Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-07-09 22:49:31 INFO
TEST-RUNNER
Test instance 5AITABvxNw created
baseUrl
https://www.certification.openid.net/test/a/openid4us
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "server_metadata": "discovery",
  "response_mode": "default",
  "client_registration": "dynamic_client"
}
alias
openid4us
description
planId
d6BE7uTcoAvAt
config
{
  "alias": "openid4us",
  "server": {
    "discoveryUrl": "https://connect.openid4.us:5443/.well-known/openid-configuration",
    "login_hint": "bob"
  },
  "client": {
    "client_name": "opend4Client1"
  },
  "client2": {
    "client_name": "openid4Client2"
  }
}
testName
oidcc-ensure-registered-redirect-uri
2020-07-09 22:49:31 SUCCESS
CreateRedirectUri
Created redirect URI
redirect_uri
https://www.certification.openid.net/test/a/openid4us/callback
2020-07-09 22:49:31
GetDynamicServerConfiguration
HTTP request
request_uri
https://connect.openid4.us:5443/.well-known/openid-configuration
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/cbor, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2020-07-09 22:49:32 RESPONSE
GetDynamicServerConfiguration
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "date": "Thu, 09 Jul 2020 22:49:32 GMT",
  "server": "Apache/2.4.38 (Debian)",
  "access-control-allow-origin": "*",
  "content-length": "3625",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive",
  "content-type": "application/json"
}
response_body
{
 "version":"3.0",
 "issuer":"https:\/\/connect.openid4.us:5443\/phpOp",
 "authorization_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/auth",
 "token_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/token",
 "userinfo_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/userinfo",
 "check_session_iframe":"https:\/\/connect.openid4.us:5443\/phpOp\/opframe.php",
 "aggregation_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/aggregation",
 "end_session_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/endsession",
 "jwks_uri":"https:\/\/connect.openid4.us:5443\/phpOp\/op.jwk",
 "registration_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/registration",
 "scopes_supported":[
  "openid",
  "profile",
  "email",
  "address",
  "phone",
  "offline_access"
 ],
 "response_types_supported":[
  "code",
  "code token",
  "code id_token",
  "token",
  "id_token token",
  "code id_token token",
  "id_token"
 ],
 "grant_types_supported":[
  "authorization_code",
  "implicit"
 ],
 "acr_values_supported":[
  "acr1",
  "acr2",
  "acr3"
 ],
 "subject_types_supported":[
  "public",
  "pairwise"
 ],
 "userinfo_signing_alg_values_supported":[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
 ],
 "userinfo_encryption_alg_values_supported":[
  "RSA1_5",
  "RSA-OAEP"
 ],
 "userinfo_encryption_enc_values_supported":[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
 ],
 "id_token_signing_alg_values_supported":[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
