Test Summary

Test Results

Expand All Collapse All
All times are UTC
2021-10-01 07:09:53 INFO
TEST-RUNNER
Test instance 82AkPeGBGf7k7EP created
baseUrl
https://www.certification.openid.net/test/a/idpy
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "response_mode": "form_post",
  "client_registration": "dynamic_client"
}
alias
idpy
description
oidcrp
planId
2XhPS6IlG6T8u
config
{
  "alias": "idpy",
  "description": "oidcrp",
  "server": {
    "discoveryUrl": "https://89.45.234.133:4000/.well-known/openid-configuration",
    "login_hint": "roland@89.45.234.133:4000"
  },
  "client2": {
    "client_name": "Anything"
  }
}
testName
oidcc-client-test-invalid-aud
2021-10-01 07:09:53 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/idpy/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/idpy/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/idpy/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/idpy/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/idpy/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/idpy/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-10-01 07:09:53
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/idpy/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/idpy/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/idpy/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/idpy/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/idpy/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/idpy/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2021-10-01 07:09:53
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "41RRpJBVVkPwkrhgvu5-dIC48vx1U-q-bdm_gZ_a7EB3ZG6HAp2QuQEoQ_za0tGBmvEV5mCBpI8VQeMOqAePF9a9vdDBrIaDshJCtYo_P8TZu__126GWkjtax0GG7rXILgKOXzuNgMq4DDRCeOY9DIjuGv_4nIpXFCzPnm-M8-k",
      "kty": "RSA",
      "q": "l-OZQ8d5I7qbmJtyYPd4DjzSWqzl9ZdWGR-9vp0RppkFq_Rcfia_Rlx7RKkjKFbOJasr-pHwlpab8VpJQFOmjoJ0_xF_qvJ93RCZjhIW47CG3Mr9NFckljT0eAXAvKw6S84BWYFEB5J9jOhFI_qa2mn0u8Ywgq2RS4-m95mqMIk",
      "d": "FarJCS99TYzR_hz3vh6ERI4GR0U_KeXq0QsprQQIdbcdK22W0ehaHqSU441EBDvNtNuTM86OjP2Ogjas1ePPS5gXSwqt29M2WMZqW354hutWQeJ8o3zvIi7kbaH4OI8_Rf_N1WMH4rlrTrusGCJ_1DT3ZWfwP5PjqwlQyzEqgjDdW53r14Dp0hypEIG6RYLAbiL-T97ILmyUxkdPf5IOIMelsraFJiQGvplIWe4PWaQRbf9bVhCVUxQyhNmjkDBjq0rxC4_6btqKi0Y6rMueQM5A0flj3TMj_1bDP3k9jOn3e6vY2gOzIh-E9Qi3qFipJBrEdIZEqzlOfyXfJbaoAQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "b9bdf8c1-8ec3-46f7-a689-400301a269b4",
      "qi": "BQ1NSfIg2vrvqSaOzoZQSkBA0uq1ggKgQDUs07ctbWLl-rYoQyi8P2IiNnkiT-DtI3t6kaWzrV3Z86Zu1FWF7FMxgLfqT9QPdOBbFJ8qZHn9H2jJfINQq01ROrFQ76TzN3QiJhuZG5swPIg07dlfSWlXDBFu79hAHEFeL2dElZw",
      "dp": "n2wadVXjAsRSihJThpKqi_lZus3hWiBdu5vg-X6pgNUU5ZG9jNADFjsBiexhaUcTpR09RnqXcFgHiFU7igsDBqzKE7u6lssewFqd_cId6RKbv4QZXxVLCvIlD2ecwPsqj1mrjo2tBo0j1SsxEqgkWA4PLVAlgWJi_vsN_wYry0E",
      "dq": "VmaBqKyvnENqf0Ttq3saL_8pKatwpGOR9ni31tZCVCJ3t3kppBkmdT_mXwhXl3rJiWP1gHPEB-Vkj8ZsJMtw02AibXXmybdnIXlv4AEqRBsGnFJb9oobpdY5uoyLNshB4R0uZ1vA9w29nYoCypSjwdrD_Iygy7UwEWuF7xLaXQE",
      "n": "huDYBgsNJ-4Xm_ykEBqDk4I1bf6ZqDJNl30l7_4wF1VGF5rmT1j_ZFhm6LV8JVhdADnGyyGEK95ufJ_hLlBFoHitmI8AKHzwuqtC9uCVh3xuCSk0R24qxl8XQkuemj-bXJLEmbLmdk4nGqAqf_c-zSZo6KPuST5UAqZqUockQ5beV7Se8WfMKLkuwpRb_TvoTltc54kAr7c7LYceKxCzNdXtO-QVTkMVN4MFnTMeXCOrQy6nG_nma_RBE57rtS2SymFV8RB3WNXS-UAB7vhBVDjz1nr8SjboTfHvrFl-Ztx0gUZMuNgTydIr5Z21ajBBIasF1TSgz5dMGY3jWeQ3sQ"
    },
    {
      "kty": "EC",
      "d": "oOrdfHIdgjYWzYUtJL9Pnq5dbOL2ttNX7c6b-6DW6WY",
      "use": "sig",
      "crv": "P-256",
      "kid": "c35b6a69-b7fc-449f-acf5-761f95cf9603",
      "x": "RHRNxf7lYgzBcVR88HeQ8G3FugTHFKFFbjAwgGy_ZvU",
      "y": "CycbbQ1g3_nrhXVDKuvO7tUOQJlsGGYrmiG5EVeK2Gc"
    },
    {
      "kty": "EC",
      "d": "DEkjzeKmt_Sgo5f4SI-qHuA4GPrFDqm5hzfhI5jMhJg",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "af79b173-7a7a-4a97-8219-b6459961fc3c",
      "x": "vDJBVQCxnRUHWz1Odd9HaM6F2yMKvIM1764BC4nr3oY",
      "y": "1uMvnP9_Rz44ZqjCOEm2g8uJeGAsYjd1tPIm696P4V8"
    },
    {
      "kty": "OKP",
      "d": "CZLkxZHGrFO7B70zQLfH0yueUi_JWQ1_Y9DwhPP8-TI",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "34ef4a58-9167-489d-96cf-0f9087164320",
      "x": "-ESSt6pEGQqQX-DwLyv_uqyuCk8RgSRmf_LgKf-QxsY"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "zFCaHGWDNcn_qEXa-B8Mfp2OUPIlCNyeMbFXJ96qEv33f8D64u9ZsoDRGR-RzuLqh6UpQ9DmO4DjMIk_iPCk24aWyQlQei58nDeZqGGPD7U96vXBf7oqdvQw1aknAuarVGQLwvWT9ZXQPvzI7XLFFB88yYedwc8xI_EI0fEPoFM",
