTDTGQMnQeYW7YBz72ofdqYAKtro35U8yAzUpLsyiOFaNLZe-tsQJ0Ak-UNXq9BxXAAjwi2dl5utKmLtkmuBJrHTI-0oMsi791exda6JPFreYIwTfDZ_hLiX-1jGZhQ9LuFyHq9HqUkhc6Ie91gQ
scope
openid profile
2021-07-29 06:22:08 OUTGOING
oidcc-client-test-signing-key-rotation
Response to HTTP request to test instance 5wvaexTEQIXxa2W
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "tUJ9bNigyd0kADQce4awCC3VdwYbfrBaS1RNynUG2PnQ9p1G4D",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiIwYjE0ZjZiYy1iMjJjLTQwYmQtYTc3NC02NDJkNjk2M2VhNzAiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiWTZZajhObHNVYnVxV0dWS3N6SzItUSIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiOTM2MzQ3NDk5NDMzNzQ3NDZAb3BlbmlkX2NlcnRpZmljYXRpb24iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvY2Fvc1wvIiwiZXhwIjoxNjI3NTQwMDI4LCJpYXQiOjE2Mjc1Mzk3Mjh9.bM7QkJ76izhOoCB-Vll4fsuoZuqWOh0jvAZ45q7cfP1PBVBVmO0yfrQat5bSFeAlPrLG86yTYLHBPAGhvjS8_kOxBLBynU1R4Yd_YOxDllxt19KRHYORQYEbG8rOoeTw_F19S4aHpOvqEV8UJX9Q_pCliVKi2x6BaG9qkmawG2sI8fHEbcC-AyIGkJuvvbGHV3RTDTGQMnQeYW7YBz72ofdqYAKtro35U8yAzUpLsyiOFaNLZe-tsQJ0Ak-UNXq9BxXAAjwi2dl5utKmLtkmuBJrHTI-0oMsi791exda6JPFreYIwTfDZ_hLiX-1jGZhQ9LuFyHq9HqUkhc6Ie91gQ",
  "scope": "openid profile"
}
outgoing_path
token
2021-07-29 06:22:08 INCOMING
oidcc-client-test-signing-key-rotation
Incoming HTTP request to test instance 5wvaexTEQIXxa2W
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Go-http-client/1.1",
  "accept-encoding": "gzip",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2021-07-29 06:22:08 OUTGOING
oidcc-client-test-signing-key-rotation
Response to HTTP request to test instance 5wvaexTEQIXxa2W
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "0b14f6bc-b22c-40bd-a774-642d6963ea70",
      "n": "3fZFGuWnLlNE8Tjc7MzXqs1k-UJIxNrppbRPM2ieB01oCnR7z9cNrFCWXbMHVNHlNRtIMZ4BWt9rClwrY54d8lJMGs1nX2KgNSNytd7DlyAHRSbEgwfEelxSWSXjIWjnaZIa3Dueq45HKVpLQTkEYd35N6Os8hdW99laTHkFRnmDtZ35ff-rTfDgKkqV5L9QDKRXQQ88BIaIU7jrZZHlSiz01B8sEhZVjK-l5ZmTB_a1BfwfiRnZxD4RUMahNDTMp1NJAmPH5meRGSqPPAyvQG9yZMEdWhjYJEsKPgFGScPnQyzhcXWrlG9UmuWL-zPdFsFBh04_mH6gn_e57v1dtw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "3bb264b0-444c-453f-b937-8179703405f5",
      "n": "hAwQAmNFxYrsrmG3637GBSPXDLwxHLhmg1-K-68JpKi7oyXFVWjPcaQ8ITNr1yjgiZo6Ly0OK_1vNHlLcuNw4MVfyuhdrDSEbaj8gfsRxPkNZsCCNnVCalahJ60H5uoWnp2as5-fWYvQ-pAclqk6sERRp6WCGUMBwUW60KvnJuuNq_HRfnyikhghPhFjW7sh676jtbAGEjupS3Fd919tRo1SXjVBmMQ88WAZZ1ulqhx8yyLsWr6eWItTyhX6MDZJ1JLbz5L85OZPgeLNz9cvvj3Hc_ioqJXnZN8vFjMcUNI9_p7xjieuKEI7mnTMM5Q_XHsqcUA5thor-e43iEwpYw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "7ec31f02-b6ff-4a50-9625-471831c2ad7f",
      "x": "OFRvrLrxIMURvaC6dZAjbitVFT1Unmb7Dbp9YhJIs04",
      "y": "02hnlszosvrhQjFF0Wa7L4UZBUmSjWRqD696OEvEa_w"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "9b188ff1-b6e5-4fb2-ac84-a64facd8ea64",
      "x": "q6pvzK1Kw7hoNcQX8YnnbZZby6RkZXbhdRVNgjdVs5c",
      "y": "_v1QhZw3QxkXBIssrpm76aT3nSmZoBVJT9WNtAYfJt8"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "1e901347-e38c-49ad-afbd-779d3af25f80",
      "x": "MP2QXySTmeSwEqSJNd82nwQ2ulXaxvGNwWLpGIZql_g",
      "y": "mWuCGMnLXJ4AiHLi2ZISYHbcoSbgdqv7pZ0P7Mx7UaM"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "5f02ffba-3b49-48d8-a15d-de5f159c0bf7",
      "x": "bwwhTPIakkrlZF8meZxxt-4HFoyXE43TOTprc-jDtvk"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "52a03e0f-52fe-42ee-b662-0d521434f920",
      "alg": "RSA-OAEP",
