Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-07-28 20:05:31 INFO
TEST-RUNNER
Test instance Jnq1u3IYIp created
baseUrl
https://www.certification.openid.net/test/Jnq1u3IYIp
variant
{
  "client_auth_type": "private_key_jwt",
  "response_type": "id_token token",
  "server_metadata": "discovery",
  "client_registration": "dynamic_client",
  "response_mode": "default"
}
alias

                                
description
node oidc-provider
planId
CPl9Z5mrCKPvd
config
{
  "description": "node oidc-provider",
  "server": {
    "discoveryUrl": "https://op.panva.cz/.well-known/openid-configuration",
    "login_hint": "bob@example.com"
  },
  "client": {
    "client_name": "first-openid-client"
  },
  "client2": {
    "client_name": "second-openid-client"
  },
  "browser": [
    {
      "comment": "expect an immediate error page",
      "match": "https://op.panva.cz/auth*",
      "tasks": [
        {
          "task": "Expect redirect uri mismatch error page",
          "match": "https://op.panva.cz/auth*",
          "commands": [
            [
              "wait",
              "xpath",
              "//*",
              10,
              "oops! something went wrong",
              "update-image-placeholder"
            ]
          ]
        }
      ]
    }
  ]
}
testName
oidcc-redirect-uri-query-mismatch
2020-07-28 20:05:31 SUCCESS
CreateRedirectUri
Created redirect URI
redirect_uri
https://www.certification.openid.net/test/Jnq1u3IYIp/callback
2020-07-28 20:05:31
GetDynamicServerConfiguration
HTTP request
request_uri
https://op.panva.cz/.well-known/openid-configuration
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/cbor, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2020-07-28 20:05:32 RESPONSE
GetDynamicServerConfiguration
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "content-length": "5937",
  "content-type": "application/json; charset\u003dutf-8",
  "date": "Tue, 28 Jul 2020 20:05:32 GMT",
  "server": [
    "Caddy",
    "Cowboy"
  ],
  "strict-transport-security": "max-age\u003d15552000; includeSubDomains",
  "vary": "Origin",
  "via": "1.1 vegur",
  "x-content-type-options": "nosniff",
  "x-dns-prefetch-control": "off",
  "x-download-options": "noopen",
  "x-frame-options": "SAMEORIGIN",
  "x-xss-protection": "1; mode\u003dblock"
}
response_body
{"acr_values_supported":["urn:mace:incommon:iap:bronze"],"authorization_endpoint":"https://op.panva.cz/auth","device_authorization_endpoint":"https://op.panva.cz/device/auth","claims_parameter_supported":true,"claims_supported":["sub","address","email","email_verified","phone_number","phone_number_verified","birthdate","family_name","gender","given_name","locale","middle_name","name","nickname","picture","preferred_username","profile","updated_at","website","zoneinfo","acr","sid","auth_time","iss","amr"],"code_challenge_methods_supported":["S256"],"end_session_endpoint":"https://op.panva.cz/session/end","check_session_iframe":"https://op.panva.cz/session/check","grant_types_supported":["implicit","authorization_code","refresh_token","urn:ietf:params:oauth:grant-type:device_code"],"id_token_signing_alg_values_supported":["HS256","HS384","HS512","none","PS256","PS384","PS512","RS256","RS384","RS512","ES256","ES256K","ES384","ES512","EdDSA"],"issuer":"https://op.panva.cz","jwks_uri":"https://op.panva.cz/jwks","registration_endpoint":"https://op.panva.cz/reg","response_modes_supported":["form_post","fragment","query","jwt","query.jwt","fragment.jwt","form_post.jwt"],"response_types_supported":["code id_token token","code id_token","code token","code","id_token token","id_token","none"],"scopes_supported":["openid","offline_access","address","email","phone","profile"],"subject_types_supported":["public","pairwise"],"token_endpoint_auth_methods_supported":["none","client_secret_basic","client_secret_jwt","client_secret_post","private_key_jwt","self_signed_tls_client_auth"],"token_endpoint_auth_signing_alg_values_supported":["HS256","HS384","HS512","RS256","RS384","RS512","PS256","PS384","PS512","ES256","ES256K","ES384","ES512","EdDSA"],"token_endpoint":"https://op.panva.cz/token","pushed_authorization_request_endpoint":"https://op.panva.cz/request","request_object_signing_alg_values_supported":["HS256","HS384","HS512","RS256","RS384","RS512","PS256","PS384","PS512","ES256","ES256K","ES384","ES512","EdDSA","none"],"request_parameter_supported":true,"request_uri_parameter_supported":true,"require_request_uri_registration":true,"userinfo_endpoint":"https://op.panva.cz/me","userinfo_signing_alg_values_supported":["HS256","HS384","HS512","none","PS256","PS384","PS512","RS256","RS384","RS512","ES256","ES256K","ES384","ES512","EdDSA"],"authorization_signing_alg_values_supported":["HS256","HS384","HS512","PS256","PS384","PS512","RS256","RS384","RS512","ES256","ES256K","ES384","ES512","EdDSA"],"introspection_endpoint":"https://op.panva.cz/token/introspection","introspection_endpoint_auth_methods_supported":["none","client_secret_basic","client_secret_jwt","client_secret_post","private_key_jwt","self_signed_tls_client_auth"],"introspection_endpoint_auth_signing_alg_values_supported":["HS256","HS384","HS512","RS256","RS384","RS512","PS256","PS384","PS512","ES256","ES256K","ES384","ES512","EdDSA"],"dpop_signing_alg_values_supported":["RS256","RS384","RS512","PS256","PS384","PS512","ES256","ES256K","ES384","ES512","EdDSA"],"revocation_endpoint":"https://op.panva.cz/token/revocation","revocation_endpoint_auth_methods_supported":["none","client_secret_basic","client_secret_jwt","client_secret_post","private_key_jwt","self_signed_tls_client_auth"],"revocation_endpoint_auth_signing_alg_values_supported":["HS256","HS384","HS512","RS256","RS384","RS512","PS256","PS384","PS512","ES256","ES256K","ES384","ES512","EdDSA"],"id_token_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA-OAEP-384","RSA-OAEP-512","RSA1_5","ECDH-ES","ECDH-ES+A128KW","ECDH-ES+A192KW","ECDH-ES+A256KW","A128GCMKW","A192GCMKW","A256GCMKW","A128KW","A192KW","A256KW","PBES2-HS256+A128KW","PBES2-HS384+A192KW","PBES2-HS512+A256KW","dir"],"id_token_encryption_enc_values_supported":["A128CBC-HS256","A128GCM","A192CBC-HS384","A192GCM","A256CBC-HS512","A256GCM"],"userinfo_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA-OAEP-384","RSA-OAEP-512","RSA1_5","ECDH-ES","ECDH-ES+A128KW","ECDH-ES+A192KW","ECDH-ES+A256KW","A128GCMKW","A192GCMKW","A256GCMKW","A128KW","A192KW","A256KW","PBES2-HS256+A128KW","PBES2-HS384+A192KW","PBES2-HS512+A256KW","dir"],"userinfo_encryption_enc_values_supported":["A128CBC-HS256","A128GCM","A192CBC-HS384","A192GCM","A256CBC-HS512","A256GCM"],"authorization_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA-OAEP-384","RSA-OAEP-512","RSA1_5","ECDH-ES","ECDH-ES+A128KW","ECDH-ES+A192KW","ECDH-ES+A256KW","A128GCMKW","A192GCMKW","A256GCMKW","A128KW","A192KW","A256KW","PBES2-HS256+A128KW","PBES2-HS384+A192KW","PBES2-HS512+A256KW","dir"],"authorization_encryption_enc_values_supported":["A128CBC-HS256","A128GCM","A192CBC-HS384","A192GCM","A256CBC-HS512","A256GCM"],"request_object_encryption_alg_values_supported":["A128GCMKW","A192GCMKW","A