Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-07-28 20:28:12 INFO
TEST-RUNNER
Test instance yirSUYQEfi created
baseUrl
https://www.certification.openid.net/test/yirSUYQEfi
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "server_metadata": "discovery",
  "response_mode": "default",
  "client_registration": "dynamic_client"
}
alias

                                
description
node oidc-provider
planId
rDONDWEmTIXFU
config
{
  "description": "node oidc-provider",
  "server": {
    "discoveryUrl": "https://op.panva.cz/.well-known/openid-configuration",
    "login_hint": "bob@example.com"
  },
  "client": {
    "client_name": "first-openid-client"
  },
  "client2": {
    "client_name": "second-openid-client"
  }
}
testName
oidcc-session-management-rp-initiated-logout
2020-07-28 20:28:12 SUCCESS
CreateRedirectUri
Created redirect URI
redirect_uri
https://www.certification.openid.net/test/yirSUYQEfi/callback
2020-07-28 20:28:12
GetDynamicServerConfiguration
HTTP request
request_uri
https://op.panva.cz/.well-known/openid-configuration
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/cbor, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2020-07-28 20:28:12 RESPONSE
GetDynamicServerConfiguration
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "content-length": "5937",
  "content-type": "application/json; charset\u003dutf-8",
  "date": "Tue, 28 Jul 2020 20:28:12 GMT",
  "server": [
    "Caddy",
    "Cowboy"
  ],
  "strict-transport-security": "max-age\u003d15552000; includeSubDomains",
  "vary": "Origin",
  "via": "1.1 vegur",
  "x-content-type-options": "nosniff",
  "x-dns-prefetch-control": "off",
  "x-download-options": "noopen",
  "x-frame-options": "SAMEORIGIN",
  "x-xss-protection": "1; mode\u003dblock"
}
response_body
{"acr_values_supported":["urn:mace:incommon:iap:bronze"],"authorization_endpoint":"https://op.panva.cz/auth","device_authorization_endpoint":"https://op.panva.cz/device/auth","claims_parameter_supported":true,"claims_supported":["sub","address","email","email_verified","phone_number","phone_number_verified","birthdate","family_name","gender","given_name","locale","middle_name","name","nickname","picture","preferred_username","profile","updated_at","website","zoneinfo","acr","sid","auth_time","iss","amr"],"code_challenge_methods_supported":["S256"],"end_session_endpoint":"https://op.panva.cz/session/end","check_session_iframe":"https://op.panva.cz/session/check","grant_types_supported":["implicit","authorization_code","refresh_token","urn:ietf:params:oauth:grant-type:device_code"],"id_token_signing_alg_values_supported":["HS256","HS384","HS512","none","PS256","PS384","PS512","RS256","RS384","RS512","ES256","ES256K","ES384","ES512","EdDSA"],"issuer":"https://op.panva.cz","jwks_uri":"https://op.panva.cz/jwks","registration_endpoint":"https://op.panva.cz/reg","response_modes_supported":["form_post","fragment","query","jwt","query.jwt","fragment.jwt","form_post.jwt"],"response_types_supported":["code id_token token","code id_token","code token","code","id_token token","id_token","none"],"scopes_supported":["openid","offline_access","address","email","phone","profile"],"subject_types_supported":["public","pairwise"],"token_endpoint_auth_methods_supported":["none","client_secret_basic","client_secret_jwt","client_secret_post","private_key_jwt","self_signed_tls_client_auth"],"token_endpoint_auth_signing_alg_values_supported":["HS256","HS384","HS512","RS256","RS384","RS512","PS256","PS384","PS512","ES256","ES256K","ES384","ES512","EdDSA"],"token_endpoint":"https://op.panva.cz/token","pushed_authorization_request_endpoint":"https://op.panva.cz/request","request_object_signing_alg_values_supported":["HS256","HS384","HS512","RS256","RS384","RS512","PS256","PS384","PS512","ES256","ES256K","ES384","ES512","EdDSA","none"],"request_parameter_supported":true,"request_uri_parameter_supported":true,"require_request_uri_registration":true,"userinfo_endpoint":"https://op.panva.cz/me","userinfo_signing_alg_values_supported":["HS256","HS384","HS512","none","PS256","PS384","PS512","RS256","RS384","RS512","ES256","ES256K","ES384","ES512","EdDSA"],"authorization_signing_alg_values_supported":["HS256","HS384","HS512","PS256","PS384","PS512","RS256","RS384","RS512","ES256","ES256K","ES384","ES512","EdDSA"],"introspection_endpoint":"https://op.panva.cz/token/introspection","introspection_endpoint_auth_methods_supported":["none","client_secret_basic","client_secret_jwt","client_secret_post","private_key_jwt","self_signed_tls_client_auth"],"introspection_endpoint_auth_signing_alg_values_supported":["HS256","HS384","HS512","RS256","RS384","RS512","PS256","PS384","PS512","ES256","ES256K","ES384","ES512","EdDSA"],"dpop_signing_alg_values_supported":["RS256","RS384","RS512","PS256","PS384","PS512","ES256","ES256K","ES384","ES512","EdDSA"],"revocation_endpoint":"https://op.panva.cz/token/revocation","revocation_endpoint_auth_methods_supported":["none","client_secret_basic","client_secret_jwt","client_secret_post","private_key_jwt","self_signed_tls_client_auth"],"revocation_endpoint_auth_signing_alg_values_supported":["HS256","HS384","HS512","RS256","RS384","RS512","PS256","PS384","PS512","ES256","ES256K","ES384","ES512","EdDSA"],"id_token_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA-OAEP-384","RSA-OAEP-512","RSA1_5","ECDH-ES","ECDH-ES+A128KW","ECDH-ES+A192KW","ECDH-ES+A256KW","A128GCMKW","A192GCMKW","A256GCMKW","A128KW","A192KW","A256KW","PBES2-HS256+A128KW","PBES2-HS384+A192KW","PBES2-HS512+A256KW","dir"],"id_token_encryption_enc_values_supported":["A128CBC-HS256","A128GCM","A192CBC-HS384","A192GCM","A256CBC-HS512","A256GCM"],"userinfo_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA-OAEP-384","RSA-OAEP-512","RSA1_5","ECDH-ES","ECDH-ES+A128KW","ECDH-ES+A192KW","ECDH-ES+A256KW","A128GCMKW","A192GCMKW","A256GCMKW","A128KW","A192KW","A256KW","PBES2-HS256+A128KW","PBES2-HS384+A192KW","PBES2-HS512+A256KW","dir"],"userinfo_encryption_enc_values_supported":["A128CBC-HS256","A128GCM","A192CBC-HS384","A192GCM","A256CBC-HS512","A256GCM"],"authorization_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA-OAEP-384","RSA-OAEP-512","RSA1_5","ECDH-ES","ECDH-ES+A128KW","ECDH-ES+A192KW","ECDH-ES+A256KW","A128GCMKW","A192GCMKW","A256GCMKW","A128KW","A192KW","A256KW","PBES2-HS256+A128KW","PBES2-HS384+A192KW","PBES2-HS512+A256KW","dir"],"authorization_encryption_enc_values_supported":["A128CBC-HS256","A128GCM","A192CBC-HS384","A192GCM","A256CBC-HS512","A256GCM"],"request_object_encryption_alg_values_supported":["A128GCMKW","A192GCMKW","A256GCMKW","A128KW","A192KW","A256KW","PBES2-HS256+A128KW","PBES2-HS384+A192KW","PBES2-HS512+A256KW","dir","RSA-OAEP","RSA-OAEP-256","RSA-OAEP-384","RSA-OAEP-512","RSA1_5","ECDH-ES","ECDH-ES+A128KW","ECDH-ES+A192KW","ECDH-ES+A256KW"],"request_object_encryption_enc_values_supported":["A128CBC-HS256","A128GCM","A192CBC-HS384","A192GCM","A256CBC-HS512","A256GCM"],"backchannel_logout_supported":true,"backchannel_logout_session_supported":true,"frontchannel_logout_supported":true,"frontchannel_logout_session_supported":true,"tls_client_certificate_bound_access_tokens":true,"claim_types_supported":["normal"],"service_documentation":"https://github.com/panva/node-oidc-provider","version":"6.28.0-a4eb4b2","mtls_endpoint_aliases":{"token_endpoint":"https://mtls.op.panva.cz/token","introspection_endpoint":"https://mtls.op.panva.cz/token/introspection","revocation_endpoint":"https://mtls.op.panva.cz/token/revocation","userinfo_endpoint":"https://mtls.op.panva.cz/me","device_authorization_endpoint":"https://mtls.op.panva.cz/device/auth","pushed_authorization_request_endpoint":"https://mtls.op.panva.cz/request"}}
2020-07-28 20:28:12
GetDynamicServerConfiguration
Downloaded server configuration
server_config_string
{"acr_values_supported":["urn:mace:incommon:iap:bronze"],"authorization_endpoint":"https://op.panva.cz/auth","device_authorization_endpoint":"https://op.panva.cz/device/auth","claims_parameter_supported":true,"claims_supported":["sub","address","email","email_verified","phone_number","phone_number_verified","birthdate","family_name","gender","given_name","locale","middle_name","name","nickname","picture","preferred_username","profile","updated_at","website","zoneinfo","acr","sid","auth_time","iss","amr"],"code_challenge_methods_supported":["S256"],"end_session_endpoint":"https://op.panva.cz/session/end","check_session_iframe":"https://op.panva.cz/session/check","grant_types_supported":["implicit","authorization_code","refresh_token","urn:ietf:params:oauth:grant-type:device_code"],"id_token_signing_alg_values_supported":["HS256","HS384","HS512","none","PS256","PS384","PS512","RS256","RS384","RS512","ES256","ES256K","ES384","ES512","EdDSA"],"issuer":"https://op.panva.cz","jwks_uri":"https://op.panva.cz/jwks","registration_endpoint":"https://op.panva.cz/reg","response_modes_supported":["form_post","fragment","query","jwt","query.jwt","fragment.jwt","form_post.jwt"],"response_types_supported":["code id_token token","code id_token","code token","code","id_token