 ],
 "id_token_encryption_alg_values_supported":[
  "RSA1_5",
  "RSA-OAEP"
 ],
 "id_token_encryption_enc_values_supported":[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
 ],
 "request_object_signing_alg_values_supported":[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
 ],
 "request_object_encryption_alg_values_supported":[
  "RSA1_5",
  "RSA-OAEP"
 ],
 "request_object_encryption_enc_values_supported":[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
 ],
 "aggregation_signing_alg_values_supported":[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
 ],
 "aggregation_encryption_alg_values_supported":[
  "RSA1_5",
  "RSA-OAEP"
 ],
 "aggregation_encryption_enc_values_supported":[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
 ],
 "token_endpoint_auth_methods_supported":[
  "client_secret_post",
  "client_secret_basic",
  "client_secret_jwt",
  "private_key_jwt"
 ],
 "token_endpoint_auth_signing_alg_values_supported":[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
 ],
 "display_values_supported":[
  "page"
 ],
 "claim_types_supported":[
  "normal"
 ],
 "claims_supported":[
  "name",
  "given_name",
  "family_name",
  "middle_name",
  "nickname",
  "preferred_username",
  "profile",
  "picture",
  "website",
  "email",
  "email_verified",
  "gender",
  "birthdate",
  "zoneinfo",
  "locale",
  "phone_number",
  "phone_number_verified",
  "address",
  "updated_at"
 ],
 "service_documentation":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/servicedocs",
 "claims_locales_supported":[
  "en-US"
 ],
 "ui_locales_supported":[
  "en-US"
 ],
 "require_request_uri_registration":false,
 "op_policy_uri":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/op_policy",
 "op_tos_uri":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/op_tos",
 "claims_parameter_supported":true,
 "request_parameter_supported":true,
 "request_uri_parameter_supported":true
}
2020-07-09 22:49:32
GetDynamicServerConfiguration
Downloaded server configuration
server_config_string
{
 "version":"3.0",
 "issuer":"https:\/\/connect.openid4.us:5443\/phpOp",
 "authorization_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/auth",
 "token_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/token",
 "userinfo_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/userinfo",
 "check_session_iframe":"https:\/\/connect.openid4.us:5443\/phpOp\/opframe.php",
 "aggregation_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/aggregation",
 "end_session_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/endsession",
 "jwks_uri":"https:\/\/connect.openid4.us:5443\/phpOp\/op.jwk",
 "registration_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/registration",
 "scopes_supported":[
  "openid",
  "profile",
  "email",
  "address",
  "phone",
  "offline_access"
 ],
 "response_types_supported":[
  "code",
  "code token",
  "code id_token",