      "n": "pGTgexkU1wJLZ6KzkiWObCdr42KZkmUKJ7ImELzaP0LXCmHEDfyVy5ODiTJeiO1GJnJsuBYaadYHQxvyFQ04DDuEdcmldR402FgLa4bbBPsJnqrn-ESEH-3OY71lOxUThS2_vW0720NTdzOhIZE72KzdrOu49JVyoE6ZcZvrmut-z3ReZy7YPT6IEkJKegYnOt35uLs8L5oI7EFXmBydJ6_UWCG-IsCRUCkRHyox0N8Ad0Jgf91Z6NlviBwDTDNsjVbFhFj4Q6NMAZT0c_7-fITkYqhVl_-EDq_Of63HRxTUpggE7P7C6YCTNptjHaBeQ_rbb0Hl6LXoFWRFtjIArw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "cbddb2ec-c264-449f-964d-0aaf57e28360",
      "x": "vOka2awax4fnz8MLy5C2M4opi7cF-K5ZjfXYl_5ti_s",
      "y": "zcNdD0Z69D3eSnj-J98ZvEavtpWbHtDyKzrlW1nyRE0",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2021-07-29 06:22:08 INCOMING
oidcc-client-test-signing-key-rotation
Incoming HTTP request to test instance 5wvaexTEQIXxa2W
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Go-http-client/1.1",
  "authorization": "Bearer tUJ9bNigyd0kADQce4awCC3VdwYbfrBaS1RNynUG2PnQ9p1G4D",
  "accept-encoding": "gzip",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
userinfo
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Userinfo endpoint
2021-07-29 06:22:08 SUCCESS
OIDCCExtractBearerAccessTokenFromRequest
Found access token on incoming request
access_token
tUJ9bNigyd0kADQce4awCC3VdwYbfrBaS1RNynUG2PnQ9p1G4D
2021-07-29 06:22:08 SUCCESS
RequireBearerAccessToken
Found access token in request
actual
tUJ9bNigyd0kADQce4awCC3VdwYbfrBaS1RNynUG2PnQ9p1G4D
2021-07-29 06:22:08 SUCCESS
FilterUserInfoForScopes
User info endpoint output
sub
user-subject-1234531
website
https://openid.net/
zoneinfo
America/Los_Angeles
birthdate
2000-02-03
gender
female
preferred_username
d.tu
given_name
Demo
middle_name
Theresa
locale
en-US
updated_at
1580000000
name
Demo T. User
nickname
Dee
family_name
User
2021-07-29 06:22:08
ClearAccessTokenFromRequest
Condition ran but did not log anything
2021-07-29 06:22:08 INFO
AddIssAndAudToUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-07-29 06:22:08 INFO
SignUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-07-29 06:22:08 INFO
EncryptUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_encrypted_response_alg
path
userinfo_encrypted_response_alg
mapped
object
client
2021-07-29 06:22:08 OUTGOING
oidcc-client-test-signing-key-rotation
Response to HTTP request to test instance 5wvaexTEQIXxa2W
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "sub": "user-subject-1234531",
  "website": "https://openid.net/",
  "zoneinfo": "America/Los_Angeles",
  "birthdate": "2000-02-03",
  "gender": "female",
  "preferred_username": "d.tu",
  "given_name": "Demo",
  "middle_name": "Theresa",
  "locale": "en-US",
  "updated_at": 1580000000,
  "name": "Demo T. User",
  "nickname": "Dee",
  "family_name": "User"
}
outgoing_path
userinfo
2021-07-29 06:22:39 INCOMING
oidcc-client-test-signing-key-rotation
Incoming HTTP request to test instance 5wvaexTEQIXxa2W
incoming_headers
{
  "host": "www.certification.openid.net",
  "cookie": "JSESSIONID\u003d0340D2A012AC78B6C2939CF389A64905",
  "if-none-match": "W/\"5467-qF3YidmbWPgqwn+XONzgMps1HKQ\"",
  "upgrade-insecure-requests": "1",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,*/*;q\u003d0.8",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.1 Safari/605.1.15",
  "accept-language": "en-gb",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "93634749943374746@openid_certification",
  "redirect_uri": "http://localhost:4200/auth/callback",
  "response_type": "code",
  "scope": "openid profile",
  "state": "6766288b-28e6-4ff7-968e-5591d09fd21a"
}
incoming_body
2021-07-29 06:22:39
