Test Summary

Test Results

Expand All Collapse All
All times are UTC
2021-07-29 06:19:12 INFO
TEST-RUNNER
Test instance v0buZs8n8bJQ8NV created
baseUrl
https://www.certification.openid.net/test/a/caos
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "client_registration": "static_client",
  "response_mode": "default"
}
alias
caos
description
RP Certification Config "Basic Auth"
planId
AYSdLbzmWbu9X
config
{
  "alias": "caos",
  "description": "RP Certification Config \"Basic Auth\"",
  "publish": "summary",
  "client": {
    "client_id": "93634749943374746@openid_certification",
    "client_secret": "myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*\u003d@JhYacA4^qC]B{ZK}",
    "redirect_uri": "http://localhost:4200/auth/callback"
  }
}
testName
oidcc-client-test-discovery-issuer-mismatch
2021-07-29 06:19:12 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/caos/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/caos/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/caos/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/caos/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/caos/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/caos/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-07-29 06:19:12
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/caos/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/caos/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/caos/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/caos/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/caos/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/caos/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-07-29 06:19:12
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "9qVmaXu6C32JlDI8akK5fgU5AmxQyy5ZAMFlwT5xyghV8AYdQAC9Ig-kkRY2P5S8nigqGZfXIH2SPv_su-cG2q8_X3mVosU1plCToaCkR16BpPz7iAHYm2NiahD6TN52UYUOD9efva5hr-pXzIohke6qG8FFyAd9V4XQe06wjI0",
      "kty": "RSA",
      "q": "sfwx7ay7a0h7tr1qaLZ1maigaOuNUdyW1xRSYTWaBK2CZNjUsHM72P75U0j0Y4VlrhclFx-p4Q9cau5Lej39lB-BTydbW0pRA66cf40rcGoLwacpHdYboiQ9yOcUtbDT1R2-QAuI_pts2Skg9bAoxaiZKW7Cdt6AMLy5UUXuyMk",
      "d": "a1rjF_v5kLO9GF4y6bYzWxHtbGCknBWykZKQ-FZ8fNsoLc7AZM8IU3IrQPdgQANTndAJNori1dpfthQDHMB4Q1qOlqEeOuzv6n2kJxJXmQKqP_fy29zztt6JsVyOk38eeL-U5M2WWdvTfzy5KHo37ou_w7ku_g8rqPu-uldcGveS-nr1D-DJ93NttlR9g2As_yLb1VhE1KMUxlnkaPJDimvSO_iJs7Pf6qdREaerT2J99gj78b6FrLTsL4zlu25XvlhXmwZ9I3ZGE40TlCv6HIQg-zC-My1N0TdOVujWhrYPNEgUd0Trslf-Jhxe67rhIyAP3Yujb4Ecd6GKP7Y64Q",
      "e": "AQAB",
      "use": "sig",
      "kid": "edca5ea4-1294-48b9-86ec-c22d83d388db",
      "qi": "e-X4xE7_y4QkiCLhWnJ_1rfhujAnPRlvmk4oP9LtWyn7I40LXpag94JL-3FqhUJ6OZZsaHzmb6pRxv-ufM2bPZTTKg5E_4ZhdLi6vQA7o5PPfSx-uVfSH_a65MqaEKx2RsOGtMV6q6oC8TCjZgWIFgXOvmI2s8VI6_EUGaE87sw",
      "dp": "8XipNShe0pULNr2gDGBa_hfa4pZs2x77IBQ3rOOXv7Y9fIpf5KNUh55M_YaDgef6adTksr3HbhXCMk-Y07WxLjRYlP6SExOEHNnST3DYpM7PmlnbYCJ-kFLSrQkGJG-_4rujMrtltuyc0v9ZCfVKPHcur5Ge4eEDQ8bMf4xgqJk",
      "dq": "hcvh9Jtu4H1CkuLdRQ40ZWh__Z9lQu6ibdiW_QCAYZfVd94QNPzLNpql7tfe75luEGrRtQpWeBtGDBRKpQBIybrNSCV75ap-MFhoyPHkf8MYR2FT5Vv4tfCsiYQ860CcXY7YX-jL-Sn5r13dqxPb8oqFaMIcaaNllj2oydHaaRE",
