Test Summary

Test Results

Expand All Collapse All
All times are UTC
2021-07-29 06:16:00 INFO
TEST-RUNNER
Test instance 7AfRzojQTkw1dRH created
baseUrl
https://www.certification.openid.net/test/a/caos
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "client_registration": "static_client",
  "response_mode": "default"
}
alias
caos
description
RP Certification Config "Basic Auth"
planId
AYSdLbzmWbu9X
config
{
  "alias": "caos",
  "description": "RP Certification Config \"Basic Auth\"",
  "publish": "summary",
  "client": {
    "client_id": "93634749943374746@openid_certification",
    "client_secret": "myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*\u003d@JhYacA4^qC]B{ZK}",
    "redirect_uri": "http://localhost:4200/auth/callback"
  }
}
testName
oidcc-client-test-discovery-openid-config
2021-07-29 06:16:00 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/caos/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/caos/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/caos/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/caos/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/caos/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/caos/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-07-29 06:16:00
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/caos/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/caos/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/caos/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/caos/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/caos/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/caos/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-07-29 06:16:01
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "6Dr2geof6EK0HW_WUpeK_gZZ8ima9t_LOi-aAsNv-X1nO4xS7rrErxBKwI83ucBlzYwLKRaCZJ79hdV-lHOSK9yyScDC16GwpoBnGVf6uOiOdWBUwEbUxdAObBF4KT1sVJFN-NXF97mlM3hpMSXSFpxsp8wJtd_aoOfDcZYPrrc",
      "kty": "RSA",
      "q": "4BWd_BEwKfUInUoscUPjunVtfqpfn_l_qEli_XebeZ4zEvFbAD1KK_imURmK_GYMm9naaPYUxEnreZfpmtWru-_MLNxi6w72r34xcWZ-AszaUchZkOLB9nDZI5v1wGlK5gz6Md51yhEdjcVMk0DzJ_H8n6d47rb-LmEDPbj15Vk",
      "d": "Ix--eaf__mrywuFHzUGqt1hec_Ea29P9vyYMGDNuBSWV7DNDltuasKiQjkT43FK_oPGZTvRz9-s1QoYMOCubJYwGwLFUkMCxnzmkHpumrphx8kIFj6_eiQcJG7-FKNnLQZ1MyGc1vaavAOihE9P8mAvuff4Tdw6-NlnHS78M_XhPnn7dEIYmzzfjv8Vs1BW5rZ0lyy3iOyumSojYMTfm8FBoByQLXWZPaEyuYMG8mggX9Rq6uoynkWemhB1brlgGQiiQmLR-3WxgWYEEfVPTbAYx8irB4FXQDIU0pzNNcfZrQ0XhjnMd6wJjZP7agjyZ--TJN8aMh6SJvIHv33NxwQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "f9ca7eea-31ac-42e7-a4e8-e1059a81ed5c",
      "qi": "sJmF0f2o4NTgMvnDguQSTh9ulKdtQBiks7eJYporx1vg46BM195RShbdSHP0wW9Vhjz8pm3Pj_-v19y5dUugYj3AairkOCX3ZvJ73V79ArvPNJRl4wBU4b-JfH6AIPabEmXpUfA9gfDj5fZjFPv6QRqJWhmma4YcsLCBr3fwlas",
      "dp": "g_E0Kx3NIRX85ZisCWLmamtLYUX4MHl4Ksfu1dEaZoK0S2XvnIlqxBgakIsOWzAP5xfBI4gRb3_RhN-GumtrShZrCXJGgWLxTbg4W3LcFYCzp8aigFf9_aG2__lw7uViDi48QbubbaMBVFv-UBkv4v7e0PshLT9RJQhox7k9kcM",
      "dq": "Jn8wPAzL5HlnOHZ0uiS6q97ep8MnWHlpmAS7j-YLfNJT3e4-_wSIiJNYJ1inCwORKPk9T4jvOmWkoagahvIsZcYlopNeHxncAXxBjETaYyrEWwZ7dKuwPOFYPIjfqGWua2VRWl3oiIV2OVPq-uVOoM8u4lLIMOKZOmiKQQFUpUk",