256GCMKW","A128KW","A192KW","A256KW","PBES2-HS256+A128KW","PBES2-HS384+A192KW","PBES2-HS512+A256KW","dir","RSA-OAEP","RSA-OAEP-256","RSA-OAEP-384","RSA-OAEP-512","RSA1_5","ECDH-ES","ECDH-ES+A128KW","ECDH-ES+A192KW","ECDH-ES+A256KW"],"request_object_encryption_enc_values_supported":["A128CBC-HS256","A128GCM","A192CBC-HS384","A192GCM","A256CBC-HS512","A256GCM"],"backchannel_logout_supported":true,"backchannel_logout_session_supported":true,"frontchannel_logout_supported":true,"frontchannel_logout_session_supported":true,"tls_client_certificate_bound_access_tokens":true,"claim_types_supported":["normal"],"service_documentation":"https://github.com/panva/node-oidc-provider","version":"6.28.0-a4eb4b2","mtls_endpoint_aliases":{"token_endpoint":"https://mtls.op.panva.cz/token","introspection_endpoint":"https://mtls.op.panva.cz/token/introspection","revocation_endpoint":"https://mtls.op.panva.cz/token/revocation","userinfo_endpoint":"https://mtls.op.panva.cz/me","device_authorization_endpoint":"https://mtls.op.panva.cz/device/auth","pushed_authorization_request_endpoint":"https://mtls.op.panva.cz/request"}}
2020-07-28 20:05:32
GetDynamicServerConfiguration
Downloaded server configuration
server_config_string
{"acr_values_supported":["urn:mace:incommon:iap:bronze"],"authorization_endpoint":"https://op.panva.cz/auth","device_authorization_endpoint":"https://op.panva.cz/device/auth","claims_parameter_supported":true,"claims_supported":["sub","address","email","email_verified","phone_number","phone_number_verified","birthdate","family_name","gender","given_name","locale","middle_name","name","nickname","picture","preferred_username","profile","updated_at","website","zoneinfo","acr","sid","auth_time","iss","amr"],"code_challenge_methods_supported":["S256"],"end_session_endpoint":"https://op.panva.cz/session/end","check_session_iframe":"https://op.panva.cz/session/check","grant_types_supported":["implicit","authorization_code","refresh_token","urn:ietf:params:oauth:grant-type:device_code"],"id_token_signing_alg_values_supported":["HS256","HS384","HS512","none","PS256","PS384","PS512","RS256","RS384","RS512","ES256","ES256K","ES384","ES512","EdDSA"],"issuer":"https://op.panva.cz","jwks_uri":"https://op.panva.cz/jwks","registration_endpoint":"https://op.panva.cz/reg","response_modes_supported":["form_post","fragment","query","jwt","query.jwt","fragment.jwt","form_post.jwt"],"response_types_supported":["code id_token token","code id_token","code token","code","id_token token","id_token","none"],"scopes_supported":["openid","offline_access","address","email","phone","profile"],"subject_types_supported":["public","pairwise"],"token_endpoint_auth_methods_supported":["none","client_secret_basic","client_secret_jwt","client_secret_post","private_key_jwt","self_signed_tls_client_auth"],"token_endpoint_auth_signing_alg_values_supported":["HS256","HS384","HS512","RS256","RS384","RS512","PS256","PS384","PS512","ES256","ES256K","ES384","ES512","EdDSA"],"token_endpoint":"https://op.panva.cz/token","pushed_authorization_request_endpoint":"https://op.panva.cz/request","request_object_signing_alg_values_supported":["HS256","HS384","HS512","RS256","RS384","RS512","PS256","PS384","PS512","ES256","ES256K","ES384","ES512","EdDSA","none"],"request_parameter_supported":true,"request_uri_parameter_supported":true,"require_request_uri_registration":true,"userinfo_endpoint":"https://op.panva.cz/me","userinfo_signing_alg_values_supported":["HS256","HS384","HS512","none","PS256","PS384","PS512","RS256","RS384","RS512","ES256","ES256K","ES384","ES512","EdDSA"],"authorization_signing_alg_values_supported":["HS256","HS384","HS512","PS256","PS384","PS512","RS256","RS384","RS512","ES256","ES256K","ES384","ES512","EdDSA"],"introspection_endpoint":"https://op.panva.cz/token/introspection","introspection_endpoint_auth_methods_supported":["none","client_secret_basic","client_secret_jwt","client_secret_post","private_key_jwt","self_signed_tls_client_auth"],"introspection_endpoint_auth_signing_alg_values_supported":["HS256","HS384","HS512","RS256","RS384","RS512","PS256","PS384","PS512","ES256","ES256K","ES384","ES512","EdDSA"],"dpop_signing_alg_values_supported":["RS256","RS384","RS512","PS256","PS384","PS512","ES256","ES256K","ES384","ES512","EdDSA"],"revocation_endpoint":"https://op.panva.cz/token/revocation","revocation_endpoint_auth_methods_supported":["none","client_secret_basic","client_secret_jwt","client_secret_post","private_key_jwt","self_signed_tls_client_auth"],"revocation_endpoint_auth_signing_alg_values_supported":["HS256","HS384","HS512","RS256","RS384","RS512","PS256","PS384","PS512","ES256","ES256K","ES384","ES512","EdDSA"],"id_token_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA-OAEP-384","RSA-OAEP-512","RSA1_5","ECDH-ES","ECDH-ES+A128KW","ECDH-ES+A192KW","ECDH-ES+A256KW","A128GCMKW","A192GCMKW","A256GCMKW","A128KW","A192KW","A256KW","PBES2-HS256+A128KW","PBES2-HS384+A192KW","PBES2-HS512+A256KW","dir"],"id_token_encryption_enc_values_supported":["A128CBC-HS256","A128GCM","A192CBC-HS384","A192GCM","A256CBC-HS512","A256GCM"],"userinfo_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA-OAEP-384","RSA-OAEP-512","RSA1_5","ECDH-ES","ECDH-ES+A128KW","ECDH-ES+A192KW","ECDH-ES+A256KW","A128GCMKW","A192GCMKW","A256GCMKW","A128KW","A192KW","A256KW","PBES2-HS256+A128KW","PBES2-HS384+A192KW","PBES2-HS512+A256KW","dir"],"userinfo_encryption_enc_values_supported":["A128CBC-HS256","A128GCM","A192CBC-HS384","A192GCM","A256CBC-HS512","A256GCM"],"authorization_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA-OAEP-384","RSA-OAEP-512","RSA1_5","ECDH-ES","ECDH-ES+A128KW","ECDH-ES+A192KW","ECDH-ES+A256KW","A128GCMKW","A192GCMKW","A256GCMKW","A128KW","A192KW","A256KW","PBES2-HS256+A128KW","PBES2-HS384+A192KW","PBES2-HS512+A256KW","dir"],"authorization_encryption_enc_values_supported":["A128CBC-HS256","A128GCM","A192CBC-HS384","A192GCM","A256CBC-HS512","A256GCM"],"request_object_encryption_alg_values_supported":["A128GCMKW","A192GCMKW","A256GCMKW","A128KW","A192KW","A256KW","PBES2-HS256+A128KW","PBES2-HS384+A192KW","PBES2-HS512+A256KW","dir","RSA-OAEP","RSA-OAEP-256","RSA-OAEP-384","RSA-OAEP-512","RSA1_5","ECDH-ES","ECDH-ES+A128KW","ECDH-ES+A192KW","ECDH-ES+A256KW"],"request_object_encryption_enc_values_supported":["A128CBC-HS256","A128GCM","A192CBC-HS384","A192GCM","A256CBC-HS512","A256GCM"],"backchannel_logout_supported":true,"backchannel_logout_session_supported":true,"frontchannel_logout_supported":true,"frontchannel_logout_session_supported":true,"tls_client_certificate_bound_access_tokens":true,"claim_types_supported":["normal"],"service_documentation":"https://github.com/panva/node-oidc-provider","version":"6.28.0-a4eb4b2","mtls_endpoint_aliases":{"token_endpoint":"https://mtls.op.panva.cz/token","introspection_endpoint":"https://mtls.op.panva.cz/token/introspection","revocation_endpoint":"https://mtls.op.panva.cz/token/revocation","userinfo_endpoint":"https://mtls.op.panva.cz/me","device_authorization_endpoint":"https://mtls.op.panva.cz/device/auth","pushed_authorization_request_endpoint":"https://mtls.op.panva.cz/request"}}