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "x5I0dkjznhKBZ8LMvuXefb30mL_mKjnvi28HkCFd43NeasnwxSDuDo6AjA6rQu0HIZmWCeafwDUOxFzsbpTBMZtFYVOuWs5w2-YQe0Z_h3HBXrAjNM0pUBcuDLfzBH1pC8Qg_ed2SqCNcniqxD6miGHQXGKU_gV8aWpxQeoM0FU",
      "kty": "RSA",
      "q": "wv2Tl1WC_TwypBjGpIHZPpo7qdmBCGq20L4Pfr3X4-Mrnz1jEpcdxZRVBTiXz2tvm8rbVXmGUkcXLPsd-W9fElnfQmHY3MoTcu6JjzzgAyAnyMg0X-Pt6SxTHIp0wiAIHAoGvYpZxpsVdKhZL3wj79sdCCLsn73NzLdji-TNNwc",
      "d": "i8_LmpAJQ8Rfy8xzfPjjlnvFbpuOKTDaeP9QvPMWpXSgixBrQOgdQUyjcBwxLy21-8tpaKywlnhv_jD8N_IxmBSYeK7aZeiWN89yVZxjkOufD9Bi05In_bqzi9iehorwsfUcuuPJTNgcqD978SBzQlGHQ-0Hxoud-JKc6aQ9oLQxwIPL9_h9w4rSF3COz15VSUSWbynS5-dWnkZZM2wALGGrFz5SW6pmqN7h-HDVwC1M2jpDw0QNpQP5Q0XTDxnMgVzuElk7DvugW85ZrrpuBAwkeNR67qX8IqFPOAC1ucUaQ3k2lC2XjcUsTVUgYBIBfB4HqVx3zk7BNjsWLltYUQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "4267f10f-61fa-4d87-a0c0-509fe752a3cd",
      "qi": "eUGA3FqOdmLIGldLPjg-eH6rjTbN6ScNWK6-YefeUCauUnOEfp6BsuccrPSlbG6sw_txtfw8RYsqGoB4qvjAXemgh5Nk8tY23ULfd_OW29DTdzU5ctzKgeOHOA8--tfkBOuzj7ftOlf2K-6kZ9MBASIy778_TWS8NWCZjDvqNc4",
      "dp": "e3RBCc71DRrLfEFv4MNYEBba4UcMfaCbQ3jqh8lsSBCNHqhPTdKiENUsRfepD9yKpclZnERTHFZ2DRiilYFlxWcU0zEt0TSVciJunaOtrj67bPSuwrILVWURcoK0TVm7CrFH62ksrtuExIRKtt0-rW08tHmzSzRfkuJqr2i2hoU",
      "dq": "DkBmZysy1btuoBvHeQKclDzFm5ZwHeNe1Ubu7v6FJvzVlV_xO8ybunMq-6S1Q83AbIyZF1g4fw7_HKSF_lMribXT4ZAxP4Hthfr1RujWHqRdBAnN-iw4mVBKCs371qxsq0_4SiYwhZmUKeCcFCJopgFHz-5tiQdgYVQODI1-ikU",
      "n": "mAJ6Tmo1PUp_sv6hIwWzq6KVNx8iObQyxJNCS-94EI9nYP8vmO5vZWI4ED0pgeTKTIli_2flLCXGUe_jf4fECsvxWEZpQrdEQDRdsWzfT-7xqxMqRjt9bhoU-VU6605wS1C2c14N-9gM-vazLLBAbhovZw8GSs_3_93X8Yf6G_V9gDxNyBGaiN0ytdTNLirZUNUKxGrveulWWP21t9h4eRvpmjyiql2aAAypusrBWe3jo4PwuyTYLadbsZ1AaaH5rsSjXcP0gLPfFM-K3skvHgldlLL1QY9ohtwDGf2gHSTc21xyMJ9JBvWz09Yzx4IMUpFijF64LrLYwxULryz1Uw"
    },
    {
      "kty": "EC",
      "d": "t6opW8k7RnmSl5JaXJijcGkgRLbQy5ungkzaItXisOg",
      "use": "sig",
      "crv": "P-256",
      "kid": "44b6253b-baa8-4a08-8a49-4276f02004bb",
      "x": "8mueADAzxgTWmPfPDj7yXmWOBGrYCzr80tSbIHftsQI",
      "y": "y28e02fukZ5m06az3TcI6_8qUDy71q0s7O3BTtf3toY"
    },
    {
      "kty": "EC",
      "d": "7vUQPfpjRwKiIab-ZFjDLk-8wGLwtTfRD6HTrgywxyA",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "394a0326-d533-4029-8c2f-e8bb277f49a2",
      "x": "HhFwZPP4QWQU9Q4aK6GP7uCCVDacrKJcTqidJflS7pY",
      "y": "jALoEtUm80nvzKdvIYtJrgAiIZrUCbkLRMW-PhyyXzM"
    },
    {
      "kty": "OKP",
      "d": "bVsgdZPbaBEpNa1FtutAwl9CmsM3jakcW_n_9jajP70",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "6e67489a-8977-47dd-9959-341a8e2c2284",
      "x": "GbUz9Irk-r4P1G3qNE3LqdpiAUKA-zQKoqR5-1vQ5jo"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "z2sE8TML_Wl4MMx0MEdAOlchWPsvXVrmWB3UVomvtaN0Y43YywOWeTJ5veXYtAaRxp85hkFJWvlpyKUsEthisiwC5tzj-rHGo--BTkw68oagIT9PLACnA6cNvD4ie6K1LR849CDAGuwe-TDUZfTvD5QjxDvoGGtTaBwu-UuHi_E",
      "kty": "RSA",
      "q": "qe7nuM9zlg4wruDc9INdRYg8KFgwHaDQ04fYwYbmzlkheUETBZOeivixP78FbkTV_6yRCGElHAG4rv-v1vLM1f19R8rnAwsSEymNseAT8iHhIZmb_gSWmVtB5mu3aUep_oxzRLFrB5df_KXMX-h4sDjxwhXAAhPiOVl7idL0JUs",
      "d": "Fn50z_j4A7d-BDLAa0ozbSldoqTQUfdIvEQF_Uu3DrWzu3rlIUEms4NTacjeQpBpCxp_LgMhZfegSGmVWLhFnFYiFP1hJ9X5tMZLmeRgALPWSCfu1MmKi8He9zmZnvwLhV3VfO1CGK7jQZzZJe-oxGuyU-dN3Rsyov3LxvlcsIT9TlflkgP-ezeVQuO-vLEHl4LKD9kPK_XSK-dKDs9CqDDvzmw8oF0B7MSb1K8ZdkcSndfTcBGDqUztWtsMbg7_Paeddovp7C_bdcwij6QaPMjjUilIsaZVWovdCjatxTrJMboAlby-odagkReKdzf2yyA3pH7IJO8Lqq-9nZ6IIQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "9c143895-d77f-4749-ac92-3ccddec3186d",