  "token",
  "id_token token",
  "code id_token token",
  "id_token"
 ],
 "grant_types_supported":[
  "authorization_code",
  "implicit"
 ],
 "acr_values_supported":[
  "acr1",
  "acr2",
  "acr3"
 ],
 "subject_types_supported":[
  "public",
  "pairwise"
 ],
 "userinfo_signing_alg_values_supported":[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
 ],
 "userinfo_encryption_alg_values_supported":[
  "RSA1_5",
  "RSA-OAEP"
 ],
 "userinfo_encryption_enc_values_supported":[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
 ],
 "id_token_signing_alg_values_supported":[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
 ],
 "id_token_encryption_alg_values_supported":[
  "RSA1_5",
  "RSA-OAEP"
 ],
 "id_token_encryption_enc_values_supported":[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
 ],
 "request_object_signing_alg_values_supported":[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
 ],
 "request_object_encryption_alg_values_supported":[
  "RSA1_5",
  "RSA-OAEP"
 ],
 "request_object_encryption_enc_values_supported":[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
 ],
 "aggregation_signing_alg_values_supported":[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
 ],
 "aggregation_encryption_alg_values_supported":[
  "RSA1_5",
  "RSA-OAEP"
 ],
 "aggregation_encryption_enc_values_supported":[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
 ],
 "token_endpoint_auth_methods_supported":[
  "client_secret_post",
  "client_secret_basic",
  "client_secret_jwt",
  "private_key_jwt"
 ],
 "token_endpoint_auth_signing_alg_values_supported":[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
 ],
 "display_values_supported":[
  "page"
 ],
 "claim_types_supported":[
  "normal"
 ],
 "claims_supported":[
  "name",
  "given_name",
  "family_name",
  "middle_name",
  "nickname",
  "preferred_username",
  "profile",
  "picture",
  "website",
  "email",
  "email_verified",
  "gender",
  "birthdate",
  "zoneinfo",
  "locale",
  "phone_number",
  "phone_number_verified",
  "address",
  "updated_at"
 ],
 "service_documentation":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/servicedocs",
 "claims_locales_supported":[
  "en-US"
 ],
 "ui_locales_supported":[
  "en-US"
 ],
 "require_request_uri_registration":false,
 "op_policy_uri":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/op_policy",
 "op_tos_uri":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/op_tos",
 "claims_parameter_supported":true,
 "request_parameter_supported":true,
 "request_uri_parameter_supported":true
}
2020-07-09 22:49:32 SUCCESS
GetDynamicServerConfiguration
Successfully parsed server configuration
version
3.0
issuer
https://connect.openid4.us:5443/phpOp
authorization_endpoint
https://connect.openid4.us:5443/phpOp/index.php/auth
token_endpoint
https://connect.openid4.us:5443/phpOp/index.php/token
userinfo_endpoint
https://connect.openid4.us:5443/phpOp/index.php/userinfo