token","id_token","none"],"scopes_supported":["openid","offline_access","address","email","phone","profile"],"subject_types_supported":["public","pairwise"],"token_endpoint_auth_methods_supported":["none","client_secret_basic","client_secret_jwt","client_secret_post","private_key_jwt","self_signed_tls_client_auth"],"token_endpoint_auth_signing_alg_values_supported":["HS256","HS384","HS512","RS256","RS384","RS512","PS256","PS384","PS512","ES256","ES256K","ES384","ES512","EdDSA"],"token_endpoint":"https://op.panva.cz/token","pushed_authorization_request_endpoint":"https://op.panva.cz/request","request_object_signing_alg_values_supported":["HS256","HS384","HS512","RS256","RS384","RS512","PS256","PS384","PS512","ES256","ES256K","ES384","ES512","EdDSA","none"],"request_parameter_supported":true,"request_uri_parameter_supported":true,"require_request_uri_registration":true,"userinfo_endpoint":"https://op.panva.cz/me","userinfo_signing_alg_values_supported":["HS256","HS384","HS512","none","PS256","PS384","PS512","RS256","RS384","RS512","ES256","ES256K","ES384","ES512","EdDSA"],"authorization_signing_alg_values_supported":["HS256","HS384","HS512","PS256","PS384","PS512","RS256","RS384","RS512","ES256","ES256K","ES384","ES512","EdDSA"],"introspection_endpoint":"https://op.panva.cz/token/introspection","introspection_endpoint_auth_methods_supported":["none","client_secret_basic","client_secret_jwt","client_secret_post","private_key_jwt","self_signed_tls_client_auth"],"introspection_endpoint_auth_signing_alg_values_supported":["HS256","HS384","HS512","RS256","RS384","RS512","PS256","PS384","PS512","ES256","ES256K","ES384","ES512","EdDSA"],"dpop_signing_alg_values_supported":["RS256","RS384","RS512","PS256","PS384","PS512","ES256","ES256K","ES384","ES512","EdDSA"],"revocation_endpoint":"https://op.panva.cz/token/revocation","revocation_endpoint_auth_methods_supported":["none","client_secret_basic","client_secret_jwt","client_secret_post","private_key_jwt","self_signed_tls_client_auth"],"revocation_endpoint_auth_signing_alg_values_supported":["HS256","HS384","HS512","RS256","RS384","RS512","PS256","PS384","PS512","ES256","ES256K","ES384","ES512","EdDSA"],"id_token_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA-OAEP-384","RSA-OAEP-512","RSA1_5","ECDH-ES","ECDH-ES+A128KW","ECDH-ES+A192KW","ECDH-ES+A256KW","A128GCMKW","A192GCMKW","A256GCMKW","A128KW","A192KW","A256KW","PBES2-HS256+A128KW","PBES2-HS384+A192KW","PBES2-HS512+A256KW","dir"],"id_token_encryption_enc_values_supported":["A128CBC-HS256","A128GCM","A192CBC-HS384","A192GCM","A256CBC-HS512","A256GCM"],"userinfo_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA-OAEP-384","RSA-OAEP-512","RSA1_5","ECDH-ES","ECDH-ES+A128KW","ECDH-ES+A192KW","ECDH-ES+A256KW","A128GCMKW","A192GCMKW","A256GCMKW","A128KW","A192KW","A256KW","PBES2-HS256+A128KW","PBES2-HS384+A192KW","PBES2-HS512+A256KW","dir"],"userinfo_encryption_enc_values_supported":["A128CBC-HS256","A128GCM","A192CBC-HS384","A192GCM","A256CBC-HS512","A256GCM"],"authorization_encryption_alg_values_supported":["RSA-OAEP","RSA-OAEP-256","RSA-OAEP-384","RSA-OAEP-512","RSA1_5","ECDH-ES","ECDH-ES+A128KW","ECDH-ES+A192KW","ECDH-ES+A256KW","A128GCMKW","A192GCMKW","A256GCMKW","A128KW","A192KW","A256KW","PBES2-HS256+A128KW","PBES2-HS384+A192KW","PBES2-HS512+A256KW","dir"],"authorization_encryption_enc_values_supported":["A128CBC-HS256","A128GCM","A192CBC-HS384","A192GCM","A256CBC-HS512","A256GCM"],"request_object_encryption_alg_values_supported":["A128GCMKW","A192GCMKW","A256GCMKW","A128KW","A192KW","A256KW","PBES2-HS256+A128KW","PBES2-HS384+A192KW","PBES2-HS512+A256KW","dir","RSA-OAEP","RSA-OAEP-256","RSA-OAEP-384","RSA-OAEP-512","RSA1_5","ECDH-ES","ECDH-ES+A128KW","ECDH-ES+A192KW","ECDH-ES+A256KW"],"request_object_encryption_enc_values_supported":["A128CBC-HS256","A128GCM","A192CBC-HS384","A192GCM","A256CBC-HS512","A256GCM"],"backchannel_logout_supported":true,"backchannel_logout_session_supported":true,"frontchannel_logout_supported":true,"frontchannel_logout_session_supported":true,"tls_client_certificate_bound_access_tokens":true,"claim_types_supported":["normal"],"service_documentation":"https://github.com/panva/node-oidc-provider","version":"6.28.0-a4eb4b2","mtls_endpoint_aliases":{"token_endpoint":"https://mtls.op.panva.cz/token","introspection_endpoint":"https://mtls.op.panva.cz/token/introspection","revocation_endpoint":"https://mtls.op.panva.cz/token/revocation","userinfo_endpoint":"https://mtls.op.panva.cz/me","device_authorization_endpoint":"https://mtls.op.panva.cz/device/auth","pushed_authorization_request_endpoint":"https://mtls.op.panva.cz/request"}}
2020-07-28 20:28:12 SUCCESS
GetDynamicServerConfiguration
Successfully parsed server configuration
acr_values_supported
[
  "urn:mace:incommon:iap:bronze"
]
authorization_endpoint
https://op.panva.cz/auth
device_authorization_endpoint
https://op.panva.cz/device/auth
claims_parameter_supported
true
claims_supported
[
  "sub",
  "address",
  "email",
  "email_verified",
  "phone_number",
  "phone_number_verified",
  "birthdate",
  "family_name",
  "gender",
  "given_name",
  "locale",
  "middle_name",
  "name",
  "nickname",
  "picture",
  "preferred_username",
  "profile",
  "updated_at",
  "website",
  "zoneinfo",
  "acr",
  "sid",
  "auth_time",
  "iss",
  "amr"
]
code_challenge_methods_supported
[
  "S256"
]
end_session_endpoint
https://op.panva.cz/session/end
check_session_iframe
https://op.panva.cz/session/check
grant_types_supported
[
  "implicit",
  "authorization_code",
  "refresh_token",
  "urn:ietf:params:oauth:grant-type:device_code"
]
id_token_signing_alg_values_supported
[
  "HS256",
  "HS384",
  "HS512",
  "none",
  "PS256",
  "PS384",
  "PS512",
  "RS256",
  "RS384",
  "RS512",
  "ES256",
  "ES256K",
  "ES384",
  "ES512",
  "EdDSA"
]
issuer
https://op.panva.cz
jwks_uri
https://op.panva.cz/jwks
registration_endpoint
https://op.panva.cz/reg
response_modes_supported
[
  "form_post",
  "fragment",
  "query",
  "jwt",
  "query.jwt",
  "fragment.jwt",
  "form_post.jwt"
]
response_types_supported
[
  "code id_token token",
  "code id_token",
  "code token",
  "code",
  "id_token token",
  "id_token",
  "none"
]
scopes_supported
[
  "openid",
  "offline_access",
  "address",
  "email",
  "phone",
  "profile"
]
subject_types_supported
[
  "public",
  "pairwise"
]
token_endpoint_auth_methods_supported
[
  "none",
  "client_secret_basic",
  "client_secret_jwt",
  "client_secret_post",
  "private_key_jwt",
  "self_signed_tls_client_auth"
]
token_endpoint_auth_signing_alg_values_supported
[
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512",
  "PS256",
  "PS384",
  "PS512",
  "ES256",
  "ES256K",
  "ES384",
  "ES512",
  "EdDSA"
]
token_endpoint
https://op.panva.cz/token
pushed_authorization_request_endpoint
https://op.panva.cz/request
request_object_signing_alg_values_supported
[
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512",
  "PS256",
  "PS384",
  "PS512",
  "ES256",
  "ES256K",
  "ES384",
  "ES512",
  "EdDSA",
  "none"
]
request_parameter_supported
true
request_uri_parameter_supported
true
require_request_uri_registration
true
userinfo_endpoint
https://op.panva.cz/me
userinfo_signing_alg_values_supported
[
  "HS256",
  "HS384",
  "HS512",
  "none",
  "PS256",
  "PS384",
  "PS512",
  "RS256",
  "RS384",
  "RS512",
  "ES256",
  "ES256K",
  "ES384",
  "ES512",
  "EdDSA"
]
authorization_signing_alg_values_supported
[
  "HS256",
  "HS384",
  "HS512",
  "PS256",
  "PS384",
  "PS512",
  "RS256",
  "RS384",
  "RS512",
  "ES256",
  "ES256K",
  "ES384",
  "ES512",
  "EdDSA"
]
introspection_endpoint
https://op.panva.cz/token/introspection
introspection_endpoint_auth_methods_supported
[
  "none",
  "client_secret_basic",
  "client_secret_jwt",
  "client_secret_post",
  "private_key_jwt",
  "self_signed_tls_client_auth"
]
introspection_endpoint_auth_signing_alg_values_supported
[
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512",
  "PS256",
  "PS384",
  "PS512",
  "ES256",
  "ES256K",
  "ES384",
  "ES512",
  "EdDSA"
]
dpop_signing_alg_values_supported
[
  "RS256",
  "RS384",
  "RS512",
  "PS256",
  "PS384",
  "PS512",
  "ES256",
  "ES256K",
  "ES384",
  "ES512",
  "EdDSA"
]
revocation_endpoint
https://op.panva.cz/token/revocation
revocation_endpoint_auth_methods_supported
[
  "none",
  "client_secret_basic",
  "client_secret_jwt",
  "client_secret_post",
  "private_key_jwt",
  "self_signed_tls_client_auth"
]
revocation_endpoint_auth_signing_alg_values_supported
[
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512",
  "PS256",
  "PS384",
  "PS512",
  "ES256",
  "ES256K",
  "ES384",
  "ES512",
  "EdDSA"
]
id_token_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA-OAEP-384",
  "RSA-OAEP-512",
  "RSA1_5",
  "ECDH-ES",
  "ECDH-ES+A128KW",
  "ECDH-ES+A192KW",
  "ECDH-ES+A256KW",
  "A128GCMKW",
  "A192GCMKW",
  "A256GCMKW",
  "A128KW",
  "A192KW",
  "A256KW",
  "PBES2-HS256+A128KW",
  "PBES2-HS384+A192KW",
  "PBES2-HS512+A256KW",
  "dir"
]
id_token_encryption_enc_values_supported
[
  "A128CBC-HS256",
  "A128GCM",
  "A192CBC-HS384",
  "A192GCM",
  "A256CBC-HS512",
  "A256GCM"
]
userinfo_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA-OAEP-384",
  "RSA-OAEP-512",
  "RSA1_5",
  "ECDH-ES",
  "ECDH-ES+A128KW",
  "ECDH-ES+A192KW",
  "ECDH-ES+A256KW",
  "A128GCMKW",
  "A192GCMKW",
  "A256GCMKW",
  "A128KW",
  "A192KW",
  "A256KW",
  "PBES2-HS256+A128KW",
  "PBES2-HS384+A192KW",
  "PBES2-HS512+A256KW",
  "dir"
]
userinfo_encryption_enc_values_supported
[
  "A128CBC-HS256",
  "A128GCM",
  "A192CBC-HS384",
  "A192GCM",
  "A256CBC-HS512",
  "A256GCM"
]
authorization_encryption_alg_values_supported
[
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA-OAEP-384",
  "RSA-OAEP-512",
  "RSA1_5",
  "ECDH-ES",
  "ECDH-ES+A128KW",
  "ECDH-ES+A192KW",
  "ECDH-ES+A256KW",
  "A128GCMKW",
  "A192GCMKW",
  "A256GCMKW",
  "A128KW",
  "A192KW",
  "A256KW",
  "PBES2-HS256+A128KW",
  "PBES2-HS384+A192KW",
  "PBES2-HS512+A256KW",
  "dir"
]
authorization_encryption_enc_values_supported
[
  "A128CBC-HS256",
  "A128GCM",
  "A192CBC-HS384",
  "A192GCM",
  "A256CBC-HS512",
  "A256GCM"
]
request_object_encryption_alg_values_supported
[
  "A128GCMKW",
  "A192GCMKW",
  "A256GCMKW",
  "A128KW",
  "A192KW",
  "A256KW",
  "PBES2-HS256+A128KW",
  "PBES2-HS384+A192KW",
  "PBES2-HS512+A256KW",
  "dir",
  "RSA-OAEP",
  "RSA-OAEP-256",
  "RSA-OAEP-384",
  "RSA-OAEP-512",
  "RSA1_5",
  "ECDH-ES",
  "ECDH-ES+A128KW",
  "ECDH-ES+A192KW",
  "ECDH-ES+A256KW"
]
request_object_encryption_enc_values_supported
[
  "A128CBC-HS256",
  "A128GCM",
  "A192CBC-HS384",
  "A192GCM",
  "A256CBC-HS512",
  "A256GCM"
]
backchannel_logout_supported
true
backchannel_logout_session_supported
true
frontchannel_logout_supported
true
frontchannel_logout_session_supported
true
tls_client_certificate_bound_access_tokens
true
claim_types_supported
[
  "normal"
]
service_documentation
https://github.com/panva/node-oidc-provider
version
6.28.0-a4eb4b2
mtls_endpoint_aliases
{