      "n": "y0cz2LhUD80GjVbHz7619nwEQdI3c_4L05hxiYeCrj6lKSvaP9LSP-pTKrdd-723MvA54tTupXaq20VUVBfypI8nQwIy3gcbZc36lHoEB5N_1cUJiJPmKHThaHU25dfDIQTBpMIyNOjdibZv3nm5jsv4oOIZ-nGD3i4QlSr4PCuszEAdB5fa_18dGp0jYfSu-UQJS8mzLSlHWTqNnYW2B2wyRHDFUIit-HxjQdtWp1Ja3cYZFhJHhVT3X7_lCdh1o2nRV1y7DA8BfMXkI6rBrGcx3xbC_XQFGa_5k784tqC9gUfS6BBFDN7AUqZK-2m8n5CMuzbH_vP4Fzbp7-Bwnw"
    },
    {
      "kty": "EC",
      "d": "_0tcWM9bHNI2X6CZRb1JIL1AElOKEfrkNwhb_jB2GtA",
      "use": "sig",
      "crv": "P-256",
      "kid": "84fb3d68-41eb-4fa2-9ede-694f6994b5ec",
      "x": "hcXWUn1Uk9hNNpe-VLZorngHtE3sHRYbcOSB49rB-3c",
      "y": "boK8cLqRAuKHt-rOZpku7xqB09wuGONRSUHVbMn3oeo"
    },
    {
      "kty": "EC",
      "d": "JKI7IttBhT0Jh3utN0bwSAK9pJzhFZfFlytpVHRP69c",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "f2bd4ecb-8b0a-4bed-8e3a-e499fcb11ddb",
      "x": "D8JR15grgL28QYQUdBvfd2-XxepylHu4JFJ8V3cqZSY",
      "y": "eXxjL4qvgQT7X0K167qctRdkbO4hTGNdYbSnEOgnEFg"
    },
    {
      "kty": "OKP",
      "d": "zOOpEoTcD3DU89gccAHTPGm1XFqHhL4kAFCLek7bxMU",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "444ccc69-5751-489b-be7d-9d938f11475f",
      "x": "hDk-3dpIZcSly2UYp6TjvhVNWVD3G1lU7YMTnmhFsso"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "3MhPqXxCJdgcNrDq4QjRtWMi4RkICPIBZ87mYBBGSa3TMXm6N0X7f6CWKEh74MQ8-NUYWl7v-nILQSfyPZE6xVKp2FdUYycvzY6IXJRcYIN-xQba-6ECADxfZgE0miCmQf9JaVBjskkqjIlbvVbqI9TbzqiGsrNvbX2THz3byds",
      "kty": "RSA",
      "q": "1utJmzakZhlglROwSnfAdelX9_ZUuoFSp-BkBDKzw1ZGOicFolILQvJrFhE6j6yS34oFzbk9ucJTrJgiqoSBKw0QMZGtKxyOOZ7tmPpsAhxDl1_NJFylTLw3oBKYRgqk5Q1BQb0kU9n7xOjaUP4Yo7O_KcEyQrBmJersvrHBeRM",
      "d": "Wm9k99Wag3EuFLqQjfg9HljtcxKwN0hNY664Surj_wrJN5fbfK9xFep7qBWDb1sXxa-c_rcRQpo8VtRYp3XXpH2tWzfx613aCzdMzPBEQ7v1qZqiIUlaQuS99QUeXkKvsm7pE96wCIPJJ3vjfQw-qAa6iCdMxgoMsHecGZytqXFzE9m16LgT0ytulrMCgC0vrkQDWT_iIJkAbelBfjG2lUlWcZ5HNdDpV4aTlwBpVrEdh70TzQt-XeDKbI7OC9-vS2dFMq6NDaDyb5tolXAhLRp8ZL_o5bNApRQ-yOoNmkdjWMe7sCQSyAdKWcw-RJPVAmBRFTvXDfeExhmcucF0IQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "f53a0fc2-d520-4e44-9a88-0901a50372ff",
      "qi": "Bv4yeIrvx-wOAw_X7t1kMm0Mhs7YBv32bmua3h4xpGrmX1Jte8_oociWz-Dizi8ElpObqaepoM33deJCRgso3qMRLl-an5f7mxjyBo_ar1caLNy1fAbqps60ZtPSUdRMH74f9q-ZvTZ_QFtpSGoKiAm0kqrZN8zZWUCLztnt130",
      "dp": "pu6NzQg2u4Z7Tp7V-PBCH3Olm6zhdmIEzgiSB3BGtM7JME9pjQFM92LkJfEoOPonX70_fJTrveEcwVcCwapdVXT7FqhxFcc7TaDHWbiTYCYMY8ybJkbGzIbZWrbuntqw2pW7W_V8bAEGOtxgkPh2cEExMUAbGGKzjYW1B5ot5KE",
      "alg": "RSA-OAEP",
      "dq": "q_7giTbRmmP0x1laXD456CM2I1sfs6KLY45QfIuXEVyaFy_jcmP2Xz1iNebT1udlI0ByJJF6tI6wKBAYrh4cwTdTHlhXHYlcyQBHZYYDqiy0axBgPBlosGBwo8o90s_x5t0UvGeCCxkIRC2VifvP_DJ9ag0TDAvfs7iufm4DR8E",
      "n": "uVpd88mT9Zb5MbTZk1EcCq4tUGGisqJVys8ZYEoor5wmtD1h9z-1v0aoVrr8AQNS0gIy-AbJ9PKbATjvP_jRxqfSFbDQT4u7acEKeUiTeHnlBCpdmwYtUOJ7DOX1prm5E2U5WGJotk-wahqaji87qbTT_XPm__2WiHTsmm0RZ_MSNv_jLFHMqGcZBuidFbyA9Wd0SmBgkG5kqvLlssQpIAYLMfvvBMfsFLOUBv6fw9Z51-7q4asCWqowBNCm-DCYhlYQhdNf_cksRA1vMRYQfgkElcQ5JH_2QK7ha0vvYhg3IFtvvk1QuNi2AqDTGB40ZqNz0F3qpPWvkf1cEtN-QQ"
    },
    {
      "kty": "EC",
      "d": "HpvyZfv2rKoSCVmvLoodubM6wRq-nA5QMJ5wrwjwB4g",
      "use": "enc",
      "crv": "P-256",
      "kid": "6b7417bf-c0bb-4460-b572-062bbcc23796",
      "x": "mvwdcdvwgvqdEcI0CDKLwZZXeDZasr6oqlsIhgjTRp0",
      "y": "vjULttLdKK3DXyBrBD83BIO8i5QyOFaO0A7oFfGiAhg",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "f9ca7eea-31ac-42e7-a4e8-e1059a81ed5c",