      "kty": "RSA",
      "q": "uEVBT4B_y1xGJz6ZNx6FaBiMk1A3l9jsbmhWgSuPCtVY-kDT8QltzBrN8s3CrB6CcZkUh2KV3fcRA_Agx-zgyb3dobxRz7FLtFYRPjc0_EOVFyj9sM9cvo9N4DzBxX1bwTirimxhjQ_hlb6EuhuamFfMSFTsfUmT3_RBqzOXCnE",
      "d": "H32Sp67hUhBSwMn8D4LYRp6pz-TpsCp_43Ank4qtaq9rKZCZvhIOgrAd71uhF1vTpW9v3ppcqQCPuALfSivyAe6fnKlobxWMOnqq4VZrq7o7-_chHzuFUhFhbqxXYN-NPoG5b6vXa-q1d3fPDiGiC-Z1JfGuvCOXC-XCrPPoiIUVxuK2Ethzpqf0F81NDhmxrk9ckwXLoVhjfBrv-kXk-njv4gEfQnIvpCIE_YYGz1tWlGMS8olE7M8Ll9khYoCTMEayf4ALNWZW8OAeN06VEpNbWPo4J_6HCxqeHw7N2WKGaWcVE1Z5G-mOPztVd2VLw6eJqwuAjB7xsC9U2Rb94Q",
      "e": "AQAB",
      "use": "enc",
      "kid": "985fdd78-848d-4f40-a2ff-4db688259eab",
      "qi": "oStt90PZnu6x7n2YohWRh1rUhoyfBtABw2tCjACBtjfPlvRlfluMISySG8eeoFieGkYOS4zT4Pu7720cCYKUxHPmFdV6_xdSS8o4kDSYsAGOLe5Iww9VrtpTB06QyEt3mltlAwoW7c6HzNWGgoZybmEioCq9w4WwhLrbL2ttE4U",
      "dp": "abAkGB5WwkNMkVIZVBJTl0ePL8YibDQbTN9Mk142If7nwVklLrDbeF_0SgevmBJ_eU1xTBhKkGs6mofUqtS4oqo7Y6EC1UEoynJkdNqKc3iwn9MilhzKDKCChnOqr3B9HflmsCHyuK4XfA2tLk8ZLTB_dExHydKQu-PaSSdmius",
      "alg": "RSA-OAEP",
      "dq": "OMBblPimYyNQF9YXqfokbCLjaJtUA9gzOO25dp7LtzJt7OT6YUneHvZCZ30nb4sV8ZaL1AZw0aO-AdB6yBgUQw3OrHkrWSPphOjc9qRaFTdbO37MYx_6GFZaTa1ooEIzeBbT_hXTFXbGqy-6APdvbWvc5ooBK7T1bgv0DZ4d7oE",
      "n": "kxE0nd0suuiJWffhFm_S7kRYV2VUpcsPhf5XFc3-937ywWepI_PlvnvOcXYz5noZPAUhu0QDfbJDQMpojL8v2TDmgHvZ_bzRWpdnIEuLESDQOdmHGAmRu8j4iiqK_sIayAfhO1STLYSYVHNXCO7o6hmFvqId_N5BHfzMu5UNRTGOb5fCLa2_Qj_zO295rZgG2ubAeVoj8yXCIckr_W7BMhVucKtCcRkdMpd_ERYGBaR3fvXQaVKtvyxFrNDOAO4wXYlRsR7q38rf9pnKcBAI2vgAy2NSXPSX0SE4go7hiFsR9ln7NPbZp13q2y8Xq8ImmVsA8WBV5K1n2Y-vHh4Cow"
    },
    {
      "kty": "EC",
      "d": "eL0YjYNmcPlJwWcEMYAh_Y07B7XEbZT1sSB472xhZvM",
      "use": "enc",
      "crv": "P-256",
      "kid": "c0dea02a-07a4-4e15-a19d-40648dfe9121",
      "x": "og_eDwmD1ZoQQYWwptZykBoH7muuqAMFQiyAJK622kY",
      "y": "hO_0rn-WREvHFxzZursplWUXC9cuYkhIb2grIZ94CMk",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "b9bdf8c1-8ec3-46f7-a689-400301a269b4",
      "n": "huDYBgsNJ-4Xm_ykEBqDk4I1bf6ZqDJNl30l7_4wF1VGF5rmT1j_ZFhm6LV8JVhdADnGyyGEK95ufJ_hLlBFoHitmI8AKHzwuqtC9uCVh3xuCSk0R24qxl8XQkuemj-bXJLEmbLmdk4nGqAqf_c-zSZo6KPuST5UAqZqUockQ5beV7Se8WfMKLkuwpRb_TvoTltc54kAr7c7LYceKxCzNdXtO-QVTkMVN4MFnTMeXCOrQy6nG_nma_RBE57rtS2SymFV8RB3WNXS-UAB7vhBVDjz1nr8SjboTfHvrFl-Ztx0gUZMuNgTydIr5Z21ajBBIasF1TSgz5dMGY3jWeQ3sQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "cc4b20c2-046d-4078-b287-697c2eb99724",
      "n": "kLuFNHNEFzE-eXmwZ6PsIvgWroCnke1xc10GJyxVqipF66k_1nPqU4smQbFkKy6WhHBbJnT9FoOYv9xfXS1C5D5DFj9SQHC_P8TDa3lXV00EHoTS27sLwzNpjKa4HpdUYrbr4GkpQ0sgPtDlutvkHuCK3KpSWBAI1o5tkrVvPbm0QQShAk9fWMcOYZGD2yZkid4EAeexzkeHKWMqB10EgUt-8Z2To_aK4Tydtcykjji3yS34GDHhQHlJCf0sGCWUXAaSBenEyiHPi3JR-uKfSuTN0hLJD68sMLzbPBhGECh2xgHWkj7FMgd4ytq7BksyXdu6TK3bB2iT_iPSld_iuQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "c35b6a69-b7fc-449f-acf5-761f95cf9603",
      "x": "RHRNxf7lYgzBcVR88HeQ8G3FugTHFKFFbjAwgGy_ZvU",
      "y": "CycbbQ1g3_nrhXVDKuvO7tUOQJlsGGYrmiG5EVeK2Gc"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "183e2c52-1acb-4888-ba9a-76551009f6cd",
      "x": "3YeDnSYBIYitxmLguz_whvdT5Lnz-ztVFdWhumOYheQ",
      "y": "OMfiALtR-i_K7iZIaKOL_46AfWD6l4wCq95rOEF89A8"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "af79b173-7a7a-4a97-8219-b6459961fc3c",
      "x": "vDJBVQCxnRUHWz1Odd9HaM6F2yMKvIM1764BC4nr3oY",
      "y": "1uMvnP9_Rz44ZqjCOEm2g8uJeGAsYjd1tPIm696P4V8"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "34ef4a58-9167-489d-96cf-0f9087164320",
      "x": "-ESSt6pEGQqQX-DwLyv_uqyuCk8RgSRmf_LgKf-QxsY"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "985fdd78-848d-4f40-a2ff-4db688259eab",
      "alg": "RSA-OAEP",
      "n": "kxE0nd0suuiJWffhFm_S7kRYV2VUpcsPhf5XFc3-937ywWepI_PlvnvOcXYz5noZPAUhu0QDfbJDQMpojL8v2TDmgHvZ_bzRWpdnIEuLESDQOdmHGAmRu8j4iiqK_sIayAfhO1STLYSYVHNXCO7o6hmFvqId_N5BHfzMu5UNRTGOb5fCLa2_Qj_zO295rZgG2ubAeVoj8yXCIckr_W7BMhVucKtCcRkdMpd_ERYGBaR3fvXQaVKtvyxFrNDOAO4wXYlRsR7q38rf9pnKcBAI2vgAy2NSXPSX0SE4go7hiFsR9ln7NPbZp13q2y8Xq8ImmVsA8WBV5K1n2Y-vHh4Cow"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "c0dea02a-07a4-4e15-a19d-40648dfe9121",
      "x": "og_eDwmD1ZoQQYWwptZykBoH7muuqAMFQiyAJK622kY",
      "y": "hO_0rn-WREvHFxzZursplWUXC9cuYkhIb2grIZ94CMk",
      "alg": "ECDH-ES"
    }
  ]
}