check_session_iframe
https://connect.openid4.us:5443/phpOp/opframe.php
aggregation_endpoint
https://connect.openid4.us:5443/phpOp/index.php/aggregation
end_session_endpoint
https://connect.openid4.us:5443/phpOp/index.php/endsession
jwks_uri
https://connect.openid4.us:5443/phpOp/op.jwk
registration_endpoint
https://connect.openid4.us:5443/phpOp/index.php/registration
scopes_supported
[
  "openid",
  "profile",
  "email",
  "address",
  "phone",
  "offline_access"
]
response_types_supported
[
  "code",
  "code token",
  "code id_token",
  "token",
  "id_token token",
  "code id_token token",
  "id_token"
]
grant_types_supported
[
  "authorization_code",
  "implicit"
]
acr_values_supported
[
  "acr1",
  "acr2",
  "acr3"
]
subject_types_supported
[
  "public",
  "pairwise"
]
userinfo_signing_alg_values_supported
[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
]
userinfo_encryption_alg_values_supported
[
  "RSA1_5",
  "RSA-OAEP"
]
userinfo_encryption_enc_values_supported
[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
]
id_token_signing_alg_values_supported
[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
]
id_token_encryption_alg_values_supported
[
  "RSA1_5",
  "RSA-OAEP"
]
id_token_encryption_enc_values_supported
[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
]
request_object_signing_alg_values_supported
[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
]
request_object_encryption_alg_values_supported
[
  "RSA1_5",
  "RSA-OAEP"
]
request_object_encryption_enc_values_supported
[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
]
aggregation_signing_alg_values_supported
[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
]
aggregation_encryption_alg_values_supported
[
  "RSA1_5",
  "RSA-OAEP"
]
aggregation_encryption_enc_values_supported
[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
]
token_endpoint_auth_methods_supported
[
  "client_secret_post",
  "client_secret_basic",
  "client_secret_jwt",
  "private_key_jwt"
]
token_endpoint_auth_signing_alg_values_supported
[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
]
display_values_supported
[
  "page"
]
claim_types_supported
[
  "normal"
]
claims_supported
[
  "name",
  "given_name",
  "family_name",
  "middle_name",
  "nickname",
  "preferred_username",
  "profile",
  "picture",
  "website",
  "email",
  "email_verified",
  "gender",
  "birthdate",
  "zoneinfo",
  "locale",
  "phone_number",
  "phone_number_verified",
  "address",
  "updated_at"
]
service_documentation
https://connect.openid4.us:5443/phpOp/index.php/servicedocs
claims_locales_supported
[
  "en-US"
]
ui_locales_supported
[
  "en-US"
]
require_request_uri_registration
false
op_policy_uri
https://connect.openid4.us:5443/phpOp/index.php/op_policy
op_tos_uri
https://connect.openid4.us:5443/phpOp/index.php/op_tos
claims_parameter_supported
true
request_parameter_supported
true
request_uri_parameter_supported
true
