Test Summary

Test Results

Expand All Collapse All
All times are UTC
2021-09-30 07:04:38 INFO
TEST-RUNNER
Test instance 0ZEcc3ObsVfrPbF created
baseUrl
https://www.certification.openid.net/test/a/idpy
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "client_registration": "dynamic_client",
  "response_mode": "default"
}
alias
idpy
description
oidcop
planId
Q5bxP9ys6sz13
config
{
  "alias": "idpy",
  "description": "oidcop",
  "server": {
    "discoveryUrl": "https://89.45.234.133:4000/.well-known/openid-configuration",
    "login_hint": "roland@89.45.234.133:4000"
  },
  "client2": {
    "client_name": "Anything"
  }
}
testName
oidcc-client-test-discovery-openid-config
2021-09-30 07:04:38 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/idpy/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/idpy/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/idpy/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/idpy/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/idpy/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/idpy/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-09-30 07:04:38
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/idpy/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/idpy/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/idpy/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/idpy/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/idpy/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/idpy/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-09-30 07:04:38
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "xDl-cFsL436jcfHqWEm3_2VsyaVjyLOaVsF4VUT-fG5FroS7yLKfptnwjVqZQJDZIrKdlTeJ41amqwFMhopq8wpSqixU1jN-doIavy6O5kFHSyGf2hcSK0KwjmQD4M6gemizBxJkFN5uMgo-rzOJ92ZvNAw7ekwxvMZuewirSYc",
      "kty": "RSA",
      "q": "t7FXTBLPfodIr5YpTO3A5pLiGxXqvVBsc0r-92ageAo9PJPlxxEjAshgaC8aGzdkWtpbDXr1W5hoATp2wVpYZHk14KvyV3TI0-t7bDFmTR3GyXctWnrYPDzbQQIj6HylPPG7G-OsamuFD2teUo5jWxhS3NMrTR6YqoQAjZUQE-M",
      "d": "BErj6e5ShIq4aGOmSulTFLW5KbADw2TLQeT4r7l8z0edYNGqaCVjgQd0Ej3Mjw6gQ0DtqmDp-X2biXsILKeMFfFFfs7hQ5JlGhh6uBvkIg4ZzOITzEG62IEwYldeC3IIZLQ42xdii0K307_Jb7bxVoTvEUUE9_bMHbSmvLZd6ja2FWL0i2Rlw_k7cqoPSzCzAuBvnfK6fNgyMZ-x5K0ZJU3_ZXmSS8zaoJJJaOK_qmFujMa1U3Sd-rxgiUKiZ4I2l6uDBKiamjVwZzLJbB19F3oUI373Ep3vc3cbNIKBLTYJ20S0QWdMTUNPQQzu4sNPu61XgwGRsiF1lrIp91i9KQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "4c9c28b0-1944-49ee-b0ed-9c43b25bd605",