2021-10-01 07:09:53 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2021-10-01 07:09:53 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2021-10-01 07:09:53 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": 1580000000
}
2021-10-01 07:09:53
StoreOriginalClientConfiguration
No client details on configuration, created an empty original_client_config object.
2021-10-01 07:09:53
ExtractClientNameFromStoredConfig
Extracted client_name from stored client configuration.
client_name
2021-10-01 07:09:53
oidcc-client-test-invalid-aud
Setup Done
2021-10-01 07:09:58 INCOMING
oidcc-client-test-invalid-aud
Incoming HTTP request to test instance 82AkPeGBGf7k7EP
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2021-10-01 07:09:58 OUTGOING
oidcc-client-test-invalid-aud
Response to HTTP request to test instance 82AkPeGBGf7k7EP
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/a/idpy/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/idpy/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/idpy/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/idpy/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/idpy/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/idpy/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2021-10-01 07:09:59 INCOMING
oidcc-client-test-invalid-aud
Incoming HTTP request to test instance 82AkPeGBGf7k7EP
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2021-10-01 07:09:59 OUTGOING
oidcc-client-test-invalid-aud
Response to HTTP request to test instance 82AkPeGBGf7k7EP
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "b9bdf8c1-8ec3-46f7-a689-400301a269b4",
      "n": "huDYBgsNJ-4Xm_ykEBqDk4I1bf6ZqDJNl30l7_4wF1VGF5rmT1j_ZFhm6LV8JVhdADnGyyGEK95ufJ_hLlBFoHitmI8AKHzwuqtC9uCVh3xuCSk0R24qxl8XQkuemj-bXJLEmbLmdk4nGqAqf_c-zSZo6KPuST5UAqZqUockQ5beV7Se8WfMKLkuwpRb_TvoTltc54kAr7c7LYceKxCzNdXtO-QVTkMVN4MFnTMeXCOrQy6nG_nma_RBE57rtS2SymFV8RB3WNXS-UAB7vhBVDjz1nr8SjboTfHvrFl-Ztx0gUZMuNgTydIr5Z21ajBBIasF1TSgz5dMGY3jWeQ3sQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "cc4b20c2-046d-4078-b287-697c2eb99724",
      "n": "kLuFNHNEFzE-eXmwZ6PsIvgWroCnke1xc10GJyxVqipF66k_1nPqU4smQbFkKy6WhHBbJnT9FoOYv9xfXS1C5D5DFj9SQHC_P8TDa3lXV00EHoTS27sLwzNpjKa4HpdUYrbr4GkpQ0sgPtDlutvkHuCK3KpSWBAI1o5tkrVvPbm0QQShAk9fWMcOYZGD2yZkid4EAeexzkeHKWMqB10EgUt-8Z2To_aK4Tydtcykjji3yS34GDHhQHlJCf0sGCWUXAaSBenEyiHPi3JR-uKfSuTN0hLJD68sMLzbPBhGECh2xgHWkj7FMgd4ytq7BksyXdu6TK3bB2iT_iPSld_iuQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "c35b6a69-b7fc-449f-acf5-761f95cf9603",
      "x": "RHRNxf7lYgzBcVR88HeQ8G3FugTHFKFFbjAwgGy_ZvU",
      "y": "CycbbQ1g3_nrhXVDKuvO7tUOQJlsGGYrmiG5EVeK2Gc"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "183e2c52-1acb-4888-ba9a-76551009f6cd",
      "x": "3YeDnSYBIYitxmLguz_whvdT5Lnz-ztVFdWhumOYheQ",
      "y": "OMfiALtR-i_K7iZIaKOL_46AfWD6l4wCq95rOEF89A8"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "af79b173-7a7a-4a97-8219-b6459961fc3c",
      "x": "vDJBVQCxnRUHWz1Odd9HaM6F2yMKvIM1764BC4nr3oY",
      "y": "1uMvnP9_Rz44ZqjCOEm2g8uJeGAsYjd1tPIm696P4V8"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "34ef4a58-9167-489d-96cf-0f9087164320",
      "x": "-ESSt6pEGQqQX-DwLyv_uqyuCk8RgSRmf_LgKf-QxsY"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "985fdd78-848d-4f40-a2ff-4db688259eab",
      "alg": "RSA-OAEP",
      "n": "kxE0nd0suuiJWffhFm_S7kRYV2VUpcsPhf5XFc3-937ywWepI_PlvnvOcXYz5noZPAUhu0QDfbJDQMpojL8v2TDmgHvZ_bzRWpdnIEuLESDQOdmHGAmRu8j4iiqK_sIayAfhO1STLYSYVHNXCO7o6hmFvqId_N5BHfzMu5UNRTGOb5fCLa2_Qj_zO295rZgG2ubAeVoj8yXCIckr_W7BMhVucKtCcRkdMpd_ERYGBaR3fvXQaVKtvyxFrNDOAO4wXYlRsR7q38rf9pnKcBAI2vgAy2NSXPSX0SE4go7hiFsR9ln7NPbZp13q2y8Xq8ImmVsA8WBV5K1n2Y-vHh4Cow"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "c0dea02a-07a4-4e15-a19d-40648dfe9121",
      "x": "og_eDwmD1ZoQQYWwptZykBoH7muuqAMFQiyAJK622kY",
      "y": "hO_0rn-WREvHFxzZursplWUXC9cuYkhIb2grIZ94CMk",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2021-10-01 07:09:59 INCOMING
oidcc-client-test-invalid-aud
Incoming HTTP request to test instance 82AkPeGBGf7k7EP
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "content-type": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "703",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
    "https://89.45.234.133:8090/authz_im_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
    "https://89.45.234.133:8090/authz_fp_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
