0 | phase | <--<-- 0 --- Webfinger -->--> |
0 | not expected to do | WebFinger |
0 | phase | <--<-- 1 --- Discovery -->--> |
0 | provider_config | kwargs:{'issuer': 'https://oidc-prod-eu01a-test1.ice.ibmcloud.com/oidc/endpoint/default'}
|
1 | http response | url:https://oidc-prod-eu01a-test1.ice.ibmcloud.com/oidc/endpoint/default/.well-known/openid-configuration status_code:200
|
1 | ProviderConfigurationResponse | {
"authorization_endpoint": "https://oidc-prod-eu01a-test1.ice.ibmcloud.com/oidc/endpoint/default/authorize",
"claim_types_supported": [
"normal"
],
"claims_parameter_supported": true,
"claims_supported": [
"realmName",
"preferred_username",
"given_name",
"uid",
"upn",
"groupIds",
"employee_id",
"name",
"tenantId",
"mobile_number",
"department",
"family_name",
"job_title",
"email"
],
"device_authorization_endpoint": "https://oidc-prod-eu01a-test1.ice.ibmcloud.com/oidc/endpoint/default/device_authorization",
"grant_types_supported": [
"authorization_code",
"implicit",
"client_credentials",
"password",
"refresh_token",
"urn:ietf:params:oauth:grant-type:device_code"
],
"id_token_encryption_alg_values_supported": [
"none"
],
"id_token_encryption_enc_values_supported": [
"none"
],
"id_token_signing_alg_values_supported": [
"none",
"HS256",
"HS384",
"HS512",
"RS256",
"RS384",
"RS512"
],
"introspection_endpoint": "https://oidc-prod-eu01a-test1.ice.ibmcloud.com/oidc/endpoint/default/introspect",
"issuer": "https://oidc-prod-eu01a-test1.ice.ibmcloud.com/oidc/endpoint/default",
"jwks_uri": "https://oidc-prod-eu01a-test1.ice.ibmcloud.com/oidc/endpoint/default/jwks",
"request_object_encryption_alg_values_supported": [
"none"
],
"request_object_encryption_enc_values_supported": [
"none"
],
"request_object_signing_alg_values_supported": [
"none"
],
"request_parameter_supported": true,
"request_uri_parameter_supported": false,
"require_request_uri_registration": false,
"response_modes_supported": [
"query",
"fragment",
"form_post"
],
"response_types_supported": [
"code",
"none",
"token",
"id_token",
"token id_token",
"code id_token",
"code token",
"code token id_token"
],
"revocation_endpoint": "https://oidc-prod-eu01a-test1.ice.ibmcloud.com/oidc/endpoint/default/revoke",
"scopes_supported": [
"openid",
"profile",
"email",
"phone"
],
"subject_types_supported": [
"public"
],
"token_endpoint": "https://oidc-prod-eu01a-test1.ice.ibmcloud.com/oidc/endpoint/default/token",
"token_endpoint_auth_methods_supported": [
"client_secret_basic",
"client_secret_post"
],
"user_authorization_endpoint": "https://oidc-prod-eu01a-test1.ice.ibmcloud.com/oidc/endpoint/default/user_authorization",