2020-07-09 22:49:32 SUCCESS
CheckServerConfiguration
Found required server configuration keys
required
[
  "authorization_endpoint",
  "token_endpoint",
  "issuer"
]
2020-07-09 22:49:32 SUCCESS
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
registration_endpoint
{
  "testHost": "connect.openid4.us",
  "testPort": 5443
}
authorization_endpoint
{
  "testHost": "connect.openid4.us",
  "testPort": 5443
}
token_endpoint
{
  "testHost": "connect.openid4.us",
  "testPort": 5443
}
userinfo_endpoint
{
  "testHost": "connect.openid4.us",
  "testPort": 5443
}
2020-07-09 22:49:32
FetchServerKeys
Fetching server key
jwks_uri
https://connect.openid4.us:5443/phpOp/op.jwk
2020-07-09 22:49:32
FetchServerKeys
HTTP request
request_uri
https://connect.openid4.us:5443/phpOp/op.jwk
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/cbor, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2020-07-09 22:49:32 RESPONSE
FetchServerKeys
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "date": "Thu, 09 Jul 2020 22:49:32 GMT",
  "server": "Apache/2.4.38 (Debian)",
  "last-modified": "Sat, 04 Apr 2020 01:04:41 GMT",
  "etag": "\"3e7-5a26c9e6d9151\"",
  "accept-ranges": "bytes",
  "content-length": "999",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive"
}
response_body
{
    "keys": [
        {
            "kty":"RSA",
            "n":"w9x1sXTkzuxJRHfLYdCv1DN2SsD90ufkSt_HOSjM7PSFsh-yGrqP85Hia2y_2bogz03L4GUrrGBXk8OlKxEK_U1QxhhRYyFKuyo2Y6jx2t8RXCE1duskyRikcEFMQtfacZiNeLlr_0SqlxQJBNgBi_e3g3UIFzyEXpRQS7X0AJ6xuRLT7-Nl1BT3QSB-cBsENgHb10zQNaOG3VnyNehrtofHzPyF4PO4q1dVK7qaqyjp50sX7ya7TXqG3e0dNV-vyIN5AVG-UKOGiON8XB9UQj0x4zWiIa7PYG298m6Jx_26ZLNU0RyF3kXbUzwDBdpOyhXjoyOwQ1V42BxDyqhaow",
            "e":"AQAB",
            "kid":"PHPOP-00S",
            "use":"sig"
        },
        {
            "kty":"RSA",
            "n":"1RuG1vnups95HRtpHE33XJdD23Uj4-nt4m5yDUicE843BqMOo27Zx-WNF2vRVU_xOjFoPcs5v59j0YF8D-GI8ocUHYsADy6CSUNLToYYUHYrh_QMp3EdB2gmD0rjav4RddZ7HymIoAGLPvrVztMLdRnJ71TZjdzkkT3dQ5_-t8tpukoMGOCiI-F4bMl6KynKV3h5Deb-o4_rZc5OnVQSywymy33HrlsCHBgrv8MWswzw8SxdOxnbLJFETuciqdM9fhIcJgBnzzcw3iaAsBFRpfP95Zw9_eZYUTu2XcWx6XRsQKfBaKMy8NzV55SaQDdJgycrpUX4_bUfWR861708Fw",
            "e":"AQAB",
            "kid":"PHPOP-00E",
            "use":"enc"
        }
    ]
}


2020-07-09 22:49:32
FetchServerKeys
Found JWK set string
jwk_string
{
    "keys": [
        {
            "kty":"RSA",
            "n":"w9x1sXTkzuxJRHfLYdCv1DN2SsD90ufkSt_HOSjM7PSFsh-yGrqP85Hia2y_2bogz03L4GUrrGBXk8OlKxEK_U1QxhhRYyFKuyo2Y6jx2t8RXCE1duskyRikcEFMQtfacZiNeLlr_0SqlxQJBNgBi_e3g3UIFzyEXpRQS7X0AJ6xuRLT7-Nl1BT3QSB-cBsENgHb10zQNaOG3VnyNehrtofHzPyF4PO4q1dVK7qaqyjp50sX7ya7TXqG3e0dNV-vyIN5AVG-UKOGiON8XB9UQj0x4zWiIa7PYG298m6Jx_26ZLNU0RyF3kXbUzwDBdpOyhXjoyOwQ1V42BxDyqhaow",
            "e":"AQAB",
            "kid":"PHPOP-00S",
            "use":"sig"
        },
        {
            "kty":"RSA",
