Test Info

Issuerhttps://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest
Profile[]
Test IDOP-scope-email
Test descriptionScope requesting email claims
Timestamp2020-07-09T09:29:21Z

Conditions


verify-scopes: status=OK [Verifies that the claims corresponding to the requested scopes are returned]
check-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
verify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
Done: status=OK

Trace Output

0phase<--<-- 0 --- Webfinger -->-->
0not expected to doWebFinger
0phase<--<-- 1 --- Discovery -->-->
0provider_config
kwargs:{'issuer': 'https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest'}
0http response
url:https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest/.well-known/openid-configuration status_code:200
0ProviderConfigurationResponse
{
    "acr_values_supported": [
        "loginradius:nist:level:1:re-auth"
    ],
    "authorization_endpoint": "https://cloud-api.loginradius.com/sso/oidc/v2/oidctest/authorize",
    "backchannel_logout_session_supported": false,
    "backchannel_logout_supported": false,
    "claims_parameter_supported": false,
    "claims_supported": [
        "email",
        "phone_number",
        "website",
        "FirstName",
        "gender",
        "zoneinfo",
        "family_name",
        "locale",
        "updated_at",
        "acr",
        "CustomFields.customerid",
        "Uid",
        "middle_name",
        "profile",
        "Favicon",
        "phone_number_verified",
        "name",
        "given_name",
        "nickname",
        "picture",
        "birthdate",
        "Country",
        "address",
        "preferred_username",
        "LastName",
        "email_verified",
        "auth_time",
        "UserName"
    ],
    "frontchannel_logout_session_supported": false,
    "frontchannel_logout_supported": false,
    "grant_types_supported": [
        "authorization_code",
        "refresh_token"
    ],
    "id_token_signing_alg_values_supported": [
        "RS256"
    ],
    "issuer": "https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest",
    "jwks_uri": "https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest/jwks",
    "request_parameter_supported": false,
    "request_uri_parameter_supported": true,
    "require_request_uri_registration": false,
    "response_modes_supported": [
        "query",
        "form_post",
        "fragment"
    ],
    "response_types_supported": [
        "code",
        "token",
        "id_token",
        "code token",
        "code id_token",
        "token id_token",
        "code token id_token"
    ],
    "revocation_endpoint": "https://cloud-api.loginradius.com/sso/oidc/v2/oidctest/revoke",
    "scopes_supported": [
        "openid",
        "email",
        "phone",
        "profile",
        "address"
    ],
    "subject_types_supported": [
        "public"
    ],
    "token_endpoint": "https://cloud-api.loginradius.com/sso/oidc/v2/oidctest/token",
    "token_endpoint_auth_methods_supported": [
        "client_secret_post",
        "client_secret_basic"
    ],