      "qi": "ROMOprxbWDY7Ycn_Ax5AP7Ay87vDNx-hw6D6-b3mhuf-9GKT2UZ9_PwxUixeaMp2h3g1KsOugJb3eQYeAi3Ox4SWC1J_APabuAzdGR_LeItL8J5GvMPDIhiTePa_hm1YMHnbOiHS5hBILdfLA-i_AiufA3z_hx24KJu2ikWGSlk",
      "dp": "h8IlPvXJYDj7GP2JAtxv1n-W7RWjH7hSUdRcWbPO1NVCZbK-9cnIYFVAR6G8H8C5A0bOMOhkae4bZd9uJHuKxdF2qMJlWX2oZT5q5OOSJZEmF_zHBib7KbHalJ4alc-eRAVOksMo2bY4Y6OpMX6KRikQ6-zF8c21jsv7luHvuxE",
      "alg": "RSA-OAEP",
      "dq": "L58x9Qq9-6lSX0_I3AUMWHYLVcsRANyWaRFC30ks2VsFFHP2HrP11EBJe_HOVc6YoiP8KPsAaU7aMMCayIQWf0mgmEP2ZVXu5MvaV6TSMiLocoAXxSIICkYWu7ooFirtKta1XuTRd7kmPyk_kwkU-V2b8qYhvvNPjH7VLhSeMu0",
      "n": "ia83gSFmwYMvgD7ZYxJ_zjD8Y88zHQpq3XgCIrWsbBbqfFhJ7pm81HYWdCjWsc7I4HPG6oM_44Y15KTsL6qmkZpxKsLqGp1QbQccMaLABRCkBQaxwtkhh0Q7OfJLzrDAdUj39e2Q9mNRqcjVuQIAVi5nCnCPkCDkuUMJdnOSKBIQKDKGnxiDgDiItImuVHLNwkzgt12jzCKflASaKMSl-RW7INYhRqWdCotJ_o0JPw6QvI84Y9vke4TxVq8va8XPkl1faTTl4NlgUlw2nCATR3uY2e_xTipj3Lr6xazZIDq-FM7Tmv43sAWUvB1nLVhmSSa1y-qioZ60LKfpy6PUmw"
    },
    {
      "kty": "EC",
      "d": "MvZFb6v1v6nyTRyft3j5IQCeciI-UFoOr0S5xHssQ_U",
      "use": "enc",
      "crv": "P-256",
      "kid": "ab0b3262-883a-4146-860e-2040fba180d1",
      "x": "Iu6WBLNV4OYsI50UySgehvguK4P9GTUqLN87Nj96JC0",
      "y": "NOPaSrYDRtAtMWvD9JMOpYSoSO4UuuPwiT2l7kHPPBs",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "4267f10f-61fa-4d87-a0c0-509fe752a3cd",
      "n": "mAJ6Tmo1PUp_sv6hIwWzq6KVNx8iObQyxJNCS-94EI9nYP8vmO5vZWI4ED0pgeTKTIli_2flLCXGUe_jf4fECsvxWEZpQrdEQDRdsWzfT-7xqxMqRjt9bhoU-VU6605wS1C2c14N-9gM-vazLLBAbhovZw8GSs_3_93X8Yf6G_V9gDxNyBGaiN0ytdTNLirZUNUKxGrveulWWP21t9h4eRvpmjyiql2aAAypusrBWe3jo4PwuyTYLadbsZ1AaaH5rsSjXcP0gLPfFM-K3skvHgldlLL1QY9ohtwDGf2gHSTc21xyMJ9JBvWz09Yzx4IMUpFijF64LrLYwxULryz1Uw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "11850c16-8a7c-405c-b187-76e94bcc4499",
      "n": "jdamgLkm07_kP_LrvaSwnMStL5bYchr_ZWS0W8rcL5XNgmA3xkUrlDZF3b1e6fQUDDPyb1SUueUccqir78IV5y21_Ycagem1aBPCBCEi-OtH8_Ld6Q_YlUYSMcG626Ut-2-pQ2JSCVsLELuh4TKJdDOiBQNIC_RgAv-YjtCKCOMBspkYJerXbx2CFumL0lnljJ1Dfv2-GrX9NRkCVzEaR-Nh2qs4Ra-XnCLupN2q2r7qZ_QnZHTxBCzUBx5QWSC0oUCCI_M-1X5wBPqI6I5XtHGXw6HObdosuVXcTh2eiIsVoK2m0UpDh1wVFQV3NjjwnMOaKt36o1QEL139SB7ERw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "44b6253b-baa8-4a08-8a49-4276f02004bb",
      "x": "8mueADAzxgTWmPfPDj7yXmWOBGrYCzr80tSbIHftsQI",
      "y": "y28e02fukZ5m06az3TcI6_8qUDy71q0s7O3BTtf3toY"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "4946139b-1bca-493a-aaf2-ba557fa593e0",
      "x": "JsL8Dq3GcG8QtYuYoYeki2SWqkYgA_0hm1Un5e-3tc8",
      "y": "dlQx54MusL1QDxuxo5BOuL8wMjrqcOvfI9muABNHcsE"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "394a0326-d533-4029-8c2f-e8bb277f49a2",
      "x": "HhFwZPP4QWQU9Q4aK6GP7uCCVDacrKJcTqidJflS7pY",
      "y": "jALoEtUm80nvzKdvIYtJrgAiIZrUCbkLRMW-PhyyXzM"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "6e67489a-8977-47dd-9959-341a8e2c2284",
      "x": "GbUz9Irk-r4P1G3qNE3LqdpiAUKA-zQKoqR5-1vQ5jo"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "9c143895-d77f-4749-ac92-3ccddec3186d",
      "alg": "RSA-OAEP",
      "n": "ia83gSFmwYMvgD7ZYxJ_zjD8Y88zHQpq3XgCIrWsbBbqfFhJ7pm81HYWdCjWsc7I4HPG6oM_44Y15KTsL6qmkZpxKsLqGp1QbQccMaLABRCkBQaxwtkhh0Q7OfJLzrDAdUj39e2Q9mNRqcjVuQIAVi5nCnCPkCDkuUMJdnOSKBIQKDKGnxiDgDiItImuVHLNwkzgt12jzCKflASaKMSl-RW7INYhRqWdCotJ_o0JPw6QvI84Y9vke4TxVq8va8XPkl1faTTl4NlgUlw2nCATR3uY2e_xTipj3Lr6xazZIDq-FM7Tmv43sAWUvB1nLVhmSSa1y-qioZ60LKfpy6PUmw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "ab0b3262-883a-4146-860e-2040fba180d1",
      "x": "Iu6WBLNV4OYsI50UySgehvguK4P9GTUqLN87Nj96JC0",
      "y": "NOPaSrYDRtAtMWvD9JMOpYSoSO4UuuPwiT2l7kHPPBs",