    "https://89.45.234.133:8090/req_uri/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "authorization_code",
    "implicit"
  ]
}
incoming_query_string_params
{}
incoming_body
{"application_type": "web", "response_types": ["code", "id_token"], "contacts": ["ops@example.com"], "token_endpoint_auth_method": "client_secret_basic", "redirect_uris": ["https://89.45.234.133:8090/authz_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8", "https://89.45.234.133:8090/authz_im_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8", "https://89.45.234.133:8090/authz_fp_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8", "https://89.45.234.133:8090/req_uri/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8"], "jwks_uri": "https://89.45.234.133:8090/static/jwks.json", "grant_types": ["authorization_code", "implicit"]}
Registration endpoint
2021-10-01 07:09:59 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
    "https://89.45.234.133:8090/authz_im_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
    "https://89.45.234.133:8090/authz_fp_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
    "https://89.45.234.133:8090/req_uri/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "authorization_code",
    "implicit"
  ]
}
2021-10-01 07:09:59 SUCCESS
EnsureRegistrationRequestContainsAtLeastOneContact
Registration request contains valid contacts
contacts
[
  "ops@example.com"
]
2021-10-01 07:09:59 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code",
  "implicit"
]
response_types
[
  "code",
  "id_token"
]
2021-10-01 07:09:59 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://89.45.234.133:8090/authz_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
  "https://89.45.234.133:8090/authz_im_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
  "https://89.45.234.133:8090/authz_fp_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
  "https://89.45.234.133:8090/req_uri/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8"
]
2021-10-01 07:09:59 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2021-10-01 07:09:59 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2021-10-01 07:09:59 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2021-10-01 07:09:59 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2021-10-01 07:09:59 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2021-10-01 07:09:59 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2021-10-01 07:09:59 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2021-10-01 07:09:59 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2021-10-01 07:09:59 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2021-10-01 07:09:59 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2021-10-01 07:09:59 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2021-10-01 07:09:59 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2021-10-01 07:09:59 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2021-10-01 07:09:59 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2021-10-01 07:09:59 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2021-10-01 07:09:59 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2021-10-01 07:09:59 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2021-10-01 07:09:59 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2021-10-01 07:09:59 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
    "https://89.45.234.133:8090/authz_im_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
    "https://89.45.234.133:8090/authz_fp_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
    "https://89.45.234.133:8090/req_uri/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "client_id": "client_IPbKCiyNDleiupr14522-~[@\u003e"
}
2021-10-01 07:09:59
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_hijDVmKfBrjIyfpziagpdsuaiiUHRoKmprSxXwdNXWKFlHlmvE5659234038^|#/"
2021-10-01 07:09:59 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2021-10-01 07:09:59 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
    "https://89.45.234.133:8090/authz_im_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
    "https://89.45.234.133:8090/authz_fp_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
    "https://89.45.234.133:8090/req_uri/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "client_id": "client_IPbKCiyNDleiupr14522-~[@\u003e",
  "client_secret": "secret_hijDVmKfBrjIyfpziagpdsuaiiUHRoKmprSxXwdNXWKFlHlmvE5659234038^|#/\""