            "n":"1RuG1vnups95HRtpHE33XJdD23Uj4-nt4m5yDUicE843BqMOo27Zx-WNF2vRVU_xOjFoPcs5v59j0YF8D-GI8ocUHYsADy6CSUNLToYYUHYrh_QMp3EdB2gmD0rjav4RddZ7HymIoAGLPvrVztMLdRnJ71TZjdzkkT3dQ5_-t8tpukoMGOCiI-F4bMl6KynKV3h5Deb-o4_rZc5OnVQSywymy33HrlsCHBgrv8MWswzw8SxdOxnbLJFETuciqdM9fhIcJgBnzzcw3iaAsBFRpfP95Zw9_eZYUTu2XcWx6XRsQKfBaKMy8NzV55SaQDdJgycrpUX4_bUfWR861708Fw",
            "e":"AQAB",
            "kid":"PHPOP-00E",
            "use":"enc"
        }
    ]
}


2020-07-09 22:49:32 SUCCESS
FetchServerKeys
Found server JWK set
server_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "n": "w9x1sXTkzuxJRHfLYdCv1DN2SsD90ufkSt_HOSjM7PSFsh-yGrqP85Hia2y_2bogz03L4GUrrGBXk8OlKxEK_U1QxhhRYyFKuyo2Y6jx2t8RXCE1duskyRikcEFMQtfacZiNeLlr_0SqlxQJBNgBi_e3g3UIFzyEXpRQS7X0AJ6xuRLT7-Nl1BT3QSB-cBsENgHb10zQNaOG3VnyNehrtofHzPyF4PO4q1dVK7qaqyjp50sX7ya7TXqG3e0dNV-vyIN5AVG-UKOGiON8XB9UQj0x4zWiIa7PYG298m6Jx_26ZLNU0RyF3kXbUzwDBdpOyhXjoyOwQ1V42BxDyqhaow",
      "e": "AQAB",
      "kid": "PHPOP-00S",
      "use": "sig"
    },
    {
      "kty": "RSA",
      "n": "1RuG1vnups95HRtpHE33XJdD23Uj4-nt4m5yDUicE843BqMOo27Zx-WNF2vRVU_xOjFoPcs5v59j0YF8D-GI8ocUHYsADy6CSUNLToYYUHYrh_QMp3EdB2gmD0rjav4RddZ7HymIoAGLPvrVztMLdRnJ71TZjdzkkT3dQ5_-t8tpukoMGOCiI-F4bMl6KynKV3h5Deb-o4_rZc5OnVQSywymy33HrlsCHBgrv8MWswzw8SxdOxnbLJFETuciqdM9fhIcJgBnzzcw3iaAsBFRpfP95Zw9_eZYUTu2XcWx6XRsQKfBaKMy8NzV55SaQDdJgycrpUX4_bUfWR861708Fw",
      "e": "AQAB",
      "kid": "PHPOP-00E",
      "use": "enc"
    }
  ]
}
2020-07-09 22:49:32 SUCCESS
CheckServerKeysIsValid
Server JWKs is valid
server_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "n": "w9x1sXTkzuxJRHfLYdCv1DN2SsD90ufkSt_HOSjM7PSFsh-yGrqP85Hia2y_2bogz03L4GUrrGBXk8OlKxEK_U1QxhhRYyFKuyo2Y6jx2t8RXCE1duskyRikcEFMQtfacZiNeLlr_0SqlxQJBNgBi_e3g3UIFzyEXpRQS7X0AJ6xuRLT7-Nl1BT3QSB-cBsENgHb10zQNaOG3VnyNehrtofHzPyF4PO4q1dVK7qaqyjp50sX7ya7TXqG3e0dNV-vyIN5AVG-UKOGiON8XB9UQj0x4zWiIa7PYG298m6Jx_26ZLNU0RyF3kXbUzwDBdpOyhXjoyOwQ1V42BxDyqhaow",
      "e": "AQAB",
      "kid": "PHPOP-00S",
      "use": "sig"
    },
    {
      "kty": "RSA",
      "n": "1RuG1vnups95HRtpHE33XJdD23Uj4-nt4m5yDUicE843BqMOo27Zx-WNF2vRVU_xOjFoPcs5v59j0YF8D-GI8ocUHYsADy6CSUNLToYYUHYrh_QMp3EdB2gmD0rjav4RddZ7HymIoAGLPvrVztMLdRnJ71TZjdzkkT3dQ5_-t8tpukoMGOCiI-F4bMl6KynKV3h5Deb-o4_rZc5OnVQSywymy33HrlsCHBgrv8MWswzw8SxdOxnbLJFETuciqdM9fhIcJgBnzzcw3iaAsBFRpfP95Zw9_eZYUTu2XcWx6XRsQKfBaKMy8NzV55SaQDdJgycrpUX4_bUfWR861708Fw",
      "e": "AQAB",
      "kid": "PHPOP-00E",
      "use": "enc"
    }
  ]
}
2020-07-09 22:49:32 SUCCESS
ValidateServerJWKs
Valid server JWKs
2020-07-09 22:49:32 SUCCESS
CheckForKeyIdInServerJWKs
All keys contain kids
2020-07-09 22:49:32 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-07-09 22:49:32 SUCCESS
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
2020-07-09 22:49:32 SUCCESS
GetDynamicClientConfiguration
Found a dynamic_client_registration_template object
client_name
opend4Client1
2020-07-09 22:49:32 SUCCESS
GenerateRS256ClientJWKs