2020-07-28 20:05:32 SUCCESS
GetDynamicServerConfiguration
Successfully parsed server configuration
acr_values_supported
[
  "urn:mace:incommon:iap:bronze"
]
authorization_endpoint
https://op.panva.cz/auth
device_authorization_endpoint
https://op.panva.cz/device/auth
claims_parameter_supported
true
claims_supported
[
  "sub",
  "address",
  "email",
  "email_verified",
  "phone_number",
  "phone_number_verified",
  "birthdate",
  "family_name",
  "gender",
  "given_name",
  "locale",
  "middle_name",
  "name",
  "nickname",
  "picture",
  "preferred_username",
  "profile",
  "updated_at",
  "website",
  "zoneinfo",
  "acr",
  "sid",
  "auth_time",
  "iss",
  "amr"
]
code_challenge_methods_supported
[
  "S256"
]
end_session_endpoint
https://op.panva.cz/session/end
check_session_iframe
https://op.panva.cz/session/check
grant_types_supported
[
  "implicit",
  "authorization_code",
  "refresh_token",
  "urn:ietf:params:oauth:grant-type:device_code"
]
id_token_signing_alg_values_supported
[
  "HS256",
  "HS384",
  "HS512",
  "none",
  "PS256",
  "PS384",
  "PS512",
  "RS256",
  "RS384",
  "RS512",
  "ES256",
  "ES256K",
  "ES384",
  "ES512",
  "EdDSA"
]
issuer
https://op.panva.cz
jwks_uri
https://op.panva.cz/jwks
registration_endpoint
https://op.panva.cz/reg
response_modes_supported
[
  "form_post",
  "fragment",
  "query",
  "jwt",
  "query.jwt",
  "fragment.jwt",
  "form_post.jwt"
]
response_types_supported
[
  "code id_token token",
  "code id_token",
  "code token",
  "code",
  "id_token token",
  "id_token",
  "none"
]
scopes_supported
[
  "openid",
  "offline_access",
  "address",
  "email",
  "phone",
  "profile"
]
subject_types_supported
[
  "public",
  "pairwise"
]
token_endpoint_auth_methods_supported
[
  "none",
  "client_secret_basic",
  "client_secret_jwt",
  "client_secret_post",
  "private_key_jwt",
  "self_signed_tls_client_auth"
]
token_endpoint_auth_signing_alg_values_supported
[
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512",
  "PS256",
  "PS384",
  "PS512",
  "ES256",
  "ES256K",
  "ES384",
  "ES512",
  "EdDSA"
]
token_endpoint
https://op.panva.cz/token
pushed_authorization_request_endpoint
https://op.panva.cz/request
request_object_signing_alg_values_supported
[
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512",
  "PS256",
  "PS384",
  "PS512",
  "ES256",
  "ES256K",
  "ES384",
  "ES512",
  "EdDSA",
  "none"
]
request_parameter_supported
true
request_uri_parameter_supported
true
require_request_uri_registration
true
userinfo_endpoint
https://op.panva.cz/me
userinfo_signing_alg_values_supported
[
  "HS256",
  "HS384",
  "HS512",
  "none",
  "PS256",
  "PS384",
  "PS512",
  "RS256",
  "RS384",
  "RS512",
  "ES256",
  "ES256K",
  "ES384",
  "ES512",
  "EdDSA"
]
authorization_signing_alg_values_supported
[
  "HS256",
  "HS384",
  "HS512",
  "PS256",
  "PS384",
  "PS512",
  "RS256",
  "RS384",
  "RS512",
  "ES256",
  "ES256K",
  "ES384",
  "ES512",
  "EdDSA"
]
introspection_endpoint
https://op.panva.cz/token/introspection
introspection_endpoint_auth_methods_supported
[
  "none",
  "client_secret_basic",
  "client_secret_jwt",
  "client_secret_post",
  "private_key_jwt",
  "self_signed_tls_client_auth"
]
introspection_endpoint_auth_signing_alg_values_supported
[
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512",
  "PS256",
  "PS384",
  "PS512",
  "ES256",
  "ES256K",
  "ES384",
  "ES512",
  "EdDSA"
]
dpop_signing_alg_values_supported
[
  "RS256",
  "RS384",
  "RS512",
  "PS256",
  "PS384",
  "PS512",
  "ES256",
  "ES256K",
  "ES384",
  "ES512",
  "EdDSA"
]
revocation_endpoint
https://op.panva.cz/token/revocation
revocation_endpoint_auth_methods_supported
[
  "none",
  "client_secret_basic",
  "client_secret_jwt",
  "client_secret_post",
  "private_key_jwt",
  "self_signed_tls_client_auth"
]
revocation_endpoint_auth_signing_alg_values_supported
[
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512",
  "PS256",
  "PS384",
  "PS512",
  "ES256",
  "ES256K",
  "ES384",
  "ES512",
  "EdDSA"
]
id_token_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA-OAEP-384",
  "RSA-OAEP-512",
  "RSA1_5",
  "ECDH-ES",
  "ECDH-ES+A128KW",
  "ECDH-ES+A192KW",
  "ECDH-ES+A256KW",
  "A128GCMKW",
  "A192GCMKW",
  "A256GCMKW",
  "A128KW",
  "A192KW",
  "A256KW",
  "PBES2-HS256+A128KW",
  "PBES2-HS384+A192KW",
  "PBES2-HS512+A256KW",
  "dir"
]
id_token_encryption_enc_values_supported
[
  "A128CBC-HS256",
  "A128GCM",
  "A192CBC-HS384",
  "A192GCM",
  "A256CBC-HS512",
  "A256GCM"
]
userinfo_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA-OAEP-384",
  "RSA-OAEP-512",
  "RSA1_5",
  "ECDH-ES",
  "ECDH-ES+A128KW",
  "ECDH-ES+A192KW",
  "ECDH-ES+A256KW",
  "A128GCMKW",
  "A192GCMKW",
  "A256GCMKW",
  "A128KW",
  "A192KW",
  "A256KW",
  "PBES2-HS256+A128KW",
  "PBES2-HS384+A192KW",
  "PBES2-HS512+A256KW",
  "dir"
]
userinfo_encryption_enc_values_supported
[
  "A128CBC-HS256",
  "A128GCM",
  "A192CBC-HS384",
  "A192GCM",
  "A256CBC-HS512",
  "A256GCM"
]
authorization_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA-OAEP-384",
  "RSA-OAEP-512",
  "RSA1_5",
  "ECDH-ES",
  "ECDH-ES+A128KW",
  "ECDH-ES+A192KW",
  "ECDH-ES+A256KW",
  "A128GCMKW",
  "A192GCMKW",
  "A256GCMKW",
  "A128KW",
  "A192KW",
  "A256KW",
  "PBES2-HS256+A128KW",
  "PBES2-HS384+A192KW",
  "PBES2-HS512+A256KW",
  "dir"
]
authorization_encryption_enc_values_supported
[
  "A128CBC-HS256",
  "A128GCM",
  "A192CBC-HS384",
  "A192GCM",
  "A256CBC-HS512",
  "A256GCM"
]
request_object_encryption_alg_values_supported
[
  "A128GCMKW",
  "A192GCMKW",
  "A256GCMKW",
  "A128KW",
  "A192KW",
  "A256KW",
  "PBES2-HS256+A128KW",
  "PBES2-HS384+A192KW",
  "PBES2-HS512+A256KW",
  "dir",
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA-OAEP-384",
  "RSA-OAEP-512",
  "RSA1_5",
  "ECDH-ES",
  "ECDH-ES+A128KW",
  "ECDH-ES+A192KW",
  "ECDH-ES+A256KW"
]
request_object_encryption_enc_values_supported
[
  "A128CBC-HS256",
  "A128GCM",
  "A192CBC-HS384",
  "A192GCM",
  "A256CBC-HS512",
  "A256GCM"
]
backchannel_logout_supported
true
backchannel_logout_session_supported
true
frontchannel_logout_supported
true
frontchannel_logout_session_supported
true
tls_client_certificate_bound_access_tokens
true
claim_types_supported
[
  "normal"
]
service_documentation
https://github.com/panva/node-oidc-provider
version
6.28.0-a4eb4b2
mtls_endpoint_aliases
{
  "token_endpoint": "https://mtls.op.panva.cz/token",
  "introspection_endpoint": "https://mtls.op.panva.cz/token/introspection",
  "revocation_endpoint": "https://mtls.op.panva.cz/token/revocation",
  "userinfo_endpoint": "https://mtls.op.panva.cz/me",
  "device_authorization_endpoint": "https://mtls.op.panva.cz/device/auth",
  "pushed_authorization_request_endpoint": "https://mtls.op.panva.cz/request"
}
2020-07-28 20:05:32 SUCCESS
CheckServerConfiguration
Found required server configuration keys
required
[
  "authorization_endpoint",
  "token_endpoint",
  "issuer"
]
2020-07-28 20:05:32 SUCCESS
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
registration_endpoint
{
  "testHost": "op.panva.cz",
  "testPort": 443
}
authorization_endpoint