      "n": "q3tWumSHIGjo1Vx1YHAxUyljvXmYV3eSR7-sm88jMV7wtokrkU7RbNnZkmN6PxqCX_-k_pJf4W8dyK3QjBYefCvDbzeRaVxuSR_Bu_4erohaagXLn-K_I69qDU3cuOYsr7eB48zuRSjbv7wRIO8zGZYOL3BCVWHW9SVUPWjbfqwfCDjHouOgnfWZ9sjfPUeg5MZNI55oy7fD4J4aGP3AwClDBLYWilUPidRUc5Y2QSkmpSstA92fFJBUCmqVrFiXl91KNm8TJlpHmVd-z24b7icrhiXxHCrUYQENSkCl2b_G-WXSFSvJUWkoyF0uK-agx7UY4oJ7wMZ0xCHsYoKCtQ"
    },
    {
      "kty": "EC",
      "d": "nG0ycJCOkUjl4ZFFUCBb6dgPcBGjgPN5nl3gK3WiJJc",
      "use": "sig",
      "crv": "P-256",
      "kid": "eac614dc-4095-48fd-a8be-987043f3266f",
      "x": "efm6UWNQXNtrlljMivQV-rAKWKs88w6SHmDCLOgnAX8",
      "y": "MGba0023hNoAQpgkRXJ2LlvI3AnzwfXcVDlRNk2_hnE"
    },
    {
      "kty": "EC",
      "d": "SJ49KOEcp5FGDOBfFHxiIzp3YtPAvVPTH0yzUUHi_Pg",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "a11cbcb9-9dbb-49fc-81c3-8b5ec4a247bd",
      "x": "8DsCjUTYnIXc6-XDLALS2PZp_X93H9gFMTIGRdsiC0Y",
      "y": "16gW6zIQQf_VMrviTYAzpIQHDAHSavp5L4STcfEg_vo"
    },
    {
      "kty": "OKP",
      "d": "msMTvsBUuqax4SeOzWEqtsM8TguytqPrk5EAVkQOkig",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "f22f8cbb-2f1e-4a1f-a138-02c8b769077e",
      "x": "h-IdgPdZq7OFFBqy1KGmldxR7VpQcdAWF-gS5MmvkwA"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "4wZPK27TRO0SaC7Q5UbT813e0yHtI2UQBtXFK3v9V86KYc24Qopcxz2j8mHHdorFc--e66JJiLNptW6YGrUuKDxTWtKr7M1wyafinZwAv1DBejY5sFaRKQNAg06tujnIi8Uw-YI4waLnqgX8lYg84LDd6sLGd-Raxa3MCUYwD0k",
      "kty": "RSA",
      "q": "ovb3-tt0Js5mTmxx4FEmXWC3RoNVU0H2dZoqUbgUgSFr_L8hWB9tiPH9Wagts3SW-xD7M6uDCKhfAVpfRl44yiQawm_nwcd1z05wBPXPa4oDzCDJQDeV-N4wd6_hz_qSuiM3AC8zBfuUq-hI8o0uvVyL9CQrlxGbCgN4s9eXEIc",
      "d": "RhoezYKxfXMiYCOOw9J6jIUG076dtObhw1_ySEyKJ-PvbDvQ1mYCXhQHEInhSFoNTAf4Pin2Dc_JHFJN8E0v3b0oxPIZWmwxovpq6Xa6suxAIT4yDFdTQS-8fg93MEH6nVl1r0l_dzFJ15jO-sRCZmX0qje4hhCGyIvqpCLJSY5XtyxH2YkKpQhKiTqt9EjVE94qdgp_rXEc2a49NlR9ujQcD6kTNw4iib1S6wh85WAXL0eSY468DIl48Te8MWe-3YWVncKeQcZZ4wsgaWI1cu93rkh4pp1-rbkl7YgfrvRRFeuAtN1OsGZm1IVvQqFZT0HC43DSlRvz7oQ_FOcxoQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "65bb4779-58c0-43ca-8a17-529efa0e5ec5",
      "qi": "iEmCOVINn-DxPlKcD7S8PQbv_RKZ50T5LJg2RyS_j1fcni6DS0Svmf8iIZny4VKEbmX_7dfLb8_93crsUk4UqzwpwudnN4pXmsjtXWkSEBo1aawXeVoO-2DPtCSCSrkqfBoQg4UU1Rk0o1UWzB9kjTIPXanAIKNZizNTk40bBBk",
      "dp": "wrf_oZ4dwSmhtxAohe65Diz-WJLpxYkCNQqXYdOoGO8DDB4Zo6DvMMjy3Ir3PPqLnwPwh-SbM4_G5CHmfknWPBZ53BWD9sjCq4O-wDY1AeLu_7aQxmmJeebbJ4SNR4QWOaO5fNgvfA4Qq2kVGuBObt3kiV3kQqLvJEwMDAxSXlk",
      "alg": "RSA-OAEP",
      "dq": "NCbO8yO5xxV0XhKMWtn9ahKidFlhO_S3F6mPc3lybmSwt0C_PgFIv3OZvVB5150vGAe2LDHuDB490SQHq3BJwj7NpX3EcBoR1JboeF3l1Cdl0bSIUxm2z97jKdpKbJFm1VShrFhufrKlQGJkveJ6m7T7QNU2cfD7abf0r7EFsg8",
      "n": "kIUCEx0Hz_pUUtS_VKU7NmrvwWzF_-A6lBbqZ3xW8Sa6iZnVh_BZ95R0k9udpPcbWR99JG7G1szjUQ4klLaC1YFdcjJErcr7BES43DXTmANf46P3Y0U8MOvExxkmquQMK6Wjp-1vqpTbblyIJ3PsDOMt6zHOBbW6NOFw4p5c1gPzEb-MQPohjNIlDjNqou-duB8xyiY-ea2VwwR3Q9W1jwl5Cs5BtmlzR4OBvPe5augfb2Yx4gNCc2xgOPRlGGT3zGPldvRZNWH_IcB80msHxPyqziFjDzV-MTIBHrlkacNVELD0juw4FTGEvceNE7O0u-1oNn0-eNbhcdiBV1uffw"
    },
    {
      "kty": "EC",
      "d": "0fAq3AaWPi3hT4brSqds0SECiIxjxSJl8nhBpRRxNrA",
      "use": "enc",
      "crv": "P-256",
      "kid": "d19992ac-5fab-4d7c-a82b-c22cfadfaf2b",