"userinfo_encryption_alg_values_supported": [
"none"
],
"userinfo_encryption_enc_values_supported": [
"none"
],
"userinfo_endpoint": "https://oidc-prod-eu01a-test1.ice.ibmcloud.com/oidc/endpoint/default/userinfo",
"userinfo_signing_alg_values_supported": [
"none"
],
"version": "3.0"
}
|
1 | phase | <--<-- 2 --- Registration -->--> |
1 | not expected to do | Dynamic registration |
1 | phase | <--<-- 3 --- AsyncAuthn -->--> |
1 | AuthorizationRequest | {
"client_id": "5525f670-e6b3-41a9-afec-add4254aff3b",
"nonce": "EJVhqFEoEixckprV",
"redirect_uri": "https://op.certification.openid.net:61913/authz_cb",
"response_type": "id_token token",
"scope": "openid profile",
"state": "AkbJUyylt68NdEcy"
}
|
1 | redirect url | https://oidc-prod-eu01a-test1.ice.ibmcloud.com/oidc/endpoint/default/authorize?state=AkbJUyylt68NdEcy&nonce=EJVhqFEoEixckprV&response_type=id_token+token&scope=openid+profile&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61913%2Fauthz_cb&client_id=5525f670-e6b3-41a9-afec-add4254aff3b |
1 | redirect | https://oidc-prod-eu01a-test1.ice.ibmcloud.com/oidc/endpoint/default/authorize?state=AkbJUyylt68NdEcy&nonce=EJVhqFEoEixckprV&response_type=id_token+token&scope=openid+profile&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A61913%2Fauthz_cb&client_id=5525f670-e6b3-41a9-afec-add4254aff3b |
2 | http args | {} |
2 | response | URL with fragment |
2 | response | access_token=H2yhPXTV391bpxGXoJoZUIjQCFFnp9m1PobDDtiM&scope=openid+profile&grant_id=4e16a3fa-5d17-4a57-a2f9-efd4afba2fa5&id_token=eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6InNlcnZlciJ9.eyJnaXZlbl9uYW1lIjoiR2VldGhhIiwic19oYXNoIjoiQk1fQ0xkNnFzMjZ6UkFWS3BJX2dGQSIsInVuaXF1ZVNlY3VyaXR5TmFtZSI6IjY0MDAwNEtHNFAiLCJ0ZW5hbnRJZCI6Im9pZGMtcHJvZC1ldTAxYS10ZXN0MS5pY2UuaWJtY2xvdWQuY29tIiwicmVhbG1OYW1lIjoiY2xvdWRJZGVudGl0eVJlYWxtIiwicHJlZmVycmVkX3VzZXJuYW1lIjoiZ2VldGhhbmphbGkuZEBpYm0uY29tIiwibmFtZSI6IkdlZXRoYSBEIiwibm9uY2UiOiJFSlZocUZFb0VpeGNrcHJWIiwiZW1haWwiOiJnZWV0aGFuamFsaS5kQGlibS5jb20iLCJhY3IiOiJ1cm46aWJtOnNlY3VyaXR5OnBvbGljeTppZDoxIiwidXNlclR5cGUiOiJyZWd1bGFyIiwiZGlzcGxheU5hbWUiOiJHZWV0aGEgRCIsImZhbWlseV9uYW1lIjoiRCIsImdyb3VwSWRzIjpbImFsbFVzZXJzIiwiYWRtaW4iXSwiYXRfaGFzaCI6ImE1cTJQLUJWZDR4N2o1MXNsZ1ZlM1EiLCJ1aWQiOiI2NDAwMDRLRzRQIiwiZXh0Ijp7InRlbmFudElkIjoib2lkYy1wcm9kLWV1MDFhLXRlc3QxLmljZS5pYm1jbG91ZC5jb20ifSwiaXNzIjoiaHR0cHM6Ly9vaWRjLXByb2QtZXUwMWEtdGVzdDEuaWNlLmlibWNsb3VkLmNvbS9vaWRjL2VuZHBvaW50L2RlZmF1bHQiLCJhdWQiOiI1NTI1ZjY3MC1lNmIzLTQxYTktYWZlYy1hZGQ0MjU0YWZmM2IiLCJzdWIiOiI2NDAwMDRLRzRQIiwiaWF0IjoxNTY4MTkxMjc3LCJleHAiOjE1NjgxOTg0Nzd9.RAxvo3Y4bvrRK3m-ZdXmRnieZp2kw8gp8VR_cwAhaYyWSGUzQbOhFftPD4pS15HnX_3SRXxNWqdJzU6e8hGU1N6ELaqn1lhhn5clwo6nV8uvK8YSB-TqcFI4SQlYCpfZxcc-eiI2iDAgUnLCsLgXz85A3oAkn-YZmUnv_FHnqYjZwWZLnwpg4-KzJv-BTUmZyZeJ16o5CExQlhp0VJrqhR5unkAf4w5LzoVkMwmQdbnPremzFk2zxPYGznelkyv3c-JtZvGJNP2P-eBQ--jvBVTw5At5eqBYMhdvmLjSUoyDdSocvbLxPfA7PyO-awpV7PyfAegSjupkd_9EJndCwQ&state=AkbJUyylt68NdEcy&token_type=Bearer&expires_in=7200 |