{
  "testHost": "op.panva.cz",
  "testPort": 443
}
token_endpoint
{
  "testHost": "op.panva.cz",
  "testPort": 443
}
userinfo_endpoint
{
  "testHost": "op.panva.cz",
  "testPort": 443
}
2020-07-28 20:05:32
FetchServerKeys
Fetching server key
jwks_uri
https://op.panva.cz/jwks
2020-07-28 20:05:32
FetchServerKeys
HTTP request
request_uri
https://op.panva.cz/jwks
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/cbor, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2020-07-28 20:05:33 RESPONSE
FetchServerKeys
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "content-length": "2810",
  "content-type": "application/json; charset\u003dutf-8",
  "date": "Tue, 28 Jul 2020 20:05:33 GMT",
  "server": [
    "Caddy",
    "Cowboy"
  ],
  "strict-transport-security": "max-age\u003d15552000; includeSubDomains",
  "vary": "Origin",
  "via": "1.1 vegur",
  "x-content-type-options": "nosniff",
  "x-dns-prefetch-control": "off",
  "x-download-options": "noopen",
  "x-frame-options": "SAMEORIGIN",
  "x-xss-protection": "1; mode\u003dblock"
}
response_body
{"keys":[{"e":"AQAB","n":"xwQ72P9z9OYshiQ-ntDYaPnnfwG6u9JAdLMZ5o0dmjlcyrvwQRdoFIKPnO65Q8mh6F_LDSxjxa2Yzo_wdjhbPZLjfUJXgCzm54cClXzT5twzo7lzoAfaJlkTsoZc2HFWqmcri0BuzmTFLZx2Q7wYBm0pXHmQKF0V-C1O6NWfd4mfBhbM-I1tHYSpAMgarSm22WDMDx-WWI7TEzy2QhaBVaENW9BKaKkJklocAZCxk18WhR0fckIGiWiSM5FcU1PY2jfGsTmX505Ub7P5Dz75Ygqrutd5tFrcqyPAtPTFDk8X1InxkkUwpP3nFU5o50DGhwQolGYKPGtQ-ZtmbOfcWQ","kty":"RSA","kid":"r1LkbBo3925Rb2ZFFrKyU3MVex9T2817Kx0vbi6i_Kc","use":"sig"},{"e":"AQAB","n":"mXauIvyeUFA74P2vcmgAWSCMw6CP6-MJ6EvFuRARfLLJEi49AzQvJl_4pwDvLkZcCqS7OqPE1ufNyDH6oQPEc7JuukHMY02EgwqHjJ6GG6FQqJuiWlKB_l-7c9y9r4bh4r58xdZc6T5dFVSNT2VcIVoSjq9VmzwpaTKCUyVeZYHZhnLfWMm9rKU5WSz75siG-_jbudItsfhEwA59kvi4So2IV9TxHwW50i4IcTB1gXwG1olNgiX3-Mq1Iw5VGPzMo2hQXI3q1y-ZjhSwhvG5dje9J8htBEWdVYk4f6cv19IE9gEx7T-2vIVw5FCpAmmfFuRebec49c7zjfr0EyTI4w","kty":"RSA","kid":"w5kPRdJWODnYjihMgqs0tHkKk-e5OxU4DnSCZDkF_h0","use":"enc"},{"crv":"P-256","x":"FWZ9rSkLt6Dx9E3pxLybhdM6xgR5obGsj5_pqmnz5J4","y":"_n8G69C-A2Xl4xUW2lF0i8ZGZnk_KPYrhv4GbTGu5G4","kty":"EC","kid":"MFZeG102dQiqbANoaMlW_Jmf7fOZmtRsHt77JFhTpF0","use":"sig"},{"crv":"P-256","x":"Eb3RtGgBGOEz33yu46aha_RU6pyBaYNlu6SawlWGGHQ","y":"tUncttzF6Ud4Abfn1N2A1Rz2MBbJSdI0zuKS28BNb-U","kty":"EC","kid":"mlSUkq-ELqZiWl9zs9ZKkbcjIvgajGgnXfPWUZn9lEc","use":"enc"},{"crv":"secp256k1","x":"KDAUHh_SpgROXXAq8IFs9B9lGNB9VP4RwebeAO2tBao","y":"wr3L1dZyUCrS4H18fDYy5hcvGTCp05tiiBy0ZUG8Qs4","kty":"EC","kid":"vl5k1biVlGOHeu2XiLg_0qrIVdoFdM0POWeeCl-QMsY","use":"sig"},{"crv":"P-384","x":"P1npwyTJ2p20D9_r2u31DU7tfDEufaVcSJJcDOuO6QyqrXvjyMvf8e5xv3XxE39l","y":"tmq2S12MVdKUQTmd0AxVEOji1ihR_vZAhTLKojD2XW_2EJH7ydiaz2oxrnkC0mvI","kty":"EC","kid":"rqHXKVLLF2RxqFgXWfEZE578gM-IhelOjugVfb_BMZ4","use":"sig"},{"crv":"P-384","x":"UhkqvxbxMCGtkg_-6W0gqkr21fgY3LSaNbquU7CYEDwBwGCd6iK6Bu5PVUxraulY","y":"CXrg3mxUkN5D4bPfiLfnD1jMYGSDxn2Zeh-8_OOstX21WNZJ9_i-iFZR3pIXyH0z","kty":"EC","kid":"rV1Hjt_79O_m1oJ7Jz0QgKHDa2iwb8p4kvMU0L99wjg","use":"enc"},{"crv":"P-521","x":"AIjEl5H8w2Rf_iqIP8WT7v5-FlBlBGYy5sMJs1XOxWz4RRARIEOemEY45g10sEPzZ4qe7oyjCUDK5FY1WwjRvgHK","y":"AaKN94cn1ApvvfpOWO9VpJm-lLzOUR8XxOrKYfPqcLs0zEqSPiGdWA5CoNL5ck1q-CXD09ysQSmNkzFGaig2Mnop","kty":"EC","kid":"RG_hu6lggazoCOu2wsrn3icSvhAXuGyL55f2GAaH2NA","use":"sig"},{"crv":"P-521","x":"AXFcu6lqcxoyFUU14xTw0I5cfCR2q0jqOXwU_EKjA5mIxUpue58IIrfrIh4IauV3co2SziD6Uf1SWe8l11Y4-BoJ","y":"AREzsMJu3VveUPMaJ2QWmjucwzZH4FqufXzS2IW-MGqViyDNTg2BgX-2VCJvdTo0zbhvRvBC1ghJNrVnH5M92JQ6","kty":"EC","kid":"MPcTmIIPYRnLt9s_TdBrpV27HcNVDi9aZpB0eJvAxzE","use":"enc"},{"crv":"Ed25519","x":"lDkysGJKRmJeUp8ncTyGraHPHHiIfdxSajxGm7Srla8","kty":"OKP","kid":"CLjPrbijCB2z9dScRNpM1mSGOQVOIByTmd18Ft2eiAQ","use":"sig"},{"crv":"Ed448","x":"BG1zKFg6A_Rzix4pA08oYN5xHqhKIiREXZ59NZoA8p3xhgjh-tm8nc-6udtiL5ZNhWDbnRSq4jQA","kty":"OKP","kid":"kU2PiegZOPUKcsJATItJArz18oWWfEH-Ma52K_8nGaE","use":"sig"}]}
2020-07-28 20:05:33
FetchServerKeys
Found JWK set string
jwk_string
{"keys":[{"e":"AQAB","n":"xwQ72P9z9OYshiQ-ntDYaPnnfwG6u9JAdLMZ5o0dmjlcyrvwQRdoFIKPnO65Q8mh6F_LDSxjxa2Yzo_wdjhbPZLjfUJXgCzm54cClXzT5twzo7lzoAfaJlkTsoZc2HFWqmcri0BuzmTFLZx2Q7wYBm0pXHmQKF0V-C1O6NWfd4mfBhbM-I1tHYSpAMgarSm22WDMDx-WWI7TEzy2QhaBVaENW9BKaKkJklocAZCxk18WhR0fckIGiWiSM5FcU1PY2jfGsTmX505Ub7P5Dz75Ygqrutd5tFrcqyPAtPTFDk8X1InxkkUwpP3nFU5o50DGhwQolGYKPGtQ-ZtmbOfcWQ","kty":"RSA","kid":"r1LkbBo3925Rb2ZFFrKyU3MVex9T2817Kx0vbi6i_Kc","use":"sig"},{"e":"AQAB","n":"mXauIvyeUFA74P2vcmgAWSCMw6CP6-MJ6EvFuRARfLLJEi49AzQvJl_4pwDvLkZcCqS7OqPE1ufNyDH6oQPEc7JuukHMY02EgwqHjJ6GG6FQqJuiWlKB_l-7c9y9r4bh4r58xdZc6T5dFVSNT2VcIVoSjq9VmzwpaTKCUyVeZYHZhnLfWMm9rKU5WSz75siG-_jbudItsfhEwA59kvi4So2IV9TxHwW50i4IcTB1gXwG1olNgiX3-Mq1Iw5VGPzMo2hQXI3q1y-ZjhSwhvG5dje9J8htBEWdVYk4f6cv19IE9gEx7T-2vIVw5FCpAmmfFuRebec49c7zjfr0EyTI4w","kty":"RSA","kid":"w5kPRdJWODnYjihMgqs0tHkKk-e5OxU4DnSCZDkF_h0","use":"enc"},{"crv":"P-256","x":"FWZ9rSkLt6Dx9E3pxLybhdM6xgR5obGsj5_pqmnz5J4","y":"_n8G69C-A2Xl4xUW2lF0i8ZGZnk_KPYrhv4GbTGu5G4","kty":"EC","kid":"MFZeG102dQiqbANoaMlW_Jmf7fOZmtRsHt77JFhTpF0","use":"sig"},{"crv":"P-256","x":"Eb3RtGgBGOEz33yu46aha_RU6pyBaYNlu6SawlWGGHQ","y":"tUncttzF6Ud4Abfn1N2A1Rz2MBbJSdI0zuKS28BNb-U","kty":"EC","kid":"mlSUkq-ELqZiWl9zs9ZKkbcjIvgajGgnXfPWUZn9lEc","use":"enc"},{"crv":"secp256k1","x":"KDAUHh_SpgROXXAq8IFs9B9lGNB9VP4RwebeAO2tBao","y":"wr3L1dZyUCrS4H18fDYy5hcvGTCp05tiiBy0ZUG8Qs4","kty":"EC","kid":"vl5k1biVlGOHeu2XiLg_0qrIVdoFdM0POWeeCl-QMsY","use":"sig"},{"crv":"P-384","x":"P1npwyTJ2p20D9_r2u31DU7tfDEufaVcSJJcDOuO6QyqrXvjyMvf8e5xv3XxE39l","y":"tmq2S12MVdKUQTmd0AxVEOji1ihR_vZAhTLKojD2XW_2EJH7ydiaz2oxrnkC0mvI","kty":"EC","kid":"rqHXKVLLF2RxqFgXWfEZE578gM-IhelOjugVfb_BMZ4","use":"sig"},{"crv":"P-384","x":"UhkqvxbxMCGtkg_-6W0gqkr21fgY3LSaNbquU7CYEDwBwGCd6iK6Bu5PVUxraulY","y":"CXrg3mxUkN5D4bPfiLfnD1jMYGSDxn2Zeh-8_OOstX21WNZJ9_i-iFZR3pIXyH0z","kty":"EC","kid":"rV1Hjt_79O_m1oJ7Jz0QgKHDa2iwb8p4kvMU0L99wjg","use":"enc"},{"crv":"P-521","x":"AIjEl5H8w2Rf_iqIP8WT7v5-FlBlBGYy5sMJs1XOxWz4RRARIEOemEY45g10sEPzZ4qe7oyjCUDK5FY1WwjRvgHK","y":"AaKN94cn1ApvvfpOWO9VpJm-lLzOUR8XxOrKYfPqcLs0zEqSPiGdWA5CoNL5ck1q-CXD09ysQSmNkzFGaig2Mnop","kty":"EC","kid":"RG_hu6lggazoCOu2wsrn3icSvhAXuGyL55f2GAaH2NA","use":"sig"},{"crv":"P-521","x":"AXFcu6lqcxoyFUU14xTw0I5cfCR2q0jqOXwU_EKjA5mIxUpue58IIrfrIh4IauV3co2SziD6Uf1SWe8l11Y4-BoJ","y":"AREzsMJu3VveUPMaJ2QWmjucwzZH4FqufXzS2IW-MGqViyDNTg2BgX-2VCJvdTo0zbhvRvBC1ghJNrVnH5M92JQ6","kty":"EC","kid":"MPcTmIIPYRnLt9s_TdBrpV27HcNVDi9aZpB0eJvAxzE","use":"enc"},{"crv":"Ed25519","x":"lDkysGJKRmJeUp8ncTyGraHPHHiIfdxSajxGm7Srla8","kty":"OKP","kid":"CLjPrbijCB2z9dScRNpM1mSGOQVOIByTmd18Ft2eiAQ","use":"sig"},{"crv":"Ed448","x":"BG1zKFg6A_Rzix4pA08oYN5xHqhKIiREXZ59NZoA8p3xhgjh-tm8nc-6udtiL5ZNhWDbnRSq4jQA","kty":"OKP","kid":"kU2PiegZOPUKcsJATItJArz18oWWfEH-Ma52K_8nGaE","use":"sig"}]}
2020-07-28 20:05:33 SUCCESS
FetchServerKeys
Found server JWK set
server_jwks
{
  "keys": [
    {
      "e": "AQAB",
      "n": "xwQ72P9z9OYshiQ-ntDYaPnnfwG6u9JAdLMZ5o0dmjlcyrvwQRdoFIKPnO65Q8mh6F_LDSxjxa2Yzo_wdjhbPZLjfUJXgCzm54cClXzT5twzo7lzoAfaJlkTsoZc2HFWqmcri0BuzmTFLZx2Q7wYBm0pXHmQKF0V-C1O6NWfd4mfBhbM-I1tHYSpAMgarSm22WDMDx-WWI7TEzy2QhaBVaENW9BKaKkJklocAZCxk18WhR0fckIGiWiSM5FcU1PY2jfGsTmX505Ub7P5Dz75Ygqrutd5tFrcqyPAtPTFDk8X1InxkkUwpP3nFU5o50DGhwQolGYKPGtQ-ZtmbOfcWQ",