      "qi": "XMeHwulfGCbgck7jJ1payVYaXckglEz9UXuUHgnrIFOPd8ByKS3_D4c6ROlQMplvq6QfPxT-p2Oz6iWmz_gXUpg7JLpADTbBt8XLWoKDmknIsyophNE83PyLjFKNCp22VnvFuz7bS9XstJebPfTJfihVb7TucdUyEbCX5Tt2wjA",
      "dp": "klY6SDpuLFOmOvTqCru3f705G0y_lM70nByezCCvFUb7qoIMtUkZLUq9Tf2x6ufbNzgzszN_Hs7hbwiB9JhH2EbrjUOQZUpz1peCsO9c3LT0IUDLQM8R2rdaimZmSgJuxbtNQEnj33hef-0KAIkULC_1YMB6nuMx-JGXlSPK8gM",
      "dq": "biL4UnZczmJSpGSGMsfChvy-cLr9WbDktWPb534y7IZHHREYDfkqYrq9gvnqzzKxCwAs47I7dkW05jeliFyg7uz17tVpoiI1X0qrX71mtwoJbDX2jW9mQwfB9gJQgU5qzFWreBdUAyKgTxRzI1CYJcA5vokmR0D3DBXFNx6O2z0",
      "n": "jM0IDJY5QYEEwTl9H_ukhVs1_p0DxJ60v7WA_G9Inmu2QPdxwO9MavtFqaABpbF_maZtlsC__N8TGjYGn1sQ2Pd4tPcKTuIatqg1YG44oDCrj758U7w7vN2E79Lyx2CWhE6dQN0aOIm_vVLsNFMpcdAG8erC4Xm7Y0T9WxzH9ExZVdOtWsIpcCPrtFiSq44xgt86oHGvuxTCmByF3PL79CxkwBcnY0yVUPGhH6F9wLFv_ukEWhTTvF1AC_4tQuNjB8ZjZzh6IDYzMMAEy7PA8s79_ehw_i9Yjv4vs8OMx_fzfBJV-FBEa_uFq3N8NYYdUg0LiS5-FuL31tSYkcc3tQ"
    },
    {
      "kty": "EC",
      "d": "kRZFwRv5GFpk5LzXZkcPsuJvZwe75hAls9Au0ZK9FZQ",
      "use": "sig",
      "crv": "P-256",
      "kid": "c220d4c2-d45f-4b53-911e-1857adf32cc5",
      "x": "oxe8RoiUP5PZ3g_ztSAn2idtjzf4fNeAxnSqTsyF3bE",
      "y": "W6093HAwly9sGxkD8IKd1SpBWf-V3JH-aA1O_yWs_gI"
    },
    {
      "kty": "EC",
      "d": "vr3SBUfRDWRnH28jvwwO9gXRr4iUPSSC66xURAOOl54",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "5c246539-21b9-4353-a18e-fa9de124fd85",
      "x": "jedvFK39U3AC0EKqsceKuf1LMkfuN6SkkdGdiH5RT8s",
      "y": "LuYYjbsdUZ_fSWKSiQobPsf4Zc4UJcghfEUDxuIHarM"
    },
    {
      "kty": "OKP",
      "d": "buWnmwwfZRNYyiAPEdH3sTUQkE7HClvp0yJ7ARvji_8",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "d790dcd3-f26d-4d9f-a9be-7f407a894708",
      "x": "HJmEKJp46m5cOkC1UDTspUYEnGLDzXV33-cNgRcZj5U"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "6_oU3pb_1AW2z_3ts_L0xsareMkDWEO97-qAJ-gUOOE3j1N7HUOcsO70oBoUibv5PaXRF3ddYEsoTZK-bLgk0iN9PPFl4dzpKCBOC6ue16olqW2l6rEUbtN10Un7ES_T71Rdq5hj9OCsjePLalS9oRB-O77FOKUX0ARc1u7fRtM",
      "kty": "RSA",
      "q": "poaLjbb48gGY_yXNSOQnmg3Ot0C0oYMKt8AUcp6KpomanhJQmKw6SpYuVohRH_DMO9lgNPnUXwFAtJdnm13ua49oCsDkn1yVXKWbX9X_oS11xPpb-v7HkZMvrQ_mxmJrBCC5KCy1IAh0a_e_bN8ug5iJqmm-Ws0krsykofZgx5M",