      "n": "y0cz2LhUD80GjVbHz7619nwEQdI3c_4L05hxiYeCrj6lKSvaP9LSP-pTKrdd-723MvA54tTupXaq20VUVBfypI8nQwIy3gcbZc36lHoEB5N_1cUJiJPmKHThaHU25dfDIQTBpMIyNOjdibZv3nm5jsv4oOIZ-nGD3i4QlSr4PCuszEAdB5fa_18dGp0jYfSu-UQJS8mzLSlHWTqNnYW2B2wyRHDFUIit-HxjQdtWp1Ja3cYZFhJHhVT3X7_lCdh1o2nRV1y7DA8BfMXkI6rBrGcx3xbC_XQFGa_5k784tqC9gUfS6BBFDN7AUqZK-2m8n5CMuzbH_vP4Fzbp7-Bwnw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "72d68310-3a17-4ea5-a3dd-73ddd758568b",
      "n": "tQRIKBAJQLgjo7yGiCRQjVxyFeTMhEw6BGCJUQgBYaGSRGC8iSV2STJgWQlg1F65ywGU8yfHxDgnFZoxjqwcBp2mJu6eLUchhmeao3NEKl4QYKH2mJMu6llVah1Qcm1GgF8xyCZFmdk_BGPMm88dBGVcOS0nBxI1FHXTNpYbyU07jmhBRqB2wnafhyKfeNPjnv3BlWoxrcdDuVAg1pUxO4vlSMdPhKh99TSmNtgHRJfkEQ3oj_URopPRcerXWULFA3XFxKMkX85l4eyZchNnj_YFe4pHsU6XFDgkDqAkhv8BHWoPqyT43ZFKxPW-r4mYxyb7RcD4JXbP3RL3WJ6M-w"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "84fb3d68-41eb-4fa2-9ede-694f6994b5ec",
      "x": "hcXWUn1Uk9hNNpe-VLZorngHtE3sHRYbcOSB49rB-3c",
      "y": "boK8cLqRAuKHt-rOZpku7xqB09wuGONRSUHVbMn3oeo"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "0f65fc74-792b-4461-9be4-62238894730d",
      "x": "sPe5rvT9ROb2313cnnKSOS8jUOH_BJM2Palo8LOWiGw",
      "y": "1CySbXSNZwd-r4sAQ0C3yqAiBXOX-OYnn8I21Ql7-1g"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "f2bd4ecb-8b0a-4bed-8e3a-e499fcb11ddb",
      "x": "D8JR15grgL28QYQUdBvfd2-XxepylHu4JFJ8V3cqZSY",
      "y": "eXxjL4qvgQT7X0K167qctRdkbO4hTGNdYbSnEOgnEFg"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "444ccc69-5751-489b-be7d-9d938f11475f",
      "x": "hDk-3dpIZcSly2UYp6TjvhVNWVD3G1lU7YMTnmhFsso"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "f53a0fc2-d520-4e44-9a88-0901a50372ff",
      "alg": "RSA-OAEP",
      "n": "uVpd88mT9Zb5MbTZk1EcCq4tUGGisqJVys8ZYEoor5wmtD1h9z-1v0aoVrr8AQNS0gIy-AbJ9PKbATjvP_jRxqfSFbDQT4u7acEKeUiTeHnlBCpdmwYtUOJ7DOX1prm5E2U5WGJotk-wahqaji87qbTT_XPm__2WiHTsmm0RZ_MSNv_jLFHMqGcZBuidFbyA9Wd0SmBgkG5kqvLlssQpIAYLMfvvBMfsFLOUBv6fw9Z51-7q4asCWqowBNCm-DCYhlYQhdNf_cksRA1vMRYQfgkElcQ5JH_2QK7ha0vvYhg3IFtvvk1QuNi2AqDTGB40ZqNz0F3qpPWvkf1cEtN-QQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "6b7417bf-c0bb-4460-b572-062bbcc23796",
      "x": "mvwdcdvwgvqdEcI0CDKLwZZXeDZasr6oqlsIhgjTRp0",
      "y": "vjULttLdKK3DXyBrBD83BIO8i5QyOFaO0A7oFfGiAhg",
      "alg": "ECDH-ES"
    }
  ]
}
2021-07-29 06:16:01 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2021-07-29 06:16:01 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2021-07-29 06:16:01 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": 1580000000
}
2021-07-29 06:16:01 SUCCESS
OIDCCGetStaticClientConfigurationForRPTests
Found a static client object
client_id
93634749943374746@openid_certification
client_secret
myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*=@JhYacA4^qC]B{ZK}
redirect_uris
[
  "http://localhost:4200/auth/callback"
]
2021-07-29 06:16:01 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "client_id": "93634749943374746@openid_certification",
  "client_secret": "myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*\u003d@JhYacA4^qC]B{ZK}",
  "redirect_uris": [
    "http://localhost:4200/auth/callback"
  ]
}