      "alg": "ECDH-ES"
    }
  ]
}
Second Authorization Request
2021-07-29 06:22:39 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2021-07-29 06:22:39 SUCCESS
EnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "profile"
]
expected
openid
2021-07-29 06:22:39 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "93634749943374746@openid_certification",
  "redirect_uri": "http://localhost:4200/auth/callback",
  "response_type": "code",
  "scope": "openid profile",
  "state": "6766288b-28e6-4ff7-968e-5591d09fd21a"
}
2021-07-29 06:22:39 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid profile
2021-07-29 06:22:39 INFO
ExtractNonceFromAuthorizationRequest
Couldn't find 'nonce' in authorization endpoint parameters
2021-07-29 06:22:39 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2021-07-29 06:22:39 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
93634749943374746@openid_certification
2021-07-29 06:22:39 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
http://localhost:4200/auth/callback
expected
[
  "http://localhost:4200/auth/callback"
]
2021-07-29 06:22:39 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "profile"
]
expected
openid
2021-07-29 06:22:39 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2021-07-29 06:22:39 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
tMy3CtL60Q
2021-07-29 06:22:39 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
PqTfQngOoPVDi-2lz6LoNA
2021-07-29 06:22:39 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "http://localhost:4200/auth/callback",
  "state": "6766288b-28e6-4ff7-968e-5591d09fd21a"
}
2021-07-29 06:22:39 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "http://localhost:4200/auth/callback",
  "state": "6766288b-28e6-4ff7-968e-5591d09fd21a",
  "code": "tMy3CtL60Q"
}
2021-07-29 06:22:39
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
http://localhost:4200/auth/callback?state=6766288b-28e6-4ff7-968e-5591d09fd21a&code=tMy3CtL60Q
2021-07-29 06:22:39 OUTGOING
oidcc-client-test-signing-key-rotation
Response to HTTP request to test instance 5wvaexTEQIXxa2W
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [http://localhost:4200/auth/callback?state=6766288b-28e6-4ff7-968e-5591d09fd21a&code=tMy3CtL60Q]
outgoing_path
authorize
2021-07-29 06:22:40 INCOMING
oidcc-client-test-signing-key-rotation
Incoming HTTP request to test instance 5wvaexTEQIXxa2W
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Go-http-client/1.1",
  "authorization": "Basic OTM2MzQ3NDk5NDMzNzQ3NDYlNDBvcGVuaWRfY2VydGlmaWNhdGlvbjpteWNsUSU2MFJCX0Y1JTdDSEElM0ElNDA3JTIxcjdIJTI4RExsdEtBJTI5UH51JTIzJTI5QWclMjNMUThadyUyQ2ttJTJBJTNEJTQwSmhZYWNBNCU1RXFDJTVEQiU3QlpLJTdE",
  "content-type": "application/x-www-form-urlencoded",
  "accept-encoding": "gzip",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "106",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "code": "tMy3CtL60Q",
  "grant_type": "authorization_code",
  "redirect_uri": "http://localhost:4200/auth/callback"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
code=tMy3CtL60Q&grant_type=authorization_code&redirect_uri=http%3A%2F%2Flocalhost%3A4200%2Fauth%2Fcallback
Token endpoint
2021-07-29 06:22:40 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
93634749943374746@openid_certification
client_secret
myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*=@JhYacA4^qC]B{ZK}
method
client_secret_basic
2021-07-29 06:22:40 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2021-07-29 06:22:40 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