}
2021-10-01 07:09:59
FetchClientKeys
Fetching client keys
jwks_uri
https://89.45.234.133:8090/static/jwks.json
2021-10-01 07:09:59
FetchClientKeys
HTTP request
request_uri
https://89.45.234.133:8090/static/jwks.json
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/cbor, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2021-10-01 07:10:00 RESPONSE
FetchClientKeys
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "content-length": "691",
  "content-type": "application/json",
  "last-modified": "Fri, 01 Oct 2021 07:09:58 GMT",
  "cache-control": "public, max-age\u003d43200",
  "expires": "Fri, 01 Oct 2021 19:10:00 GMT",
  "etag": "\"1633072198.4369674-691-625874018\"",
  "date": "Fri, 01 Oct 2021 07:10:00 GMT",
  "server": "Werkzeug/1.0.1 Python/3.8.10"
}
response_body
{"keys": [{"kty": "RSA", "use": "sig", "kid": "ZnM1b012dmhUSjh5X05VOUhpN0pXZVlSSEVjQ2J5dEkyQXEwTWQ2UjdhRQ", "n": "tkih6m_RcAr9RozD7IrHS0KjdLHSjMYuT2uRdtbTEJx1jBV6sDADoP3IskBFlwKssFAfZmtjSLETX7JUyIBkhUfTU0OKdVVrfTslfbUw4_m4OyaJmB6POycCH-zk-we9GnP1rjvfPIaaWLVtNM6r2wC-MTWv4MEL1sp-G0nj63oC53hc83q0pxaJqaDr7fMSZCUswL209DnSSn5aF80teBDUS-wOjLvihFIKSDZf0r3t9ObxYsT4tPbq7hQQc2K9XlYADfr-cmBQtwXg9h1jI31s5p-xI1SWzABQm2ZdCovcGjl9GopHsqtCINU7LCK7noRgwxHPERcJwDOX06IRmw", "e": "AQAB"}, {"kty": "EC", "use": "sig", "kid": "S0p4OFlHMzdtNzFjZlpoWkpKNnVmMHM1RHAyVlFtbXlrUjRhdjVpNXBLWQ", "crv": "P-256", "x": "MEFzjCvTrLMkOcRgdLWYpK4b_xrKOn5XAKJvOhYqZTM", "y": "-T_OakJ08j_rRP4Imn1p3L4rG60cQk72Nh4HX_tDDd0"}]}
2021-10-01 07:10:00
FetchClientKeys
Found JWK set string
jwk_string
{"keys": [{"kty": "RSA", "use": "sig", "kid": "ZnM1b012dmhUSjh5X05VOUhpN0pXZVlSSEVjQ2J5dEkyQXEwTWQ2UjdhRQ", "n": "tkih6m_RcAr9RozD7IrHS0KjdLHSjMYuT2uRdtbTEJx1jBV6sDADoP3IskBFlwKssFAfZmtjSLETX7JUyIBkhUfTU0OKdVVrfTslfbUw4_m4OyaJmB6POycCH-zk-we9GnP1rjvfPIaaWLVtNM6r2wC-MTWv4MEL1sp-G0nj63oC53hc83q0pxaJqaDr7fMSZCUswL209DnSSn5aF80teBDUS-wOjLvihFIKSDZf0r3t9ObxYsT4tPbq7hQQc2K9XlYADfr-cmBQtwXg9h1jI31s5p-xI1SWzABQm2ZdCovcGjl9GopHsqtCINU7LCK7noRgwxHPERcJwDOX06IRmw", "e": "AQAB"}, {"kty": "EC", "use": "sig", "kid": "S0p4OFlHMzdtNzFjZlpoWkpKNnVmMHM1RHAyVlFtbXlrUjRhdjVpNXBLWQ", "crv": "P-256", "x": "MEFzjCvTrLMkOcRgdLWYpK4b_xrKOn5XAKJvOhYqZTM", "y": "-T_OakJ08j_rRP4Imn1p3L4rG60cQk72Nh4HX_tDDd0"}]}
2021-10-01 07:10:00 SUCCESS
FetchClientKeys
Downloaded and added client JWK set to client
client
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
    "https://89.45.234.133:8090/authz_im_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
    "https://89.45.234.133:8090/authz_fp_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
    "https://89.45.234.133:8090/req_uri/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "client_id": "client_IPbKCiyNDleiupr14522-~[@\u003e",
  "client_secret": "secret_hijDVmKfBrjIyfpziagpdsuaiiUHRoKmprSxXwdNXWKFlHlmvE5659234038^|#/\"",
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "use": "sig",
        "kid": "ZnM1b012dmhUSjh5X05VOUhpN0pXZVlSSEVjQ2J5dEkyQXEwTWQ2UjdhRQ",
        "n": "tkih6m_RcAr9RozD7IrHS0KjdLHSjMYuT2uRdtbTEJx1jBV6sDADoP3IskBFlwKssFAfZmtjSLETX7JUyIBkhUfTU0OKdVVrfTslfbUw4_m4OyaJmB6POycCH-zk-we9GnP1rjvfPIaaWLVtNM6r2wC-MTWv4MEL1sp-G0nj63oC53hc83q0pxaJqaDr7fMSZCUswL209DnSSn5aF80teBDUS-wOjLvihFIKSDZf0r3t9ObxYsT4tPbq7hQQc2K9XlYADfr-cmBQtwXg9h1jI31s5p-xI1SWzABQm2ZdCovcGjl9GopHsqtCINU7LCK7noRgwxHPERcJwDOX06IRmw",
        "e": "AQAB"
      },
      {
        "kty": "EC",
        "use": "sig",
        "kid": "S0p4OFlHMzdtNzFjZlpoWkpKNnVmMHM1RHAyVlFtbXlrUjRhdjVpNXBLWQ",
        "crv": "P-256",
        "x": "MEFzjCvTrLMkOcRgdLWYpK4b_xrKOn5XAKJvOhYqZTM",
        "y": "-T_OakJ08j_rRP4Imn1p3L4rG60cQk72Nh4HX_tDDd0"
      }
    ]
  }
}
2021-10-01 07:10:00 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2021-10-01 07:10:00
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2021-10-01 07:10:00 OUTGOING
oidcc-client-test-invalid-aud
Response to HTTP request to test instance 82AkPeGBGf7k7EP
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "application_type": "web",
  "response_types": [
    "code",
    "id_token"
  ],
  "contacts": [
    "ops@example.com"
  ],
  "token_endpoint_auth_method": "client_secret_basic",
  "redirect_uris": [
    "https://89.45.234.133:8090/authz_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
    "https://89.45.234.133:8090/authz_im_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