  "token_endpoint": "https://mtls.op.panva.cz/token",
  "introspection_endpoint": "https://mtls.op.panva.cz/token/introspection",
  "revocation_endpoint": "https://mtls.op.panva.cz/token/revocation",
  "userinfo_endpoint": "https://mtls.op.panva.cz/me",
  "device_authorization_endpoint": "https://mtls.op.panva.cz/device/auth",
  "pushed_authorization_request_endpoint": "https://mtls.op.panva.cz/request"
}
2020-07-28 20:28:12 SUCCESS
CheckServerConfiguration
Found required server configuration keys
required
[
  "authorization_endpoint",
  "token_endpoint",
  "issuer"
]
2020-07-28 20:28:12 SUCCESS
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
registration_endpoint
{
  "testHost": "op.panva.cz",
  "testPort": 443
}
authorization_endpoint
{
  "testHost": "op.panva.cz",
  "testPort": 443
}
token_endpoint
{
  "testHost": "op.panva.cz",
  "testPort": 443
}
userinfo_endpoint
{
  "testHost": "op.panva.cz",
  "testPort": 443
}
2020-07-28 20:28:12
FetchServerKeys
Fetching server key
jwks_uri
https://op.panva.cz/jwks
2020-07-28 20:28:12
FetchServerKeys
HTTP request
request_uri
https://op.panva.cz/jwks
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/cbor, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2020-07-28 20:28:13 RESPONSE
FetchServerKeys
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "content-length": "2810",
  "content-type": "application/json; charset\u003dutf-8",
  "date": "Tue, 28 Jul 2020 20:28:13 GMT",
  "server": [
    "Caddy",
    "Cowboy"
  ],
  "strict-transport-security": "max-age\u003d15552000; includeSubDomains",
  "vary": "Origin",
  "via": "1.1 vegur",
  "x-content-type-options": "nosniff",
  "x-dns-prefetch-control": "off",
  "x-download-options": "noopen",
  "x-frame-options": "SAMEORIGIN",
  "x-xss-protection": "1; mode\u003dblock"
}
response_body
{"keys":[{"e":"AQAB","n":"xwQ72P9z9OYshiQ-ntDYaPnnfwG6u9JAdLMZ5o0dmjlcyrvwQRdoFIKPnO65Q8mh6F_LDSxjxa2Yzo_wdjhbPZLjfUJXgCzm54cClXzT5twzo7lzoAfaJlkTsoZc2HFWqmcri0BuzmTFLZx2Q7wYBm0pXHmQKF0V-C1O6NWfd4mfBhbM-I1tHYSpAMgarSm22WDMDx-WWI7TEzy2QhaBVaENW9BKaKkJklocAZCxk18WhR0fckIGiWiSM5FcU1PY2jfGsTmX505Ub7P5Dz75Ygqrutd5tFrcqyPAtPTFDk8X1InxkkUwpP3nFU5o50DGhwQolGYKPGtQ-ZtmbOfcWQ","kty":"RSA","kid":"r1LkbBo3925Rb2ZFFrKyU3MVex9T2817Kx0vbi6i_Kc","use":"sig"},{"e":"AQAB","n":"mXauIvyeUFA74P2vcmgAWSCMw6CP6-MJ6EvFuRARfLLJEi49AzQvJl_4pwDvLkZcCqS7OqPE1ufNyDH6oQPEc7JuukHMY02EgwqHjJ6GG6FQqJuiWlKB_l-7c9y9r4bh4r58xdZc6T5dFVSNT2VcIVoSjq9VmzwpaTKCUyVeZYHZhnLfWMm9rKU5WSz75siG-_jbudItsfhEwA59kvi4So2IV9TxHwW50i4IcTB1gXwG1olNgiX3-Mq1Iw5VGPzMo2hQXI3q1y-ZjhSwhvG5dje9J8htBEWdVYk4f6cv19IE9gEx7T-2vIVw5FCpAmmfFuRebec49c7zjfr0EyTI4w","kty":"RSA","kid":"w5kPRdJWODnYjihMgqs0tHkKk-e5OxU4DnSCZDkF_h0","use":"enc"},{"crv":"P-256","x":"FWZ9rSkLt6Dx9E3pxLybhdM6xgR5obGsj5_pqmnz5J4","y":"_n8G69C-A2Xl4xUW2lF0i8ZGZnk_KPYrhv4GbTGu5G4","kty":"EC","kid":"MFZeG102dQiqbANoaMlW_Jmf7fOZmtRsHt77JFhTpF0","use":"sig"},{"crv":"P-256","x":"Eb3RtGgBGOEz33yu46aha_RU6pyBaYNlu6SawlWGGHQ","y":"tUncttzF6Ud4Abfn1N2A1Rz2MBbJSdI0zuKS28BNb-U","kty":"EC","kid":"mlSUkq-ELqZiWl9zs9ZKkbcjIvgajGgnXfPWUZn9lEc","use":"enc"},{"crv":"secp256k1","x":"KDAUHh_SpgROXXAq8IFs9B9lGNB9VP4RwebeAO2tBao","y":"wr3L1dZyUCrS4H18fDYy5hcvGTCp05tiiBy0ZUG8Qs4","kty":"EC","kid":"vl5k1biVlGOHeu2XiLg_0qrIVdoFdM0POWeeCl-QMsY","use":"sig"},{"crv":"P-384","x":"P1npwyTJ2p20D9_r2u31DU7tfDEufaVcSJJcDOuO6QyqrXvjyMvf8e5xv3XxE39l","y":"tmq2S12MVdKUQTmd0AxVEOji1ihR_vZAhTLKojD2XW_2EJH7ydiaz2oxrnkC0mvI","kty":"EC","kid":"rqHXKVLLF2RxqFgXWfEZE578gM-IhelOjugVfb_BMZ4","use":"sig"},{"crv":"P-384","x":"UhkqvxbxMCGtkg_-6W0gqkr21fgY3LSaNbquU7CYEDwBwGCd6iK6Bu5PVUxraulY","y":"CXrg3mxUkN5D4bPfiLfnD1jMYGSDxn2Zeh-8_OOstX21WNZJ9_i-iFZR3pIXyH0z","kty":"EC","kid":"rV1Hjt_79O_m1oJ7Jz0QgKHDa2iwb8p4kvMU0L99wjg","use":"enc"},{"crv":"P-521","x":"AIjEl5H8w2Rf_iqIP8WT7v5-FlBlBGYy5sMJs1XOxWz4RRARIEOemEY45g10sEPzZ4qe7oyjCUDK5FY1WwjRvgHK","y":"AaKN94cn1ApvvfpOWO9VpJm-lLzOUR8XxOrKYfPqcLs0zEqSPiGdWA5CoNL5ck1q-CXD09ysQSmNkzFGaig2Mnop","kty":"EC","kid":"RG_hu6lggazoCOu2wsrn3icSvhAXuGyL55f2GAaH2NA","use":"sig"},{"crv":"P-521","x":"AXFcu6lqcxoyFUU14xTw0I5cfCR2q0jqOXwU_EKjA5mIxUpue58IIrfrIh4IauV3co2SziD6Uf1SWe8l11Y4-BoJ","y":"AREzsMJu3VveUPMaJ2QWmjucwzZH4FqufXzS2IW-MGqViyDNTg2BgX-2VCJvdTo0zbhvRvBC1ghJNrVnH5M92JQ6","kty":"EC","kid":"MPcTmIIPYRnLt9s_TdBrpV27HcNVDi9aZpB0eJvAxzE","use":"enc"},{"crv":"Ed25519","x":"lDkysGJKRmJeUp8ncTyGraHPHHiIfdxSajxGm7Srla8","kty":"OKP","kid":"CLjPrbijCB2z9dScRNpM1mSGOQVOIByTmd18Ft2eiAQ","use":"sig"},{"crv":"Ed448","x":"BG1zKFg6A_Rzix4pA08oYN5xHqhKIiREXZ59NZoA8p3xhgjh-tm8nc-6udtiL5ZNhWDbnRSq4jQA","kty":"OKP","kid":"kU2PiegZOPUKcsJATItJArz18oWWfEH-Ma52K_8nGaE","use":"sig"}]}
2020-07-28 20:28:13
FetchServerKeys
Found JWK set string
jwk_string
{"keys":[{"e":"AQAB","n":"xwQ72P9z9OYshiQ-ntDYaPnnfwG6u9JAdLMZ5o0dmjlcyrvwQRdoFIKPnO65Q8mh6F_LDSxjxa2Yzo_wdjhbPZLjfUJXgCzm54cClXzT5twzo7lzoAfaJlkTsoZc2HFWqmcri0BuzmTFLZx2Q7wYBm0pXHmQKF0V-C1O6NWfd4mfBhbM-I1tHYSpAMgarSm22WDMDx-WWI7TEzy2QhaBVaENW9BKaKkJklocAZCxk18WhR0fckIGiWiSM5FcU1PY2jfGsTmX505Ub7P5Dz75Ygqrutd5tFrcqyPAtPTFDk8X1InxkkUwpP3nFU5o50DGhwQolGYKPGtQ-ZtmbOfcWQ","kty":"RSA","kid":"r1LkbBo3925Rb2ZFFrKyU3MVex9T2817Kx0vbi6i_Kc","use":"sig"},{"e":"AQAB","n":"mXauIvyeUFA74P2vcmgAWSCMw6CP6-MJ6EvFuRARfLLJEi49AzQvJl_4pwDvLkZcCqS7OqPE1ufNyDH6oQPEc7JuukHMY02EgwqHjJ6GG6FQqJuiWlKB_l-7c9y9r4bh4r58xdZc6T5dFVSNT2VcIVoSjq9VmzwpaTKCUyVeZYHZhnLfWMm9rKU5WSz75siG-_jbudItsfhEwA59kvi4So2IV9TxHwW50i4IcTB1gXwG1olNgiX3-Mq1Iw5VGPzMo2hQXI3q1y-ZjhSwhvG5dje9J8htBEWdVYk4f6cv19IE9gEx7T-2vIVw5FCpAmmfFuRebec49c7zjfr0EyTI4w","kty":"RSA","kid":"w5kPRdJWODnYjihMgqs0tHkKk-e5OxU4DnSCZDkF_h0","use":"enc"},{"crv":"P-256","x":"FWZ9rSkLt6Dx9E3pxLybhdM6xgR5obGsj5_pqmnz5J4","y":"_n8G69C-A2Xl4xUW2lF0i8ZGZnk_KPYrhv4GbTGu5G4","kty":"EC","kid":"MFZeG102dQiqbANoaMlW_Jmf7fOZmtRsHt77JFhTpF0","use":"sig"},{"crv":"P-256","x":"Eb3RtGgBGOEz33yu46aha_RU6pyBaYNlu6SawlWGGHQ","y":"tUncttzF6Ud4Abfn1N2A1Rz2MBbJSdI0zuKS28BNb-U","kty":"EC","kid":"mlSUkq-ELqZiWl9zs9ZKkbcjIvgajGgnXfPWUZn9lEc","use":"enc"},{"crv":"secp256k1","x":"KDAUHh_SpgROXXAq8IFs9B9lGNB9VP4RwebeAO2tBao","y":"wr3L1dZyUCrS4H18fDYy5hcvGTCp05tiiBy0ZUG8Qs4","kty":"EC","kid":"vl5k1biVlGOHeu2XiLg_0qrIVdoFdM0POWeeCl-QMsY","use":"sig"},{"crv":"P-384","x":"P1npwyTJ2p20D9_r2u31DU7tfDEufaVcSJJcDOuO6QyqrXvjyMvf8e5xv3XxE39l","y":"tmq2S12MVdKUQTmd0AxVEOji1ihR_vZAhTLKojD2XW_2EJH7ydiaz2oxrnkC0mvI","kty":"EC","kid":"rqHXKVLLF2RxqFgXWfEZE578gM-IhelOjugVfb_BMZ4","use":"sig"},{"crv":"P-384","x":"UhkqvxbxMCGtkg_-6W0gqkr21fgY3LSaNbquU7CYEDwBwGCd6iK6Bu5PVUxraulY","y":"CXrg3mxUkN5D4bPfiLfnD1jMYGSDxn2Zeh-8_OOstX21WNZJ9_i-iFZR3pIXyH0z","kty":"EC","kid":"rV1Hjt_79O_m1oJ7Jz0QgKHDa2iwb8p4kvMU0L99wjg","use":"enc"},{"crv":"P-521","x":"AIjEl5H8w2Rf_iqIP8WT7v5-FlBlBGYy5sMJs1XOxWz4RRARIEOemEY45g10sEPzZ4qe7oyjCUDK5FY1WwjRvgHK","y":"AaKN94cn1ApvvfpOWO9VpJm-lLzOUR8XxOrKYfPqcLs0zEqSPiGdWA5CoNL5ck1q-CXD09ysQSmNkzFGaig2Mnop","kty":"EC","kid":"RG_hu6lggazoCOu2wsrn3icSvhAXuGyL55f2GAaH2NA","use":"sig"},{"crv":"P-521","x":"AXFcu6lqcxoyFUU14xTw0I5cfCR2q0jqOXwU_EKjA5mIxUpue58IIrfrIh4IauV3co2SziD6Uf1SWe8l11Y4-BoJ","y":"AREzsMJu3VveUPMaJ2QWmjucwzZH4FqufXzS2IW-MGqViyDNTg2BgX-2VCJvdTo0zbhvRvBC1ghJNrVnH5M92JQ6","kty":"EC","kid":"MPcTmIIPYRnLt9s_TdBrpV27HcNVDi9aZpB0eJvAxzE","use":"enc"},{"crv":"Ed25519","x":"lDkysGJKRmJeUp8ncTyGraHPHHiIfdxSajxGm7Srla8","kty":"OKP","kid":"CLjPrbijCB2z9dScRNpM1mSGOQVOIByTmd18Ft2eiAQ","use":"sig"},{"crv":"Ed448","x":"BG1zKFg6A_Rzix4pA08oYN5xHqhKIiREXZ59NZoA8p3xhgjh-tm8nc-6udtiL5ZNhWDbnRSq4jQA","kty":"OKP","kid":"kU2PiegZOPUKcsJATItJArz18oWWfEH-Ma52K_8nGaE","use":"sig"}]}
2020-07-28 20:28:13 SUCCESS
FetchServerKeys
Found server JWK set
server_jwks
{
  "keys": [
    {
      "e": "AQAB",
      "n": "xwQ72P9z9OYshiQ-ntDYaPnnfwG6u9JAdLMZ5o0dmjlcyrvwQRdoFIKPnO65Q8mh6F_LDSxjxa2Yzo_wdjhbPZLjfUJXgCzm54cClXzT5twzo7lzoAfaJlkTsoZc2HFWqmcri0BuzmTFLZx2Q7wYBm0pXHmQKF0V-C1O6NWfd4mfBhbM-I1tHYSpAMgarSm22WDMDx-WWI7TEzy2QhaBVaENW9BKaKkJklocAZCxk18WhR0fckIGiWiSM5FcU1PY2jfGsTmX505Ub7P5Dz75Ygqrutd5tFrcqyPAtPTFDk8X1InxkkUwpP3nFU5o50DGhwQolGYKPGtQ-ZtmbOfcWQ",
      "kty": "RSA",
      "kid": "r1LkbBo3925Rb2ZFFrKyU3MVex9T2817Kx0vbi6i_Kc",
      "use": "sig"
    },
    {
      "e": "AQAB",
      "n": "mXauIvyeUFA74P2vcmgAWSCMw6CP6-MJ6EvFuRARfLLJEi49AzQvJl_4pwDvLkZcCqS7OqPE1ufNyDH6oQPEc7JuukHMY02EgwqHjJ6GG6FQqJuiWlKB_l-7c9y9r4bh4r58xdZc6T5dFVSNT2VcIVoSjq9VmzwpaTKCUyVeZYHZhnLfWMm9rKU5WSz75siG-_jbudItsfhEwA59kvi4So2IV9TxHwW50i4IcTB1gXwG1olNgiX3-Mq1Iw5VGPzMo2hQXI3q1y-ZjhSwhvG5dje9J8htBEWdVYk4f6cv19IE9gEx7T-2vIVw5FCpAmmfFuRebec49c7zjfr0EyTI4w",
      "kty": "RSA",
      "kid": "w5kPRdJWODnYjihMgqs0tHkKk-e5OxU4DnSCZDkF_h0",
      "use": "enc"
    },
    {
      "crv": "P-256",
      "x": "FWZ9rSkLt6Dx9E3pxLybhdM6xgR5obGsj5_pqmnz5J4",
      "y": "_n8G69C-A2Xl4xUW2lF0i8ZGZnk_KPYrhv4GbTGu5G4",
      "kty": "EC",
      "kid": "MFZeG102dQiqbANoaMlW_Jmf7fOZmtRsHt77JFhTpF0",
      "use": "sig"
    },
    {
      "crv": "P-256",
      "x": "Eb3RtGgBGOEz33yu46aha_RU6pyBaYNlu6SawlWGGHQ",
      "y": "tUncttzF6Ud4Abfn1N2A1Rz2MBbJSdI0zuKS28BNb-U",
      "kty": "EC",
      "kid": "mlSUkq-ELqZiWl9zs9ZKkbcjIvgajGgnXfPWUZn9lEc",
      "use": "enc"
    },
    {
      "crv": "secp256k1",
      "x": "KDAUHh_SpgROXXAq8IFs9B9lGNB9VP4RwebeAO2tBao",
      "y": "wr3L1dZyUCrS4H18fDYy5hcvGTCp05tiiBy0ZUG8Qs4",
      "kty": "EC",
      "kid": "vl5k1biVlGOHeu2XiLg_0qrIVdoFdM0POWeeCl-QMsY",
      "use": "sig"
    },
    {
      "crv": "P-384",
      "x": "P1npwyTJ2p20D9_r2u31DU7tfDEufaVcSJJcDOuO6QyqrXvjyMvf8e5xv3XxE39l",
      "y": "tmq2S12MVdKUQTmd0AxVEOji1ihR_vZAhTLKojD2XW_2EJH7ydiaz2oxrnkC0mvI",
      "kty": "EC",
      "kid": "rqHXKVLLF2RxqFgXWfEZE578gM-IhelOjugVfb_BMZ4",
      "use": "sig"
    },
    {
      "crv": "P-384",
      "x": "UhkqvxbxMCGtkg_-6W0gqkr21fgY3LSaNbquU7CYEDwBwGCd6iK6Bu5PVUxraulY",
      "y": "CXrg3mxUkN5D4bPfiLfnD1jMYGSDxn2Zeh-8_OOstX21WNZJ9_i-iFZR3pIXyH0z",
      "kty": "EC",
      "kid": "rV1Hjt_79O_m1oJ7Jz0QgKHDa2iwb8p4kvMU0L99wjg",
      "use": "enc"
    },
    {
      "crv": "P-521",
      "x": "AIjEl5H8w2Rf_iqIP8WT7v5-FlBlBGYy5sMJs1XOxWz4RRARIEOemEY45g10sEPzZ4qe7oyjCUDK5FY1WwjRvgHK",