      "kty": "RSA",
      "kid": "r1LkbBo3925Rb2ZFFrKyU3MVex9T2817Kx0vbi6i_Kc",
      "use": "sig"
    },
    {
      "e": "AQAB",
      "n": "mXauIvyeUFA74P2vcmgAWSCMw6CP6-MJ6EvFuRARfLLJEi49AzQvJl_4pwDvLkZcCqS7OqPE1ufNyDH6oQPEc7JuukHMY02EgwqHjJ6GG6FQqJuiWlKB_l-7c9y9r4bh4r58xdZc6T5dFVSNT2VcIVoSjq9VmzwpaTKCUyVeZYHZhnLfWMm9rKU5WSz75siG-_jbudItsfhEwA59kvi4So2IV9TxHwW50i4IcTB1gXwG1olNgiX3-Mq1Iw5VGPzMo2hQXI3q1y-ZjhSwhvG5dje9J8htBEWdVYk4f6cv19IE9gEx7T-2vIVw5FCpAmmfFuRebec49c7zjfr0EyTI4w",
      "kty": "RSA",
      "kid": "w5kPRdJWODnYjihMgqs0tHkKk-e5OxU4DnSCZDkF_h0",
      "use": "enc"
    },
    {
      "crv": "P-256",
      "x": "FWZ9rSkLt6Dx9E3pxLybhdM6xgR5obGsj5_pqmnz5J4",
      "y": "_n8G69C-A2Xl4xUW2lF0i8ZGZnk_KPYrhv4GbTGu5G4",
      "kty": "EC",
      "kid": "MFZeG102dQiqbANoaMlW_Jmf7fOZmtRsHt77JFhTpF0",
      "use": "sig"
    },
    {
      "crv": "P-256",
      "x": "Eb3RtGgBGOEz33yu46aha_RU6pyBaYNlu6SawlWGGHQ",
      "y": "tUncttzF6Ud4Abfn1N2A1Rz2MBbJSdI0zuKS28BNb-U",
      "kty": "EC",
      "kid": "mlSUkq-ELqZiWl9zs9ZKkbcjIvgajGgnXfPWUZn9lEc",
      "use": "enc"
    },
    {
      "crv": "secp256k1",
      "x": "KDAUHh_SpgROXXAq8IFs9B9lGNB9VP4RwebeAO2tBao",
      "y": "wr3L1dZyUCrS4H18fDYy5hcvGTCp05tiiBy0ZUG8Qs4",
      "kty": "EC",
      "kid": "vl5k1biVlGOHeu2XiLg_0qrIVdoFdM0POWeeCl-QMsY",
      "use": "sig"
    },
    {
      "crv": "P-384",
      "x": "P1npwyTJ2p20D9_r2u31DU7tfDEufaVcSJJcDOuO6QyqrXvjyMvf8e5xv3XxE39l",
      "y": "tmq2S12MVdKUQTmd0AxVEOji1ihR_vZAhTLKojD2XW_2EJH7ydiaz2oxrnkC0mvI",
      "kty": "EC",
      "kid": "rqHXKVLLF2RxqFgXWfEZE578gM-IhelOjugVfb_BMZ4",
      "use": "sig"
    },
    {
      "crv": "P-384",
      "x": "UhkqvxbxMCGtkg_-6W0gqkr21fgY3LSaNbquU7CYEDwBwGCd6iK6Bu5PVUxraulY",
      "y": "CXrg3mxUkN5D4bPfiLfnD1jMYGSDxn2Zeh-8_OOstX21WNZJ9_i-iFZR3pIXyH0z",
      "kty": "EC",
      "kid": "rV1Hjt_79O_m1oJ7Jz0QgKHDa2iwb8p4kvMU0L99wjg",
      "use": "enc"
    },
    {
      "crv": "P-521",
      "x": "AIjEl5H8w2Rf_iqIP8WT7v5-FlBlBGYy5sMJs1XOxWz4RRARIEOemEY45g10sEPzZ4qe7oyjCUDK5FY1WwjRvgHK",
      "y": "AaKN94cn1ApvvfpOWO9VpJm-lLzOUR8XxOrKYfPqcLs0zEqSPiGdWA5CoNL5ck1q-CXD09ysQSmNkzFGaig2Mnop",
      "kty": "EC",
      "kid": "RG_hu6lggazoCOu2wsrn3icSvhAXuGyL55f2GAaH2NA",
      "use": "sig"
    },
    {
      "crv": "P-521",
      "x": "AXFcu6lqcxoyFUU14xTw0I5cfCR2q0jqOXwU_EKjA5mIxUpue58IIrfrIh4IauV3co2SziD6Uf1SWe8l11Y4-BoJ",
      "y": "AREzsMJu3VveUPMaJ2QWmjucwzZH4FqufXzS2IW-MGqViyDNTg2BgX-2VCJvdTo0zbhvRvBC1ghJNrVnH5M92JQ6",
      "kty": "EC",
      "kid": "MPcTmIIPYRnLt9s_TdBrpV27HcNVDi9aZpB0eJvAxzE",
      "use": "enc"
    },
    {
      "crv": "Ed25519",
      "x": "lDkysGJKRmJeUp8ncTyGraHPHHiIfdxSajxGm7Srla8",
      "kty": "OKP",
      "kid": "CLjPrbijCB2z9dScRNpM1mSGOQVOIByTmd18Ft2eiAQ",
      "use": "sig"
    },
    {
      "crv": "Ed448",
      "x": "BG1zKFg6A_Rzix4pA08oYN5xHqhKIiREXZ59NZoA8p3xhgjh-tm8nc-6udtiL5ZNhWDbnRSq4jQA",
      "kty": "OKP",
      "kid": "kU2PiegZOPUKcsJATItJArz18oWWfEH-Ma52K_8nGaE",
      "use": "sig"
    }
  ]
}
2020-07-28 20:05:33 SUCCESS
CheckServerKeysIsValid
Server JWKs is valid
server_jwks
{
  "keys": [
    {
      "e": "AQAB",
      "n": "xwQ72P9z9OYshiQ-ntDYaPnnfwG6u9JAdLMZ5o0dmjlcyrvwQRdoFIKPnO65Q8mh6F_LDSxjxa2Yzo_wdjhbPZLjfUJXgCzm54cClXzT5twzo7lzoAfaJlkTsoZc2HFWqmcri0BuzmTFLZx2Q7wYBm0pXHmQKF0V-C1O6NWfd4mfBhbM-I1tHYSpAMgarSm22WDMDx-WWI7TEzy2QhaBVaENW9BKaKkJklocAZCxk18WhR0fckIGiWiSM5FcU1PY2jfGsTmX505Ub7P5Dz75Ygqrutd5tFrcqyPAtPTFDk8X1InxkkUwpP3nFU5o50DGhwQolGYKPGtQ-ZtmbOfcWQ",
      "kty": "RSA",
      "kid": "r1LkbBo3925Rb2ZFFrKyU3MVex9T2817Kx0vbi6i_Kc",
      "use": "sig"
    },
    {
      "e": "AQAB",
      "n": "mXauIvyeUFA74P2vcmgAWSCMw6CP6-MJ6EvFuRARfLLJEi49AzQvJl_4pwDvLkZcCqS7OqPE1ufNyDH6oQPEc7JuukHMY02EgwqHjJ6GG6FQqJuiWlKB_l-7c9y9r4bh4r58xdZc6T5dFVSNT2VcIVoSjq9VmzwpaTKCUyVeZYHZhnLfWMm9rKU5WSz75siG-_jbudItsfhEwA59kvi4So2IV9TxHwW50i4IcTB1gXwG1olNgiX3-Mq1Iw5VGPzMo2hQXI3q1y-ZjhSwhvG5dje9J8htBEWdVYk4f6cv19IE9gEx7T-2vIVw5FCpAmmfFuRebec49c7zjfr0EyTI4w",
      "kty": "RSA",
      "kid": "w5kPRdJWODnYjihMgqs0tHkKk-e5OxU4DnSCZDkF_h0",
      "use": "enc"
    },
    {
      "crv": "P-256",
      "x": "FWZ9rSkLt6Dx9E3pxLybhdM6xgR5obGsj5_pqmnz5J4",
      "y": "_n8G69C-A2Xl4xUW2lF0i8ZGZnk_KPYrhv4GbTGu5G4",
      "kty": "EC",
      "kid": "MFZeG102dQiqbANoaMlW_Jmf7fOZmtRsHt77JFhTpF0",
      "use": "sig"
    },
    {
      "crv": "P-256",
      "x": "Eb3RtGgBGOEz33yu46aha_RU6pyBaYNlu6SawlWGGHQ",
      "y": "tUncttzF6Ud4Abfn1N2A1Rz2MBbJSdI0zuKS28BNb-U",
      "kty": "EC",
      "kid": "mlSUkq-ELqZiWl9zs9ZKkbcjIvgajGgnXfPWUZn9lEc",
      "use": "enc"
    },
    {
      "crv": "secp256k1",
      "x": "KDAUHh_SpgROXXAq8IFs9B9lGNB9VP4RwebeAO2tBao",
      "y": "wr3L1dZyUCrS4H18fDYy5hcvGTCp05tiiBy0ZUG8Qs4",
      "kty": "EC",
      "kid": "vl5k1biVlGOHeu2XiLg_0qrIVdoFdM0POWeeCl-QMsY",
      "use": "sig"
    },
    {
      "crv": "P-384",
      "x": "P1npwyTJ2p20D9_r2u31DU7tfDEufaVcSJJcDOuO6QyqrXvjyMvf8e5xv3XxE39l",
      "y": "tmq2S12MVdKUQTmd0AxVEOji1ihR_vZAhTLKojD2XW_2EJH7ydiaz2oxrnkC0mvI",
      "kty": "EC",
      "kid": "rqHXKVLLF2RxqFgXWfEZE578gM-IhelOjugVfb_BMZ4",
      "use": "sig"
    },
    {
      "crv": "P-384",
      "x": "UhkqvxbxMCGtkg_-6W0gqkr21fgY3LSaNbquU7CYEDwBwGCd6iK6Bu5PVUxraulY",
      "y": "CXrg3mxUkN5D4bPfiLfnD1jMYGSDxn2Zeh-8_OOstX21WNZJ9_i-iFZR3pIXyH0z",
      "kty": "EC",
      "kid": "rV1Hjt_79O_m1oJ7Jz0QgKHDa2iwb8p4kvMU0L99wjg",
      "use": "enc"
    },
    {
      "crv": "P-521",
      "x": "AIjEl5H8w2Rf_iqIP8WT7v5-FlBlBGYy5sMJs1XOxWz4RRARIEOemEY45g10sEPzZ4qe7oyjCUDK5FY1WwjRvgHK",
      "y": "AaKN94cn1ApvvfpOWO9VpJm-lLzOUR8XxOrKYfPqcLs0zEqSPiGdWA5CoNL5ck1q-CXD09ysQSmNkzFGaig2Mnop",
      "kty": "EC",
      "kid": "RG_hu6lggazoCOu2wsrn3icSvhAXuGyL55f2GAaH2NA",
      "use": "sig"
    },
    {
      "crv": "P-521",
      "x": "AXFcu6lqcxoyFUU14xTw0I5cfCR2q0jqOXwU_EKjA5mIxUpue58IIrfrIh4IauV3co2SziD6Uf1SWe8l11Y4-BoJ",
      "y": "AREzsMJu3VveUPMaJ2QWmjucwzZH4FqufXzS2IW-MGqViyDNTg2BgX-2VCJvdTo0zbhvRvBC1ghJNrVnH5M92JQ6",
      "kty": "EC",
      "kid": "MPcTmIIPYRnLt9s_TdBrpV27HcNVDi9aZpB0eJvAxzE",
      "use": "enc"
    },
    {
      "crv": "Ed25519",
      "x": "lDkysGJKRmJeUp8ncTyGraHPHHiIfdxSajxGm7Srla8",
      "kty": "OKP",
      "kid": "CLjPrbijCB2z9dScRNpM1mSGOQVOIByTmd18Ft2eiAQ",
      "use": "sig"
    },
    {
      "crv": "Ed448",
      "x": "BG1zKFg6A_Rzix4pA08oYN5xHqhKIiREXZ59NZoA8p3xhgjh-tm8nc-6udtiL5ZNhWDbnRSq4jQA",
      "kty": "OKP",
      "kid": "kU2PiegZOPUKcsJATItJArz18oWWfEH-Ma52K_8nGaE",
      "use": "sig"
    }
  ]
}
2020-07-28 20:05:33 SUCCESS
ValidateServerJWKs
Valid server JWKs
2020-07-28 20:05:33 SUCCESS
CheckForKeyIdInServerJWKs
All keys contain kids
2020-07-28 20:05:33 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-07-28 20:05:33 SUCCESS
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
2020-07-28 20:05:33 SUCCESS
GetDynamicClientConfiguration
Created dynamic_client_registration_template object from the client configuration.