    "https://89.45.234.133:8090/authz_fp_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
    "https://89.45.234.133:8090/req_uri/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8"
  ],
  "jwks_uri": "https://89.45.234.133:8090/static/jwks.json",
  "grant_types": [
    "authorization_code",
    "implicit"
  ],
  "client_id": "client_IPbKCiyNDleiupr14522-~[@\u003e",
  "client_secret": "secret_hijDVmKfBrjIyfpziagpdsuaiiUHRoKmprSxXwdNXWKFlHlmvE5659234038^|#/\"",
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "use": "sig",
        "kid": "ZnM1b012dmhUSjh5X05VOUhpN0pXZVlSSEVjQ2J5dEkyQXEwTWQ2UjdhRQ",
        "n": "tkih6m_RcAr9RozD7IrHS0KjdLHSjMYuT2uRdtbTEJx1jBV6sDADoP3IskBFlwKssFAfZmtjSLETX7JUyIBkhUfTU0OKdVVrfTslfbUw4_m4OyaJmB6POycCH-zk-we9GnP1rjvfPIaaWLVtNM6r2wC-MTWv4MEL1sp-G0nj63oC53hc83q0pxaJqaDr7fMSZCUswL209DnSSn5aF80teBDUS-wOjLvihFIKSDZf0r3t9ObxYsT4tPbq7hQQc2K9XlYADfr-cmBQtwXg9h1jI31s5p-xI1SWzABQm2ZdCovcGjl9GopHsqtCINU7LCK7noRgwxHPERcJwDOX06IRmw",
        "e": "AQAB"
      },
      {
        "kty": "EC",
        "use": "sig",
        "kid": "S0p4OFlHMzdtNzFjZlpoWkpKNnVmMHM1RHAyVlFtbXlrUjRhdjVpNXBLWQ",
        "crv": "P-256",
        "x": "MEFzjCvTrLMkOcRgdLWYpK4b_xrKOn5XAKJvOhYqZTM",
        "y": "-T_OakJ08j_rRP4Imn1p3L4rG60cQk72Nh4HX_tDDd0"
      }
    ]
  },
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2021-10-01 07:10:00 INCOMING
oidcc-client-test-invalid-aud
Incoming HTTP request to test instance 82AkPeGBGf7k7EP
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,*/*;q\u003d0.8",
  "cookie": "JSESSIONID\u003dC72C28B7C54F724771359E5F9D552F52; __utma\u003d201319536.1325286560.1632909994.1632989957.1631776378.4; __utmc\u003d201319536; __utmz\u003d201319536.1632985063.2.2.utmcsr\u003dt.co|utmccn\u003d(referral)|utmcmd\u003dreferral|utmcct\u003d/",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/14.1.2 Safari/605.1.15",
  "accept-language": "en-us",
  "referer": "https://89.45.234.133:8090/authz_fp_cb/1a63a94f09ad2913b90f2acd5afa562c9201e337aad710f8a50e01c4626b5183",
  "accept-encoding": "gzip, deflate, br",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "redirect_uri": "https://89.45.234.133:8090/authz_fp_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
  "scope": "openid profile email address phone",
  "response_type": "code",
  "nonce": "7MA1BNlUjeq79OaoWhltgFdb",
  "response_mode": "form_post",
  "state": "zlpIB3oBfLDtyVJKFSnyUl9hoy5D3IBT",
  "client_id": "client_IPbKCiyNDleiupr14522-~[@\u003e"
}
incoming_body
Authorization endpoint
2021-10-01 07:10:00 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2021-10-01 07:10:00 SUCCESS
EnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "profile",
  "email",
  "address",
  "phone"
]
expected
openid
2021-10-01 07:10:00 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "redirect_uri": "https://89.45.234.133:8090/authz_fp_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
  "scope": "openid profile email address phone",
  "response_type": "code",
  "nonce": "7MA1BNlUjeq79OaoWhltgFdb",
  "response_mode": "form_post",
  "state": "zlpIB3oBfLDtyVJKFSnyUl9hoy5D3IBT",
  "client_id": "client_IPbKCiyNDleiupr14522-~[@\u003e"
}
2021-10-01 07:10:00 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid profile email address phone
2021-10-01 07:10:00 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
7MA1BNlUjeq79OaoWhltgFdb
2021-10-01 07:10:00 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2021-10-01 07:10:00 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_IPbKCiyNDleiupr14522-~[@>
2021-10-01 07:10:00 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://89.45.234.133:8090/authz_fp_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8
expected
[
  "https://89.45.234.133:8090/authz_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
  "https://89.45.234.133:8090/authz_im_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
  "https://89.45.234.133:8090/authz_fp_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
  "https://89.45.234.133:8090/req_uri/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8"
]
2021-10-01 07:10:00 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "profile",
  "email",
  "address",
  "phone"
]
expected
openid
2021-10-01 07:10:00 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2021-10-01 07:10:00 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
Un3w5JBEqNcR75yWojyH8BIxTmOnsEQQ