2021-07-29 06:16:01 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2021-07-29 06:16:01 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2021-07-29 06:16:01 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "http://localhost:4200/auth/callback"
]
2021-07-29 06:16:01 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2021-07-29 06:16:01 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2021-07-29 06:16:01 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2021-07-29 06:16:01 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2021-07-29 06:16:01 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2021-07-29 06:16:01 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2021-07-29 06:16:01 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2021-07-29 06:16:01 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-07-29 06:16:01 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2021-07-29 06:16:01 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2021-07-29 06:16:01 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2021-07-29 06:16:01 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2021-07-29 06:16:01 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2021-07-29 06:16:01 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2021-07-29 06:16:01 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2021-07-29 06:16:01 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2021-07-29 06:16:01 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2021-07-29 06:16:01 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2021-07-29 06:16:01
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2021-07-29 06:16:01
oidcc-client-test-discovery-openid-config
Setup Done
2021-07-29 06:16:24 INCOMING
oidcc-client-test-discovery-openid-config
Incoming HTTP request to test instance 7AfRzojQTkw1dRH
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,*/*;q\u003d0.8",
  "upgrade-insecure-requests": "1",
  "cookie": "JSESSIONID\u003d0340D2A012AC78B6C2939CF389A64905",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.1 Safari/605.1.15",
  "accept-language": "en-gb",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "93634749943374746@openid_certification",
  "redirect_uri": "http://localhost:4200/auth/callback",
  "response_type": "code",
  "scope": "openid profile",
  "state": "716b7fd4-e3a9-4ede-8e6a-79ce6d56b896"
}
incoming_body
Authorization endpoint
2021-07-29 06:16:24 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2021-07-29 06:16:24 SUCCESS
EnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "profile"
]
expected
openid
2021-07-29 06:16:24 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "93634749943374746@openid_certification",
  "redirect_uri": "http://localhost:4200/auth/callback",
  "response_type": "code",
  "scope": "openid profile",
  "state": "716b7fd4-e3a9-4ede-8e6a-79ce6d56b896"
}
2021-07-29 06:16:24 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid profile
2021-07-29 06:16:24 INFO
ExtractNonceFromAuthorizationRequest
Couldn't find 'nonce' in authorization endpoint parameters
2021-07-29 06:16:24 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2021-07-29 06:16:24 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
93634749943374746@openid_certification
2021-07-29 06:16:24 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