      "d": "NDeMy9en0XYyAHScUliM1S4ooxKk_p19uJVEr2NdlXKDkBqYo_sw29R5hgDWGytAwevxA4wGD1CErTHoKuMVksIUIQ4nQgvINh9R5aPZPcCkm9XGfgXUbgXWp9n0iCn9L9ONMhmvCX5KDNF0cySBvKA81ne1oqZLlTQQPXyCfbFqxrbI-hQCYBop3lAVDMxBqXQnISkFCrZ55MHHmYopvZ0QT1aZfjU99C2taVIXDaaon62IL05O67x5C_fE3eWfC4SHnUcKlnxxNPhTRtPrIJYpXC0FDTRP8EXPqiabV9GxQtf-voBdSGKCxu5p-LKlKcyBHDe2iRF23F1c4DCC2Q",
      "e": "AQAB",
      "use": "enc",
      "kid": "17ed6711-92e3-41cc-89ba-74a60ff51472",
      "qi": "HgQP2i42shTiMUnVyTYF6xGhul2lVC3q1Dc_QLM1--whKZqtAblTAwVLnlQTYnNnmVyX5L28H_SLuGvtelxaadzOmgXD3PqG3XD3U03DRCaoe4ddhcLQ0AXX8dBH7mM8S2vEdITwbjHxw85a30LQDdb2skhYyaWHLK0f8bHDhB8",
      "dp": "eW3K52_UXYpDNGx6sSrIgrEg85qcugLB7n9BS0fFgC-Eo6BVrg1oyDNudiR1hRrResOlAOpPhommR6THkLKBYBEbFQ0zXDKNWDSndKHvrxLDJphh1I8i8JSn__aN155A9Nr5CJ_2b8BdivY5apIIsqUGEEBuxGNQCZ71FzT8eDk",
      "alg": "RSA-OAEP",
      "dq": "WfT2sFB2fO1GBBccpVKy3fK1h6MJsPJEOO0nXp-skLhm8Rs9tKvdNWuZjp9HC7Ud7vrHkPagtc3McYIUswZ0BGDMuHppRnlSKmE_5O6KkDwpkYYZaCZ4EnjrWVbsuKBz5R_0RfKYybwngCeunhaWXvpo68kBzrVhKphcGy4oK8c",
      "n": "mYAvEq0ojCkaR8Z04lCxRSN1BmYy3FzU6r65BSr67xNHqROBq_FzBkj0egWDV3JMz6o7wE4CqAwr-eu2v4a-6b37w6wKYgHRN6_Nt0Oq3HKUo-lWJHkyIfgzDKlDMwk5jNucZKtWjHlkX5P7vDdED4wtXZeNeTxbWi7GZYR9U6to75HKUEeY8qvymrFbj7mhaBOVQ274PBZyd_unxPJ1xZ03nz5jedOtYjlrVczmAMzNyQeLj9YdweV4H0WqRFtdUBd_EJiiCY2sLPoecj7jRYlPhWh0JYGHg_5wgJUtJZViQCrZQ7LEN6WGbMq4DQxiuBHUqqXTnyhOvzuXC2OwKQ"
    },
    {
      "kty": "EC",
      "d": "DkMRuriqu2zovkVn4FRGR3waxXp3iim6x4m7evxTsd4",
      "use": "enc",
      "crv": "P-256",
      "kid": "e4971579-0a2b-4052-a78a-059c6f7e65ca",
      "x": "hf725kweUyaBb-94mLufR-kH6pUiE4rQ_U9-H02LtyU",
      "y": "MT3QPWv5k7-fzHnlQHHGt1AtcW7ei7J43CqFNjJeunw",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "4c9c28b0-1944-49ee-b0ed-9c43b25bd605",
      "n": "jM0IDJY5QYEEwTl9H_ukhVs1_p0DxJ60v7WA_G9Inmu2QPdxwO9MavtFqaABpbF_maZtlsC__N8TGjYGn1sQ2Pd4tPcKTuIatqg1YG44oDCrj758U7w7vN2E79Lyx2CWhE6dQN0aOIm_vVLsNFMpcdAG8erC4Xm7Y0T9WxzH9ExZVdOtWsIpcCPrtFiSq44xgt86oHGvuxTCmByF3PL79CxkwBcnY0yVUPGhH6F9wLFv_ukEWhTTvF1AC_4tQuNjB8ZjZzh6IDYzMMAEy7PA8s79_ehw_i9Yjv4vs8OMx_fzfBJV-FBEa_uFq3N8NYYdUg0LiS5-FuL31tSYkcc3tQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "6441de4a-77de-40fe-adf5-a5c525dc6d02",
