Test Info

Issuerhttps://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest
Profile[]
Test IDOP-scope-phone
Test descriptionScope requesting phone claims
Timestamp2020-07-09T09:29:41Z

Conditions


verify-scopes: status=OK [Verifies that the claims corresponding to the requested scopes are returned]
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK

Trace Output

0phase<--<-- 0 --- Webfinger -->-->
0not expected to doWebFinger
0phase<--<-- 1 --- Discovery -->-->
0provider_config
kwargs:{'issuer': 'https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest'}
0http response
url:https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest/.well-known/openid-configuration status_code:200
0ProviderConfigurationResponse
{
    "acr_values_supported": [
        "loginradius:nist:level:1:re-auth"
    ],
    "authorization_endpoint": "https://cloud-api.loginradius.com/sso/oidc/v2/oidctest/authorize",
    "backchannel_logout_session_supported": false,
    "backchannel_logout_supported": false,
    "claims_parameter_supported": false,
    "claims_supported": [
        "phone_number",
        "website",
        "FirstName",
        "email",
        "zoneinfo",
        "gender",
        "locale",
        "updated_at",
        "acr",
        "CustomFields.customerid",
        "Uid",
        "family_name",
        "profile",
        "middle_name",
        "name",
        "given_name",
        "nickname",
        "picture",
        "birthdate",
        "Country",
        "Favicon",
        "phone_number_verified",
        "preferred_username",
        "LastName",
        "address",
        "auth_time",
        "UserName",
        "email_verified"
    ],
    "frontchannel_logout_session_supported": false,
    "frontchannel_logout_supported": false,
    "grant_types_supported": [
        "authorization_code",
        "refresh_token"
    ],
    "id_token_signing_alg_values_supported": [
        "RS256"
    ],
    "issuer": "https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest",
    "jwks_uri": "https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest/jwks",
    "request_parameter_supported": false,
    "request_uri_parameter_supported": true,
    "require_request_uri_registration": false,
    "response_modes_supported": [
        "query",
        "form_post",
        "fragment"
    ],
    "response_types_supported": [
        "code",
        "token",
        "id_token",
        "code token",
        "code id_token",
        "token id_token",
        "code token id_token"
    ],
    "revocation_endpoint": "https://cloud-api.loginradius.com/sso/oidc/v2/oidctest/revoke",
    "scopes_supported": [
        "openid",
        "email",
        "phone",
        "profile",
        "address"
    ],
    "subject_types_supported": [
        "public"
    ],
    "token_endpoint": "https://cloud-api.loginradius.com/sso/oidc/v2/oidctest/token",
    "token_endpoint_auth_methods_supported": [
        "client_secret_post",
        "client_secret_basic"
    ],
    "userinfo_endpoint": "https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest/userinfo",