tMy3CtL60Q
2021-07-29 06:22:40 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
http://localhost:4200/auth/callback
2021-07-29 06:22:40 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
VKTn3Z1zNnUb6MZ2nWkA59o0dY5L8uqAKWdlquyG31Oy0qQNBG
2021-07-29 06:22:40 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
OxU3D9M4aIOwu2iCc0IpCw
2021-07-29 06:22:40 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/caos/
sub
user-subject-1234531
aud
93634749943374746@openid_certification
iat
1627539760
exp
1627540060
2021-07-29 06:22:40 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
OxU3D9M4aIOwu2iCc0IpCw
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/caos/",
  "sub": "user-subject-1234531",
  "aud": "93634749943374746@openid_certification",
  "iat": 1627539760,
  "exp": 1627540060,
  "at_hash": "OxU3D9M4aIOwu2iCc0IpCw"
}
2021-07-29 06:22:40 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiI0MjY3ZjEwZi02MWZhLTRkODctYTBjMC01MDlmZTc1MmEzY2QiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiT3hVM0Q5TTRhSU93dTJpQ2MwSXBDdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiOTM2MzQ3NDk5NDMzNzQ3NDZAb3BlbmlkX2NlcnRpZmljYXRpb24iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvY2Fvc1wvIiwiZXhwIjoxNjI3NTQwMDYwLCJpYXQiOjE2Mjc1Mzk3NjB9.LbFsVUen8vx7blF6aYkM4eGQAlDnU0lpliOblZZU0QsH4cJuFIVYOqkF8Ogtz91XQyPATDR21r_3QJ8mA51M0le2paYR9PdPNB8knNUbUuJBJzuiaAV5oB9qaCcDGGYaQBM0mwSoEW9Kup6tJdrGsSt5NnQXh5x7IBH96DsKmileYV0KpHIxGN-2FcQ21HyQTS8OdSuzjE_XAWP_8wR2OiF5lGJ8_zeZtiqyIM4Ct7OkJf6URKfp7UEzLsyq9dewUU9VSDoYEgRFZO1ax3O2Q5lbQu4pj7Hh_610jKRJmRdEpEG_VkBK3juTyWbbrEN79qBHPWeJluq_qhpKq030qA
key
{"p":"x5I0dkjznhKBZ8LMvuXefb30mL_mKjnvi28HkCFd43NeasnwxSDuDo6AjA6rQu0HIZmWCeafwDUOxFzsbpTBMZtFYVOuWs5w2-YQe0Z_h3HBXrAjNM0pUBcuDLfzBH1pC8Qg_ed2SqCNcniqxD6miGHQXGKU_gV8aWpxQeoM0FU","kty":"RSA","q":"wv2Tl1WC_TwypBjGpIHZPpo7qdmBCGq20L4Pfr3X4-Mrnz1jEpcdxZRVBTiXz2tvm8rbVXmGUkcXLPsd-W9fElnfQmHY3MoTcu6JjzzgAyAnyMg0X-Pt6SxTHIp0wiAIHAoGvYpZxpsVdKhZL3wj79sdCCLsn73NzLdji-TNNwc","d":"i8_LmpAJQ8Rfy8xzfPjjlnvFbpuOKTDaeP9QvPMWpXSgixBrQOgdQUyjcBwxLy21-8tpaKywlnhv_jD8N_IxmBSYeK7aZeiWN89yVZxjkOufD9Bi05In_bqzi9iehorwsfUcuuPJTNgcqD978SBzQlGHQ-0Hxoud-JKc6aQ9oLQxwIPL9_h9w4rSF3COz15VSUSWbynS5-dWnkZZM2wALGGrFz5SW6pmqN7h-HDVwC1M2jpDw0QNpQP5Q0XTDxnMgVzuElk7DvugW85ZrrpuBAwkeNR67qX8IqFPOAC1ucUaQ3k2lC2XjcUsTVUgYBIBfB4HqVx3zk7BNjsWLltYUQ","e":"AQAB","use":"sig","kid":"4267f10f-61fa-4d87-a0c0-509fe752a3cd","qi":"eUGA3FqOdmLIGldLPjg-eH6rjTbN6ScNWK6-YefeUCauUnOEfp6BsuccrPSlbG6sw_txtfw8RYsqGoB4qvjAXemgh5Nk8tY23ULfd_OW29DTdzU5ctzKgeOHOA8--tfkBOuzj7ftOlf2K-6kZ9MBASIy778_TWS8NWCZjDvqNc4","dp":"e3RBCc71DRrLfEFv4MNYEBba4UcMfaCbQ3jqh8lsSBCNHqhPTdKiENUsRfepD9yKpclZnERTHFZ2DRiilYFlxWcU0zEt0TSVciJunaOtrj67bPSuwrILVWURcoK0TVm7CrFH62ksrtuExIRKtt0-rW08tHmzSzRfkuJqr2i2hoU","dq":"DkBmZysy1btuoBvHeQKclDzFm5ZwHeNe1Ubu7v6FJvzVlV_xO8ybunMq-6S1Q83AbIyZF1g4fw7_HKSF_lMribXT4ZAxP4Hthfr1RujWHqRdBAnN-iw4mVBKCs371qxsq0_4SiYwhZmUKeCcFCJopgFHz-5tiQdgYVQODI1-ikU","n":"mAJ6Tmo1PUp_sv6hIwWzq6KVNx8iObQyxJNCS-94EI9nYP8vmO5vZWI4ED0pgeTKTIli_2flLCXGUe_jf4fECsvxWEZpQrdEQDRdsWzfT-7xqxMqRjt9bhoU-VU6605wS1C2c14N-9gM-vazLLBAbhovZw8GSs_3_93X8Yf6G_V9gDxNyBGaiN0ytdTNLirZUNUKxGrveulWWP21t9h4eRvpmjyiql2aAAypusrBWe3jo4PwuyTYLadbsZ1AaaH5rsSjXcP0gLPfFM-K3skvHgldlLL1QY9ohtwDGf2gHSTc21xyMJ9JBvWz09Yzx4IMUpFijF64LrLYwxULryz1Uw"}
algorithm
RS256
2021-07-29 06:22:40 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2021-07-29 06:22:40 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