      "n": "6GTM8H9QdCWtG3ol1DCAi-Gfd2IxzOwGGNNZR7cPdg8NwE2jrncWEOfk7otIuZd6si518ibe99vJuzdBYRxQ8F-PjJwdz8kMPyKyUszpb6mgzPYTzhajDouryiPnQ_LQxBWeB05JLc2ahDT0p5fuK-k_m_w8AHOxIaLtc1WcU7PP1XKGYP9DgfqcynIdjsxfbp0AUeV9_LpF59PALFuDfIbeenDITz_u-UxotILRGsjl3u11llQ1Rl2t46C9eXkjk1nWnHr2UZoAgVvrA3wNX3A8mXloxCQ8ZjjhgdGzk2dOs07k77TeBeI1LHNdyUVR27dkWRO0lp42ENvp2DCgiw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "c220d4c2-d45f-4b53-911e-1857adf32cc5",
      "x": "oxe8RoiUP5PZ3g_ztSAn2idtjzf4fNeAxnSqTsyF3bE",
      "y": "W6093HAwly9sGxkD8IKd1SpBWf-V3JH-aA1O_yWs_gI"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "ee09370f-c529-4a0a-a687-23382b7a592a",
      "x": "hrNqtO9EJN6afrNOaCdyFcc-HoChief7b-_xxVEDiRc",
      "y": "nN_llnjCp8YiZ-sZd8yzPEiJTXlRI9kwZKsCZIGHXO8"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "5c246539-21b9-4353-a18e-fa9de124fd85",
      "x": "jedvFK39U3AC0EKqsceKuf1LMkfuN6SkkdGdiH5RT8s",
      "y": "LuYYjbsdUZ_fSWKSiQobPsf4Zc4UJcghfEUDxuIHarM"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "d790dcd3-f26d-4d9f-a9be-7f407a894708",
      "x": "HJmEKJp46m5cOkC1UDTspUYEnGLDzXV33-cNgRcZj5U"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "17ed6711-92e3-41cc-89ba-74a60ff51472",
      "alg": "RSA-OAEP",
      "n": "mYAvEq0ojCkaR8Z04lCxRSN1BmYy3FzU6r65BSr67xNHqROBq_FzBkj0egWDV3JMz6o7wE4CqAwr-eu2v4a-6b37w6wKYgHRN6_Nt0Oq3HKUo-lWJHkyIfgzDKlDMwk5jNucZKtWjHlkX5P7vDdED4wtXZeNeTxbWi7GZYR9U6to75HKUEeY8qvymrFbj7mhaBOVQ274PBZyd_unxPJ1xZ03nz5jedOtYjlrVczmAMzNyQeLj9YdweV4H0WqRFtdUBd_EJiiCY2sLPoecj7jRYlPhWh0JYGHg_5wgJUtJZViQCrZQ7LEN6WGbMq4DQxiuBHUqqXTnyhOvzuXC2OwKQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "e4971579-0a2b-4052-a78a-059c6f7e65ca",
      "x": "hf725kweUyaBb-94mLufR-kH6pUiE4rQ_U9-H02LtyU",
      "y": "MT3QPWv5k7-fzHnlQHHGt1AtcW7ei7J43CqFNjJeunw",
      "alg": "ECDH-ES"
    }
  ]
}
2021-09-30 07:04:38 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2021-09-30 07:04:38 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2021-09-30 07:04:38 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": 1580000000
}
2021-09-30 07:04:38
StoreOriginalClientConfiguration
No client details on configuration, created an empty original_client_config object.
2021-09-30 07:04:38
ExtractClientNameFromStoredConfig
Extracted client_name from stored client configuration.