client_name
first-openid-client
2020-07-28 20:05:33
AddQueryToRedirectUri
Updated redirect_uri
redirect_uri
https://www.certification.openid.net/test/Jnq1u3IYIp/callback?bar=foo
2020-07-28 20:05:34 SUCCESS
GenerateRS256ClientJWKs
Generated client JWKs
client_jwks
{
  "keys": [
    {
      "p": "4-BrehlO1cZICOTDt7_GGMOCrwNDzES1cv1-w95tzeCeYI6jLWhJSMX2s7yDLs7_iQwunRs1HwhhUnjOPW9MtRNwkEinH43Nr7hzsgMZp8YjK_z5nONoJVf80i0Pws5l7G-bAlz1rWnR0T1DkbbqcGcT77AbXZlYQ89jL5N7Egs",
      "kty": "RSA",
      "q": "wUDfWrXMGk-EFtVPVJa97YuxhSqzgdHnU53FZdSSMMKJBD--ru5g-rwBaaIxvbMti9Umx4mSv1u8W9lNjH3LwjyzEooFbpqPzP1rFmCkIIjdbTMMg-sG2Zaa4KYGoiwt27gIPbAe-CZC_gykJAx8vR9ZRjt4eJ_HniltJYQ3D9c",
      "d": "SvMDSsQbPq5f1kFnEob8KUUb2CMh1OGDa3w8dBJHn3YYbY0EI9K6F12WuuO7V2o_ji2GZ_wGPOlFeh7_XTl78elrXACulM6HjNOJa-oHAujIplnT9QFjInZOBXdxifUAC0EJraB32PwmUZ0wwmlKi89djXPgV95tfsd4FxOJl7FM9aCO7Ry74qKEg-qzhyaUkkUfDnBRFvggmVPyZDnU2HHrmbH2T69_i4LuSsmm7nmD3p6_UoXXm60nd_L1Vctm6SaMbuLanA8B5HRvILTogrJXiQR-kDZ-Yqlvcle35a83sC1IflqTSVSnGvYmj92WmXN55yvFl16B0PlifPK5mQ",
      "e": "AQAB",
      "use": "sig",
      "qi": "JjTrqkeBKQj3UHUwUIOeDXzXXTRf8o9ut_ykMp9FBIAW-06-TLp0qxrsxKJZ8cH84c0OR82IGKOjXCzlMrlj1sBXuhE9i56i7yzCqhJa0amST0LaNEW876rgdERz-GgGNS9ZuAoh4CfzwuZToWXfLw9_t_wToAPpjTiJ_8eGaVY",
      "dp": "SFnQxguTBDzYUjqQCZ9R_jrVG0wmEo0eL0xdG0NcCanvnyiqlpgt7HUuRxLrc8k1SQYdJrSkwR2gCNdiZA8ag8OQUb8_kL0tOUWPNk3Vr3cxY54GgtGRF4pAM1srTebKZa9pv-5T8qNOgui4s2MoPFf99HQtvCIb7CvEii6BPNE",
      "alg": "RS256",
      "dq": "i7KogvsuKsrWUmcqbJx3eVNlJT2D-9FPpqtDOeRbNXI6995Yqj3Zzwa_AqxjxpzSzOVtngp-EWRwGflQzMFW3Pdh_4HUgWqrjuSWV9vOaVJmtnyTjH0GO55aIREDdJH5KH61PlqlWH7YKKvcr85zEYeq0lFFOfVOqK-LnfYgk4s",
      "n": "rAXv8yfzQhcLwBrxtVqhDtccCYezeIs374AdskalKNgaSJjuIWCTRILg90D72a2LWFr8n-TfWyymycNe8kEr6E66bDtEWSBwtUYKW_HlitZg2uxQiQpPwWXn5hXCXbGo5M73nUFxdkpV3oAn3_U20yLQ8EmRnWeZaPVbWFenBRIqT7qnULT90IikZtmTFm54G1Oz03HuNIg5G8zUeZrkSASN6xqMpnlXWS46gVS0NNylfpNTeitZyZgNSvnSN40qvCZ7unqTxzrYGX9Zv36Ic_c0ZF1XKVEqAzGQnD9HdYoqTaj1T8sXPn62uEgDR2TecOkAAfhmfN5We4XunsfMPQ"
    }
  ]
}
public_client_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "alg": "RS256",
      "n": "rAXv8yfzQhcLwBrxtVqhDtccCYezeIs374AdskalKNgaSJjuIWCTRILg90D72a2LWFr8n-TfWyymycNe8kEr6E66bDtEWSBwtUYKW_HlitZg2uxQiQpPwWXn5hXCXbGo5M73nUFxdkpV3oAn3_U20yLQ8EmRnWeZaPVbWFenBRIqT7qnULT90IikZtmTFm54G1Oz03HuNIg5G8zUeZrkSASN6xqMpnlXWS46gVS0NNylfpNTeitZyZgNSvnSN40qvCZ7unqTxzrYGX9Zv36Ic_c0ZF1XKVEqAzGQnD9HdYoqTaj1T8sXPn62uEgDR2TecOkAAfhmfN5We4XunsfMPQ"
    }
  ]
}
2020-07-28 20:05:34 SUCCESS
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-07-28 20:05:34 SUCCESS
CreateDynamicRegistrationRequest
Created dynamic registration request
client_name
first-openid-client Jnq1u3IYIp
2020-07-28 20:05:34
AddImplicitGrantTypeToDynamicRegistrationRequest
Added 'implicit' to 'grant_types'
grant_types
[
  "implicit"
]
2020-07-28 20:05:34
AddPublicJwksToDynamicRegistrationRequest
Added client public JWKS to dynamic registration request
dynamic_registration_request
{
  "client_name": "first-openid-client Jnq1u3IYIp",
  "grant_types": [
    "implicit"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "rAXv8yfzQhcLwBrxtVqhDtccCYezeIs374AdskalKNgaSJjuIWCTRILg90D72a2LWFr8n-TfWyymycNe8kEr6E66bDtEWSBwtUYKW_HlitZg2uxQiQpPwWXn5hXCXbGo5M73nUFxdkpV3oAn3_U20yLQ8EmRnWeZaPVbWFenBRIqT7qnULT90IikZtmTFm54G1Oz03HuNIg5G8zUeZrkSASN6xqMpnlXWS46gVS0NNylfpNTeitZyZgNSvnSN40qvCZ7unqTxzrYGX9Zv36Ic_c0ZF1XKVEqAzGQnD9HdYoqTaj1T8sXPn62uEgDR2TecOkAAfhmfN5We4XunsfMPQ"
      }
    ]
  }
}
2020-07-28 20:05:34
AddTokenEndpointAuthMethodToDynamicRegistrationRequestFromEnvironment
Added token endpoint auth method to dynamic registration request
dynamic_registration_request
{
  "client_name": "first-openid-client Jnq1u3IYIp",
  "grant_types": [
    "implicit"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "rAXv8yfzQhcLwBrxtVqhDtccCYezeIs374AdskalKNgaSJjuIWCTRILg90D72a2LWFr8n-TfWyymycNe8kEr6E66bDtEWSBwtUYKW_HlitZg2uxQiQpPwWXn5hXCXbGo5M73nUFxdkpV3oAn3_U20yLQ8EmRnWeZaPVbWFenBRIqT7qnULT90IikZtmTFm54G1Oz03HuNIg5G8zUeZrkSASN6xqMpnlXWS46gVS0NNylfpNTeitZyZgNSvnSN40qvCZ7unqTxzrYGX9Zv36Ic_c0ZF1XKVEqAzGQnD9HdYoqTaj1T8sXPn62uEgDR2TecOkAAfhmfN5We4XunsfMPQ"
      }
    ]
  },
  "token_endpoint_auth_method": "private_key_jwt"
}
2020-07-28 20:05:34
AddResponseTypesArrayToDynamicRegistrationRequestFromEnvironment
Added response_types array to dynamic registration request
dynamic_registration_request
{
  "client_name": "first-openid-client Jnq1u3IYIp",
  "grant_types": [
    "implicit"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "rAXv8yfzQhcLwBrxtVqhDtccCYezeIs374AdskalKNgaSJjuIWCTRILg90D72a2LWFr8n-TfWyymycNe8kEr6E66bDtEWSBwtUYKW_HlitZg2uxQiQpPwWXn5hXCXbGo5M73nUFxdkpV3oAn3_U20yLQ8EmRnWeZaPVbWFenBRIqT7qnULT90IikZtmTFm54G1Oz03HuNIg5G8zUeZrkSASN6xqMpnlXWS46gVS0NNylfpNTeitZyZgNSvnSN40qvCZ7unqTxzrYGX9Zv36Ic_c0ZF1XKVEqAzGQnD9HdYoqTaj1T8sXPn62uEgDR2TecOkAAfhmfN5We4XunsfMPQ"
      }
    ]
  },
  "token_endpoint_auth_method": "private_key_jwt",
  "response_types": [
    "id_token token"
  ]
}
2020-07-28 20:05:34
AddRedirectUriToDynamicRegistrationRequest
Added redirect_uris array to dynamic registration request
dynamic_registration_request
{
  "client_name": "first-openid-client Jnq1u3IYIp",
  "grant_types": [
    "implicit"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "rAXv8yfzQhcLwBrxtVqhDtccCYezeIs374AdskalKNgaSJjuIWCTRILg90D72a2LWFr8n-TfWyymycNe8kEr6E66bDtEWSBwtUYKW_HlitZg2uxQiQpPwWXn5hXCXbGo5M73nUFxdkpV3oAn3_U20yLQ8EmRnWeZaPVbWFenBRIqT7qnULT90IikZtmTFm54G1Oz03HuNIg5G8zUeZrkSASN6xqMpnlXWS46gVS0NNylfpNTeitZyZgNSvnSN40qvCZ7unqTxzrYGX9Zv36Ic_c0ZF1XKVEqAzGQnD9HdYoqTaj1T8sXPn62uEgDR2TecOkAAfhmfN5We4XunsfMPQ"
      }
    ]
  },
  "token_endpoint_auth_method": "private_key_jwt",
  "response_types": [
    "id_token token"
  ],
  "redirect_uris": [
    "https://www.certification.openid.net/test/Jnq1u3IYIp/callback?bar\u003dfoo"
  ]
}
2020-07-28 20:05:34
AddContactsToDynamicRegistrationRequest
Added contacts array to dynamic registration request
dynamic_registration_request
{
  "client_name": "first-openid-client Jnq1u3IYIp",
  "grant_types": [
    "implicit"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "rAXv8yfzQhcLwBrxtVqhDtccCYezeIs374AdskalKNgaSJjuIWCTRILg90D72a2LWFr8n-TfWyymycNe8kEr6E66bDtEWSBwtUYKW_HlitZg2uxQiQpPwWXn5hXCXbGo5M73nUFxdkpV3oAn3_U20yLQ8EmRnWeZaPVbWFenBRIqT7qnULT90IikZtmTFm54G1Oz03HuNIg5G8zUeZrkSASN6xqMpnlXWS46gVS0NNylfpNTeitZyZgNSvnSN40qvCZ7unqTxzrYGX9Zv36Ic_c0ZF1XKVEqAzGQnD9HdYoqTaj1T8sXPn62uEgDR2TecOkAAfhmfN5We4XunsfMPQ"
      }
    ]
  },
  "token_endpoint_auth_method": "private_key_jwt",
  "response_types": [
    "id_token token"
  ],
  "redirect_uris": [
    "https://www.certification.openid.net/test/Jnq1u3IYIp/callback?bar\u003dfoo"
  ],
  "contacts": [
    "certification@oidf.org"
  ]
}
2020-07-28 20:05:34
CallDynamicRegistrationEndpoint
HTTP request
request_uri