      "y": "AaKN94cn1ApvvfpOWO9VpJm-lLzOUR8XxOrKYfPqcLs0zEqSPiGdWA5CoNL5ck1q-CXD09ysQSmNkzFGaig2Mnop",
      "kty": "EC",
      "kid": "RG_hu6lggazoCOu2wsrn3icSvhAXuGyL55f2GAaH2NA",
      "use": "sig"
    },
    {
      "crv": "P-521",
      "x": "AXFcu6lqcxoyFUU14xTw0I5cfCR2q0jqOXwU_EKjA5mIxUpue58IIrfrIh4IauV3co2SziD6Uf1SWe8l11Y4-BoJ",
      "y": "AREzsMJu3VveUPMaJ2QWmjucwzZH4FqufXzS2IW-MGqViyDNTg2BgX-2VCJvdTo0zbhvRvBC1ghJNrVnH5M92JQ6",
      "kty": "EC",
      "kid": "MPcTmIIPYRnLt9s_TdBrpV27HcNVDi9aZpB0eJvAxzE",
      "use": "enc"
    },
    {
      "crv": "Ed25519",
      "x": "lDkysGJKRmJeUp8ncTyGraHPHHiIfdxSajxGm7Srla8",
      "kty": "OKP",
      "kid": "CLjPrbijCB2z9dScRNpM1mSGOQVOIByTmd18Ft2eiAQ",
      "use": "sig"
    },
    {
      "crv": "Ed448",
      "x": "BG1zKFg6A_Rzix4pA08oYN5xHqhKIiREXZ59NZoA8p3xhgjh-tm8nc-6udtiL5ZNhWDbnRSq4jQA",
      "kty": "OKP",
      "kid": "kU2PiegZOPUKcsJATItJArz18oWWfEH-Ma52K_8nGaE",
      "use": "sig"
    }
  ]
}
2020-07-28 20:28:13 SUCCESS
CheckServerKeysIsValid
Server JWKs is valid
server_jwks
{
  "keys": [
    {
      "e": "AQAB",
      "n": "xwQ72P9z9OYshiQ-ntDYaPnnfwG6u9JAdLMZ5o0dmjlcyrvwQRdoFIKPnO65Q8mh6F_LDSxjxa2Yzo_wdjhbPZLjfUJXgCzm54cClXzT5twzo7lzoAfaJlkTsoZc2HFWqmcri0BuzmTFLZx2Q7wYBm0pXHmQKF0V-C1O6NWfd4mfBhbM-I1tHYSpAMgarSm22WDMDx-WWI7TEzy2QhaBVaENW9BKaKkJklocAZCxk18WhR0fckIGiWiSM5FcU1PY2jfGsTmX505Ub7P5Dz75Ygqrutd5tFrcqyPAtPTFDk8X1InxkkUwpP3nFU5o50DGhwQolGYKPGtQ-ZtmbOfcWQ",
      "kty": "RSA",
      "kid": "r1LkbBo3925Rb2ZFFrKyU3MVex9T2817Kx0vbi6i_Kc",
      "use": "sig"
    },
    {
      "e": "AQAB",
      "n": "mXauIvyeUFA74P2vcmgAWSCMw6CP6-MJ6EvFuRARfLLJEi49AzQvJl_4pwDvLkZcCqS7OqPE1ufNyDH6oQPEc7JuukHMY02EgwqHjJ6GG6FQqJuiWlKB_l-7c9y9r4bh4r58xdZc6T5dFVSNT2VcIVoSjq9VmzwpaTKCUyVeZYHZhnLfWMm9rKU5WSz75siG-_jbudItsfhEwA59kvi4So2IV9TxHwW50i4IcTB1gXwG1olNgiX3-Mq1Iw5VGPzMo2hQXI3q1y-ZjhSwhvG5dje9J8htBEWdVYk4f6cv19IE9gEx7T-2vIVw5FCpAmmfFuRebec49c7zjfr0EyTI4w",
      "kty": "RSA",
      "kid": "w5kPRdJWODnYjihMgqs0tHkKk-e5OxU4DnSCZDkF_h0",
      "use": "enc"
    },
    {
      "crv": "P-256",
      "x": "FWZ9rSkLt6Dx9E3pxLybhdM6xgR5obGsj5_pqmnz5J4",
      "y": "_n8G69C-A2Xl4xUW2lF0i8ZGZnk_KPYrhv4GbTGu5G4",
      "kty": "EC",
      "kid": "MFZeG102dQiqbANoaMlW_Jmf7fOZmtRsHt77JFhTpF0",
      "use": "sig"
    },
    {
      "crv": "P-256",
      "x": "Eb3RtGgBGOEz33yu46aha_RU6pyBaYNlu6SawlWGGHQ",
      "y": "tUncttzF6Ud4Abfn1N2A1Rz2MBbJSdI0zuKS28BNb-U",
      "kty": "EC",
      "kid": "mlSUkq-ELqZiWl9zs9ZKkbcjIvgajGgnXfPWUZn9lEc",
      "use": "enc"
    },
    {
      "crv": "secp256k1",
      "x": "KDAUHh_SpgROXXAq8IFs9B9lGNB9VP4RwebeAO2tBao",
      "y": "wr3L1dZyUCrS4H18fDYy5hcvGTCp05tiiBy0ZUG8Qs4",
      "kty": "EC",
      "kid": "vl5k1biVlGOHeu2XiLg_0qrIVdoFdM0POWeeCl-QMsY",
      "use": "sig"
    },
    {
      "crv": "P-384",
      "x": "P1npwyTJ2p20D9_r2u31DU7tfDEufaVcSJJcDOuO6QyqrXvjyMvf8e5xv3XxE39l",
      "y": "tmq2S12MVdKUQTmd0AxVEOji1ihR_vZAhTLKojD2XW_2EJH7ydiaz2oxrnkC0mvI",
      "kty": "EC",
      "kid": "rqHXKVLLF2RxqFgXWfEZE578gM-IhelOjugVfb_BMZ4",
      "use": "sig"
    },
    {
      "crv": "P-384",
      "x": "UhkqvxbxMCGtkg_-6W0gqkr21fgY3LSaNbquU7CYEDwBwGCd6iK6Bu5PVUxraulY",
      "y": "CXrg3mxUkN5D4bPfiLfnD1jMYGSDxn2Zeh-8_OOstX21WNZJ9_i-iFZR3pIXyH0z",
      "kty": "EC",
      "kid": "rV1Hjt_79O_m1oJ7Jz0QgKHDa2iwb8p4kvMU0L99wjg",
      "use": "enc"
    },
    {
      "crv": "P-521",
      "x": "AIjEl5H8w2Rf_iqIP8WT7v5-FlBlBGYy5sMJs1XOxWz4RRARIEOemEY45g10sEPzZ4qe7oyjCUDK5FY1WwjRvgHK",
      "y": "AaKN94cn1ApvvfpOWO9VpJm-lLzOUR8XxOrKYfPqcLs0zEqSPiGdWA5CoNL5ck1q-CXD09ysQSmNkzFGaig2Mnop",
      "kty": "EC",
      "kid": "RG_hu6lggazoCOu2wsrn3icSvhAXuGyL55f2GAaH2NA",
      "use": "sig"
    },
    {
      "crv": "P-521",
      "x": "AXFcu6lqcxoyFUU14xTw0I5cfCR2q0jqOXwU_EKjA5mIxUpue58IIrfrIh4IauV3co2SziD6Uf1SWe8l11Y4-BoJ",
      "y": "AREzsMJu3VveUPMaJ2QWmjucwzZH4FqufXzS2IW-MGqViyDNTg2BgX-2VCJvdTo0zbhvRvBC1ghJNrVnH5M92JQ6",
      "kty": "EC",
      "kid": "MPcTmIIPYRnLt9s_TdBrpV27HcNVDi9aZpB0eJvAxzE",
      "use": "enc"
    },
    {
      "crv": "Ed25519",
      "x": "lDkysGJKRmJeUp8ncTyGraHPHHiIfdxSajxGm7Srla8",
      "kty": "OKP",
      "kid": "CLjPrbijCB2z9dScRNpM1mSGOQVOIByTmd18Ft2eiAQ",
      "use": "sig"
    },
    {
      "crv": "Ed448",
      "x": "BG1zKFg6A_Rzix4pA08oYN5xHqhKIiREXZ59NZoA8p3xhgjh-tm8nc-6udtiL5ZNhWDbnRSq4jQA",
      "kty": "OKP",
      "kid": "kU2PiegZOPUKcsJATItJArz18oWWfEH-Ma52K_8nGaE",
      "use": "sig"
    }
  ]
}
2020-07-28 20:28:13 SUCCESS
ValidateServerJWKs
Valid server JWKs
2020-07-28 20:28:13 SUCCESS
CheckForKeyIdInServerJWKs
All keys contain kids
2020-07-28 20:28:13 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-07-28 20:28:13 SUCCESS
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
2020-07-28 20:28:13 SUCCESS
CreatePostLogoutRedirectUri
Created post_logout_redirect_uri URI
post_logout_redirect_uri
https://www.certification.openid.net/test/yirSUYQEfi/post_logout_redirect
2020-07-28 20:28:13 SUCCESS
GetDynamicClientConfiguration
Created dynamic_client_registration_template object from the client configuration.
client_name
first-openid-client
2020-07-28 20:28:13 SUCCESS
GenerateRS256ClientJWKs
Generated client JWKs
client_jwks
{
  "keys": [
    {
      "p": "7JU-5VFwYYJCQ_M7tVUAKbgV4QCqIQkEgfMOFDmX_9SdKr08ghXbtRTopTdLCRcg-nRZOATc0bt8ckJ8chQa_jPWn9v7QB-LbmfTqxeseOoo0P0MyVIlM3K8k-QMyUJ_o8SPYh-O9wUQ2Oy3_xZ__-P2osohMxz320NjKzlw4MM",
      "kty": "RSA",
      "q": "uF1HWdG4lRjMHD7Lu1VlcmAtgTWd68uYGIuT5c_Yd9L-_JVDCEXwfiO6Lee49OrKixk6IRpW8txl3kjYX81PuySp4ZZIWJmTWHn6Dgm7jgE7e3wrAe6_VPiIf9R3HwcO_c2Yk7OGhuWtIEm25fcsG3cHMMwoTVy10xjcMJZ81nc",
      "d": "AeHZyWFte_lKmUPcNFB_V14SKOCP_7gS9g-6hNa_Yu_RVB4aFYTE-7YJ_k5Nf-2uPUYkyVSpT6vl36F4GO5VgWoAv09_5eUGLU4yHRJO0QPnR7R8EeifknrN3czOy_3ae4EZ_Z9aO581n6j5XxFHqdmeGYPZFfikOhjt-RUqEWzNnk6z_djR_QPTdzQU6BtZdSM8Lpc0rP3Opr8E5oJFD-qVxScz_k1N8fcjZ6mDCnaQRt1zlkIn_aIJR_P9-prjdIxTaMfZNnMFcncwEnWMlFmfUQK2b2-We6kVDGduq_WAoQi-6TsT8lHbk47H9P-DrK-8k_li-wgakOLp1RFVcQ",
      "e": "AQAB",
      "use": "sig",
      "qi": "TytFzemd6cQAHIrIbG_dpmwuwaWmdkqkoSezRokPiPv5BQ5TFMlmEPpnKjZeckPMQ6GN0Ld1xI-gMOrwpNpZ21dozgEXtQPZGZcVVOLCsrOEPXwNNH11r54z4opMrVIiMnI5esTg86N9zierH08tUdb5mVEUN0duccnC-syH9b0",
      "dp": "eQwzzilJEtsPBK1jE3iWSMJDj4hDg_uVLtgpj_eX6fHjKIcCepyseY5lKoOMBO6slPkK3Tq_sR_4oI2cFtJqrT3gxpJLj5eUQ70j9Bp8yLEmiSewbyF0n0pJanH4iNFZdXWQ12fGQmV5JUSZMA9XFpqRCuHY8soTl0B3cRpGwvk",
      "alg": "RS256",
      "dq": "gW06gduw8TqPT-TlsYWpyjmquGKjkr1C8ThLg7H-DWCakUdX3575zhPWyBM8zPNnbW8wV7zd_XCsMviArgC8UGzUtgGCmHB3-EzpNqGugWpsD6yDpL-uokA300WcurOB2rtSuZ32ew0SFPCq7ZYv6LgO3Dr2sBi9rIxvR8zdptE",
      "n": "qmF5XRH8QKC7mZ7trMz2DTqHaDYOPkICK2HL3oDJb3QSXSWNTWJ5zibKYEgQWNCtmOMG4s9ucCmQGTnkj7Xmc83Y3LpqkgFwjvuNLWiflXhTTx8JVRtlhGBMlt5ELBNC9Im41KEvucqxz2pxKfQ8gpMTfpEvUTrEJpjGuPoK0O7rWeL-RWRO8flUiY9CDuhI0co3AyXYkZmmAVhOBlEzH7TLS8U_7e-lhs8njxMXdQ0FWdru8SUBViAppT11c2c1nFBm9vOuwEZXrEhBfenPBDbr0DYvBMpWpoT5X5SNjYIcGmvUlCQNQxIXai8TpjycIjVvEJ3-gG0vauoLL898pQ"
    }
  ]
}
public_client_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "alg": "RS256",
      "n": "qmF5XRH8QKC7mZ7trMz2DTqHaDYOPkICK2HL3oDJb3QSXSWNTWJ5zibKYEgQWNCtmOMG4s9ucCmQGTnkj7Xmc83Y3LpqkgFwjvuNLWiflXhTTx8JVRtlhGBMlt5ELBNC9Im41KEvucqxz2pxKfQ8gpMTfpEvUTrEJpjGuPoK0O7rWeL-RWRO8flUiY9CDuhI0co3AyXYkZmmAVhOBlEzH7TLS8U_7e-lhs8njxMXdQ0FWdru8SUBViAppT11c2c1nFBm9vOuwEZXrEhBfenPBDbr0DYvBMpWpoT5X5SNjYIcGmvUlCQNQxIXai8TpjycIjVvEJ3-gG0vauoLL898pQ"
    }
  ]
}
2020-07-28 20:28:13 SUCCESS
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-07-28 20:28:13 SUCCESS
CreateDynamicRegistrationRequest
Created dynamic registration request
client_name
first-openid-client yirSUYQEfi
2020-07-28 20:28:13
AddAuthorizationCodeGrantTypeToDynamicRegistrationRequest
Added 'authorization_code' to 'grant_types'
grant_types
[
  "authorization_code"
]
2020-07-28 20:28:13
AddPublicJwksToDynamicRegistrationRequest
Added client public JWKS to dynamic registration request
dynamic_registration_request
{
  "client_name": "first-openid-client yirSUYQEfi",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "qmF5XRH8QKC7mZ7trMz2DTqHaDYOPkICK2HL3oDJb3QSXSWNTWJ5zibKYEgQWNCtmOMG4s9ucCmQGTnkj7Xmc83Y3LpqkgFwjvuNLWiflXhTTx8JVRtlhGBMlt5ELBNC9Im41KEvucqxz2pxKfQ8gpMTfpEvUTrEJpjGuPoK0O7rWeL-RWRO8flUiY9CDuhI0co3AyXYkZmmAVhOBlEzH7TLS8U_7e-lhs8njxMXdQ0FWdru8SUBViAppT11c2c1nFBm9vOuwEZXrEhBfenPBDbr0DYvBMpWpoT5X5SNjYIcGmvUlCQNQxIXai8TpjycIjVvEJ3-gG0vauoLL898pQ"
      }
    ]
  }
}
2020-07-28 20:28:13
AddTokenEndpointAuthMethodToDynamicRegistrationRequestFromEnvironment
Added token endpoint auth method to dynamic registration request
dynamic_registration_request
{
  "client_name": "first-openid-client yirSUYQEfi",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "qmF5XRH8QKC7mZ7trMz2DTqHaDYOPkICK2HL3oDJb3QSXSWNTWJ5zibKYEgQWNCtmOMG4s9ucCmQGTnkj7Xmc83Y3LpqkgFwjvuNLWiflXhTTx8JVRtlhGBMlt5ELBNC9Im41KEvucqxz2pxKfQ8gpMTfpEvUTrEJpjGuPoK0O7rWeL-RWRO8flUiY9CDuhI0co3AyXYkZmmAVhOBlEzH7TLS8U_7e-lhs8njxMXdQ0FWdru8SUBViAppT11c2c1nFBm9vOuwEZXrEhBfenPBDbr0DYvBMpWpoT5X5SNjYIcGmvUlCQNQxIXai8TpjycIjVvEJ3-gG0vauoLL898pQ"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic"
}
2020-07-28 20:28:13
AddResponseTypesArrayToDynamicRegistrationRequestFromEnvironment
Added response_types array to dynamic registration request
dynamic_registration_request
{
  "client_name": "first-openid-client yirSUYQEfi",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "qmF5XRH8QKC7mZ7trMz2DTqHaDYOPkICK2HL3oDJb3QSXSWNTWJ5zibKYEgQWNCtmOMG4s9ucCmQGTnkj7Xmc83Y3LpqkgFwjvuNLWiflXhTTx8JVRtlhGBMlt5ELBNC9Im41KEvucqxz2pxKfQ8gpMTfpEvUTrEJpjGuPoK0O7rWeL-RWRO8flUiY9CDuhI0co3AyXYkZmmAVhOBlEzH7TLS8U_7e-lhs8njxMXdQ0FWdru8SUBViAppT11c2c1nFBm9vOuwEZXrEhBfenPBDbr0DYvBMpWpoT5X5SNjYIcGmvUlCQNQxIXai8TpjycIjVvEJ3-gG0vauoLL898pQ"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ]
}
2020-07-28 20:28:13
AddRedirectUriToDynamicRegistrationRequest
Added redirect_uris array to dynamic registration request
dynamic_registration_request
{