client_name
2021-09-30 07:04:38
oidcc-client-test-discovery-openid-config
Setup Done
2021-09-30 07:04:55 INCOMING
oidcc-client-test-discovery-openid-config
Incoming HTTP request to test instance 0ZEcc3ObsVfrPbF
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2021-09-30 07:04:55 OUTGOING
oidcc-client-test-discovery-openid-config
Response to HTTP request to test instance 0ZEcc3ObsVfrPbF
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/a/idpy/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/idpy/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/idpy/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/idpy/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/idpy/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/idpy/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2021-09-30 07:04:55 FINISHED
oidcc-client-test-discovery-openid-config
Test has run to completion
testmodule_result
PASSED
2021-09-30 07:04:56 INCOMING
oidcc-client-test-discovery-openid-config
Incoming HTTP request to test instance 0ZEcc3ObsVfrPbF
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2021-09-30 07:04:56 OUTGOING
oidcc-client-test-discovery-openid-config
Response to HTTP request to test instance 0ZEcc3ObsVfrPbF
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "4c9c28b0-1944-49ee-b0ed-9c43b25bd605",
      "n": "jM0IDJY5QYEEwTl9H_ukhVs1_p0DxJ60v7WA_G9Inmu2QPdxwO9MavtFqaABpbF_maZtlsC__N8TGjYGn1sQ2Pd4tPcKTuIatqg1YG44oDCrj758U7w7vN2E79Lyx2CWhE6dQN0aOIm_vVLsNFMpcdAG8erC4Xm7Y0T9WxzH9ExZVdOtWsIpcCPrtFiSq44xgt86oHGvuxTCmByF3PL79CxkwBcnY0yVUPGhH6F9wLFv_ukEWhTTvF1AC_4tQuNjB8ZjZzh6IDYzMMAEy7PA8s79_ehw_i9Yjv4vs8OMx_fzfBJV-FBEa_uFq3N8NYYdUg0LiS5-FuL31tSYkcc3tQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "6441de4a-77de-40fe-adf5-a5c525dc6d02",
      "n": "6GTM8H9QdCWtG3ol1DCAi-Gfd2IxzOwGGNNZR7cPdg8NwE2jrncWEOfk7otIuZd6si518ibe99vJuzdBYRxQ8F-PjJwdz8kMPyKyUszpb6mgzPYTzhajDouryiPnQ_LQxBWeB05JLc2ahDT0p5fuK-k_m_w8AHOxIaLtc1WcU7PP1XKGYP9DgfqcynIdjsxfbp0AUeV9_LpF59PALFuDfIbeenDITz_u-UxotILRGsjl3u11llQ1Rl2t46C9eXkjk1nWnHr2UZoAgVvrA3wNX3A8mXloxCQ8ZjjhgdGzk2dOs07k77TeBeI1LHNdyUVR27dkWRO0lp42ENvp2DCgiw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "c220d4c2-d45f-4b53-911e-1857adf32cc5",
      "x": "oxe8RoiUP5PZ3g_ztSAn2idtjzf4fNeAxnSqTsyF3bE",
      "y": "W6093HAwly9sGxkD8IKd1SpBWf-V3JH-aA1O_yWs_gI"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "ee09370f-c529-4a0a-a687-23382b7a592a",
      "x": "hrNqtO9EJN6afrNOaCdyFcc-HoChief7b-_xxVEDiRc",
      "y": "nN_llnjCp8YiZ-sZd8yzPEiJTXlRI9kwZKsCZIGHXO8"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "5c246539-21b9-4353-a18e-fa9de124fd85",
      "x": "jedvFK39U3AC0EKqsceKuf1LMkfuN6SkkdGdiH5RT8s",
      "y": "LuYYjbsdUZ_fSWKSiQobPsf4Zc4UJcghfEUDxuIHarM"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "d790dcd3-f26d-4d9f-a9be-7f407a894708",
      "x": "HJmEKJp46m5cOkC1UDTspUYEnGLDzXV33-cNgRcZj5U"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "17ed6711-92e3-41cc-89ba-74a60ff51472",
      "alg": "RSA-OAEP",
      "n": "mYAvEq0ojCkaR8Z04lCxRSN1BmYy3FzU6r65BSr67xNHqROBq_FzBkj0egWDV3JMz6o7wE4CqAwr-eu2v4a-6b37w6wKYgHRN6_Nt0Oq3HKUo-lWJHkyIfgzDKlDMwk5jNucZKtWjHlkX5P7vDdED4wtXZeNeTxbWi7GZYR9U6to75HKUEeY8qvymrFbj7mhaBOVQ274PBZyd_unxPJ1xZ03nz5jedOtYjlrVczmAMzNyQeLj9YdweV4H0WqRFtdUBd_EJiiCY2sLPoecj7jRYlPhWh0JYGHg_5wgJUtJZViQCrZQ7LEN6WGbMq4DQxiuBHUqqXTnyhOvzuXC2OwKQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "e4971579-0a2b-4052-a78a-059c6f7e65ca",
      "x": "hf725kweUyaBb-94mLufR-kH6pUiE4rQ_U9-H02LtyU",
      "y": "MT3QPWv5k7-fzHnlQHHGt1AtcW7ei7J43CqFNjJeunw",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2021-09-30 07:05:00
TEST-RUNNER
Alias has now been claimed by another test
alias
idpy
new_test_id
GnvBY5i1Belk4Wb
Test Results