https://op.panva.cz/reg
request_method
POST
request_headers
{
  "accept": "application/json",
  "accept-charset": "utf-8",
  "content-type": "application/json",
  "content-length": "704"
}
request_body
{"client_name":"first-openid-client Jnq1u3IYIp","grant_types":["implicit"],"jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"rAXv8yfzQhcLwBrxtVqhDtccCYezeIs374AdskalKNgaSJjuIWCTRILg90D72a2LWFr8n-TfWyymycNe8kEr6E66bDtEWSBwtUYKW_HlitZg2uxQiQpPwWXn5hXCXbGo5M73nUFxdkpV3oAn3_U20yLQ8EmRnWeZaPVbWFenBRIqT7qnULT90IikZtmTFm54G1Oz03HuNIg5G8zUeZrkSASN6xqMpnlXWS46gVS0NNylfpNTeitZyZgNSvnSN40qvCZ7unqTxzrYGX9Zv36Ic_c0ZF1XKVEqAzGQnD9HdYoqTaj1T8sXPn62uEgDR2TecOkAAfhmfN5We4XunsfMPQ"}]},"token_endpoint_auth_method":"private_key_jwt","response_types":["id_token token"],"redirect_uris":["https://www.certification.openid.net/test/Jnq1u3IYIp/callback?bar=foo"],"contacts":["certification@oidf.org"]}
2020-07-28 20:05:34 RESPONSE
CallDynamicRegistrationEndpoint
HTTP response
response_status_code
201 CREATED
response_status_text
Created
response_headers
{
  "cache-control": "no-cache, no-store",
  "content-length": "1459",
  "content-type": "application/json; charset\u003dutf-8",
  "date": "Tue, 28 Jul 2020 20:05:34 GMT",
  "pragma": "no-cache",
  "server": [
    "Caddy",
    "Cowboy"
  ],
  "strict-transport-security": "max-age\u003d15552000; includeSubDomains",
  "via": "1.1 vegur",
  "x-content-type-options": "nosniff",
  "x-dns-prefetch-control": "off",
  "x-download-options": "noopen",
  "x-frame-options": "SAMEORIGIN",
  "x-xss-protection": "1; mode\u003dblock"
}
response_body
{"application_type":"web","grant_types":["implicit"],"id_token_signed_response_alg":"RS256","post_logout_redirect_uris":[],"require_auth_time":false,"response_types":["id_token token"],"subject_type":"public","token_endpoint_auth_method":"private_key_jwt","introspection_endpoint_auth_method":"private_key_jwt","revocation_endpoint_auth_method":"private_key_jwt","backchannel_logout_session_required":false,"frontchannel_logout_session_required":false,"require_signed_request_object":false,"request_uris":[],"require_pushed_authorization_requests":false,"authorization_signed_response_alg":"RS256","tls_client_certificate_bound_access_tokens":false,"client_id_issued_at":1595966734,"client_id":"F58f408oUi44Xagpw7Oh1","client_name":"first-openid-client Jnq1u3IYIp","contacts":["certification@oidf.org"],"jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"rAXv8yfzQhcLwBrxtVqhDtccCYezeIs374AdskalKNgaSJjuIWCTRILg90D72a2LWFr8n-TfWyymycNe8kEr6E66bDtEWSBwtUYKW_HlitZg2uxQiQpPwWXn5hXCXbGo5M73nUFxdkpV3oAn3_U20yLQ8EmRnWeZaPVbWFenBRIqT7qnULT90IikZtmTFm54G1Oz03HuNIg5G8zUeZrkSASN6xqMpnlXWS46gVS0NNylfpNTeitZyZgNSvnSN40qvCZ7unqTxzrYGX9Zv36Ic_c0ZF1XKVEqAzGQnD9HdYoqTaj1T8sXPn62uEgDR2TecOkAAfhmfN5We4XunsfMPQ"}]},"redirect_uris":["https://www.certification.openid.net/test/Jnq1u3IYIp/callback?bar=foo"],"registration_client_uri":"https://op.panva.cz/reg/F58f408oUi44Xagpw7Oh1","registration_access_token":"TmpN0ggd_7Dnip6xlN35Rh3o99bir2egDpl5zeUo8pE"}
2020-07-28 20:05:34
CallDynamicRegistrationEndpoint
Registration endpoint response
dynamic_registration_response
{"application_type":"web","grant_types":["implicit"],"id_token_signed_response_alg":"RS256","post_logout_redirect_uris":[],"require_auth_time":false,"response_types":["id_token token"],"subject_type":"public","token_endpoint_auth_method":"private_key_jwt","introspection_endpoint_auth_method":"private_key_jwt","revocation_endpoint_auth_method":"private_key_jwt","backchannel_logout_session_required":false,"frontchannel_logout_session_required":false,"require_signed_request_object":false,"request_uris":[],"require_pushed_authorization_requests":false,"authorization_signed_response_alg":"RS256","tls_client_certificate_bound_access_tokens":false,"client_id_issued_at":1595966734,"client_id":"F58f408oUi44Xagpw7Oh1","client_name":"first-openid-client Jnq1u3IYIp","contacts":["certification@oidf.org"],"jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"rAXv8yfzQhcLwBrxtVqhDtccCYezeIs374AdskalKNgaSJjuIWCTRILg90D72a2LWFr8n-TfWyymycNe8kEr6E66bDtEWSBwtUYKW_HlitZg2uxQiQpPwWXn5hXCXbGo5M73nUFxdkpV3oAn3_U20yLQ8EmRnWeZaPVbWFenBRIqT7qnULT90IikZtmTFm54G1Oz03HuNIg5G8zUeZrkSASN6xqMpnlXWS46gVS0NNylfpNTeitZyZgNSvnSN40qvCZ7unqTxzrYGX9Zv36Ic_c0ZF1XKVEqAzGQnD9HdYoqTaj1T8sXPn62uEgDR2TecOkAAfhmfN5We4XunsfMPQ"}]},"redirect_uris":["https://www.certification.openid.net/test/Jnq1u3IYIp/callback?bar=foo"],"registration_client_uri":"https://op.panva.cz/reg/F58f408oUi44Xagpw7Oh1","registration_access_token":"TmpN0ggd_7Dnip6xlN35Rh3o99bir2egDpl5zeUo8pE"}
2020-07-28 20:05:34
CallDynamicRegistrationEndpoint
Parsed registration endpoint response
application_type
web
grant_types
[
  "implicit"
]
id_token_signed_response_alg
RS256
post_logout_redirect_uris
[]
require_auth_time
false
response_types
[
  "id_token token"
]
subject_type
public
token_endpoint_auth_method
private_key_jwt
introspection_endpoint_auth_method
private_key_jwt
revocation_endpoint_auth_method
private_key_jwt
backchannel_logout_session_required
false
frontchannel_logout_session_required
false
require_signed_request_object
false
request_uris
[]
require_pushed_authorization_requests
false
authorization_signed_response_alg
RS256
tls_client_certificate_bound_access_tokens
false
client_id_issued_at
1595966734
client_id
F58f408oUi44Xagpw7Oh1
client_name
first-openid-client Jnq1u3IYIp
contacts
[
  "certification@oidf.org"
]
jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "alg": "RS256",
      "n": "rAXv8yfzQhcLwBrxtVqhDtccCYezeIs374AdskalKNgaSJjuIWCTRILg90D72a2LWFr8n-TfWyymycNe8kEr6E66bDtEWSBwtUYKW_HlitZg2uxQiQpPwWXn5hXCXbGo5M73nUFxdkpV3oAn3_U20yLQ8EmRnWeZaPVbWFenBRIqT7qnULT90IikZtmTFm54G1Oz03HuNIg5G8zUeZrkSASN6xqMpnlXWS46gVS0NNylfpNTeitZyZgNSvnSN40qvCZ7unqTxzrYGX9Zv36Ic_c0ZF1XKVEqAzGQnD9HdYoqTaj1T8sXPn62uEgDR2TecOkAAfhmfN5We4XunsfMPQ"
    }
  ]
}
redirect_uris
[
  "https://www.certification.openid.net/test/Jnq1u3IYIp/callback?bar\u003dfoo"
]
registration_client_uri
https://op.panva.cz/reg/F58f408oUi44Xagpw7Oh1
registration_access_token
TmpN0ggd_7Dnip6xlN35Rh3o99bir2egDpl5zeUo8pE
2020-07-28 20:05:34 SUCCESS
CallDynamicRegistrationEndpoint
Extracted dynamic registration management credentials
registration_client_uri
https://op.panva.cz/reg/F58f408oUi44Xagpw7Oh1
registration_access_token
TmpN0ggd_7Dnip6xlN35Rh3o99bir2egDpl5zeUo8pE
2020-07-28 20:05:34
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
scope
openid
2020-07-28 20:05:34 SUCCESS
EnsureServerConfigurationSupportsPrivateKeyJwt
Found supported private_key_jwt method
method
private_key_jwt
2020-07-28 20:05:34 SUCCESS
SetProtectedResourceUrlToUserInfoEndpoint
userinfo_endpoint will be used to test access token. The user info is not a mandatory to implement feature in the OpenID Connect specification, but is mandatory for certification.