  "client_name": "first-openid-client yirSUYQEfi",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "qmF5XRH8QKC7mZ7trMz2DTqHaDYOPkICK2HL3oDJb3QSXSWNTWJ5zibKYEgQWNCtmOMG4s9ucCmQGTnkj7Xmc83Y3LpqkgFwjvuNLWiflXhTTx8JVRtlhGBMlt5ELBNC9Im41KEvucqxz2pxKfQ8gpMTfpEvUTrEJpjGuPoK0O7rWeL-RWRO8flUiY9CDuhI0co3AyXYkZmmAVhOBlEzH7TLS8U_7e-lhs8njxMXdQ0FWdru8SUBViAppT11c2c1nFBm9vOuwEZXrEhBfenPBDbr0DYvBMpWpoT5X5SNjYIcGmvUlCQNQxIXai8TpjycIjVvEJ3-gG0vauoLL898pQ"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "redirect_uris": [
    "https://www.certification.openid.net/test/yirSUYQEfi/callback"
  ]
}
2020-07-28 20:28:13
AddContactsToDynamicRegistrationRequest
Added contacts array to dynamic registration request
dynamic_registration_request
{
  "client_name": "first-openid-client yirSUYQEfi",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "qmF5XRH8QKC7mZ7trMz2DTqHaDYOPkICK2HL3oDJb3QSXSWNTWJ5zibKYEgQWNCtmOMG4s9ucCmQGTnkj7Xmc83Y3LpqkgFwjvuNLWiflXhTTx8JVRtlhGBMlt5ELBNC9Im41KEvucqxz2pxKfQ8gpMTfpEvUTrEJpjGuPoK0O7rWeL-RWRO8flUiY9CDuhI0co3AyXYkZmmAVhOBlEzH7TLS8U_7e-lhs8njxMXdQ0FWdru8SUBViAppT11c2c1nFBm9vOuwEZXrEhBfenPBDbr0DYvBMpWpoT5X5SNjYIcGmvUlCQNQxIXai8TpjycIjVvEJ3-gG0vauoLL898pQ"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "redirect_uris": [
    "https://www.certification.openid.net/test/yirSUYQEfi/callback"
  ],
  "contacts": [
    "certification@oidf.org"
  ]
}
2020-07-28 20:28:13
AddPostLogoutRedirectUriToDynamicRegistrationRequest
Added post_logout_redirect_uris to dynamic registration request
dynamic_registration_request
{
  "client_name": "first-openid-client yirSUYQEfi",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "qmF5XRH8QKC7mZ7trMz2DTqHaDYOPkICK2HL3oDJb3QSXSWNTWJ5zibKYEgQWNCtmOMG4s9ucCmQGTnkj7Xmc83Y3LpqkgFwjvuNLWiflXhTTx8JVRtlhGBMlt5ELBNC9Im41KEvucqxz2pxKfQ8gpMTfpEvUTrEJpjGuPoK0O7rWeL-RWRO8flUiY9CDuhI0co3AyXYkZmmAVhOBlEzH7TLS8U_7e-lhs8njxMXdQ0FWdru8SUBViAppT11c2c1nFBm9vOuwEZXrEhBfenPBDbr0DYvBMpWpoT5X5SNjYIcGmvUlCQNQxIXai8TpjycIjVvEJ3-gG0vauoLL898pQ"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "redirect_uris": [
    "https://www.certification.openid.net/test/yirSUYQEfi/callback"
  ],
  "contacts": [
    "certification@oidf.org"
  ],
  "post_logout_redirect_uris": [
    "https://www.certification.openid.net/test/yirSUYQEfi/post_logout_redirect"
  ]
}
2020-07-28 20:28:13
CallDynamicRegistrationEndpoint
HTTP request
request_uri
https://op.panva.cz/reg
request_method
POST
request_headers
{
  "accept": "application/json",
  "accept-charset": "utf-8",
  "content-type": "application/json",
  "content-length": "806"
}
request_body
{"client_name":"first-openid-client yirSUYQEfi","grant_types":["authorization_code"],"jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"qmF5XRH8QKC7mZ7trMz2DTqHaDYOPkICK2HL3oDJb3QSXSWNTWJ5zibKYEgQWNCtmOMG4s9ucCmQGTnkj7Xmc83Y3LpqkgFwjvuNLWiflXhTTx8JVRtlhGBMlt5ELBNC9Im41KEvucqxz2pxKfQ8gpMTfpEvUTrEJpjGuPoK0O7rWeL-RWRO8flUiY9CDuhI0co3AyXYkZmmAVhOBlEzH7TLS8U_7e-lhs8njxMXdQ0FWdru8SUBViAppT11c2c1nFBm9vOuwEZXrEhBfenPBDbr0DYvBMpWpoT5X5SNjYIcGmvUlCQNQxIXai8TpjycIjVvEJ3-gG0vauoLL898pQ"}]},"token_endpoint_auth_method":"client_secret_basic","response_types":["code"],"redirect_uris":["https://www.certification.openid.net/test/yirSUYQEfi/callback"],"contacts":["certification@oidf.org"],"post_logout_redirect_uris":["https://www.certification.openid.net/test/yirSUYQEfi/post_logout_redirect"]}
2020-07-28 20:28:14 RESPONSE
CallDynamicRegistrationEndpoint
HTTP response
response_status_code
201 CREATED
response_status_text
Created
response_headers
{
  "cache-control": "no-cache, no-store",
  "content-length": "1672",
  "content-type": "application/json; charset\u003dutf-8",
  "date": "Tue, 28 Jul 2020 20:28:14 GMT",
  "pragma": "no-cache",
  "server": [
    "Caddy",
    "Cowboy"
  ],
  "strict-transport-security": "max-age\u003d15552000; includeSubDomains",
  "via": "1.1 vegur",
  "x-content-type-options": "nosniff",
  "x-dns-prefetch-control": "off",
  "x-download-options": "noopen",
  "x-frame-options": "SAMEORIGIN",
  "x-xss-protection": "1; mode\u003dblock"
}
response_body
{"application_type":"web","grant_types":["authorization_code"],"id_token_signed_response_alg":"RS256","post_logout_redirect_uris":["https://www.certification.openid.net/test/yirSUYQEfi/post_logout_redirect"],"require_auth_time":false,"response_types":["code"],"subject_type":"public","token_endpoint_auth_method":"client_secret_basic","introspection_endpoint_auth_method":"client_secret_basic","revocation_endpoint_auth_method":"client_secret_basic","backchannel_logout_session_required":false,"frontchannel_logout_session_required":false,"require_signed_request_object":false,"request_uris":[],"require_pushed_authorization_requests":false,"authorization_signed_response_alg":"RS256","tls_client_certificate_bound_access_tokens":false,"client_id_issued_at":1595968094,"client_id":"tuT0hkb5L7kVvvKv8vY1i","client_name":"first-openid-client yirSUYQEfi","client_secret_expires_at":0,"client_secret":"aerzbuPBEK8ygp__gebDnDdxraLoqtCQxCJ07jREPwRUUCE8f3pl-lgIkGDD0dcjuS1JHiAlVjJmADu-QE-BGg","contacts":["certification@oidf.org"],"jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"qmF5XRH8QKC7mZ7trMz2DTqHaDYOPkICK2HL3oDJb3QSXSWNTWJ5zibKYEgQWNCtmOMG4s9ucCmQGTnkj7Xmc83Y3LpqkgFwjvuNLWiflXhTTx8JVRtlhGBMlt5ELBNC9Im41KEvucqxz2pxKfQ8gpMTfpEvUTrEJpjGuPoK0O7rWeL-RWRO8flUiY9CDuhI0co3AyXYkZmmAVhOBlEzH7TLS8U_7e-lhs8njxMXdQ0FWdru8SUBViAppT11c2c1nFBm9vOuwEZXrEhBfenPBDbr0DYvBMpWpoT5X5SNjYIcGmvUlCQNQxIXai8TpjycIjVvEJ3-gG0vauoLL898pQ"}]},"redirect_uris":["https://www.certification.openid.net/test/yirSUYQEfi/callback"],"registration_client_uri":"https://op.panva.cz/reg/tuT0hkb5L7kVvvKv8vY1i","registration_access_token":"jMSvLnHyz7lY4LcBbbld83fe43bTksArvJWkIeQrY1g"}
2020-07-28 20:28:14
CallDynamicRegistrationEndpoint
Registration endpoint response
dynamic_registration_response
{"application_type":"web","grant_types":["authorization_code"],"id_token_signed_response_alg":"RS256","post_logout_redirect_uris":["https://www.certification.openid.net/test/yirSUYQEfi/post_logout_redirect"],"require_auth_time":false,"response_types":["code"],"subject_type":"public","token_endpoint_auth_method":"client_secret_basic","introspection_endpoint_auth_method":"client_secret_basic","revocation_endpoint_auth_method":"client_secret_basic","backchannel_logout_session_required":false,"frontchannel_logout_session_required":false,"require_signed_request_object":false,"request_uris":[],"require_pushed_authorization_requests":false,"authorization_signed_response_alg":"RS256","tls_client_certificate_bound_access_tokens":false,"client_id_issued_at":1595968094,"client_id":"tuT0hkb5L7kVvvKv8vY1i","client_name":"first-openid-client yirSUYQEfi","client_secret_expires_at":0,"client_secret":"aerzbuPBEK8ygp__gebDnDdxraLoqtCQxCJ07jREPwRUUCE8f3pl-lgIkGDD0dcjuS1JHiAlVjJmADu-QE-BGg","contacts":["certification@oidf.org"],"jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"qmF5XRH8QKC7mZ7trMz2DTqHaDYOPkICK2HL3oDJb3QSXSWNTWJ5zibKYEgQWNCtmOMG4s9ucCmQGTnkj7Xmc83Y3LpqkgFwjvuNLWiflXhTTx8JVRtlhGBMlt5ELBNC9Im41KEvucqxz2pxKfQ8gpMTfpEvUTrEJpjGuPoK0O7rWeL-RWRO8flUiY9CDuhI0co3AyXYkZmmAVhOBlEzH7TLS8U_7e-lhs8njxMXdQ0FWdru8SUBViAppT11c2c1nFBm9vOuwEZXrEhBfenPBDbr0DYvBMpWpoT5X5SNjYIcGmvUlCQNQxIXai8TpjycIjVvEJ3-gG0vauoLL898pQ"}]},"redirect_uris":["https://www.certification.openid.net/test/yirSUYQEfi/callback"],"registration_client_uri":"https://op.panva.cz/reg/tuT0hkb5L7kVvvKv8vY1i","registration_access_token":"jMSvLnHyz7lY4LcBbbld83fe43bTksArvJWkIeQrY1g"}
2020-07-28 20:28:14
CallDynamicRegistrationEndpoint
Parsed registration endpoint response
application_type
web
grant_types
[
  "authorization_code"
]
id_token_signed_response_alg
RS256
post_logout_redirect_uris
[
  "https://www.certification.openid.net/test/yirSUYQEfi/post_logout_redirect"
]
require_auth_time
false
response_types
[
  "code"
]
subject_type
public
token_endpoint_auth_method
client_secret_basic
introspection_endpoint_auth_method
client_secret_basic
revocation_endpoint_auth_method
client_secret_basic
backchannel_logout_session_required
false
frontchannel_logout_session_required
false
require_signed_request_object
false
request_uris
[]
require_pushed_authorization_requests
false
authorization_signed_response_alg
RS256
tls_client_certificate_bound_access_tokens
false
client_id_issued_at
1595968094
client_id
tuT0hkb5L7kVvvKv8vY1i
client_name
first-openid-client yirSUYQEfi
client_secret_expires_at
0
client_secret
aerzbuPBEK8ygp__gebDnDdxraLoqtCQxCJ07jREPwRUUCE8f3pl-lgIkGDD0dcjuS1JHiAlVjJmADu-QE-BGg
contacts
[
  "certification@oidf.org"
]
jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "alg": "RS256",
      "n": "qmF5XRH8QKC7mZ7trMz2DTqHaDYOPkICK2HL3oDJb3QSXSWNTWJ5zibKYEgQWNCtmOMG4s9ucCmQGTnkj7Xmc83Y3LpqkgFwjvuNLWiflXhTTx8JVRtlhGBMlt5ELBNC9Im41KEvucqxz2pxKfQ8gpMTfpEvUTrEJpjGuPoK0O7rWeL-RWRO8flUiY9CDuhI0co3AyXYkZmmAVhOBlEzH7TLS8U_7e-lhs8njxMXdQ0FWdru8SUBViAppT11c2c1nFBm9vOuwEZXrEhBfenPBDbr0DYvBMpWpoT5X5SNjYIcGmvUlCQNQxIXai8TpjycIjVvEJ3-gG0vauoLL898pQ"
    }
  ]
}
redirect_uris
[
  "https://www.certification.openid.net/test/yirSUYQEfi/callback"
]
registration_client_uri
https://op.panva.cz/reg/tuT0hkb5L7kVvvKv8vY1i
registration_access_token
jMSvLnHyz7lY4LcBbbld83fe43bTksArvJWkIeQrY1g
2020-07-28 20:28:14 SUCCESS
CallDynamicRegistrationEndpoint
Extracted dynamic registration management credentials
registration_client_uri
https://op.panva.cz/reg/tuT0hkb5L7kVvvKv8vY1i
registration_access_token
jMSvLnHyz7lY4LcBbbld83fe43bTksArvJWkIeQrY1g
2020-07-28 20:28:14
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
scope
openid
2020-07-28 20:28:14 SUCCESS
EnsureServerConfigurationSupportsClientSecretBasic
token_endpoint_auth_methods_supported
actual
[
  "none",
  "client_secret_basic",
  "client_secret_jwt",
  "client_secret_post",
  "private_key_jwt",
  "self_signed_tls_client_auth"
]
expected
[
  "client_secret_basic"
]
minimum_matches_required
1
2020-07-28 20:28:14 SUCCESS
SetProtectedResourceUrlToUserInfoEndpoint
userinfo_endpoint will be used to test access token. The user info is not a mandatory to implement feature in the OpenID Connect specification, but is mandatory for certification.