      "x": "Rik-YbjCxLKyPD--P62vBQSZ0SDbHmJTe415Srh-Th0",
      "y": "ZLNa1rRUpdzk3rdprf6Pyfto1CmoFhOur-mRn3s4ig8",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "edca5ea4-1294-48b9-86ec-c22d83d388db",
      "n": "q3tWumSHIGjo1Vx1YHAxUyljvXmYV3eSR7-sm88jMV7wtokrkU7RbNnZkmN6PxqCX_-k_pJf4W8dyK3QjBYefCvDbzeRaVxuSR_Bu_4erohaagXLn-K_I69qDU3cuOYsr7eB48zuRSjbv7wRIO8zGZYOL3BCVWHW9SVUPWjbfqwfCDjHouOgnfWZ9sjfPUeg5MZNI55oy7fD4J4aGP3AwClDBLYWilUPidRUc5Y2QSkmpSstA92fFJBUCmqVrFiXl91KNm8TJlpHmVd-z24b7icrhiXxHCrUYQENSkCl2b_G-WXSFSvJUWkoyF0uK-agx7UY4oJ7wMZ0xCHsYoKCtQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "a81709f6-6ea7-4fcb-8b9d-88d032935ff7",
      "n": "jEsz6pzyHypYnvYJm-3wPVqcpouttEdzVE1fR6QZw-9aovabOG0SrLYudyHFwtaJ2gC5gICMl6b8AuFCE4BGeeb5Cn3T7N7N-iOmFoJx_8pHKdsgv2FGeHb_On1yue7MBu9YRB9x1ZkyR83SjFqpLEG-m-CkNhiUJCBD3sXR-sESOk_phCRwmc-o0Oz67VuWmI52QenTLFyWXk2twhS4Vx2Oy-7jMjGqOUEXnfeTe-MMu9nS36SvZsxx13VnJfphpmLypn8wb1wDmfSHLoUcvRfdPRj4_q-bN5kfvXSJYh2gg33176VIRLfjXboyYhDrFNSwgYCjR-MqH3XrMJnOAQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "eac614dc-4095-48fd-a8be-987043f3266f",
      "x": "efm6UWNQXNtrlljMivQV-rAKWKs88w6SHmDCLOgnAX8",
      "y": "MGba0023hNoAQpgkRXJ2LlvI3AnzwfXcVDlRNk2_hnE"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "de017e16-1fc5-4937-a152-efea7ca7ee75",
      "x": "-HDDT29mKNhTlRdoeC51zSUWtbxxWAeBlL0BmFS4D8k",
      "y": "_ILXzUVrDIuDW30AHzV_G2-KbFn9eaH_V_yUQro6JlE"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "a11cbcb9-9dbb-49fc-81c3-8b5ec4a247bd",
      "x": "8DsCjUTYnIXc6-XDLALS2PZp_X93H9gFMTIGRdsiC0Y",
      "y": "16gW6zIQQf_VMrviTYAzpIQHDAHSavp5L4STcfEg_vo"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "f22f8cbb-2f1e-4a1f-a138-02c8b769077e",
      "x": "h-IdgPdZq7OFFBqy1KGmldxR7VpQcdAWF-gS5MmvkwA"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "65bb4779-58c0-43ca-8a17-529efa0e5ec5",
      "alg": "RSA-OAEP",
      "n": "kIUCEx0Hz_pUUtS_VKU7NmrvwWzF_-A6lBbqZ3xW8Sa6iZnVh_BZ95R0k9udpPcbWR99JG7G1szjUQ4klLaC1YFdcjJErcr7BES43DXTmANf46P3Y0U8MOvExxkmquQMK6Wjp-1vqpTbblyIJ3PsDOMt6zHOBbW6NOFw4p5c1gPzEb-MQPohjNIlDjNqou-duB8xyiY-ea2VwwR3Q9W1jwl5Cs5BtmlzR4OBvPe5augfb2Yx4gNCc2xgOPRlGGT3zGPldvRZNWH_IcB80msHxPyqziFjDzV-MTIBHrlkacNVELD0juw4FTGEvceNE7O0u-1oNn0-eNbhcdiBV1uffw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "d19992ac-5fab-4d7c-a82b-c22cfadfaf2b",
      "x": "Rik-YbjCxLKyPD--P62vBQSZ0SDbHmJTe415Srh-Th0",
      "y": "ZLNa1rRUpdzk3rdprf6Pyfto1CmoFhOur-mRn3s4ig8",
      "alg": "ECDH-ES"
    }
  ]
}
2021-07-29 06:19:12 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2021-07-29 06:19:12 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2021-07-29 06:19:12 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": 1580000000
}
2021-07-29 06:19:12 SUCCESS
OIDCCGetStaticClientConfigurationForRPTests
Found a static client object
client_id
93634749943374746@openid_certification
client_secret
myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*=@JhYacA4^qC]B{ZK}
redirect_uris
[
  "http://localhost:4200/auth/callback"
]
2021-07-29 06:19:12 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "client_id": "93634749943374746@openid_certification",
