Test Info

Test descriptionVerify that jwks_uri is published
Profile[]
Test IDOP-Discovery-jwks_uri
Timestamp2017-12-18T20:58:47Z
Issuerhttps://oidctest.idautoengineering.net/idp

Conditions


check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
Done: status=OK

Trace Output

0.0phase<--<-- 0 --- Webfinger -->-->
0.0not expected to doWebFinger
0.0phase<--<-- 1 --- Discovery -->-->
0.0provider_config
kwargs:{'issuer': 'https://oidctest.idautoengineering.net/idp'}
0.024http response
url:https://oidctest.idautoengineering.net/idp/.well-known/openid-configuration status_code:200
0.026ProviderConfigurationResponse
{
    "authorization_endpoint": "https://oidctest.idautoengineering.net/idp/profile/oidc/auth",
    "claim_types_supported": [
        "normal"
    ],
    "claims_parameter_supported": false,
    "claims_supported": [
        "sub",
        "name",
        "given_name",
        "family_name",
        "email"
    ],
    "display_values_supported": [
        "page"
    ],
    "grant_types_supported": [
        "authorization_code"
    ],
    "id_token_signing_alg_values_supported": [
        "RS256"
    ],
    "issuer": "https://oidctest.idautoengineering.net/idp",
    "jwks_uri": "https://oidctest.idautoengineering.net/idp/profile/oidc/jwks",
    "request_parameter_supported": false,
    "request_uri_parameter_supported": true,
    "require_request_uri_registration": true,
    "response_modes_supported": [
        "query"
    ],
    "response_types_supported": [
        "code",
        "token",
        "id_token"
    ],
    "scopes_supported": [
        "openid"
    ],
    "subject_types_supported": [
        "public"
    ],
    "token_endpoint": "https://oidctest.idautoengineering.net/idp/profile/oidc/token",
    "token_endpoint_auth_methods_supported": [
        "client_secret_post",
        "client_secret_basic"
    ],
    "userinfo_endpoint": "https://oidctest.idautoengineering.net/idp/profile/oidc/userinfo",
    "userinfo_signing_alg_values_supported": [
        "RS256"
    ],
    "version": "3.0"
}
0.026phase<--<-- 2 --- Done -->-->
0.026end
0.026assertionCheckHTTPResponse
0.026conditioncheck-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0.027assertionCheckHasJwksURI
0.027conditionproviderinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
0.027assertionBareKeys
0.044http response
url:https://oidctest.idautoengineering.net/idp/profile/oidc/jwks status_code:200
0.044jwks{'keys': [{'n': 'AIrk783d5Hd6_IOq0D1ZoX40UFJwR4x629wC0GDy2Mzw9IdpL_FdDHHZI8xn-BSEqEYufFdoj4GNkVV-6HruEHmE98a50msajiO9h34cMahpIuE7rqcRxTih4fedOdWwAOUDryJ-vZ1MAG7cJ0Oh6xdQcBLjx-mKbMcpQcAemogJb393bKHIfcB6fZePfe516drs6pUWazBTBrAOloF9a-0QALCyirNKCTwDhnG0mT_2ZxqZj9vaKcZns6tCpHkhqF936MFTgRFj0_DeK6UvDe2MsylImZY9GKcogeXZvnv-FddiJnw6WGXlV8GkjBC2BnY0pTfK9wvM_9qNuhrldC0', 'alg': 'RS256', 'kid': '652e6957e173fc619617fa23c36cbac54a5fa78e60b7062896b6d8357d45a9f1', 'e': 'AQAB', 'use': 'sig', 'kty': 'RSA'}]}
0.044conditionbare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
0.044conditionDone: status=OK

Result

PASSED