    "userinfo_endpoint": "https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest/userinfo",
    "version": "3.0"
}
0phase<--<-- 2 --- Registration -->-->
0not expected to doDynamic registration
0phase<--<-- 3 --- AsyncAuthn -->-->
0AuthorizationRequest
{
    "client_id": "112563f6-1480-40b8-8e28-e072ca212c82",
    "nonce": "XwtVCg2qnb0OuDBX",
    "redirect_uri": "https://op.certification.openid.net:62346/authz_cb",
    "response_type": "code token",
    "scope": "openid email",
    "state": "mzjZJYxjjtmo4aOu"
}
0redirect urlhttps://cloud-api.loginradius.com/sso/oidc/v2/oidctest/authorize?state=mzjZJYxjjtmo4aOu&nonce=XwtVCg2qnb0OuDBX&response_type=code+token&scope=openid+email&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A62346%2Fauthz_cb&client_id=112563f6-1480-40b8-8e28-e072ca212c82
0redirecthttps://cloud-api.loginradius.com/sso/oidc/v2/oidctest/authorize?state=mzjZJYxjjtmo4aOu&nonce=XwtVCg2qnb0OuDBX&response_type=code+token&scope=openid+email&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A62346%2Fauthz_cb&client_id=112563f6-1480-40b8-8e28-e072ca212c82
12http args{}
12responseURL with fragment
12responsestate=mzjZJYxjjtmo4aOu&code=0e70026154c48f9225e90e666237e293%3Ad87b72a3a5ef35779e25c3df48b518c8263ac787afad8fd4205fa6b81e302ab5a4e8651b89c3cbdfc1c7073b8128dc4477e21e5f3046ab702385afe88e1ea89a9263cfc907439ecab5d24f0509850cbdf5b6b31c54b54d1143fc3c2d16ef4ac6926125e9e116d8ac85842a0bc9691663&access_token=509f9c00-2001-485e-8f29-99549a3c8913&token_type=Bearer&expires_in=895
12response{'state': 'mzjZJYxjjtmo4aOu', 'code': '0e70026154c48f9225e90e666237e293:d87b72a3a5ef35779e25c3df48b518c8263ac787afad8fd4205fa6b81e302ab5a4e8651b89c3cbdfc1c7073b8128dc4477e21e5f3046ab702385afe88e1ea89a9263cfc907439ecab5d24f0509850cbdf5b6b31c54b54d1143fc3c2d16ef4ac6926125e9e116d8ac85842a0bc9691663', 'access_token': '509f9c00-2001-485e-8f29-99549a3c8913', 'token_type': 'Bearer', 'expires_in': 895}
12AuthorizationResponse
{
    "access_token": "509f9c00-2001-485e-8f29-99549a3c8913",
    "code": "0e70026154c48f9225e90e666237e293:d87b72a3a5ef35779e25c3df48b518c8263ac787afad8fd4205fa6b81e302ab5a4e8651b89c3cbdfc1c7073b8128dc4477e21e5f3046ab702385afe88e1ea89a9263cfc907439ecab5d24f0509850cbdf5b6b31c54b54d1143fc3c2d16ef4ac6926125e9e116d8ac85842a0bc9691663",
    "expires_in": 895,
    "state": "mzjZJYxjjtmo4aOu",
    "token_type": "Bearer"
}
12phase<--<-- 4 --- AccessToken -->-->
12requestop_args: {'state': 'mzjZJYxjjtmo4aOu'}, req_args: {'redirect_uri': 'https://op.certification.openid.net:62346/authz_cb'}
12do_access_token_request
kwargs:{'request_args': {'redirect_uri': 'https://op.certification.openid.net:62346/authz_cb', 'code': '0e70026154c48f9225e90e666237e293:d87b72a3a5ef35779e25c3df48b518c8263ac787afad8fd4205fa6b81e302ab5a4e8651b89c3cbdfc1c7073b8128dc4477e21e5f3046ab702385afe88e1ea89a9263cfc907439ecab5d24f0509850cbdf5b6b31c54b54d1143fc3c2d16ef4ac6926125e9e116d8ac85842a0bc9691663', 'state': 'mzjZJYxjjtmo4aOu', 'grant_type': 'authorization_code', 'client_id': '112563f6-1480-40b8-8e28-e072ca212c82'}, 'state': 'mzjZJYxjjtmo4aOu', 'authn_method': 'client_secret_basic'}