Generated client JWKs
client_jwks
{
  "keys": [
    {
      "p": "wmT8yU9y96Zsp4kEo5KV1_X_TE87ssMrE_37l5FtqoSuv4rnltjXTE6bwF-u8lvM_rKHAXtJVUEL5LqSHjktfGQ2L4NabSXG25lAxDDJqZhs9c94nfESwIbWJ6mpkovJZYX4qF68DsdyEAYI4OykZ8gMEzfxi0qZvis1w1JB2cM",
      "kty": "RSA",
      "q": "uHVwlD1VAHzwMHB7ZIGJTvc7anyaWpDcTp3XgnrJ4m5dXjdmKVDnVEMY0xAQ9AZI7dZ1_nXR77YFUU9oTHrffyfA8QcgnmgVLezzyiuUDpumXEtIg2p61O0w13iMYyG8ByxcDFt36TQJOBgbbR80eZLaEMmGxu1wp2943FegW2k",
      "d": "Po_Qhytpdj-foG4MvUrpnPlFam78fYqj4mqwvXNK9Zzt9jJcKyu2LWR4vmU80NCTS9paDydmdnMWGxNLU0E7_8fB6te1JHOu6WttciTkITt-JIR_VozxPIWJsAOSSlGapEPX06OmpJz2ZqFosMIz3qaLSzYBfLpU3KGy59TtZP-RfQvzG_7UohWdRhJJHL2jsyNuiS9KE8hu-b_dt2nThD3te0uNJEUYPZpYsBbjLd64t1nCjGILSZCU7Qgbd-xVesvAi9R62Gz7h6w5wf5MlgG9NN1ZwLA8Ap8tRDTrXfS7MWx33ZLYT8tgVSm8Jfk5QPYA2pdbFLjhuKucjNkHgQ",
      "e": "AQAB",
      "use": "sig",
      "qi": "O2y0yUDkSmxwI8qXNE_soRTz7RFtMTjxrd4OnlepLNcKZZaRtFoC3RE_NZ4407jRN3vIr0Cialn2LyYsyij1m0x0kFEKIhM3f25MDe6LFm5-_STcLV_awY_NiFz7BVUxVnuihJFrJrns6ioDVnGOLvdCquYm1H5WVg93GoCaqDQ",
      "dp": "bRA9pzBU_063DTPZj3Axc63Ho2ecxcmsBJZtrnbgQVgZtstW7ZIREPXVepP0UnNgytEc357s4NESvCxUyHIp6-1JXVTjyfL048XSyX_Z1LX5A9x3_pz_eVbtFemhgt-8iaIlhUlJVz1c6FKKbq81-igJZkrv0Md1BHW3vzMKUQM",
      "alg": "RS256",
      "dq": "Tm8Jhs8phMKbc01w-oSmOSChcB85lwb_1qIBUGcbzx90ripKU4kmREsflCfBvbGqcw99Ls00joRMcI2eYN7ih_QEc7i_IvxI_TVDWJT9KNUAgUA1vkOZpU6SNRz6PPDMPhSbs1l1fID25pZBmz3ol0VdWkQG_jFadKfOsYrFEfk",
      "n": "jBHDVPioxNHOC7vUcP1U75VlIY0ty95t9VpaC6Y9OhHNX4Ea6iuHmc4ZWiqi7iLg1aajGbCRyYLflyKwOlH96PHP4x5vNb1sWYFIz9Cec_9vUEW35K5raIQlsH8TXJjYhXqdENJnMyzxjHyrtjZ5C8ZvrbuvkJR6f6wtsz9dEdH19gpv4VCvc_s8012aFf_zpkccxlwh7LaZsJgMDGxCa5vWnaa_z8o194a7953tAFylS18JXuvCuQrmratKlwODwoxj-6g7CG-OkUHui99Z7dEFwtTZIxvuwLx7xRtwfZisxJaxmMif64_aNVFxhAXuP2V96lBH-ESGFNEXhEqh-w"
    }
  ]
}
public_client_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "alg": "RS256",
      "n": "jBHDVPioxNHOC7vUcP1U75VlIY0ty95t9VpaC6Y9OhHNX4Ea6iuHmc4ZWiqi7iLg1aajGbCRyYLflyKwOlH96PHP4x5vNb1sWYFIz9Cec_9vUEW35K5raIQlsH8TXJjYhXqdENJnMyzxjHyrtjZ5C8ZvrbuvkJR6f6wtsz9dEdH19gpv4VCvc_s8012aFf_zpkccxlwh7LaZsJgMDGxCa5vWnaa_z8o194a7953tAFylS18JXuvCuQrmratKlwODwoxj-6g7CG-OkUHui99Z7dEFwtTZIxvuwLx7xRtwfZisxJaxmMif64_aNVFxhAXuP2V96lBH-ESGFNEXhEqh-w"
    }
  ]
}
2020-07-09 22:49:32 SUCCESS
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-07-09 22:49:32 SUCCESS
CreateDynamicRegistrationRequest
Created dynamic registration request
client_name
opend4Client1 5AITABvxNw
2020-07-09 22:49:32
AddAuthorizationCodeGrantTypeToDynamicRegistrationRequest
Added 'authorization_code' to 'grant_types'
grant_types
[
  "authorization_code"
]
2020-07-09 22:49:32
AddPublicJwksToDynamicRegistrationRequest
Added client public JWKS to dynamic registration request
dynamic_registration_request
{