    "version": "3.0"
}
0phase<--<-- 2 --- Registration -->-->
0not expected to doDynamic registration
0phase<--<-- 3 --- AsyncAuthn -->-->
0AuthorizationRequest
{
    "client_id": "112563f6-1480-40b8-8e28-e072ca212c82",
    "nonce": "haZoTozAiNoEjLSF",
    "redirect_uri": "https://op.certification.openid.net:62346/authz_cb",
    "response_type": "code token",
    "scope": "openid phone",
    "state": "xAIHZZh6XK3I8Wiv"
}
0redirect urlhttps://cloud-api.loginradius.com/sso/oidc/v2/oidctest/authorize?state=xAIHZZh6XK3I8Wiv&nonce=haZoTozAiNoEjLSF&response_type=code+token&scope=openid+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A62346%2Fauthz_cb&client_id=112563f6-1480-40b8-8e28-e072ca212c82
0redirecthttps://cloud-api.loginradius.com/sso/oidc/v2/oidctest/authorize?state=xAIHZZh6XK3I8Wiv&nonce=haZoTozAiNoEjLSF&response_type=code+token&scope=openid+phone&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A62346%2Fauthz_cb&client_id=112563f6-1480-40b8-8e28-e072ca212c82
11http args{}
11responseURL with fragment
11responsestate=xAIHZZh6XK3I8Wiv&code=51c76f5dd32769bfbf2aeef95b37c867%3A0026e5c6004e093a55d34f6ed708122e7901b49b014cd77e0187b155521316a2843fcef5aef83ba9a0570a03d8948f25b1e67d8e13f82675005f7e10d5f67f4d5f7114204b958b28aaf6a06e7cce7dcb4e7679ce29dc69c02576d475400939166f0e4a1df1cf790d1eeb1a22d5c14191&access_token=008a309b-459e-4877-9ca8-702fd2ae1087&token_type=Bearer&expires_in=895
11response{'state': 'xAIHZZh6XK3I8Wiv', 'code': '51c76f5dd32769bfbf2aeef95b37c867:0026e5c6004e093a55d34f6ed708122e7901b49b014cd77e0187b155521316a2843fcef5aef83ba9a0570a03d8948f25b1e67d8e13f82675005f7e10d5f67f4d5f7114204b958b28aaf6a06e7cce7dcb4e7679ce29dc69c02576d475400939166f0e4a1df1cf790d1eeb1a22d5c14191', 'access_token': '008a309b-459e-4877-9ca8-702fd2ae1087', 'token_type': 'Bearer', 'expires_in': 895}
11AuthorizationResponse
{
    "access_token": "008a309b-459e-4877-9ca8-702fd2ae1087",
    "code": "51c76f5dd32769bfbf2aeef95b37c867:0026e5c6004e093a55d34f6ed708122e7901b49b014cd77e0187b155521316a2843fcef5aef83ba9a0570a03d8948f25b1e67d8e13f82675005f7e10d5f67f4d5f7114204b958b28aaf6a06e7cce7dcb4e7679ce29dc69c02576d475400939166f0e4a1df1cf790d1eeb1a22d5c14191",
    "expires_in": 895,
    "state": "xAIHZZh6XK3I8Wiv",
    "token_type": "Bearer"
}
11phase<--<-- 4 --- AccessToken -->-->
11requestop_args: {'state': 'xAIHZZh6XK3I8Wiv'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:62346/authz_cb'}
11do_access_token_request
kwargs:{'request_args': {'redirect_uri': 'https://op.certification.openid.net:62346/authz_cb', 'code': '51c76f5dd32769bfbf2aeef95b37c867:0026e5c6004e093a55d34f6ed708122e7901b49b014cd77e0187b155521316a2843fcef5aef83ba9a0570a03d8948f25b1e67d8e13f82675005f7e10d5f67f4d5f7114204b958b28aaf6a06e7cce7dcb4e7679ce29dc69c02576d475400939166f0e4a1df1cf790d1eeb1a22d5c14191', 'state': 'xAIHZZh6XK3I8Wiv', 'grant_type': 'authorization_code', 'client_id': '112563f6-1480-40b8-8e28-e072ca212c82'}, 'state': 'xAIHZZh6XK3I8Wiv', 'authn_method': 'client_secret_basic'}
11AccessTokenRequest
{