12AccessTokenRequest
{
    "code": "0e70026154c48f9225e90e666237e293:d87b72a3a5ef35779e25c3df48b518c8263ac787afad8fd4205fa6b81e302ab5a4e8651b89c3cbdfc1c7073b8128dc4477e21e5f3046ab702385afe88e1ea89a9263cfc907439ecab5d24f0509850cbdf5b6b31c54b54d1143fc3c2d16ef4ac6926125e9e116d8ac85842a0bc9691663",
    "grant_type": "authorization_code",
    "redirect_uri": "https://op.certification.openid.net:62346/authz_cb",
    "state": "mzjZJYxjjtmo4aOu"
}
12request_urlhttps://cloud-api.loginradius.com/sso/oidc/v2/oidctest/token
12request_http_args{'headers': {'Authorization': 'Basic MTEyNTYzZjYtMTQ4MC00MGI4LThlMjgtZTA3MmNhMjEyYzgyOjc4ZDNkYmUzLTEwZDEtNDk3Yi05MzU3LThlZWQ0NTkzMzYzZA==', 'Content-Type': 'application/x-www-form-urlencoded'}}
12requestgrant_type=authorization_code&redirect_uri=https%3A%2F%2Fop.certification.openid.net%3A62346%2Fauthz_cb&code=0e70026154c48f9225e90e666237e293%3Ad87b72a3a5ef35779e25c3df48b518c8263ac787afad8fd4205fa6b81e302ab5a4e8651b89c3cbdfc1c7073b8128dc4477e21e5f3046ab702385afe88e1ea89a9263cfc907439ecab5d24f0509850cbdf5b6b31c54b54d1143fc3c2d16ef4ac6926125e9e116d8ac85842a0bc9691663&state=mzjZJYxjjtmo4aOu
12http response
url:https://cloud-api.loginradius.com/sso/oidc/v2/oidctest/token status_code:200
12response{'access_token': '509f9c00-2001-485e-8f29-99549a3c8913', 'token_type': 'Bearer', 'refresh_token': '4c5efd51-6b1d-410a-b53d-f35110bb87ff', 'expires_in': 894, 'id_token': 'eyJhbGciOiJSUzI1NiIsImtpZCI6IjIwMSIsInR5cCI6IkpXVCJ9.eyJhZGRyZXNzIjp7fSwiYXNkZmdoIjoiIiwiYXRfaGFzaCI6ImE5dDJxTU5yUE1LWXVtbnQyNEVvb0EiLCJhdWQiOiIxMTI1NjNmNi0xNDgwLTQwYjgtOGUyOC1lMDcyY2EyMTJjODIiLCJhdXRoX3RpbWUiOjE1OTQyODY5NTYsImNfaGFzaCI6IkZ2YkNRZmFtUF9ZbEpqNlBhR0ZpeVEiLCJjb3VudHJ5IjpudWxsLCJlbWFpbCI6W3siVHlwZSI6IlByaW1hcnkiLCJWYWx1ZSI6ImNsb3Vkc3NvdGVzdEBtYWlsYXp5LmNvbSJ9XSwiZW1haWxfdmVyaWZpZWQiOnRydWUsImV4cCI6MTU5NDI4NzU2MSwiZmF2aWNvbjEiOm51bGwsImZuYW1lIjoiY2xvdWRzc290IiwiaWF0IjoxNTk0Mjg2OTYxLCJpc3MiOiJodHRwczovL2Nsb3VkLWFwaS5sb2dpbnJhZGl1cy5jb20vc3NvL29pZGMvdjIvaW50ZXJuYWwtbWF5YW5rL29pZGN0ZXN0IiwianRpIjoiN2Y3ZWNlYWYtNGFkMi00MmM2LTgxOGUtZTBjYzMzZjIxNjFiIiwibG5hbWUiOiJ0ZXNydCIsIm5iZiI6MTU5NDI4Njk2MSwibm9uY2UiOiJYd3RWQ2cycW5iME91REJYIiwic3ViIjoiMGI3Zjk0NWI4YzVmNGEzNmEzNWJmNDlmNzIzOWJmYTQiLCJ1aWQiOiIwYjdmOTQ1YjhjNWY0YTM2YTM1YmY0OWY3MjM5YmZhNCIsInVzZXJuYW1lIjoiY2xvdWRzc290ZXN0In0.IjyFgF9HekRe_EsvW-z9bDOPQ4rVL36gEFPgll57t5a5K1SKhVaKHU_pq9Rrwzv3jm2DBQuJhO4Js5zr-d4JjGtmnG1RB5W1bcYA7Usd__N-rsLYm70lkjKWBWQH8L09LFim7VeUv9tQ_L7Qd65HUq_2TTfDbS9ro-Au6pqk2XM8P4l8D--O4EgpiO50_7-MfWGSJt1RSL0a64vYKZMp6hU2uVzUvIRxm-xqXtpKS3Al-r7MIOUcgXdm2kkuU0J2OHayjk_5-UzV3MclN4jIBhJ0X5Bx-Ip9JzxZkDQr-oUSXFyAfKAqxp-MbuvWzfgOcWcgVxEdJyoPIFlZA7tOOA'}
12AccessTokenResponse
{
    "access_token": "509f9c00-2001-485e-8f29-99549a3c8913",
    "expires_in": 894,
    "id_token": {
        "address": {},
        "at_hash": "a9t2qMNrPMKYumnt24EooA",
        "aud": [
            "112563f6-1480-40b8-8e28-e072ca212c82"
        ],
        "auth_time": 1594286956,
        "c_hash": "FvbCQfamP_YlJj6PaGFiyQ",
        "country": null,
        "email": {
            "Type": "Primary",
