Test Info

Issuerhttps://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest
Profile[]
Test IDOP-Discovery-jwks_uri
Test descriptionVerify that jwks_uri is published
Timestamp2020-07-09T07:10:24Z

Conditions


bare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
providerinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
Done: status=OK

Trace Output

0phase<--<-- 0 --- Webfinger -->-->
0not expected to doWebFinger
0phase<--<-- 1 --- Discovery -->-->
0provider_config
kwargs:{'issuer': 'https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest'}
0http response
url:https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest/.well-known/openid-configuration status_code:200
0ProviderConfigurationResponse
{
    "acr_values_supported": [
        "loginradius:nist:level:1:re-auth"
    ],
    "authorization_endpoint": "https://cloud-api.loginradius.com/sso/oidc/v2/oidctest/authorize",
    "backchannel_logout_session_supported": false,
    "backchannel_logout_supported": false,
    "claims_parameter_supported": false,
    "claims_supported": [
        "gender",
        "zoneinfo",
        "family_name",
        "locale",
        "updated_at",
        "acr",
        "CustomFields.customerid",
        "Uid",
        "middle_name",
        "profile",
        "phone_number_verified",
        "name",
        "given_name",
        "nickname",
        "picture",
        "birthdate",
        "Country",
        "Favicon",
        "address",
        "preferred_username",
        "LastName",
        "email_verified",
        "auth_time",
        "UserName",
        "email",
        "phone_number",
        "website",
        "FirstName"
    ],
    "frontchannel_logout_session_supported": false,
    "frontchannel_logout_supported": false,
    "grant_types_supported": [
        "authorization_code",
        "refresh_token"
    ],
    "id_token_signing_alg_values_supported": [
        "RS256"
    ],
    "issuer": "https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest",
    "jwks_uri": "https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest/jwks",
    "request_parameter_supported": false,
    "request_uri_parameter_supported": true,
    "require_request_uri_registration": false,
    "response_modes_supported": [
        "query",
        "form_post",
        "fragment"
    ],
    "response_types_supported": [
        "code",
        "token",
        "id_token",
        "code token",
        "code id_token",
        "token id_token",
        "code token id_token"
    ],
    "revocation_endpoint": "https://cloud-api.loginradius.com/sso/oidc/v2/oidctest/revoke",
    "scopes_supported": [
        "openid",
        "email",
        "phone",
        "profile",
        "address"
    ],
    "subject_types_supported": [
        "public"
    ],
    "token_endpoint": "https://cloud-api.loginradius.com/sso/oidc/v2/oidctest/token",
    "token_endpoint_auth_methods_supported": [
        "client_secret_post",
        "client_secret_basic"
    ],
    "userinfo_endpoint": "https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest/userinfo",
    "version": "3.0"
}
0phase<--<-- 2 --- Done -->-->
0end
0assertionBareKeys
0http response
url:https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest/jwks status_code:200
0jwks{'keys': [{'kty': 'RSA', 'kid': '201', 'use': 'sig', 'alg': 'RS256', 'n': 'lnbTiV9H8dI66DkZUF7ORc1MBnCQx7kHXzUKrN-omOnE223MWadhJ9luU6cBSUI0bgHj2bEYa0eyx52FWUx0x-AA9se0FT9rWjp_VLj_xpUPxMKmWlHJhhyw4VDYwVzI2DNOYKoPRBqKQfrMAvfW7jXfiD6iO5Lra_XDevA3e0pYCxbYooA89AyiaFVvmsMHIV2udf5PWy8iC4h3zhibIiN1P7G_fLGRAf9kya7aAxYiFQtOx5WRd-BU8hli3mZvco9xEjzgNY63YdWmeOUgCq6qbnsusB8AlQ9WxWMJGvldYBAAZ5X7Jee93SFdG69uZtMakZEhKfyyuwur8EbzJQ', 'e': 'AQAB'}]}
0conditionbare-keys: status=OK [Dynamic OPs MUST publish their public keys as bare JWK keys]
0assertionCheckHasJwksURI
0conditionproviderinfo-has-jwks_uri: status=OK [Check that the jwks_uri discovery metadata value is in the provider_info]
0assertionCheckHTTPResponse
0conditioncheck-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
0conditionDone: status=OK

Result

PASSED