http://localhost:4200/auth/callback
expected
[
  "http://localhost:4200/auth/callback"
]
2021-07-29 06:16:24 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "profile"
]
expected
openid
2021-07-29 06:16:24 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2021-07-29 06:16:24 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
cFyox816BV
2021-07-29 06:16:24 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
qJ6d4TAiacA0Ruen-3rpng
2021-07-29 06:16:24 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "http://localhost:4200/auth/callback",
  "state": "716b7fd4-e3a9-4ede-8e6a-79ce6d56b896"
}
2021-07-29 06:16:24 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "http://localhost:4200/auth/callback",
  "state": "716b7fd4-e3a9-4ede-8e6a-79ce6d56b896",
  "code": "cFyox816BV"
}
2021-07-29 06:16:24
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
http://localhost:4200/auth/callback?state=716b7fd4-e3a9-4ede-8e6a-79ce6d56b896&code=cFyox816BV
2021-07-29 06:16:24 OUTGOING
oidcc-client-test-discovery-openid-config
Response to HTTP request to test instance 7AfRzojQTkw1dRH
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [http://localhost:4200/auth/callback?state=716b7fd4-e3a9-4ede-8e6a-79ce6d56b896&code=cFyox816BV]
outgoing_path
authorize
2021-07-29 06:16:25 INCOMING
oidcc-client-test-discovery-openid-config
Incoming HTTP request to test instance 7AfRzojQTkw1dRH
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Go-http-client/1.1",
  "authorization": "Basic OTM2MzQ3NDk5NDMzNzQ3NDYlNDBvcGVuaWRfY2VydGlmaWNhdGlvbjpteWNsUSU2MFJCX0Y1JTdDSEElM0ElNDA3JTIxcjdIJTI4RExsdEtBJTI5UH51JTIzJTI5QWclMjNMUThadyUyQ2ttJTJBJTNEJTQwSmhZYWNBNCU1RXFDJTVEQiU3QlpLJTdE",
  "content-type": "application/x-www-form-urlencoded",
  "accept-encoding": "gzip",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "106",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "code": "cFyox816BV",
  "grant_type": "authorization_code",
  "redirect_uri": "http://localhost:4200/auth/callback"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
code=cFyox816BV&grant_type=authorization_code&redirect_uri=http%3A%2F%2Flocalhost%3A4200%2Fauth%2Fcallback
Token endpoint
2021-07-29 06:16:25 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
93634749943374746@openid_certification
client_secret
myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*=@JhYacA4^qC]B{ZK}
method
client_secret_basic
2021-07-29 06:16:25 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2021-07-29 06:16:25 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
cFyox816BV
2021-07-29 06:16:25 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
http://localhost:4200/auth/callback
2021-07-29 06:16:25 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
hPuWcEPx5YHduYr1EqWw7t0v76V5D1P4YS9U9gSg0wQhZF9Gwa
2021-07-29 06:16:25 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
uhGHGg86zist5njh-DbXaw
2021-07-29 06:16:25 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/caos/
sub
user-subject-1234531
aud
93634749943374746@openid_certification
iat
1627539385
exp
1627539685
2021-07-29 06:16:25 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
uhGHGg86zist5njh-DbXaw
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/caos/",