            "Value": "cloudssotest@mailazy.com"
        },
        "email_verified": true,
        "exp": 1594287561,
        "favicon1": null,
        "fname": "cloudssot",
        "iat": 1594286961,
        "iss": "https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest",
        "jti": "7f7eceaf-4ad2-42c6-818e-e0cc33f2161b",
        "lname": "tesrt",
        "nbf": 1594286961,
        "nonce": "XwtVCg2qnb0OuDBX",
        "sub": "0b7f945b8c5f4a36a35bf49f7239bfa4",
        "uid": "0b7f945b8c5f4a36a35bf49f7239bfa4",
        "username": "cloudssotest"
    },
    "refresh_token": "4c5efd51-6b1d-410a-b53d-f35110bb87ff",
    "token_type": "Bearer"
}
12jws header{'alg': 'RS256', 'kid': '201', 'typ': 'JWT'}
12phase<--<-- 5 --- UserInfo -->-->
12do_user_info_request
kwargs:{'state': 'mzjZJYxjjtmo4aOu', 'method': 'GET', 'authn_method': 'bearer_header'}
12request{'body': None}
12request_urlhttps://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest/userinfo
12request_http_args{'headers': {'Authorization': 'Bearer 509f9c00-2001-485e-8f29-99549a3c8913'}}
12http response
url:https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest/userinfo status_code:200
12OpenIDSchema
{
    "address": {},
    "aud": "112563f6-1480-40b8-8e28-e072ca212c82",
    "country": null,
    "email": {
        "Type": "Primary",
        "Value": "cloudssotest@mailazy.com"
    },
    "email_verified": true,
    "exp": 1594287561,
    "favicon1": null,
    "fname": "cloudssot",
    "iat": 1594286961,
    "iss": "https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest",
    "jti": "c3e8828a-96e4-4aa5-9b55-3efae79e60c8",
    "lname": "tesrt",
    "nbf": 1594286961,
    "nonce": "XwtVCg2qnb0OuDBX",
    "sub": "0b7f945b8c5f4a36a35bf49f7239bfa4",
    "uid": "0b7f945b8c5f4a36a35bf49f7239bfa4",
    "username": "cloudssotest"
}
12OpenIDSchema
{
    "address": {},
    "aud": "112563f6-1480-40b8-8e28-e072ca212c82",
    "country": null,
    "email": {
        "Type": "Primary",
        "Value": "cloudssotest@mailazy.com"
    },
    "email_verified": true,
    "exp": 1594287561,
    "favicon1": null,
    "fname": "cloudssot",
    "iat": 1594286961,
    "iss": "https://cloud-api.loginradius.com/sso/oidc/v2/internal-mayank/oidctest",
    "jti": "c3e8828a-96e4-4aa5-9b55-3efae79e60c8",
    "lname": "tesrt",
    "nbf": 1594286961,
    "nonce": "XwtVCg2qnb0OuDBX",
    "sub": "0b7f945b8c5f4a36a35bf49f7239bfa4",
    "uid": "0b7f945b8c5f4a36a35bf49f7239bfa4",
    "username": "cloudssotest"
}
12jws header{'alg': 'RS256', 'kid': '201', 'typ': 'JWT'}
12phase<--<-- 6 --- Done -->-->
12end
12assertionVerifyScopes
12conditionverify-scopes: status=OK [Verifies that the claims corresponding to the requested scopes are returned]
12assertionCheckHTTPResponse
12conditioncheck-http-response: status=OK [Checks that the HTTP response status is within the 200 or 300 range. Also does some extra JSON checks]
12assertionVerifyResponse
12conditionverify-response: status=OK [Checks that the last response was one of a possible set of OpenID Connect Responses]
12conditionDone: status=OK

Result

PASSED