2021-10-01 07:10:00 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
WOAMurtq7OM5Hd_bk4afaA
2021-10-01 07:10:00 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://89.45.234.133:8090/authz_fp_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
  "state": "zlpIB3oBfLDtyVJKFSnyUl9hoy5D3IBT"
}
2021-10-01 07:10:00 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://89.45.234.133:8090/authz_fp_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
  "state": "zlpIB3oBfLDtyVJKFSnyUl9hoy5D3IBT",
  "code": "Un3w5JBEqNcR75yWojyH8BIxTmOnsEQQ"
}
2021-10-01 07:10:00 OUTGOING
oidcc-client-test-invalid-aud
Response to HTTP request to test instance 82AkPeGBGf7k7EP
outgoing
ModelAndView [view="formPostResponseMode"; model={formAction=https://89.45.234.133:8090/authz_fp_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8, formParameters={"state":"zlpIB3oBfLDtyVJKFSnyUl9hoy5D3IBT","code":"Un3w5JBEqNcR75yWojyH8BIxTmOnsEQQ"}}]
outgoing_path
authorize
2021-10-01 07:10:01 INCOMING
oidcc-client-test-invalid-aud
Incoming HTTP request to test instance 82AkPeGBGf7k7EP
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "python-requests/2.25.1",
  "accept-encoding": "gzip, deflate",
  "accept": "*/*",
  "authorization": "Basic Y2xpZW50X0lQYktDaXlORGxlaXVwcjE0NTIyLX4lNUIlNDAlM0U6c2VjcmV0X2hpakRWbUtmQnJqSXlmcHppYWdwZHN1YWlpVUhSb0ttcHJTeFh3ZE5YV0tGbEhsbXZFNTY1OTIzNDAzOCU1RSU3QyUyMyUyRiUyMg\u003d\u003d",
  "content-type": "application/x-www-form-urlencoded",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "284",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "grant_type": "authorization_code",
  "redirect_uri": "https://89.45.234.133:8090/authz_fp_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8",
  "client_id": "client_IPbKCiyNDleiupr14522-~[@\u003e",
  "state": "zlpIB3oBfLDtyVJKFSnyUl9hoy5D3IBT",
  "code": "Un3w5JBEqNcR75yWojyH8BIxTmOnsEQQ"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
grant_type=authorization_code&redirect_uri=https%3A%2F%2F89.45.234.133%3A8090%2Fauthz_fp_cb%2F28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8&client_id=client_IPbKCiyNDleiupr14522-%7E%5B%40%3E&state=zlpIB3oBfLDtyVJKFSnyUl9hoy5D3IBT&code=Un3w5JBEqNcR75yWojyH8BIxTmOnsEQQ
Token endpoint
2021-10-01 07:10:01 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
client_IPbKCiyNDleiupr14522-~[@>
client_secret
secret_hijDVmKfBrjIyfpziagpdsuaiiUHRoKmprSxXwdNXWKFlHlmvE5659234038^|#/"
method
client_secret_basic
2021-10-01 07:10:01 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2021-10-01 07:10:01 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
Un3w5JBEqNcR75yWojyH8BIxTmOnsEQQ
2021-10-01 07:10:01 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://89.45.234.133:8090/authz_fp_cb/28461094952df242f0d095875f6c40b4e4ae61a66dcd576a0e1001de396d10a8
2021-10-01 07:10:01 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
u2fptj9Nlb8Xd5Otqkug2EiOqLZyTqcokgut6ScOZvxRcWjxqq
2021-10-01 07:10:01 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
o_emkDKKU7pmotgZLWL9Mg
2021-10-01 07:10:01 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/idpy/
sub
user-subject-1234531
aud
client_IPbKCiyNDleiupr14522-~[@>
nonce
7MA1BNlUjeq79OaoWhltgFdb
iat
1633072201
exp
1633072501
2021-10-01 07:10:01 SUCCESS
AddInvalidAudValueToIdToken
Added invalid aud to ID token claims
aud
client_IPbKCiyNDleiupr14522-~[@>1
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/idpy/",
  "sub": "user-subject-1234531",
  "aud": "client_IPbKCiyNDleiupr14522-~[@\u003e1",
  "nonce": "7MA1BNlUjeq79OaoWhltgFdb",
  "iat": 1633072201,
  "exp": 1633072501
}
2021-10-01 07:10:01 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
o_emkDKKU7pmotgZLWL9Mg
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/idpy/",
  "sub": "user-subject-1234531",
  "aud": "client_IPbKCiyNDleiupr14522-~[@\u003e1",
  "nonce": "7MA1BNlUjeq79OaoWhltgFdb",
  "iat": 1633072201,
  "exp": 1633072501,
  "at_hash": "o_emkDKKU7pmotgZLWL9Mg"
}
2021-10-01 07:10:01 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiJiOWJkZjhjMS04ZWMzLTQ2ZjctYTY4OS00MDAzMDFhMjY5YjQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoib19lbWtES0tVN3Btb3RnWkxXTDlNZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X0lQYktDaXlORGxlaXVwcjE0NTIyLX5bQD4xIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL2FcL2lkcHlcLyIsImV4cCI6MTYzMzA3MjUwMSwibm9uY2UiOiI3TUExQk5sVWplcTc5T2FvV2hsdGdGZGIiLCJpYXQiOjE2MzMwNzIyMDF9.TzLz2O5qu3Xou4mjWiC9c1oboHOW54AcrgUVV8oxqdQkGX_936yVz4v1_teOaw8Cc7X8RN79-3ZJOb8yC45bORGA50EJ5va87-Owso1sNzU9swewPUnguR43tslcaNoMntWZpFan8lRmhigJdeN7Frp_-_h_XCgHi5zhqvVwuREncElZRSblFU8NzOJBJyygvSKiWTKEzlyeGPJ1AEBfrg3-5CGmJyCTVlOkiUF79rXD7Vt2AQ7PkrsSO6wUyKDWg_5UMEgGXtt_RGtmN92PAN3aWb2k_rcsARG85JYjbBPht9OkLtwUHn977ghwiHoEiwhjCfeKS_JUf9ASe_4g5Q