protected_resource_url
https://op.panva.cz/me
2020-07-28 20:28:14 SUCCESS
CheckDiscCheckSessionIframe
check_session_iframe
actual
https://op.panva.cz/session/check
2020-07-28 20:28:14
oidcc-session-management-rp-initiated-logout
Setup Done
Make request to authorization endpoint
2020-07-28 20:28:14 SUCCESS
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
client_id
tuT0hkb5L7kVvvKv8vY1i
redirect_uri
https://www.certification.openid.net/test/yirSUYQEfi/callback
scope
openid
2020-07-28 20:28:14
CreateRandomStateValue
Created state value
requested_state_length
128
state
0ptbufd9ftsnqL4I3EulFMTJv6KhrOwkckdpxdWoyMdDiRmbJ6XVmPijUKzP2ul5REe6roWSq89D493oNuWoX9Q2S2ut5NtPkGcQc9gqK4hzenTuspa05loKLE9HxiTi
2020-07-28 20:28:14 SUCCESS
AddStateToAuthorizationEndpointRequest
Added state parameter to request
client_id
tuT0hkb5L7kVvvKv8vY1i
redirect_uri
https://www.certification.openid.net/test/yirSUYQEfi/callback
scope
openid
state
0ptbufd9ftsnqL4I3EulFMTJv6KhrOwkckdpxdWoyMdDiRmbJ6XVmPijUKzP2ul5REe6roWSq89D493oNuWoX9Q2S2ut5NtPkGcQc9gqK4hzenTuspa05loKLE9HxiTi
2020-07-28 20:28:14
CreateRandomNonceValue
Created nonce value
requested_nonce_length
10
nonce
YqOr6zfem5
2020-07-28 20:28:14 SUCCESS
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
client_id
tuT0hkb5L7kVvvKv8vY1i
redirect_uri
https://www.certification.openid.net/test/yirSUYQEfi/callback
scope
openid
state
0ptbufd9ftsnqL4I3EulFMTJv6KhrOwkckdpxdWoyMdDiRmbJ6XVmPijUKzP2ul5REe6roWSq89D493oNuWoX9Q2S2ut5NtPkGcQc9gqK4hzenTuspa05loKLE9HxiTi
nonce
YqOr6zfem5
2020-07-28 20:28:14 SUCCESS
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
client_id
tuT0hkb5L7kVvvKv8vY1i
redirect_uri
https://www.certification.openid.net/test/yirSUYQEfi/callback
scope
openid
state
0ptbufd9ftsnqL4I3EulFMTJv6KhrOwkckdpxdWoyMdDiRmbJ6XVmPijUKzP2ul5REe6roWSq89D493oNuWoX9Q2S2ut5NtPkGcQc9gqK4hzenTuspa05loKLE9HxiTi
nonce
YqOr6zfem5
response_type
code
2020-07-28 20:28:14 SUCCESS
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
redirect_to_authorization_endpoint
https://op.panva.cz/auth?client_id=tuT0hkb5L7kVvvKv8vY1i&redirect_uri=https://www.certification.openid.net/test/yirSUYQEfi/callback&scope=openid&state=0ptbufd9ftsnqL4I3EulFMTJv6KhrOwkckdpxdWoyMdDiRmbJ6XVmPijUKzP2ul5REe6roWSq89D493oNuWoX9Q2S2ut5NtPkGcQc9gqK4hzenTuspa05loKLE9HxiTi&nonce=YqOr6zfem5&response_type=code
2020-07-28 20:28:14 REDIRECT
oidcc-session-management-rp-initiated-logout
Redirecting to authorization endpoint
redirect_to
https://op.panva.cz/auth?client_id=tuT0hkb5L7kVvvKv8vY1i&redirect_uri=https://www.certification.openid.net/test/yirSUYQEfi/callback&scope=openid&state=0ptbufd9ftsnqL4I3EulFMTJv6KhrOwkckdpxdWoyMdDiRmbJ6XVmPijUKzP2ul5REe6roWSq89D493oNuWoX9Q2S2ut5NtPkGcQc9gqK4hzenTuspa05loKLE9HxiTi&nonce=YqOr6zfem5&response_type=code
2020-07-28 20:28:19 INCOMING
oidcc-session-management-rp-initiated-logout
Incoming HTTP request to test instance yirSUYQEfi
incoming_headers
{
  "host": "www.certification.openid.net",
  "cache-control": "max-age\u003d0",
  "upgrade-insecure-requests": "1",
  "dnt": "1",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.89 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "cross-site",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "referer": "https://op.panva.cz/interaction/wJIfMxztHZnP3MsxTEK4u",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en,en-US;q\u003d0.9,cs;q\u003d0.8",
  "cookie": "JSESSIONID\u003d81FE6060128F726EBB2F55AADA28DE83",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
callback
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "code": "JoU5uUEZi2JmI6OMialkr3ci33HTKg5g3q3R3h9WAwK",
  "state": "0ptbufd9ftsnqL4I3EulFMTJv6KhrOwkckdpxdWoyMdDiRmbJ6XVmPijUKzP2ul5REe6roWSq89D493oNuWoX9Q2S2ut5NtPkGcQc9gqK4hzenTuspa05loKLE9HxiTi",
  "session_state": "Xks-SJvyj9JuctK5b0fFjkwMaUY7pn_Vf3xcFIB7RWI"
}
incoming_body
2020-07-28 20:28:19 SUCCESS
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
implicit_submit
{
  "path": "implicit/nCyOYTtmDMvBaSbrtheN",
  "fullUrl": "https://www.certification.openid.net/test/yirSUYQEfi/implicit/nCyOYTtmDMvBaSbrtheN"
}
2020-07-28 20:28:19 OUTGOING
oidcc-session-management-rp-initiated-logout
Response to HTTP request to test instance yirSUYQEfi
outgoing
ModelAndView [view="implicitCallback"; model={implicitSubmitUrl=https://www.certification.openid.net/test/yirSUYQEfi/implicit/nCyOYTtmDMvBaSbrtheN, returnUrl=/log-detail.html?log=yirSUYQEfi}]
outgoing_path
callback
2020-07-28 20:28:20 INCOMING
oidcc-session-management-rp-initiated-logout
Incoming HTTP request to test instance yirSUYQEfi
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "*/*",
  "dnt": "1",
  "x-requested-with": "XMLHttpRequest",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.89 Safari/537.36",
  "content-type": "text/plain",
  "origin": "https://www.certification.openid.net",
  "sec-fetch-site": "same-origin",
  "sec-fetch-mode": "cors",
  "sec-fetch-dest": "empty",
  "referer": "https://www.certification.openid.net/test/yirSUYQEfi/callback?code\u003dJoU5uUEZi2JmI6OMialkr3ci33HTKg5g3q3R3h9WAwK\u0026state\u003d0ptbufd9ftsnqL4I3EulFMTJv6KhrOwkckdpxdWoyMdDiRmbJ6XVmPijUKzP2ul5REe6roWSq89D493oNuWoX9Q2S2ut5NtPkGcQc9gqK4hzenTuspa05loKLE9HxiTi\u0026session_state\u003dXks-SJvyj9JuctK5b0fFjkwMaUY7pn_Vf3xcFIB7RWI",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en,en-US;q\u003d0.9,cs;q\u003d0.8",
  "cookie": "JSESSIONID\u003d81FE6060128F726EBB2F55AADA28DE83",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "0",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
implicit/nCyOYTtmDMvBaSbrtheN
incoming_body_form_params
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
2020-07-28 20:28:20 OUTGOING
oidcc-session-management-rp-initiated-logout
Response to HTTP request to test instance yirSUYQEfi
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [/log-detail.html?log=yirSUYQEfi]
outgoing_path
implicit/nCyOYTtmDMvBaSbrtheN
2020-07-28 20:28:20 SUCCESS
ExtractImplicitHashToCallbackResponse
implicit_hash is empty
2020-07-28 20:28:20 REDIRECT-IN
oidcc-session-management-rp-initiated-logout
Authorization endpoint response captured
url_query
{
  "code": "JoU5uUEZi2JmI6OMialkr3ci33HTKg5g3q3R3h9WAwK",
  "state": "0ptbufd9ftsnqL4I3EulFMTJv6KhrOwkckdpxdWoyMdDiRmbJ6XVmPijUKzP2ul5REe6roWSq89D493oNuWoX9Q2S2ut5NtPkGcQc9gqK4hzenTuspa05loKLE9HxiTi",
  "session_state": "Xks-SJvyj9JuctK5b0fFjkwMaUY7pn_Vf3xcFIB7RWI"
}
headers
{
  "host": "www.certification.openid.net",
  "cache-control": "max-age\u003d0",
  "upgrade-insecure-requests": "1",
  "dnt": "1",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.89 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "cross-site",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "referer": "https://op.panva.cz/interaction/wJIfMxztHZnP3MsxTEK4u",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en,en-US;q\u003d0.9,cs;q\u003d0.8",
  "cookie": "JSESSIONID\u003d81FE6060128F726EBB2F55AADA28DE83",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
http_method
GET
url_fragment
{}
post_body
Verify authorization endpoint response
2020-07-28 20:28:20 SUCCESS
CheckMatchingCallbackParameters
Callback parameters successfully verified
2020-07-28 20:28:20 SUCCESS
CheckIfAuthorizationEndpointError
No error from authorization endpoint
2020-07-28 20:28:20 SUCCESS
CheckMatchingStateParameter
State parameter correctly returned
state
0ptbufd9ftsnqL4I3EulFMTJv6KhrOwkckdpxdWoyMdDiRmbJ6XVmPijUKzP2ul5REe6roWSq89D493oNuWoX9Q2S2ut5NtPkGcQc9gqK4hzenTuspa05loKLE9HxiTi
2020-07-28 20:28:20 SUCCESS
ExtractAuthorizationCodeFromAuthorizationResponse
Found authorization code
code
JoU5uUEZi2JmI6OMialkr3ci33HTKg5g3q3R3h9WAwK
2020-07-28 20:28:20 SUCCESS
CreateTokenEndpointRequestForAuthorizationCodeGrant
grant_type
authorization_code
code
JoU5uUEZi2JmI6OMialkr3ci33HTKg5g3q3R3h9WAwK
redirect_uri
https://www.certification.openid.net/test/yirSUYQEfi/callback
2020-07-28 20:28:20 SUCCESS
AddBasicAuthClientSecretAuthenticationParameters
Added basic authorization header
Authorization
Basic dHVUMGhrYjVMN2tWdnZLdjh2WTFpOmFlcnpidVBCRUs4eWdwX19nZWJEbkRkeHJhTG9xdENReENKMDdqUkVQd1JVVUNFOGYzcGwtbGdJa0dERDBkY2p1UzFKSGlBbFZqSm1BRHUtUUUtQkdn
2020-07-28 20:28:20
CallTokenEndpoint
HTTP request
request_uri
https://op.panva.cz/token
request_method
POST
request_headers
{
  "accept": "application/json;charset\u003dUTF-8",
  "authorization": "Basic dHVUMGhrYjVMN2tWdnZLdjh2WTFpOmFlcnpidVBCRUs4eWdwX19nZWJEbkRkeHJhTG9xdENReENKMDdqUkVQd1JVVUNFOGYzcGwtbGdJa0dERDBkY2p1UzFKSGlBbFZqSm1BRHUtUUUtQkdn",
  "accept-charset": "utf-8",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "content-length": "165"
}
request_body
grant_type=authorization_code&code=JoU5uUEZi2JmI6OMialkr3ci33HTKg5g3q3R3h9WAwK&redirect_uri=https%3A%2F%2Fwww.certification.openid.net%2Ftest%2FyirSUYQEfi%2Fcallback
2020-07-28 20:28:20 RESPONSE
CallTokenEndpoint
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache, no-store",
  "content-length": "798",
  "content-type": "application/json; charset\u003dutf-8",
  "date": "Tue, 28 Jul 2020 20:28:20 GMT",
  "pragma": "no-cache",
  "server": [
    "Caddy",
    "Cowboy"
  ],
  "strict-transport-security": "max-age\u003d15552000; includeSubDomains",
  "vary": "Origin",
  "via": "1.1 vegur",
  "x-content-type-options": "nosniff",
  "x-dns-prefetch-control": "off",
  "x-download-options": "noopen",
  "x-frame-options": "SAMEORIGIN",
  "x-xss-protection": "1; mode\u003dblock"
}
response_body
{"access_token":"ecUNdOLDABd75w6iecqfH5gUqU84FYSQyO7m6xDkEAy","expires_in":3600,"id_token":"eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6InIxTGtiQm8zOTI1UmIyWkZGckt5VTNNVmV4OVQyODE3S3gwdmJpNmlfS2MifQ.eyJzdWIiOiJmb28iLCJub25jZSI6IllxT3I2emZlbTUiLCJhdF9oYXNoIjoiQlkxTnh3ZEhYS2d5RHZKUzk2VUFfQSIsImF1ZCI6InR1VDBoa2I1TDdrVnZ2S3Y4dlkxaSIsImV4cCI6MTU5NTk3MTcwMCwiaWF0IjoxNTk1OTY4MTAwLCJpc3MiOiJodHRwczovL29wLnBhbnZhLmN6In0.A96KrU5G0YjsTYFN-hlINMAxUKRUlfNsBXZ8cCAJK3T-pwI-sCbSXZAdwS36vK-uB47ErNDwf1WaM7Z852XC4wwLWAr1SbOWd3ORMKrbgtfkCUKL4l5wcmceiaHUzei_FuOcVvqYcBlb_kIs_4Fcx1QdKRRoUShPUJ6pYBlpZN0kot683IUYt9D5zwBTeCS_---pRGqKehdTdQ9s50u9YSi-_iLrI6fAb8sdo6AUOu_hGTw4oLzAvEUv7EMnWBgoNcyjL9KiK945ZLQNFT3_iCgkuHemKu4CB09mPLrnQho_5J7OAc7yg_Sv3WDUpWjC-vzXZaXyBi-IoVthSbsAlQ","scope":"openid","token_type":"Bearer"}
2020-07-28 20:28:20
CallTokenEndpoint
Token endpoint response
token_endpoint_response