2 | response | {'access_token': 'H2yhPXTV391bpxGXoJoZUIjQCFFnp9m1PobDDtiM', 'scope': 'openid profile', 'grant_id': '4e16a3fa-5d17-4a57-a2f9-efd4afba2fa5', 'id_token': 'eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6InNlcnZlciJ9.eyJnaXZlbl9uYW1lIjoiR2VldGhhIiwic19oYXNoIjoiQk1fQ0xkNnFzMjZ6UkFWS3BJX2dGQSIsInVuaXF1ZVNlY3VyaXR5TmFtZSI6IjY0MDAwNEtHNFAiLCJ0ZW5hbnRJZCI6Im9pZGMtcHJvZC1ldTAxYS10ZXN0MS5pY2UuaWJtY2xvdWQuY29tIiwicmVhbG1OYW1lIjoiY2xvdWRJZGVudGl0eVJlYWxtIiwicHJlZmVycmVkX3VzZXJuYW1lIjoiZ2VldGhhbmphbGkuZEBpYm0uY29tIiwibmFtZSI6IkdlZXRoYSBEIiwibm9uY2UiOiJFSlZocUZFb0VpeGNrcHJWIiwiZW1haWwiOiJnZWV0aGFuamFsaS5kQGlibS5jb20iLCJhY3IiOiJ1cm46aWJtOnNlY3VyaXR5OnBvbGljeTppZDoxIiwidXNlclR5cGUiOiJyZWd1bGFyIiwiZGlzcGxheU5hbWUiOiJHZWV0aGEgRCIsImZhbWlseV9uYW1lIjoiRCIsImdyb3VwSWRzIjpbImFsbFVzZXJzIiwiYWRtaW4iXSwiYXRfaGFzaCI6ImE1cTJQLUJWZDR4N2o1MXNsZ1ZlM1EiLCJ1aWQiOiI2NDAwMDRLRzRQIiwiZXh0Ijp7InRlbmFudElkIjoib2lkYy1wcm9kLWV1MDFhLXRlc3QxLmljZS5pYm1jbG91ZC5jb20ifSwiaXNzIjoiaHR0cHM6Ly9vaWRjLXByb2QtZXUwMWEtdGVzdDEuaWNlLmlibWNsb3VkLmNvbS9vaWRjL2VuZHBvaW50L2RlZmF1bHQiLCJhdWQiOiI1NTI1ZjY3MC1lNmIzLTQxYTktYWZlYy1hZGQ0MjU0YWZmM2IiLCJzdWIiOiI2NDAwMDRLRzRQIiwiaWF0IjoxNTY4MTkxMjc3LCJleHAiOjE1NjgxOTg0Nzd9.RAxvo3Y4bvrRK3m-ZdXmRnieZp2kw8gp8VR_cwAhaYyWSGUzQbOhFftPD4pS15HnX_3SRXxNWqdJzU6e8hGU1N6ELaqn1lhhn5clwo6nV8uvK8YSB-TqcFI4SQlYCpfZxcc-eiI2iDAgUnLCsLgXz85A3oAkn-YZmUnv_FHnqYjZwWZLnwpg4-KzJv-BTUmZyZeJ16o5CExQlhp0VJrqhR5unkAf4w5LzoVkMwmQdbnPremzFk2zxPYGznelkyv3c-JtZvGJNP2P-eBQ--jvBVTw5At5eqBYMhdvmLjSUoyDdSocvbLxPfA7PyO-awpV7PyfAegSjupkd_9EJndCwQ', 'state': 'AkbJUyylt68NdEcy', 'token_type': 'Bearer', 'expires_in': 7200} |
2 | AuthorizationResponse | {
"access_token": "H2yhPXTV391bpxGXoJoZUIjQCFFnp9m1PobDDtiM",
"expires_in": 7200,
"grant_id": "4e16a3fa-5d17-4a57-a2f9-efd4afba2fa5",
"id_token": {
"acr": "urn:ibm:security:policy:id:1",
"at_hash": "a5q2P-BVd4x7j51slgVe3Q",
"aud": [
"5525f670-e6b3-41a9-afec-add4254aff3b"
],
"displayName": "Geetha D",
"email": "geethanjali.d@ibm.com",
"exp": 1568198477,
"ext": {
"tenantId": "oidc-prod-eu01a-test1.ice.ibmcloud.com"
},
"family_name": "D",
"given_name": "Geetha",
"groupIds": [
"allUsers",
"admin"
],
"iat": 1568191277,
"iss": "https://oidc-prod-eu01a-test1.ice.ibmcloud.com/oidc/endpoint/default",
"name": "Geetha D",
"nonce": "EJVhqFEoEixckprV",