key
{"p":"41RRpJBVVkPwkrhgvu5-dIC48vx1U-q-bdm_gZ_a7EB3ZG6HAp2QuQEoQ_za0tGBmvEV5mCBpI8VQeMOqAePF9a9vdDBrIaDshJCtYo_P8TZu__126GWkjtax0GG7rXILgKOXzuNgMq4DDRCeOY9DIjuGv_4nIpXFCzPnm-M8-k","kty":"RSA","q":"l-OZQ8d5I7qbmJtyYPd4DjzSWqzl9ZdWGR-9vp0RppkFq_Rcfia_Rlx7RKkjKFbOJasr-pHwlpab8VpJQFOmjoJ0_xF_qvJ93RCZjhIW47CG3Mr9NFckljT0eAXAvKw6S84BWYFEB5J9jOhFI_qa2mn0u8Ywgq2RS4-m95mqMIk","d":"FarJCS99TYzR_hz3vh6ERI4GR0U_KeXq0QsprQQIdbcdK22W0ehaHqSU441EBDvNtNuTM86OjP2Ogjas1ePPS5gXSwqt29M2WMZqW354hutWQeJ8o3zvIi7kbaH4OI8_Rf_N1WMH4rlrTrusGCJ_1DT3ZWfwP5PjqwlQyzEqgjDdW53r14Dp0hypEIG6RYLAbiL-T97ILmyUxkdPf5IOIMelsraFJiQGvplIWe4PWaQRbf9bVhCVUxQyhNmjkDBjq0rxC4_6btqKi0Y6rMueQM5A0flj3TMj_1bDP3k9jOn3e6vY2gOzIh-E9Qi3qFipJBrEdIZEqzlOfyXfJbaoAQ","e":"AQAB","use":"sig","kid":"b9bdf8c1-8ec3-46f7-a689-400301a269b4","qi":"BQ1NSfIg2vrvqSaOzoZQSkBA0uq1ggKgQDUs07ctbWLl-rYoQyi8P2IiNnkiT-DtI3t6kaWzrV3Z86Zu1FWF7FMxgLfqT9QPdOBbFJ8qZHn9H2jJfINQq01ROrFQ76TzN3QiJhuZG5swPIg07dlfSWlXDBFu79hAHEFeL2dElZw","dp":"n2wadVXjAsRSihJThpKqi_lZus3hWiBdu5vg-X6pgNUU5ZG9jNADFjsBiexhaUcTpR09RnqXcFgHiFU7igsDBqzKE7u6lssewFqd_cId6RKbv4QZXxVLCvIlD2ecwPsqj1mrjo2tBo0j1SsxEqgkWA4PLVAlgWJi_vsN_wYry0E","dq":"VmaBqKyvnENqf0Ttq3saL_8pKatwpGOR9ni31tZCVCJ3t3kppBkmdT_mXwhXl3rJiWP1gHPEB-Vkj8ZsJMtw02AibXXmybdnIXlv4AEqRBsGnFJb9oobpdY5uoyLNshB4R0uZ1vA9w29nYoCypSjwdrD_Iygy7UwEWuF7xLaXQE","n":"huDYBgsNJ-4Xm_ykEBqDk4I1bf6ZqDJNl30l7_4wF1VGF5rmT1j_ZFhm6LV8JVhdADnGyyGEK95ufJ_hLlBFoHitmI8AKHzwuqtC9uCVh3xuCSk0R24qxl8XQkuemj-bXJLEmbLmdk4nGqAqf_c-zSZo6KPuST5UAqZqUockQ5beV7Se8WfMKLkuwpRb_TvoTltc54kAr7c7LYceKxCzNdXtO-QVTkMVN4MFnTMeXCOrQy6nG_nma_RBE57rtS2SymFV8RB3WNXS-UAB7vhBVDjz1nr8SjboTfHvrFl-Ztx0gUZMuNgTydIr5Z21ajBBIasF1TSgz5dMGY3jWeQ3sQ"}
algorithm
RS256
2021-10-01 07:10:01 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2021-10-01 07:10:01 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
u2fptj9Nlb8Xd5Otqkug2EiOqLZyTqcokgut6ScOZvxRcWjxqq
token_type
Bearer
id_token
eyJraWQiOiJiOWJkZjhjMS04ZWMzLTQ2ZjctYTY4OS00MDAzMDFhMjY5YjQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoib19lbWtES0tVN3Btb3RnWkxXTDlNZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X0lQYktDaXlORGxlaXVwcjE0NTIyLX5bQD4xIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL2FcL2lkcHlcLyIsImV4cCI6MTYzMzA3MjUwMSwibm9uY2UiOiI3TUExQk5sVWplcTc5T2FvV2hsdGdGZGIiLCJpYXQiOjE2MzMwNzIyMDF9.TzLz2O5qu3Xou4mjWiC9c1oboHOW54AcrgUVV8oxqdQkGX_936yVz4v1_teOaw8Cc7X8RN79-3ZJOb8yC45bORGA50EJ5va87-Owso1sNzU9swewPUnguR43tslcaNoMntWZpFan8lRmhigJdeN7Frp_-_h_XCgHi5zhqvVwuREncElZRSblFU8NzOJBJyygvSKiWTKEzlyeGPJ1AEBfrg3-5CGmJyCTVlOkiUF79rXD7Vt2AQ7PkrsSO6wUyKDWg_5UMEgGXtt_RGtmN92PAN3aWb2k_rcsARG85JYjbBPht9OkLtwUHn977ghwiHoEiwhjCfeKS_JUf9ASe_4g5Q
scope
openid profile email address phone
2021-10-01 07:10:01 OUTGOING
oidcc-client-test-invalid-aud
Response to HTTP request to test instance 82AkPeGBGf7k7EP
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "u2fptj9Nlb8Xd5Otqkug2EiOqLZyTqcokgut6ScOZvxRcWjxqq",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiJiOWJkZjhjMS04ZWMzLTQ2ZjctYTY4OS00MDAzMDFhMjY5YjQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoib19lbWtES0tVN3Btb3RnWkxXTDlNZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X0lQYktDaXlORGxlaXVwcjE0NTIyLX5bQD4xIiwiaXNzIjoiaHR0cHM6XC9cL3d3dy5jZXJ0aWZpY2F0aW9uLm9wZW5pZC5uZXRcL3Rlc3RcL2FcL2lkcHlcLyIsImV4cCI6MTYzMzA3MjUwMSwibm9uY2UiOiI3TUExQk5sVWplcTc5T2FvV2hsdGdGZGIiLCJpYXQiOjE2MzMwNzIyMDF9.TzLz2O5qu3Xou4mjWiC9c1oboHOW54AcrgUVV8oxqdQkGX_936yVz4v1_teOaw8Cc7X8RN79-3ZJOb8yC45bORGA50EJ5va87-Owso1sNzU9swewPUnguR43tslcaNoMntWZpFan8lRmhigJdeN7Frp_-_h_XCgHi5zhqvVwuREncElZRSblFU8NzOJBJyygvSKiWTKEzlyeGPJ1AEBfrg3-5CGmJyCTVlOkiUF79rXD7Vt2AQ7PkrsSO6wUyKDWg_5UMEgGXtt_RGtmN92PAN3aWb2k_rcsARG85JYjbBPht9OkLtwUHn977ghwiHoEiwhjCfeKS_JUf9ASe_4g5Q",
  "scope": "openid profile email address phone"
}
outgoing_path
token
2021-10-01 07:10:06 FINISHED
oidcc-client-test-invalid-aud
Test has run to completion
testmodule_result
PASSED
2021-10-01 07:10:09
TEST-RUNNER
Alias has now been claimed by another test
alias
idpy
new_test_id
jO0XnA4VPlSEUW4
Test Results