protected_resource_url
https://op.panva.cz/me
2020-07-28 20:05:34
oidcc-redirect-uri-query-mismatch
Setup Done
Make request to authorization endpoint
2020-07-28 20:05:34 SUCCESS
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
client_id
F58f408oUi44Xagpw7Oh1
redirect_uri
https://www.certification.openid.net/test/Jnq1u3IYIp/callback?bar=foo
scope
openid
2020-07-28 20:05:34
CreateRandomStateValue
Created state value
requested_state_length
10
state
d0TTVJj0R9
2020-07-28 20:05:34 SUCCESS
AddStateToAuthorizationEndpointRequest
Added state parameter to request
client_id
F58f408oUi44Xagpw7Oh1
redirect_uri
https://www.certification.openid.net/test/Jnq1u3IYIp/callback?bar=foo
scope
openid
state
d0TTVJj0R9
2020-07-28 20:05:34
CreateRandomNonceValue
Created nonce value
requested_nonce_length
10
nonce
AvEVPiBJAI
2020-07-28 20:05:34 SUCCESS
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
client_id
F58f408oUi44Xagpw7Oh1
redirect_uri
https://www.certification.openid.net/test/Jnq1u3IYIp/callback?bar=foo
scope
openid
state
d0TTVJj0R9
nonce
AvEVPiBJAI
2020-07-28 20:05:34 SUCCESS
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
client_id
F58f408oUi44Xagpw7Oh1
redirect_uri
https://www.certification.openid.net/test/Jnq1u3IYIp/callback?bar=foo
scope
openid
state
d0TTVJj0R9
nonce
AvEVPiBJAI
response_type
id_token token
2020-07-28 20:05:34
ReplaceRedirectUriQueryInAuthorizationRequest
Updated redirect_uri in authorization endpoint request
redirect_uri
https://www.certification.openid.net/test/Jnq1u3IYIp/callback?foo=bar
2020-07-28 20:05:34 SUCCESS
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
redirect_to_authorization_endpoint
https://op.panva.cz/auth?client_id=F58f408oUi44Xagpw7Oh1&scope=openid&state=d0TTVJj0R9&nonce=AvEVPiBJAI&response_type=id_token%20token&redirect_uri=https://www.certification.openid.net/test/Jnq1u3IYIp/callback?foo%3Dbar
2020-07-28 20:05:34 REDIRECT
oidcc-redirect-uri-query-mismatch
Redirecting to authorization endpoint
redirect_to
https://op.panva.cz/auth?client_id=F58f408oUi44Xagpw7Oh1&scope=openid&state=d0TTVJj0R9&nonce=AvEVPiBJAI&response_type=id_token%20token&redirect_uri=https://www.certification.openid.net/test/Jnq1u3IYIp/callback?foo%3Dbar
2020-07-28 20:05:34 REVIEW
ExpectRedirectUriErrorPage
Show redirect URI error page
content_type
text/html
page_source
<?xml version="1.0" encoding="UTF-8"?>
<html>
  <head>
    <meta charset="utf-8"/>
    <title>
      oops! something went wrong
    </title>
    <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no"/>
    <meta http-equiv="x-ua-compatible" content="ie=edge"/>
    <style>
      
        @import url(https://fonts.googleapis.com/css?family=Roboto:400,100);h1{font-weight:100;text-align:center;font-size:2.3em}body{font-family:Roboto,sans-serif;margin-top:25px;margin-bottom:25px}.container{padding:0 40px 10px;width:274px;background-color:#F7F7F7;margin:0 auto 10px;border-radius:2px;box-shadow:0 2px 2px rgba(0,0,0,.3);overflow:hidden}pre{white-space:pre-wrap;white-space:-moz-pre-wrap;white-space:-pre-wrap;white-space:-o-pre-wrap;word-wrap:break-word;margin:0 0 0 1em;text-indent:-1em}
      
    </style>
  </head>
  <body>
    <div class="container">
      <h1>
        oops! something went wrong
      </h1>
      <pre>
        <strong>
          error
        </strong>
        : redirect_uri_mismatch
      </pre>
      <pre>
        <strong>
          error_description
        </strong>
        : redirect_uri did not match any of the client's registered redirect_uris
      </pre>
      <pre>
        <strong>
          state
        </strong>
        : d0TTVJj0R9
      </pre>
    </div>
  </body>
</html>
2020-07-28 20:05:34
WebRunner
Scripted browser HTTP request
browser
goToUrl
request_method
GET
request_uri
https://op.panva.cz/auth?client_id=F58f408oUi44Xagpw7Oh1&scope=openid&state=d0TTVJj0R9&nonce=AvEVPiBJAI&response_type=id_token%20token&redirect_uri=https://www.certification.openid.net/test/Jnq1u3IYIp/callback?foo%3Dbar
2020-07-28 20:05:35 RESPONSE
WebRunner
Scripted browser HTTP response
response_content
<!DOCTYPE html>
    <head>
      <meta charset="utf-8">
      <title>oops! something went wrong</title>
      <meta name="viewport" content="width=device-width, initial-scale=1, shrink-to-fit=no">
      <meta http-equiv="x-ua-compatible" content="ie=edge">
      <style>
        @import url(https://fonts.googleapis.com/css?family=Roboto:400,100);h1{font-weight:100;text-align:center;font-size:2.3em}body{font-family:Roboto,sans-serif;margin-top:25px;margin-bottom:25px}.container{padding:0 40px 10px;width:274px;background-color:#F7F7F7;margin:0 auto 10px;border-radius:2px;box-shadow:0 2px 2px rgba(0,0,0,.3);overflow:hidden}pre{white-space:pre-wrap;white-space:-moz-pre-wrap;white-space:-pre-wrap;white-space:-o-pre-wrap;word-wrap:break-word;margin:0 0 0 1em;text-indent:-1em}
      </style>
    </head>
    <body>
      <div class="container">
        <h1>oops! something went wrong</h1>
        <pre><strong>error</strong>: redirect_uri_mismatch</pre><pre><strong>error_description</strong>: redirect_uri did not match any of the client&#39;s registered redirect_uris</pre><pre><strong>state</strong>: d0TTVJj0R9</pre>
      </div>
    </body>
    </html>
response_content_type
text/html
response_status_text
400-Bad Request
response_status_code
400
2020-07-28 20:05:35 INFO
WebRunner
Waiting
regexp
oops! something went wrong
seconds
10
task
Expect redirect uri mismatch error page
browser
wait
action
update-image-placeholder
element_type
xpath
url
https://op.panva.cz/auth?client_id=F58f408oUi44Xagpw7Oh1&scope=openid&state=d0TTVJj0R9&nonce=AvEVPiBJAI&response_type=id_token%20token&redirect_uri=https://www.certification.openid.net/test/Jnq1u3IYIp/callback?foo%3Dbar
target
//*
2020-07-28 20:05:35
BROWSER
Updated placeholder from scripted browser
placeholder
MwwUU11SeY
2020-07-28 20:05:35
BROWSER
All placeholders filled by scripted browser
2020-07-28 20:05:35 INFO
WebRunner
Completed processing of webpage
task
Expect redirect uri mismatch error page
browser
complete
response_status_text
400-Bad Request
match
https://op.panva.cz/auth*
url
https://op.panva.cz/auth?client_id=F58f408oUi44Xagpw7Oh1&scope=openid&state=d0TTVJj0R9&nonce=AvEVPiBJAI&response_type=id_token%20token&redirect_uri=https://www.certification.openid.net/test/Jnq1u3IYIp/callback?foo%3Dbar
response_status_code
400
2020-07-28 20:05:35 FINISHED
oidcc-redirect-uri-query-mismatch
Test has run to completion
testmodule_result
REVIEW
Unregister dynamically registered client
2020-07-28 20:05:35
UnregisterDynamicallyRegisteredClient
HTTP request
request_uri
https://op.panva.cz/reg/F58f408oUi44Xagpw7Oh1
request_method
DELETE
request_headers
{
  "accept": "application/json",
  "accept-charset": "utf-8",
  "authorization": "Bearer TmpN0ggd_7Dnip6xlN35Rh3o99bir2egDpl5zeUo8pE",
  "content-length": "0"
}
request_body

                                
2020-07-28 20:05:36 RESPONSE
UnregisterDynamicallyRegisteredClient
HTTP response
response_status_code
204 NO_CONTENT
response_status_text
No Content
response_headers
{
  "cache-control": "no-cache, no-store",
  "date": "Tue, 28 Jul 2020 20:05:36 GMT",
  "pragma": "no-cache",
  "server": [
    "Caddy",
    "Cowboy"
  ],
  "strict-transport-security": "max-age\u003d15552000; includeSubDomains",
  "via": "1.1 vegur",
  "x-content-type-options": "nosniff",
  "x-dns-prefetch-control": "off",
  "x-download-options": "noopen",
  "x-frame-options": "SAMEORIGIN",
  "x-xss-protection": "1; mode\u003dblock"
}
response_body

                                
2020-07-28 20:05:36 SUCCESS
UnregisterDynamicallyRegisteredClient
Client successfully unregistered
Test Results