    "code": "51c76f5dd32769bfbf2aeef95b37c867:0026e5c6004e093a55d34f6ed708122e7901b49b014cd77e0187b155521316a2843fcef5aef83ba9a0570a03d8948f25b1e67d8e13f82675005f7e10d5f67f4d5f7114204b958b28aaf6a06e7cce7dcb4e7679ce29dc69c02576d475400939166f0e4a1df1cf790d1eeb1a22d5c14191",
    "grant_type": "authorization_code",
    "redirect_uri": "https://op.certification.openid.net:62346/authz_cb",
    "state": "xAIHZZh6XK3I8Wiv"
}
11request_urlhttps://cloud-api.loginradius.com/sso/oidc/v2/oidctest/token
11request_http_args{'headers': {'Authorization': 'Basic MTEyNTYzZjYtMTQ4MC00MGI4LThlMjgtZTA3MmNhMjEyYzgyOjc4ZDNkYmUzLTEwZDEtNDk3Yi05MzU3LThlZWQ0NTkzMzYzZA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
11requestgrant_type=authorization_code&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A62346%2Fauthz_cb&code=51c76f5dd32769bfbf2aeef95b37c867%3A0026e5c6004e093a55d34f6ed708122e7901b49b014cd77e0187b155521316a2843fcef5aef83ba9a0570a03d8948f25b1e67d8e13f82675005f7e10d5f67f4d5f7114204b958b28aaf6a06e7cce7dcb4e7679ce29dc69c02576d475400939166f0e4a1df1cf790d1eeb1a22d5c14191&state=xAIHZZh6XK3I8Wiv
12http response
url:https://cloud-api.loginradius.com/sso/oidc/v2/oidctest/token status_code:200
12response{'access_token': '008a309b-459e-4877-9ca8-702fd2ae1087', 'token_type': 'Bearer', 'refresh_token': '7ddb9686-d61a-4495-af2e-ff532cd4a0e9', 'expires_in': 894, 'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6IjIwMSIsInR5cCI6IkpXVCJ9.eyJhZGRyZXNzIjp7fSwiYXNkZmdoIjoiIiwiYXRfaGFzaCI6IkpXM0RpYXhIaFJfQkF5MHFnVV9ueEEiLCJhdWQiOiIxMTI1NjNmNi0xNDgwLTQwYjgtOGUyOC1lMDcyY2EyMTJjODIiLCJhdXRoX3RpbWUiOjE1OTQyODY5NzUsImNfaGFzaCI6IktCYnE1SVZ6aUM5VmphUDJ2SGdsckEiLCJjb3VudHJ5IjpudWxsLCJlbWFpbCI6W3siVHlwZSI6IlByaW1hcnkiLCJWYWx1ZSI6ImNsb3Vkc3NvdGVzdEBtYWlsYXp5LmNvbSJ9XSwiZXhwIjoxNTk0Mjg3NTgwLCJmYXZpY29uMSI6bnVsbCwiZm5hbWUiOiJjbG91ZHNzb3QiLCJpYXQiOjE1OTQyODY5ODAsImlzcyI6Imh0dHBzOi8vY2xvdWQtYXBpLmxvZ2lucmFkaXVzLmNvbS9zc28vb2lkYy92Mi9pbnRlcm5hbC1tYXlhbmsvb2lkY3Rlc3QiLCJqdGkiOiJhNGQ2NmVlNC00MjFjLTQ4NzUtYWVjOS0yMjExN2IyZWYzMmIiLCJsbmFtZSI6InRlc3J0IiwibmJmIjoxNTk0Mjg2OTgwLCJub25jZSI6ImhhWm9Ub3pBaU5vRWpMU0YiLCJwaG9uZV9udW1iZXIiOiIrMTkwMjkwOTU3MTQiLCJwaG9uZV9udW1iZXJfdmVyaWZpZWQiOnRydWUsInN1YiI6IjBiN2Y5NDViOGM1ZjRhMzZhMzViZjQ5ZjcyMzliZmE0IiwidWlkIjoiMGI3Zjk0NWI4YzVmNGEzNmEzNWJmNDlmNzIzOWJmYTQiLCJ1c2VybmFtZSI6ImNsb3Vkc3NvdGVzdCJ9.fN1AhUeZUQ4mXs3REsvLynnp2VCYlN6FkBhUGx-HdPKIDiRnaJET3zBP48C2xMfWdrARQZn7BnoYnt6jkSAJpI77rDoYiJjLeRF2ebPBWsWm3qOJ1ctDAiKIfzTezOnitx5vo2QnlvqEXJaQvTiJqs_dMwc_E1Ur3cakWWJMKo5XdS2ep59zrqAUcc9ZC6z_JPT7uJZ_NLOkb4OX2sEizmr7p_32wjqe2qxszV5RTH8jmaX9pFR1ISaG2NvXmaGgPmyWvdeRDP531Z87XiB4rLVITMbaao-VqFtE8LreCWJL9VKA6qj4Xvgr4XQnqIY3YZFmCiBYw0c7WflJ2ZHACQ'}
12AccessTokenResponse
{
    "access_token": "008a309b-459e-4877-9ca8-702fd2ae1087",
    "expires_in": 894,
    "id_token": {
        "address": {},
        "at_hash": "JW3DiaxHhR_BAy0qgU_nxA",
        "aud": [
            "112563f6-1480-40b8-8e28-e072ca212c82"
        ],
        "auth_time": 1594286975,
        "c_hash": "KBbq5IVziC9VjaP2vHglrA",
        "country": null,
        "email": {
            "Type": "Primary",