  "sub": "user-subject-1234531",
  "aud": "93634749943374746@openid_certification",
  "iat": 1627539385,
  "exp": 1627539685,
  "at_hash": "uhGHGg86zist5njh-DbXaw"
}
2021-07-29 06:16:25 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiJmOWNhN2VlYS0zMWFjLTQyZTctYTRlOC1lMTA1OWE4MWVkNWMiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoidWhHSEdnODZ6aXN0NW5qaC1EYlhhdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiOTM2MzQ3NDk5NDMzNzQ3NDZAb3BlbmlkX2NlcnRpZmljYXRpb24iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvY2Fvc1wvIiwiZXhwIjoxNjI3NTM5Njg1LCJpYXQiOjE2Mjc1MzkzODV9.V91ecSFriz7MWLrDudGLYjDUuIKKOjVWYp3zhqpzOe45S4tvT3l10I7tnlKZvCZVKBHyDHn4thuc7H4WvvWZmvTDHIaNafgTbiM7zAgNUrOr0e_98lHf96xUiPwb0FlqWL9g3lkqtq7LPWwLOFW9JmlBNP3CD0m1SM5O-RZCRvgLcwXwkfuykZCDeI71AeDpVkA2DyexOc_Fb1mlg2ZsHnmLYjXoIc2rwkkKoSgNf0ilRkavv9or_FQ8cNozLCjfBT1-FhWsnLvCJRMYcvGIzwkXT5jTsjnEr4nolyKyhpgV6mI7GwsMDdq1UHfU0IjRf8Ai24tbcrmA9bLn09UVgg
key
{"p":"6Dr2geof6EK0HW_WUpeK_gZZ8ima9t_LOi-aAsNv-X1nO4xS7rrErxBKwI83ucBlzYwLKRaCZJ79hdV-lHOSK9yyScDC16GwpoBnGVf6uOiOdWBUwEbUxdAObBF4KT1sVJFN-NXF97mlM3hpMSXSFpxsp8wJtd_aoOfDcZYPrrc","kty":"RSA","q":"4BWd_BEwKfUInUoscUPjunVtfqpfn_l_qEli_XebeZ4zEvFbAD1KK_imURmK_GYMm9naaPYUxEnreZfpmtWru-_MLNxi6w72r34xcWZ-AszaUchZkOLB9nDZI5v1wGlK5gz6Md51yhEdjcVMk0DzJ_H8n6d47rb-LmEDPbj15Vk","d":"Ix--eaf__mrywuFHzUGqt1hec_Ea29P9vyYMGDNuBSWV7DNDltuasKiQjkT43FK_oPGZTvRz9-s1QoYMOCubJYwGwLFUkMCxnzmkHpumrphx8kIFj6_eiQcJG7-FKNnLQZ1MyGc1vaavAOihE9P8mAvuff4Tdw6-NlnHS78M_XhPnn7dEIYmzzfjv8Vs1BW5rZ0lyy3iOyumSojYMTfm8FBoByQLXWZPaEyuYMG8mggX9Rq6uoynkWemhB1brlgGQiiQmLR-3WxgWYEEfVPTbAYx8irB4FXQDIU0pzNNcfZrQ0XhjnMd6wJjZP7agjyZ--TJN8aMh6SJvIHv33NxwQ","e":"AQAB","use":"sig","kid":"f9ca7eea-31ac-42e7-a4e8-e1059a81ed5c","qi":"sJmF0f2o4NTgMvnDguQSTh9ulKdtQBiks7eJYporx1vg46BM195RShbdSHP0wW9Vhjz8pm3Pj_-v19y5dUugYj3AairkOCX3ZvJ73V79ArvPNJRl4wBU4b-JfH6AIPabEmXpUfA9gfDj5fZjFPv6QRqJWhmma4YcsLCBr3fwlas","dp":"g_E0Kx3NIRX85ZisCWLmamtLYUX4MHl4Ksfu1dEaZoK0S2XvnIlqxBgakIsOWzAP5xfBI4gRb3_RhN-GumtrShZrCXJGgWLxTbg4W3LcFYCzp8aigFf9_aG2__lw7uViDi48QbubbaMBVFv-UBkv4v7e0PshLT9RJQhox7k9kcM","dq":"Jn8wPAzL5HlnOHZ0uiS6q97ep8MnWHlpmAS7j-YLfNJT3e4-_wSIiJNYJ1inCwORKPk9T4jvOmWkoagahvIsZcYlopNeHxncAXxBjETaYyrEWwZ7dKuwPOFYPIjfqGWua2VRWl3oiIV2OVPq-uVOoM8u4lLIMOKZOmiKQQFUpUk","n":"y0cz2LhUD80GjVbHz7619nwEQdI3c_4L05hxiYeCrj6lKSvaP9LSP-pTKrdd-723MvA54tTupXaq20VUVBfypI8nQwIy3gcbZc36lHoEB5N_1cUJiJPmKHThaHU25dfDIQTBpMIyNOjdibZv3nm5jsv4oOIZ-nGD3i4QlSr4PCuszEAdB5fa_18dGp0jYfSu-UQJS8mzLSlHWTqNnYW2B2wyRHDFUIit-HxjQdtWp1Ja3cYZFhJHhVT3X7_lCdh1o2nRV1y7DA8BfMXkI6rBrGcx3xbC_XQFGa_5k784tqC9gUfS6BBFDN7AUqZK-2m8n5CMuzbH_vP4Fzbp7-Bwnw"}
algorithm
RS256
2021-07-29 06:16:25 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2021-07-29 06:16:25 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
hPuWcEPx5YHduYr1EqWw7t0v76V5D1P4YS9U9gSg0wQhZF9Gwa
token_type
Bearer
id_token
eyJraWQiOiJmOWNhN2VlYS0zMWFjLTQyZTctYTRlOC1lMTA1OWE4MWVkNWMiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoidWhHSEdnODZ6aXN0NW5qaC1EYlhhdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiOTM2MzQ3NDk5NDMzNzQ3NDZAb3BlbmlkX2NlcnRpZmljYXRpb24iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvY2Fvc1wvIiwiZXhwIjoxNjI3NTM5Njg1LCJpYXQiOjE2Mjc1MzkzODV9.V91ecSFriz7MWLrDudGLYjDUuIKKOjVWYp3zhqpzOe45S4tvT3l10I7tnlKZvCZVKBHyDHn4thuc7H4WvvWZmvTDHIaNafgTbiM7zAgNUrOr0e_98lHf96xUiPwb0FlqWL9g3lkqtq7LPWwLOFW9JmlBNP3CD0m1SM5O-RZCRvgLcwXwkfuykZCDeI71AeDpVkA2DyexOc_Fb1mlg2ZsHnmLYjXoIc2rwkkKoSgNf0ilRkavv9or_FQ8cNozLCjfBT1-FhWsnLvCJRMYcvGIzwkXT5jTsjnEr4nolyKyhpgV6mI7GwsMDdq1UHfU0IjRf8Ai24tbcrmA9bLn09UVgg