"preferred_username": "geethanjali.d@ibm.com",
"realmName": "cloudIdentityRealm",
"s_hash": "BM_CLd6qs26zRAVKpI_gFA",
"sub": "640004KG4P",
"tenantId": "oidc-prod-eu01a-test1.ice.ibmcloud.com",
"uid": "640004KG4P",
"uniqueSecurityName": "640004KG4P",
"userType": "regular"
},
"scope": "openid profile",
"state": "AkbJUyylt68NdEcy",
"token_type": "Bearer"
}
|
2 | phase | <--<-- 4 --- AccessToken -->--> |
2 | phase | <--<-- 5 --- UserInfo -->--> |
2 | do_user_info_request | kwargs:{'state': 'AkbJUyylt68NdEcy', 'method': 'GET', 'authn_method': 'bearer_header'}
|
2 | request | {'body': None} |
2 | request_url | https://oidc-prod-eu01a-test1.ice.ibmcloud.com/oidc/endpoint/default/userinfo |
2 | request_http_args | {'headers': {'Authorization': 'Bearer H2yhPXTV391bpxGXoJoZUIjQCFFnp9m1PobDDtiM'}} |
2 | http response | url:https://oidc-prod-eu01a-test1.ice.ibmcloud.com/oidc/endpoint/default/userinfo status_code:200
|
2 | OpenIDSchema | {
"acr": "urn:ibm:security:policy:id:1",
"displayName": "Geetha D",
"email": "geethanjali.d@ibm.com",
"ext": {
"tenantId": "oidc-prod-eu01a-test1.ice.ibmcloud.com"
},
"family_name": "D",
"given_name": "Geetha",
"groupIds": [
"allUsers",
"admin"
],
"name": "Geetha D",
"preferred_username": "geethanjali.d@ibm.com",
"realmName": "cloudIdentityRealm",
"sub": "640004KG4P",
"tenantId": "oidc-prod-eu01a-test1.ice.ibmcloud.com",
"uid": "640004KG4P",
"uniqueSecurityName": "640004KG4P",
"userType": "regular"
}
|
2 | OpenIDSchema | {
"acr": "urn:ibm:security:policy:id:1",
"displayName": "Geetha D",
"email": "geethanjali.d@ibm.com",
"ext": {
"tenantId": "oidc-prod-eu01a-test1.ice.ibmcloud.com"
},
"family_name": "D",
"given_name": "Geetha",
"groupIds": [
"allUsers",
"admin"
],
"name": "Geetha D",
"preferred_username": "geethanjali.d@ibm.com",
"realmName": "cloudIdentityRealm",
"sub": "640004KG4P",
"tenantId": "oidc-prod-eu01a-test1.ice.ibmcloud.com",
"uid": "640004KG4P",
"uniqueSecurityName": "640004KG4P",
"userType": "regular"
}
|
2 | phase | <--<-- 6 --- Done -->--> |
2 | end | |
2 | assertion | VerifyScopes |
2 | condition | verify-scopes: status=WARNING, message=The following claims were missing from the returned information: ['middle_name', 'nickname', 'profile', 'picture', 'website', 'gender', 'birthdate', 'zoneinfo', 'locale', 'updated_at'] [Verifies that the claims corresponding to the requested scopes are returned] |
2 | assertion | CheckHTTPResponse |
2 | condition | check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks] |
2 | assertion | VerifyResponse |
2 | condition | verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses] |
2 | condition | Done: status=OK |