{"access_token":"ecUNdOLDABd75w6iecqfH5gUqU84FYSQyO7m6xDkEAy","expires_in":3600,"id_token":"eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6InIxTGtiQm8zOTI1UmIyWkZGckt5VTNNVmV4OVQyODE3S3gwdmJpNmlfS2MifQ.eyJzdWIiOiJmb28iLCJub25jZSI6IllxT3I2emZlbTUiLCJhdF9oYXNoIjoiQlkxTnh3ZEhYS2d5RHZKUzk2VUFfQSIsImF1ZCI6InR1VDBoa2I1TDdrVnZ2S3Y4dlkxaSIsImV4cCI6MTU5NTk3MTcwMCwiaWF0IjoxNTk1OTY4MTAwLCJpc3MiOiJodHRwczovL29wLnBhbnZhLmN6In0.A96KrU5G0YjsTYFN-hlINMAxUKRUlfNsBXZ8cCAJK3T-pwI-sCbSXZAdwS36vK-uB47ErNDwf1WaM7Z852XC4wwLWAr1SbOWd3ORMKrbgtfkCUKL4l5wcmceiaHUzei_FuOcVvqYcBlb_kIs_4Fcx1QdKRRoUShPUJ6pYBlpZN0kot683IUYt9D5zwBTeCS_---pRGqKehdTdQ9s50u9YSi-_iLrI6fAb8sdo6AUOu_hGTw4oLzAvEUv7EMnWBgoNcyjL9KiK945ZLQNFT3_iCgkuHemKu4CB09mPLrnQho_5J7OAc7yg_Sv3WDUpWjC-vzXZaXyBi-IoVthSbsAlQ","scope":"openid","token_type":"Bearer"}
2020-07-28 20:28:20 SUCCESS
CallTokenEndpoint
Parsed token endpoint response
access_token
ecUNdOLDABd75w6iecqfH5gUqU84FYSQyO7m6xDkEAy
expires_in
3600
id_token
eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6InIxTGtiQm8zOTI1UmIyWkZGckt5VTNNVmV4OVQyODE3S3gwdmJpNmlfS2MifQ.eyJzdWIiOiJmb28iLCJub25jZSI6IllxT3I2emZlbTUiLCJhdF9oYXNoIjoiQlkxTnh3ZEhYS2d5RHZKUzk2VUFfQSIsImF1ZCI6InR1VDBoa2I1TDdrVnZ2S3Y4dlkxaSIsImV4cCI6MTU5NTk3MTcwMCwiaWF0IjoxNTk1OTY4MTAwLCJpc3MiOiJodHRwczovL29wLnBhbnZhLmN6In0.A96KrU5G0YjsTYFN-hlINMAxUKRUlfNsBXZ8cCAJK3T-pwI-sCbSXZAdwS36vK-uB47ErNDwf1WaM7Z852XC4wwLWAr1SbOWd3ORMKrbgtfkCUKL4l5wcmceiaHUzei_FuOcVvqYcBlb_kIs_4Fcx1QdKRRoUShPUJ6pYBlpZN0kot683IUYt9D5zwBTeCS_---pRGqKehdTdQ9s50u9YSi-_iLrI6fAb8sdo6AUOu_hGTw4oLzAvEUv7EMnWBgoNcyjL9KiK945ZLQNFT3_iCgkuHemKu4CB09mPLrnQho_5J7OAc7yg_Sv3WDUpWjC-vzXZaXyBi-IoVthSbsAlQ
scope
openid
token_type
Bearer
2020-07-28 20:28:20 SUCCESS
CheckIfTokenEndpointResponseError
No error from token endpoint
2020-07-28 20:28:20 SUCCESS
CheckForAccessTokenValue
Found an access token
access_token
ecUNdOLDABd75w6iecqfH5gUqU84FYSQyO7m6xDkEAy
2020-07-28 20:28:20 SUCCESS
ExtractAccessTokenFromTokenResponse
Extracted the access token
value
ecUNdOLDABd75w6iecqfH5gUqU84FYSQyO7m6xDkEAy
type
Bearer
2020-07-28 20:28:20 SUCCESS
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
expires_in
3600
2020-07-28 20:28:20 SUCCESS
ValidateExpiresIn
expires_in passed all validation checks
expires_in
3600
2020-07-28 20:28:20 INFO
CheckForRefreshTokenValue
Couldn't find refresh token
2020-07-28 20:28:20 SUCCESS
ExtractIdTokenFromTokenResponse
Found and parsed the id_token from token_endpoint_response
value
eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6InIxTGtiQm8zOTI1UmIyWkZGckt5VTNNVmV4OVQyODE3S3gwdmJpNmlfS2MifQ.eyJzdWIiOiJmb28iLCJub25jZSI6IllxT3I2emZlbTUiLCJhdF9oYXNoIjoiQlkxTnh3ZEhYS2d5RHZKUzk2VUFfQSIsImF1ZCI6InR1VDBoa2I1TDdrVnZ2S3Y4dlkxaSIsImV4cCI6MTU5NTk3MTcwMCwiaWF0IjoxNTk1OTY4MTAwLCJpc3MiOiJodHRwczovL29wLnBhbnZhLmN6In0.A96KrU5G0YjsTYFN-hlINMAxUKRUlfNsBXZ8cCAJK3T-pwI-sCbSXZAdwS36vK-uB47ErNDwf1WaM7Z852XC4wwLWAr1SbOWd3ORMKrbgtfkCUKL4l5wcmceiaHUzei_FuOcVvqYcBlb_kIs_4Fcx1QdKRRoUShPUJ6pYBlpZN0kot683IUYt9D5zwBTeCS_---pRGqKehdTdQ9s50u9YSi-_iLrI6fAb8sdo6AUOu_hGTw4oLzAvEUv7EMnWBgoNcyjL9KiK945ZLQNFT3_iCgkuHemKu4CB09mPLrnQho_5J7OAc7yg_Sv3WDUpWjC-vzXZaXyBi-IoVthSbsAlQ
header
{
  "kid": "r1LkbBo3925Rb2ZFFrKyU3MVex9T2817Kx0vbi6i_Kc",
  "typ": "JWT",
  "alg": "RS256"
}
claims
{
  "at_hash": "BY1NxwdHXKgyDvJS96UA_A",
  "sub": "foo",
  "aud": "tuT0hkb5L7kVvvKv8vY1i",
  "iss": "https://op.panva.cz",
  "exp": 1595971700,
  "nonce": "YqOr6zfem5",
  "iat": 1595968100
}
2020-07-28 20:28:20 SUCCESS
ValidateIdToken
ID token iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
2020-07-28 20:28:20 SUCCESS
ValidateIdTokenNonce
Nonce values match
nonce
YqOr6zfem5
2020-07-28 20:28:20 SUCCESS
ValidateIdTokenACRClaimAgainstRequest
Nothing to check; the conformance suite did not request an acr claim in request object
2020-07-28 20:28:20 SUCCESS
ValidateIdTokenSignature
id_token signature validated
id_token
eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6InIxTGtiQm8zOTI1UmIyWkZGckt5VTNNVmV4OVQyODE3S3gwdmJpNmlfS2MifQ.eyJzdWIiOiJmb28iLCJub25jZSI6IllxT3I2emZlbTUiLCJhdF9oYXNoIjoiQlkxTnh3ZEhYS2d5RHZKUzk2VUFfQSIsImF1ZCI6InR1VDBoa2I1TDdrVnZ2S3Y4dlkxaSIsImV4cCI6MTU5NTk3MTcwMCwiaWF0IjoxNTk1OTY4MTAwLCJpc3MiOiJodHRwczovL29wLnBhbnZhLmN6In0.A96KrU5G0YjsTYFN-hlINMAxUKRUlfNsBXZ8cCAJK3T-pwI-sCbSXZAdwS36vK-uB47ErNDwf1WaM7Z852XC4wwLWAr1SbOWd3ORMKrbgtfkCUKL4l5wcmceiaHUzei_FuOcVvqYcBlb_kIs_4Fcx1QdKRRoUShPUJ6pYBlpZN0kot683IUYt9D5zwBTeCS_---pRGqKehdTdQ9s50u9YSi-_iLrI6fAb8sdo6AUOu_hGTw4oLzAvEUv7EMnWBgoNcyjL9KiK945ZLQNFT3_iCgkuHemKu4CB09mPLrnQho_5J7OAc7yg_Sv3WDUpWjC-vzXZaXyBi-IoVthSbsAlQ
2020-07-28 20:28:20 SUCCESS
ValidateIdTokenSignatureUsingKid
id_token signature validated
id_token
eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6InIxTGtiQm8zOTI1UmIyWkZGckt5VTNNVmV4OVQyODE3S3gwdmJpNmlfS2MifQ.eyJzdWIiOiJmb28iLCJub25jZSI6IllxT3I2emZlbTUiLCJhdF9oYXNoIjoiQlkxTnh3ZEhYS2d5RHZKUzk2VUFfQSIsImF1ZCI6InR1VDBoa2I1TDdrVnZ2S3Y4dlkxaSIsImV4cCI6MTU5NTk3MTcwMCwiaWF0IjoxNTk1OTY4MTAwLCJpc3MiOiJodHRwczovL29wLnBhbnZhLmN6In0.A96KrU5G0YjsTYFN-hlINMAxUKRUlfNsBXZ8cCAJK3T-pwI-sCbSXZAdwS36vK-uB47ErNDwf1WaM7Z852XC4wwLWAr1SbOWd3ORMKrbgtfkCUKL4l5wcmceiaHUzei_FuOcVvqYcBlb_kIs_4Fcx1QdKRRoUShPUJ6pYBlpZN0kot683IUYt9D5zwBTeCS_---pRGqKehdTdQ9s50u9YSi-_iLrI6fAb8sdo6AUOu_hGTw4oLzAvEUv7EMnWBgoNcyjL9KiK945ZLQNFT3_iCgkuHemKu4CB09mPLrnQho_5J7OAc7yg_Sv3WDUpWjC-vzXZaXyBi-IoVthSbsAlQ
2020-07-28 20:28:20 SUCCESS
CheckForSubjectInIdToken
Found 'sub' in id_token
sub
foo
Second authorization: Userinfo endpoint tests
2020-07-28 20:28:20
CallProtectedResourceWithBearerToken
HTTP request
request_uri
https://op.panva.cz/me
request_method
GET
request_headers
{
  "accept": "application/json;charset\u003dUTF-8",
  "authorization": "Bearer ecUNdOLDABd75w6iecqfH5gUqU84FYSQyO7m6xDkEAy",
  "accept-charset": "utf-8",
  "content-length": "0"
}
request_body

                                
2020-07-28 20:28:21 RESPONSE
CallProtectedResourceWithBearerToken
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "cache-control": "no-cache, no-store",
  "content-length": "13",
  "content-type": "application/json; charset\u003dutf-8",
  "date": "Tue, 28 Jul 2020 20:28:21 GMT",
  "pragma": "no-cache",
  "server": [
    "Caddy",
    "Cowboy"
  ],
  "strict-transport-security": "max-age\u003d15552000; includeSubDomains",
  "vary": "Origin",
  "via": "1.1 vegur",
  "x-content-type-options": "nosniff",
  "x-dns-prefetch-control": "off",
  "x-download-options": "noopen",
  "x-frame-options": "SAMEORIGIN",
  "x-xss-protection": "1; mode\u003dblock"
}
response_body
{"sub":"foo"}
2020-07-28 20:28:21 SUCCESS
CallProtectedResourceWithBearerToken
Got a response from the resource endpoint
headers
{
  "cache-control": "no-cache, no-store",
  "content-length": "13",
  "content-type": "application/json; charset\u003dutf-8",
  "date": "Tue, 28 Jul 2020 20:28:21 GMT",
  "pragma": "no-cache",
  "server": [
    "Caddy",
    "Cowboy"
  ],
  "strict-transport-security": "max-age\u003d15552000; includeSubDomains",
  "vary": "Origin",
  "via": "1.1 vegur",
  "x-content-type-options": "nosniff",
  "x-dns-prefetch-control": "off",
  "x-download-options": "noopen",
  "x-frame-options": "SAMEORIGIN",
  "x-xss-protection": "1; mode\u003dblock"
}
status_code
{
  "code": 200
}
body
{"sub":"foo"}
2020-07-28 20:28:21 SUCCESS
ExtractSessionStateFromAuthorizationResponse
Found session_state
session_state
Xks-SJvyj9JuctK5b0fFjkwMaUY7pn_Vf3xcFIB7RWI
2020-07-28 20:28:21 REDIRECT
oidcc-session-management-rp-initiated-logout
Redirecting to our session check page
redirect_to
https://www.certification.openid.net/test/yirSUYQEfi/session_verify
2020-07-28 20:28:24 INCOMING
oidcc-session-management-rp-initiated-logout
Incoming HTTP request to test instance yirSUYQEfi
incoming_headers
{
  "host": "www.certification.openid.net",
  "upgrade-insecure-requests": "1",
  "dnt": "1",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.89 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "same-origin",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "referer": "https://www.certification.openid.net/log-detail.html?log\u003dyirSUYQEfi",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en,en-US;q\u003d0.9,cs;q\u003d0.8",
  "cookie": "JSESSIONID\u003d81FE6060128F726EBB2F55AADA28DE83",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
session_verify
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
2020-07-28 20:28:24 OUTGOING
oidcc-session-management-rp-initiated-logout
Response to HTTP request to test instance yirSUYQEfi
outgoing
ModelAndView [view="sessionVerify"; model={check_session_iframe=https://op.panva.cz/session/check, session_iframe_unchanged=https://www.certification.openid.net/test/yirSUYQEfi/rp_session_iframe}]
outgoing_path
session_verify
2020-07-28 20:28:24 INCOMING
oidcc-session-management-rp-initiated-logout
Incoming HTTP request to test instance yirSUYQEfi
incoming_headers
{
  "host": "www.certification.openid.net",
  "upgrade-insecure-requests": "1",
  "dnt": "1",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.89 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "same-origin",
  "sec-fetch-mode": "navigate",
  "sec-fetch-dest": "iframe",
  "referer": "https://www.certification.openid.net/test/yirSUYQEfi/session_verify",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en,en-US;q\u003d0.9,cs;q\u003d0.8",
  "cookie": "JSESSIONID\u003d81FE6060128F726EBB2F55AADA28DE83",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
rp_session_iframe
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
2020-07-28 20:28:24 OUTGOING
oidcc-session-management-rp-initiated-logout
Response to HTTP request to test instance yirSUYQEfi
outgoing
ModelAndView [view="rpSessionIframe"; model={client_id=tuT0hkb5L7kVvvKv8vY1i, session_state=Xks-SJvyj9JuctK5b0fFjkwMaUY7pn_Vf3xcFIB7RWI, issuer=https://op.panva.cz, service_url=https://www.certification.openid.net/test/yirSUYQEfi/session_result}]
outgoing_path
rp_session_iframe
2020-07-28 20:28:25 INCOMING
oidcc-session-management-rp-initiated-logout
Incoming HTTP request to test instance yirSUYQEfi
incoming_headers
{
  "host": "www.certification.openid.net",
  "upgrade-insecure-requests": "1",
  "dnt": "1",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.89 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "same-origin",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "referer": "https://www.certification.openid.net/test/yirSUYQEfi/rp_session_iframe",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en,en-US;q\u003d0.9,cs;q\u003d0.8",
  "cookie": "JSESSIONID\u003d81FE6060128F726EBB2F55AADA28DE83",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
session_result
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "state": "unchanged"
}
incoming_body
2020-07-28 20:28:25 OUTGOING
oidcc-session-management-rp-initiated-logout
Response to HTTP request to test instance yirSUYQEfi
outgoing
ModelAndView [view="resultCaptured"; model={returnUrl=/log-detail.html?log=yirSUYQEfi}]
outgoing_path
session_result
2020-07-28 20:28:25 SUCCESS
CheckSessionResultIsUnchanged
state from the OP's check_session_iframe is 'unchanged' as expected.