  "client_secret": "myclQ`RB_F5|HA:@7!r7H(DLltKA)P~u#)Ag#LQ8Zw,km*\u003d@JhYacA4^qC]B{ZK}",
  "redirect_uris": [
    "http://localhost:4200/auth/callback"
  ]
}
2021-07-29 06:19:12 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2021-07-29 06:19:12 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2021-07-29 06:19:12 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "http://localhost:4200/auth/callback"
]
2021-07-29 06:19:12 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2021-07-29 06:19:12 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2021-07-29 06:19:12 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2021-07-29 06:19:12 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2021-07-29 06:19:12 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2021-07-29 06:19:12 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2021-07-29 06:19:12 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2021-07-29 06:19:12 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-07-29 06:19:12 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2021-07-29 06:19:12 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2021-07-29 06:19:12 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2021-07-29 06:19:12 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2021-07-29 06:19:12 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2021-07-29 06:19:12 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2021-07-29 06:19:12 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2021-07-29 06:19:12 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2021-07-29 06:19:12 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2021-07-29 06:19:12 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2021-07-29 06:19:12
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2021-07-29 06:19:12
oidcc-client-test-discovery-issuer-mismatch
Setup Done
2021-07-29 06:19:27 INCOMING
oidcc-client-test-discovery-issuer-mismatch
Incoming HTTP request to test instance v0buZs8n8bJQ8NV
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Go-http-client/1.1",
  "accept-encoding": "gzip",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
2021-07-29 06:19:27
ChangeIssuerInServerConfigurationToBeInvalid
Added invalid issuer to server configuration
issuer
https://www.certification.openid.net/test/a/caos/INVALID
Discovery endpoint
2021-07-29 06:19:27 OUTGOING
oidcc-client-test-discovery-issuer-mismatch
Response to HTTP request to test instance v0buZs8n8bJQ8NV
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/a/caos/INVALID",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/caos/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/caos/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/caos/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/caos/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/caos/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2021-07-29 06:19:32 FINISHED
oidcc-client-test-discovery-issuer-mismatch
Test has run to completion
testmodule_result
PASSED
2021-07-29 06:20:59
TEST-RUNNER
Alias has now been claimed by another test
alias
caos
new_test_id
jjFe2zSzQiQAac4
Test Results