            "Value": "cloudssotest@mailazy.com"
        },
        "exp": 1594287580,
        "favicon1": null,
        "fname": "cloudssot",
        "iat": 1594286980,
        "iss": "https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest",
        "jti": "a4d66ee4-421c-4875-aec9-22117b2ef32b",
        "lname": "tesrt",
        "nbf": 1594286980,
        "nonce": "haZoTozAiNoEjLSF",
        "phone_number": "+19029095714",
        "phone_number_verified": true,
        "sub": "0b7f945b8c5f4a36a35bf49f7239bfa4",
        "uid": "0b7f945b8c5f4a36a35bf49f7239bfa4",
        "username": "cloudssotest"
    },
    "refresh_token": "7ddb9686-d61a-4495-af2e-ff532cd4a0e9",
    "token_type": "Bearer"
}
12jws header{'alg': 'RS256', 'kid': '201', 'typ': 'JWT'}
12phase<--<-- 5 --- UserInfo -->-->
12do_user_info_request
kwargs:{'state': 'xAIHZZh6XK3I8Wiv', 'method': 'GET', 'authn_method': 'bearer_header'}
12request{'body': None}
12request_urlhttps://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest/userinfo
12request_http_args{'headers': {'Authorization': 'Bearer 008a309b-459e-4877-9ca8-702fd2ae1087'}}
12http response
url:https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest/userinfo status_code:200
12OpenIDSchema
{
    "address": {},
    "aud": "112563f6-1480-40b8-8e28-e072ca212c82",
    "country": null,
    "email": {
        "Type": "Primary",
        "Value": "cloudssotest@mailazy.com"
    },
    "exp": 1594287581,
    "favicon1": null,
    "fname": "cloudssot",
    "iat": 1594286981,
    "iss": "https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest",
    "jti": "0cda8862-6ccc-40f9-8f73-b209a8dedbe3",
    "lname": "tesrt",
    "nbf": 1594286981,
    "nonce": "haZoTozAiNoEjLSF",
    "phone_number": "+19029095714",
    "phone_number_verified": true,
    "sub": "0b7f945b8c5f4a36a35bf49f7239bfa4",
    "uid": "0b7f945b8c5f4a36a35bf49f7239bfa4",
    "username": "cloudssotest"
}
12OpenIDSchema
{
    "address": {},
    "aud": "112563f6-1480-40b8-8e28-e072ca212c82",
    "country": null,
    "email": {
        "Type": "Primary",
        "Value": "cloudssotest@mailazy.com"
    },
    "exp": 1594287581,
    "favicon1": null,
    "fname": "cloudssot",
    "iat": 1594286981,
    "iss": "https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest",
    "jti": "0cda8862-6ccc-40f9-8f73-b209a8dedbe3",
    "lname": "tesrt",
    "nbf": 1594286981,
    "nonce": "haZoTozAiNoEjLSF",
    "phone_number": "+19029095714",
    "phone_number_verified": true,
    "sub": "0b7f945b8c5f4a36a35bf49f7239bfa4",
    "uid": "0b7f945b8c5f4a36a35bf49f7239bfa4",
    "username": "cloudssotest"
}
12jws header{'alg': 'RS256', 'kid': '201', 'typ': 'JWT'}
12phase<--<-- 6 --- Done -->-->
12end
12assertionVerifyScopes
12conditionverify-scopes: status=OK [Verifies that the claims corresponding to the requested scopes are returned]
12assertionCheckHTTPResponse
12conditioncheck-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
12assertionVerifyResponse
12conditionverify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
12conditionDone: status=OK

Result

PASSED