scope
openid profile
2021-07-29 06:16:25 OUTGOING
oidcc-client-test-discovery-openid-config
Response to HTTP request to test instance 7AfRzojQTkw1dRH
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "hPuWcEPx5YHduYr1EqWw7t0v76V5D1P4YS9U9gSg0wQhZF9Gwa",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiJmOWNhN2VlYS0zMWFjLTQyZTctYTRlOC1lMTA1OWE4MWVkNWMiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoidWhHSEdnODZ6aXN0NW5qaC1EYlhhdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiOTM2MzQ3NDk5NDMzNzQ3NDZAb3BlbmlkX2NlcnRpZmljYXRpb24iLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvY2Fvc1wvIiwiZXhwIjoxNjI3NTM5Njg1LCJpYXQiOjE2Mjc1MzkzODV9.V91ecSFriz7MWLrDudGLYjDUuIKKOjVWYp3zhqpzOe45S4tvT3l10I7tnlKZvCZVKBHyDHn4thuc7H4WvvWZmvTDHIaNafgTbiM7zAgNUrOr0e_98lHf96xUiPwb0FlqWL9g3lkqtq7LPWwLOFW9JmlBNP3CD0m1SM5O-RZCRvgLcwXwkfuykZCDeI71AeDpVkA2DyexOc_Fb1mlg2ZsHnmLYjXoIc2rwkkKoSgNf0ilRkavv9or_FQ8cNozLCjfBT1-FhWsnLvCJRMYcvGIzwkXT5jTsjnEr4nolyKyhpgV6mI7GwsMDdq1UHfU0IjRf8Ai24tbcrmA9bLn09UVgg",
  "scope": "openid profile"
}
outgoing_path
token
2021-07-29 06:16:25 INCOMING
oidcc-client-test-discovery-openid-config
Incoming HTTP request to test instance 7AfRzojQTkw1dRH
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Go-http-client/1.1",
  "accept-encoding": "gzip",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2021-07-29 06:16:25 OUTGOING
oidcc-client-test-discovery-openid-config
Response to HTTP request to test instance 7AfRzojQTkw1dRH
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "f9ca7eea-31ac-42e7-a4e8-e1059a81ed5c",
      "n": "y0cz2LhUD80GjVbHz7619nwEQdI3c_4L05hxiYeCrj6lKSvaP9LSP-pTKrdd-723MvA54tTupXaq20VUVBfypI8nQwIy3gcbZc36lHoEB5N_1cUJiJPmKHThaHU25dfDIQTBpMIyNOjdibZv3nm5jsv4oOIZ-nGD3i4QlSr4PCuszEAdB5fa_18dGp0jYfSu-UQJS8mzLSlHWTqNnYW2B2wyRHDFUIit-HxjQdtWp1Ja3cYZFhJHhVT3X7_lCdh1o2nRV1y7DA8BfMXkI6rBrGcx3xbC_XQFGa_5k784tqC9gUfS6BBFDN7AUqZK-2m8n5CMuzbH_vP4Fzbp7-Bwnw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "72d68310-3a17-4ea5-a3dd-73ddd758568b",
      "n": "tQRIKBAJQLgjo7yGiCRQjVxyFeTMhEw6BGCJUQgBYaGSRGC8iSV2STJgWQlg1F65ywGU8yfHxDgnFZoxjqwcBp2mJu6eLUchhmeao3NEKl4QYKH2mJMu6llVah1Qcm1GgF8xyCZFmdk_BGPMm88dBGVcOS0nBxI1FHXTNpYbyU07jmhBRqB2wnafhyKfeNPjnv3BlWoxrcdDuVAg1pUxO4vlSMdPhKh99TSmNtgHRJfkEQ3oj_URopPRcerXWULFA3XFxKMkX85l4eyZchNnj_YFe4pHsU6XFDgkDqAkhv8BHWoPqyT43ZFKxPW-r4mYxyb7RcD4JXbP3RL3WJ6M-w"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "84fb3d68-41eb-4fa2-9ede-694f6994b5ec",
      "x": "hcXWUn1Uk9hNNpe-VLZorngHtE3sHRYbcOSB49rB-3c",
      "y": "boK8cLqRAuKHt-rOZpku7xqB09wuGONRSUHVbMn3oeo"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "0f65fc74-792b-4461-9be4-62238894730d",
      "x": "sPe5rvT9ROb2313cnnKSOS8jUOH_BJM2Palo8LOWiGw",
      "y": "1CySbXSNZwd-r4sAQ0C3yqAiBXOX-OYnn8I21Ql7-1g"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "f2bd4ecb-8b0a-4bed-8e3a-e499fcb11ddb",
      "x": "D8JR15grgL28QYQUdBvfd2-XxepylHu4JFJ8V3cqZSY",