2020-07-28 20:28:25 SUCCESS
ExtractSessionStateFromAuthorizationResponse
Found session_state
session_state
Xks-SJvyj9JuctK5b0fFjkwMaUY7pn_Vf3xcFIB7RWI
Redirect to end session endpoint & wait for response
2020-07-28 20:28:25
CreateRandomEndSessionState
Created end_session_state value
end_session_state
apAWKAuzKjKfOTKqolKkAtCmxZuVWFybfiIycsMBkeRmOpeZoN5244859413~$`~,=$^:[>(_&]=~*%:?|"~{~]:~/
2020-07-28 20:28:25 SUCCESS
CreateEndSessionEndpointRequest
Created end session endpoint request
id_token_hint
eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6InIxTGtiQm8zOTI1UmIyWkZGckt5VTNNVmV4OVQyODE3S3gwdmJpNmlfS2MifQ.eyJzdWIiOiJmb28iLCJub25jZSI6IllxT3I2emZlbTUiLCJhdF9oYXNoIjoiQlkxTnh3ZEhYS2d5RHZKUzk2VUFfQSIsImF1ZCI6InR1VDBoa2I1TDdrVnZ2S3Y4dlkxaSIsImV4cCI6MTU5NTk3MTcwMCwiaWF0IjoxNTk1OTY4MTAwLCJpc3MiOiJodHRwczovL29wLnBhbnZhLmN6In0.A96KrU5G0YjsTYFN-hlINMAxUKRUlfNsBXZ8cCAJK3T-pwI-sCbSXZAdwS36vK-uB47ErNDwf1WaM7Z852XC4wwLWAr1SbOWd3ORMKrbgtfkCUKL4l5wcmceiaHUzei_FuOcVvqYcBlb_kIs_4Fcx1QdKRRoUShPUJ6pYBlpZN0kot683IUYt9D5zwBTeCS_---pRGqKehdTdQ9s50u9YSi-_iLrI6fAb8sdo6AUOu_hGTw4oLzAvEUv7EMnWBgoNcyjL9KiK945ZLQNFT3_iCgkuHemKu4CB09mPLrnQho_5J7OAc7yg_Sv3WDUpWjC-vzXZaXyBi-IoVthSbsAlQ
post_logout_redirect_uri
https://www.certification.openid.net/test/yirSUYQEfi/post_logout_redirect
state
apAWKAuzKjKfOTKqolKkAtCmxZuVWFybfiIycsMBkeRmOpeZoN5244859413~$`~,=$^:[>(_&]=~*%:?|"~{~]:~/
2020-07-28 20:28:25 SUCCESS
BuildRedirectToEndSessionEndpoint
Sending to end_session endpoint
redirect_to_end_session_endpoint
https://op.panva.cz/session/end?id_token_hint=eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6InIxTGtiQm8zOTI1UmIyWkZGckt5VTNNVmV4OVQyODE3S3gwdmJpNmlfS2MifQ.eyJzdWIiOiJmb28iLCJub25jZSI6IllxT3I2emZlbTUiLCJhdF9oYXNoIjoiQlkxTnh3ZEhYS2d5RHZKUzk2VUFfQSIsImF1ZCI6InR1VDBoa2I1TDdrVnZ2S3Y4dlkxaSIsImV4cCI6MTU5NTk3MTcwMCwiaWF0IjoxNTk1OTY4MTAwLCJpc3MiOiJodHRwczovL29wLnBhbnZhLmN6In0.A96KrU5G0YjsTYFN-hlINMAxUKRUlfNsBXZ8cCAJK3T-pwI-sCbSXZAdwS36vK-uB47ErNDwf1WaM7Z852XC4wwLWAr1SbOWd3ORMKrbgtfkCUKL4l5wcmceiaHUzei_FuOcVvqYcBlb_kIs_4Fcx1QdKRRoUShPUJ6pYBlpZN0kot683IUYt9D5zwBTeCS_---pRGqKehdTdQ9s50u9YSi-_iLrI6fAb8sdo6AUOu_hGTw4oLzAvEUv7EMnWBgoNcyjL9KiK945ZLQNFT3_iCgkuHemKu4CB09mPLrnQho_5J7OAc7yg_Sv3WDUpWjC-vzXZaXyBi-IoVthSbsAlQ&post_logout_redirect_uri=https://www.certification.openid.net/test/yirSUYQEfi/post_logout_redirect&state=apAWKAuzKjKfOTKqolKkAtCmxZuVWFybfiIycsMBkeRmOpeZoN5244859413~$%60~,%3D$%5E:%5B%3E(_%26%5D%3D~*%25:?%7C%22~%7B~%5D:~/
2020-07-28 20:28:25 REDIRECT
oidcc-session-management-rp-initiated-logout
Redirecting to end session endpoint
redirect_to
https://op.panva.cz/session/end?id_token_hint=eyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6InIxTGtiQm8zOTI1UmIyWkZGckt5VTNNVmV4OVQyODE3S3gwdmJpNmlfS2MifQ.eyJzdWIiOiJmb28iLCJub25jZSI6IllxT3I2emZlbTUiLCJhdF9oYXNoIjoiQlkxTnh3ZEhYS2d5RHZKUzk2VUFfQSIsImF1ZCI6InR1VDBoa2I1TDdrVnZ2S3Y4dlkxaSIsImV4cCI6MTU5NTk3MTcwMCwiaWF0IjoxNTk1OTY4MTAwLCJpc3MiOiJodHRwczovL29wLnBhbnZhLmN6In0.A96KrU5G0YjsTYFN-hlINMAxUKRUlfNsBXZ8cCAJK3T-pwI-sCbSXZAdwS36vK-uB47ErNDwf1WaM7Z852XC4wwLWAr1SbOWd3ORMKrbgtfkCUKL4l5wcmceiaHUzei_FuOcVvqYcBlb_kIs_4Fcx1QdKRRoUShPUJ6pYBlpZN0kot683IUYt9D5zwBTeCS_---pRGqKehdTdQ9s50u9YSi-_iLrI6fAb8sdo6AUOu_hGTw4oLzAvEUv7EMnWBgoNcyjL9KiK945ZLQNFT3_iCgkuHemKu4CB09mPLrnQho_5J7OAc7yg_Sv3WDUpWjC-vzXZaXyBi-IoVthSbsAlQ&post_logout_redirect_uri=https://www.certification.openid.net/test/yirSUYQEfi/post_logout_redirect&state=apAWKAuzKjKfOTKqolKkAtCmxZuVWFybfiIycsMBkeRmOpeZoN5244859413~$%60~,%3D$%5E:%5B%3E(_%26%5D%3D~*%25:?%7C%22~%7B~%5D:~/
2020-07-28 20:28:30 INCOMING
oidcc-session-management-rp-initiated-logout
Incoming HTTP request to test instance yirSUYQEfi
incoming_headers
{
  "host": "www.certification.openid.net",
  "cache-control": "max-age\u003d0",
  "upgrade-insecure-requests": "1",
  "dnt": "1",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.89 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "cross-site",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "referer": "https://op.panva.cz/session/end?id_token_hint\u003deyJhbGciOiJSUzI1NiIsInR5cCI6IkpXVCIsImtpZCI6InIxTGtiQm8zOTI1UmIyWkZGckt5VTNNVmV4OVQyODE3S3gwdmJpNmlfS2MifQ.eyJzdWIiOiJmb28iLCJub25jZSI6IllxT3I2emZlbTUiLCJhdF9oYXNoIjoiQlkxTnh3ZEhYS2d5RHZKUzk2VUFfQSIsImF1ZCI6InR1VDBoa2I1TDdrVnZ2S3Y4dlkxaSIsImV4cCI6MTU5NTk3MTcwMCwiaWF0IjoxNTk1OTY4MTAwLCJpc3MiOiJodHRwczovL29wLnBhbnZhLmN6In0.A96KrU5G0YjsTYFN-hlINMAxUKRUlfNsBXZ8cCAJK3T-pwI-sCbSXZAdwS36vK-uB47ErNDwf1WaM7Z852XC4wwLWAr1SbOWd3ORMKrbgtfkCUKL4l5wcmceiaHUzei_FuOcVvqYcBlb_kIs_4Fcx1QdKRRoUShPUJ6pYBlpZN0kot683IUYt9D5zwBTeCS_---pRGqKehdTdQ9s50u9YSi-_iLrI6fAb8sdo6AUOu_hGTw4oLzAvEUv7EMnWBgoNcyjL9KiK945ZLQNFT3_iCgkuHemKu4CB09mPLrnQho_5J7OAc7yg_Sv3WDUpWjC-vzXZaXyBi-IoVthSbsAlQ\u0026post_logout_redirect_uri\u003dhttps://www.certification.openid.net/test/yirSUYQEfi/post_logout_redirect\u0026state\u003dapAWKAuzKjKfOTKqolKkAtCmxZuVWFybfiIycsMBkeRmOpeZoN5244859413~$%60~,%3D$%5E:%5B%3E(_%26%5D%3D~*%25:?%7C%22~%7B~%5D:~/",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en,en-US;q\u003d0.9,cs;q\u003d0.8",
  "cookie": "JSESSIONID\u003d81FE6060128F726EBB2F55AADA28DE83",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
post_logout_redirect
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "state": "apAWKAuzKjKfOTKqolKkAtCmxZuVWFybfiIycsMBkeRmOpeZoN5244859413~$`~,\u003d$^:[\u003e(_\u0026]\u003d~*%:?|\"~{~]:~/"
}
incoming_body
2020-07-28 20:28:30 OUTGOING
oidcc-session-management-rp-initiated-logout
Response to HTTP request to test instance yirSUYQEfi
outgoing
ModelAndView [view="resultCaptured"; model={returnUrl=/log-detail.html?log=yirSUYQEfi}]
outgoing_path
post_logout_redirect
Verify frontchannel post logout redirect
2020-07-28 20:28:30 SUCCESS
CheckPostLogoutState
state passed to post logout redirect uri matches request
2020-07-28 20:28:30 SUCCESS
CheckForUnexpectedParametersInPostLogoutRedirect
post_logout_redirect includes only expected parameters
state
apAWKAuzKjKfOTKqolKkAtCmxZuVWFybfiIycsMBkeRmOpeZoN5244859413~$`~,=$^:[>(_&]=~*%:?|"~{~]:~/
2020-07-28 20:28:30 SUCCESS
ExtractSessionStateFromAuthorizationResponse
Found session_state
session_state
Xks-SJvyj9JuctK5b0fFjkwMaUY7pn_Vf3xcFIB7RWI
2020-07-28 20:28:30 REDIRECT
oidcc-session-management-rp-initiated-logout
Redirecting to our session check page
redirect_to
https://www.certification.openid.net/test/yirSUYQEfi/second_session_verify
2020-07-28 20:28:34 INCOMING
oidcc-session-management-rp-initiated-logout
Incoming HTTP request to test instance yirSUYQEfi
incoming_headers
{
  "host": "www.certification.openid.net",
  "upgrade-insecure-requests": "1",
  "dnt": "1",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.89 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "same-origin",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "referer": "https://www.certification.openid.net/log-detail.html?log\u003dyirSUYQEfi",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en,en-US;q\u003d0.9,cs;q\u003d0.8",
  "cookie": "JSESSIONID\u003d81FE6060128F726EBB2F55AADA28DE83",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
second_session_verify
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
2020-07-28 20:28:34 OUTGOING
oidcc-session-management-rp-initiated-logout
Response to HTTP request to test instance yirSUYQEfi
outgoing
ModelAndView [view="sessionVerify"; model={check_session_iframe=https://op.panva.cz/session/check, session_iframe_unchanged=https://www.certification.openid.net/test/yirSUYQEfi/second_rp_session_iframe}]
outgoing_path
second_session_verify
2020-07-28 20:28:34 INCOMING
oidcc-session-management-rp-initiated-logout
Incoming HTTP request to test instance yirSUYQEfi
incoming_headers
{
  "host": "www.certification.openid.net",
  "upgrade-insecure-requests": "1",
  "dnt": "1",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.89 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "same-origin",
  "sec-fetch-mode": "navigate",
  "sec-fetch-dest": "iframe",
  "referer": "https://www.certification.openid.net/test/yirSUYQEfi/second_session_verify",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en,en-US;q\u003d0.9,cs;q\u003d0.8",
  "cookie": "JSESSIONID\u003d81FE6060128F726EBB2F55AADA28DE83",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
second_rp_session_iframe
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
2020-07-28 20:28:34 OUTGOING
oidcc-session-management-rp-initiated-logout
Response to HTTP request to test instance yirSUYQEfi
outgoing
ModelAndView [view="rpSessionIframe"; model={client_id=tuT0hkb5L7kVvvKv8vY1i, session_state=Xks-SJvyj9JuctK5b0fFjkwMaUY7pn_Vf3xcFIB7RWI, issuer=https://op.panva.cz, service_url=https://www.certification.openid.net/test/yirSUYQEfi/second_session_result}]
outgoing_path
second_rp_session_iframe
2020-07-28 20:28:35 INCOMING
oidcc-session-management-rp-initiated-logout
Incoming HTTP request to test instance yirSUYQEfi
incoming_headers
{
  "host": "www.certification.openid.net",
  "upgrade-insecure-requests": "1",
  "dnt": "1",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/84.0.4147.89 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "same-origin",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "referer": "https://www.certification.openid.net/test/yirSUYQEfi/second_rp_session_iframe",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en,en-US;q\u003d0.9,cs;q\u003d0.8",
  "cookie": "JSESSIONID\u003d81FE6060128F726EBB2F55AADA28DE83",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
second_session_result
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "state": "changed"
}
incoming_body
2020-07-28 20:28:35 OUTGOING
oidcc-session-management-rp-initiated-logout
Response to HTTP request to test instance yirSUYQEfi
outgoing
ModelAndView [view="resultCaptured"; model={returnUrl=/log-detail.html?log=yirSUYQEfi}]
outgoing_path
second_session_result
2020-07-28 20:28:35 SUCCESS
CheckSecondSessionResultIsChanged
state from the OP's check_session_iframe is 'changed' as expected.
2020-07-28 20:28:35 FINISHED
oidcc-session-management-rp-initiated-logout
Test has run to completion
testmodule_result
PASSED
Unregister dynamically registered client
2020-07-28 20:28:35
UnregisterDynamicallyRegisteredClient
HTTP request
request_uri
https://op.panva.cz/reg/tuT0hkb5L7kVvvKv8vY1i
request_method
DELETE
request_headers
{
  "accept": "application/json",
  "accept-charset": "utf-8",
  "authorization": "Bearer jMSvLnHyz7lY4LcBbbld83fe43bTksArvJWkIeQrY1g",
  "content-length": "0"
}
request_body

                                
2020-07-28 20:28:35 RESPONSE
UnregisterDynamicallyRegisteredClient
HTTP response
response_status_code
204 NO_CONTENT
response_status_text
No Content
response_headers
{
  "cache-control": "no-cache, no-store",
  "date": "Tue, 28 Jul 2020 20:28:35 GMT",
  "pragma": "no-cache",
  "server": [
    "Caddy",
    "Cowboy"
  ],
  "strict-transport-security": "max-age\u003d15552000; includeSubDomains",
  "via": "1.1 vegur",
  "x-content-type-options": "nosniff",
  "x-dns-prefetch-control": "off",
  "x-download-options": "noopen",
  "x-frame-options": "SAMEORIGIN",
  "x-xss-protection": "1; mode\u003dblock"
}
response_body

                                
2020-07-28 20:28:35 SUCCESS
UnregisterDynamicallyRegisteredClient
Client successfully unregistered
Test Results