VKTn3Z1zNnUb6MZ2nWkA59o0dY5L8uqAKWdlquyG31Oy0qQNBG
token_type
Bearer
id_token
eyJraWQiOiI0MjY3ZjEwZi02MWZhLTRkODctYTBjMC01MDlmZTc1MmEzY2QiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiT3hVM0Q5TTRhSU93dTJpQ2MwSXBDdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiOTM2MzQ3NDk5NDMzNzQ3NDZAb3BlbmlkX2NlcnRpZmljYXRpb24iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvY2Fvc1wvIiwiZXhwIjoxNjI3NTQwMDYwLCJpYXQiOjE2Mjc1Mzk3NjB9.LbFsVUen8vx7blF6aYkM4eGQAlDnU0lpliOblZZU0QsH4cJuFIVYOqkF8Ogtz91XQyPATDR21r_3QJ8mA51M0le2paYR9PdPNB8knNUbUuJBJzuiaAV5oB9qaCcDGGYaQBM0mwSoEW9Kup6tJdrGsSt5NnQXh5x7IBH96DsKmileYV0KpHIxGN-2FcQ21HyQTS8OdSuzjE_XAWP_8wR2OiF5lGJ8_zeZtiqyIM4Ct7OkJf6URKfp7UEzLsyq9dewUU9VSDoYEgRFZO1ax3O2Q5lbQu4pj7Hh_610jKRJmRdEpEG_VkBK3juTyWbbrEN79qBHPWeJluq_qhpKq030qA
scope
openid profile
2021-07-29 06:22:40 OUTGOING
oidcc-client-test-signing-key-rotation
Response to HTTP request to test instance 5wvaexTEQIXxa2W
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "VKTn3Z1zNnUb6MZ2nWkA59o0dY5L8uqAKWdlquyG31Oy0qQNBG",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiI0MjY3ZjEwZi02MWZhLTRkODctYTBjMC01MDlmZTc1MmEzY2QiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiT3hVM0Q5TTRhSU93dTJpQ2MwSXBDdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiOTM2MzQ3NDk5NDMzNzQ3NDZAb3BlbmlkX2NlcnRpZmljYXRpb24iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvY2Fvc1wvIiwiZXhwIjoxNjI3NTQwMDYwLCJpYXQiOjE2Mjc1Mzk3NjB9.LbFsVUen8vx7blF6aYkM4eGQAlDnU0lpliOblZZU0QsH4cJuFIVYOqkF8Ogtz91XQyPATDR21r_3QJ8mA51M0le2paYR9PdPNB8knNUbUuJBJzuiaAV5oB9qaCcDGGYaQBM0mwSoEW9Kup6tJdrGsSt5NnQXh5x7IBH96DsKmileYV0KpHIxGN-2FcQ21HyQTS8OdSuzjE_XAWP_8wR2OiF5lGJ8_zeZtiqyIM4Ct7OkJf6URKfp7UEzLsyq9dewUU9VSDoYEgRFZO1ax3O2Q5lbQu4pj7Hh_610jKRJmRdEpEG_VkBK3juTyWbbrEN79qBHPWeJluq_qhpKq030qA",
  "scope": "openid profile"
}
outgoing_path
token
2021-07-29 06:22:40 INCOMING
oidcc-client-test-signing-key-rotation
Incoming HTTP request to test instance 5wvaexTEQIXxa2W
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Go-http-client/1.1",
  "accept-encoding": "gzip",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2021-07-29 06:22:40 OUTGOING
oidcc-client-test-signing-key-rotation
Response to HTTP request to test instance 5wvaexTEQIXxa2W
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "4267f10f-61fa-4d87-a0c0-509fe752a3cd",
      "n": "mAJ6Tmo1PUp_sv6hIwWzq6KVNx8iObQyxJNCS-94EI9nYP8vmO5vZWI4ED0pgeTKTIli_2flLCXGUe_jf4fECsvxWEZpQrdEQDRdsWzfT-7xqxMqRjt9bhoU-VU6605wS1C2c14N-9gM-vazLLBAbhovZw8GSs_3_93X8Yf6G_V9gDxNyBGaiN0ytdTNLirZUNUKxGrveulWWP21t9h4eRvpmjyiql2aAAypusrBWe3jo4PwuyTYLadbsZ1AaaH5rsSjXcP0gLPfFM-K3skvHgldlLL1QY9ohtwDGf2gHSTc21xyMJ9JBvWz09Yzx4IMUpFijF64LrLYwxULryz1Uw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "11850c16-8a7c-405c-b187-76e94bcc4499",
      "n": "jdamgLkm07_kP_LrvaSwnMStL5bYchr_ZWS0W8rcL5XNgmA3xkUrlDZF3b1e6fQUDDPyb1SUueUccqir78IV5y21_Ycagem1aBPCBCEi-OtH8_Ld6Q_YlUYSMcG626Ut-2-pQ2JSCVsLELuh4TKJdDOiBQNIC_RgAv-YjtCKCOMBspkYJerXbx2CFumL0lnljJ1Dfv2-GrX9NRkCVzEaR-Nh2qs4Ra-XnCLupN2q2r7qZ_QnZHTxBCzUBx5QWSC0oUCCI_M-1X5wBPqI6I5XtHGXw6HObdosuVXcTh2eiIsVoK2m0UpDh1wVFQV3NjjwnMOaKt36o1QEL139SB7ERw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "44b6253b-baa8-4a08-8a49-4276f02004bb",
      "x": "8mueADAzxgTWmPfPDj7yXmWOBGrYCzr80tSbIHftsQI",
      "y": "y28e02fukZ5m06az3TcI6_8qUDy71q0s7O3BTtf3toY"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "4946139b-1bca-493a-aaf2-ba557fa593e0",
      "x": "JsL8Dq3GcG8QtYuYoYeki2SWqkYgA_0hm1Un5e-3tc8",