      "y": "eXxjL4qvgQT7X0K167qctRdkbO4hTGNdYbSnEOgnEFg"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "444ccc69-5751-489b-be7d-9d938f11475f",
      "x": "hDk-3dpIZcSly2UYp6TjvhVNWVD3G1lU7YMTnmhFsso"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "f53a0fc2-d520-4e44-9a88-0901a50372ff",
      "alg": "RSA-OAEP",
      "n": "uVpd88mT9Zb5MbTZk1EcCq4tUGGisqJVys8ZYEoor5wmtD1h9z-1v0aoVrr8AQNS0gIy-AbJ9PKbATjvP_jRxqfSFbDQT4u7acEKeUiTeHnlBCpdmwYtUOJ7DOX1prm5E2U5WGJotk-wahqaji87qbTT_XPm__2WiHTsmm0RZ_MSNv_jLFHMqGcZBuidFbyA9Wd0SmBgkG5kqvLlssQpIAYLMfvvBMfsFLOUBv6fw9Z51-7q4asCWqowBNCm-DCYhlYQhdNf_cksRA1vMRYQfgkElcQ5JH_2QK7ha0vvYhg3IFtvvk1QuNi2AqDTGB40ZqNz0F3qpPWvkf1cEtN-QQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "6b7417bf-c0bb-4460-b572-062bbcc23796",
      "x": "mvwdcdvwgvqdEcI0CDKLwZZXeDZasr6oqlsIhgjTRp0",
      "y": "vjULttLdKK3DXyBrBD83BIO8i5QyOFaO0A7oFfGiAhg",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2021-07-29 06:16:25 INCOMING
oidcc-client-test-discovery-openid-config
Incoming HTTP request to test instance 7AfRzojQTkw1dRH
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Go-http-client/1.1",
  "authorization": "Bearer hPuWcEPx5YHduYr1EqWw7t0v76V5D1P4YS9U9gSg0wQhZF9Gwa",
  "accept-encoding": "gzip",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
userinfo
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Userinfo endpoint
2021-07-29 06:16:25 SUCCESS
OIDCCExtractBearerAccessTokenFromRequest
Found access token on incoming request
access_token
hPuWcEPx5YHduYr1EqWw7t0v76V5D1P4YS9U9gSg0wQhZF9Gwa
2021-07-29 06:16:25 SUCCESS
RequireBearerAccessToken
Found access token in request
actual
hPuWcEPx5YHduYr1EqWw7t0v76V5D1P4YS9U9gSg0wQhZF9Gwa
2021-07-29 06:16:25 SUCCESS
FilterUserInfoForScopes
User info endpoint output
sub
user-subject-1234531
website
https://openid.net/
zoneinfo
America/Los_Angeles
birthdate
2000-02-03
gender
female
preferred_username
d.tu
given_name
Demo
middle_name
Theresa
locale
en-US
updated_at
1580000000
name
Demo T. User
nickname
Dee
family_name
User
2021-07-29 06:16:25
ClearAccessTokenFromRequest
Condition ran but did not log anything
2021-07-29 06:16:25 INFO
AddIssAndAudToUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-07-29 06:16:25 INFO
SignUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-07-29 06:16:25 INFO
EncryptUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_encrypted_response_alg
path
userinfo_encrypted_response_alg
mapped
object
client
2021-07-29 06:16:25 OUTGOING
oidcc-client-test-discovery-openid-config
Response to HTTP request to test instance 7AfRzojQTkw1dRH
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "sub": "user-subject-1234531",
  "website": "https://openid.net/",
  "zoneinfo": "America/Los_Angeles",
  "birthdate": "2000-02-03",
  "gender": "female",
  "preferred_username": "d.tu",
  "given_name": "Demo",
  "middle_name": "Theresa",
  "locale": "en-US",
  "updated_at": 1580000000,
  "name": "Demo T. User",
  "nickname": "Dee",
  "family_name": "User"
}
outgoing_path
userinfo
2021-07-29 06:16:25 FINISHED
oidcc-client-test-discovery-openid-config
Test has run to completion
testmodule_result
PASSED
2021-07-29 06:16:47
TEST-RUNNER
Alias has now been claimed by another test
alias
caos
new_test_id
mkU9WMYud08BoLk
Test Results