      "y": "dlQx54MusL1QDxuxo5BOuL8wMjrqcOvfI9muABNHcsE"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "394a0326-d533-4029-8c2f-e8bb277f49a2",
      "x": "HhFwZPP4QWQU9Q4aK6GP7uCCVDacrKJcTqidJflS7pY",
      "y": "jALoEtUm80nvzKdvIYtJrgAiIZrUCbkLRMW-PhyyXzM"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "6e67489a-8977-47dd-9959-341a8e2c2284",
      "x": "GbUz9Irk-r4P1G3qNE3LqdpiAUKA-zQKoqR5-1vQ5jo"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "9c143895-d77f-4749-ac92-3ccddec3186d",
      "alg": "RSA-OAEP",
      "n": "ia83gSFmwYMvgD7ZYxJ_zjD8Y88zHQpq3XgCIrWsbBbqfFhJ7pm81HYWdCjWsc7I4HPG6oM_44Y15KTsL6qmkZpxKsLqGp1QbQccMaLABRCkBQaxwtkhh0Q7OfJLzrDAdUj39e2Q9mNRqcjVuQIAVi5nCnCPkCDkuUMJdnOSKBIQKDKGnxiDgDiItImuVHLNwkzgt12jzCKflASaKMSl-RW7INYhRqWdCotJ_o0JPw6QvI84Y9vke4TxVq8va8XPkl1faTTl4NlgUlw2nCATR3uY2e_xTipj3Lr6xazZIDq-FM7Tmv43sAWUvB1nLVhmSSa1y-qioZ60LKfpy6PUmw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "ab0b3262-883a-4146-860e-2040fba180d1",
      "x": "Iu6WBLNV4OYsI50UySgehvguK4P9GTUqLN87Nj96JC0",
      "y": "NOPaSrYDRtAtMWvD9JMOpYSoSO4UuuPwiT2l7kHPPBs",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2021-07-29 06:22:40 INCOMING
oidcc-client-test-signing-key-rotation
Incoming HTTP request to test instance 5wvaexTEQIXxa2W
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Go-http-client/1.1",
  "authorization": "Bearer VKTn3Z1zNnUb6MZ2nWkA59o0dY5L8uqAKWdlquyG31Oy0qQNBG",
  "accept-encoding": "gzip",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
userinfo
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Userinfo endpoint
2021-07-29 06:22:40 SUCCESS
OIDCCExtractBearerAccessTokenFromRequest
Found access token on incoming request
access_token
VKTn3Z1zNnUb6MZ2nWkA59o0dY5L8uqAKWdlquyG31Oy0qQNBG
2021-07-29 06:22:40 SUCCESS
RequireBearerAccessToken
Found access token in request
actual
VKTn3Z1zNnUb6MZ2nWkA59o0dY5L8uqAKWdlquyG31Oy0qQNBG
2021-07-29 06:22:40 SUCCESS
FilterUserInfoForScopes
User info endpoint output
sub
user-subject-1234531
website
https://openid.net/
zoneinfo
America/Los_Angeles
birthdate
2000-02-03
gender
female
preferred_username
d.tu
given_name
Demo
middle_name
Theresa
locale
en-US
updated_at
1580000000
name
Demo T. User
nickname
Dee
family_name
User
2021-07-29 06:22:40
ClearAccessTokenFromRequest
Condition ran but did not log anything
2021-07-29 06:22:40 INFO
AddIssAndAudToUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-07-29 06:22:40 INFO
SignUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-07-29 06:22:40 INFO
EncryptUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_encrypted_response_alg
path
userinfo_encrypted_response_alg
mapped
object
client
2021-07-29 06:22:40 OUTGOING
oidcc-client-test-signing-key-rotation
Response to HTTP request to test instance 5wvaexTEQIXxa2W
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "sub": "user-subject-1234531",
  "website": "https://openid.net/",
  "zoneinfo": "America/Los_Angeles",
  "birthdate": "2000-02-03",
  "gender": "female",
  "preferred_username": "d.tu",
  "given_name": "Demo",
  "middle_name": "Theresa",
  "locale": "en-US",
  "updated_at": 1580000000,
  "name": "Demo T. User",
  "nickname": "Dee",
  "family_name": "User"
}
outgoing_path
userinfo
2021-07-29 06:22:40 FINISHED
oidcc-client-test-signing-key-rotation
Test has run to completion
testmodule_result
PASSED
2021-07-29 06:25:40
TEST-RUNNER
Alias has now been claimed by another test
alias
caos
new_test_id
GyLzZUYmNxqoosY
Test Results