  "client_name": "opend4Client1 5AITABvxNw",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "jBHDVPioxNHOC7vUcP1U75VlIY0ty95t9VpaC6Y9OhHNX4Ea6iuHmc4ZWiqi7iLg1aajGbCRyYLflyKwOlH96PHP4x5vNb1sWYFIz9Cec_9vUEW35K5raIQlsH8TXJjYhXqdENJnMyzxjHyrtjZ5C8ZvrbuvkJR6f6wtsz9dEdH19gpv4VCvc_s8012aFf_zpkccxlwh7LaZsJgMDGxCa5vWnaa_z8o194a7953tAFylS18JXuvCuQrmratKlwODwoxj-6g7CG-OkUHui99Z7dEFwtTZIxvuwLx7xRtwfZisxJaxmMif64_aNVFxhAXuP2V96lBH-ESGFNEXhEqh-w"
      }
    ]
  }
}
2020-07-09 22:49:32
AddTokenEndpointAuthMethodToDynamicRegistrationRequestFromEnvironment
Added token endpoint auth method to dynamic registration request
dynamic_registration_request
{
  "client_name": "opend4Client1 5AITABvxNw",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "jBHDVPioxNHOC7vUcP1U75VlIY0ty95t9VpaC6Y9OhHNX4Ea6iuHmc4ZWiqi7iLg1aajGbCRyYLflyKwOlH96PHP4x5vNb1sWYFIz9Cec_9vUEW35K5raIQlsH8TXJjYhXqdENJnMyzxjHyrtjZ5C8ZvrbuvkJR6f6wtsz9dEdH19gpv4VCvc_s8012aFf_zpkccxlwh7LaZsJgMDGxCa5vWnaa_z8o194a7953tAFylS18JXuvCuQrmratKlwODwoxj-6g7CG-OkUHui99Z7dEFwtTZIxvuwLx7xRtwfZisxJaxmMif64_aNVFxhAXuP2V96lBH-ESGFNEXhEqh-w"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic"
}
2020-07-09 22:49:32
AddResponseTypesArrayToDynamicRegistrationRequestFromEnvironment
Added response_types array to dynamic registration request
dynamic_registration_request
{
  "client_name": "opend4Client1 5AITABvxNw",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "jBHDVPioxNHOC7vUcP1U75VlIY0ty95t9VpaC6Y9OhHNX4Ea6iuHmc4ZWiqi7iLg1aajGbCRyYLflyKwOlH96PHP4x5vNb1sWYFIz9Cec_9vUEW35K5raIQlsH8TXJjYhXqdENJnMyzxjHyrtjZ5C8ZvrbuvkJR6f6wtsz9dEdH19gpv4VCvc_s8012aFf_zpkccxlwh7LaZsJgMDGxCa5vWnaa_z8o194a7953tAFylS18JXuvCuQrmratKlwODwoxj-6g7CG-OkUHui99Z7dEFwtTZIxvuwLx7xRtwfZisxJaxmMif64_aNVFxhAXuP2V96lBH-ESGFNEXhEqh-w"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ]
}
2020-07-09 22:49:32
AddRedirectUriToDynamicRegistrationRequest
Added redirect_uris array to dynamic registration request
dynamic_registration_request
{
  "client_name": "opend4Client1 5AITABvxNw",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "jBHDVPioxNHOC7vUcP1U75VlIY0ty95t9VpaC6Y9OhHNX4Ea6iuHmc4ZWiqi7iLg1aajGbCRyYLflyKwOlH96PHP4x5vNb1sWYFIz9Cec_9vUEW35K5raIQlsH8TXJjYhXqdENJnMyzxjHyrtjZ5C8ZvrbuvkJR6f6wtsz9dEdH19gpv4VCvc_s8012aFf_zpkccxlwh7LaZsJgMDGxCa5vWnaa_z8o194a7953tAFylS18JXuvCuQrmratKlwODwoxj-6g7CG-OkUHui99Z7dEFwtTZIxvuwLx7xRtwfZisxJaxmMif64_aNVFxhAXuP2V96lBH-ESGFNEXhEqh-w"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "redirect_uris": [
    "https://www.certification.openid.net/test/a/openid4us/callback"
  ]
}
2020-07-09 22:49:32
CallDynamicRegistrationEndpoint
HTTP request
request_uri
https://connect.openid4.us:5443/phpOp/index.php/registration
request_method
POST
request_headers
{
  "accept": "application/json",
  "accept-charset": "utf-8",
  "content-type": "application/json",
  "content-length": "657"
}
request_body
{"client_name":"opend4Client1 5AITABvxNw","grant_types":["authorization_code"],"jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"jBHDVPioxNHOC7vUcP1U75VlIY0ty95t9VpaC6Y9OhHNX4Ea6iuHmc4ZWiqi7iLg1aajGbCRyYLflyKwOlH96PHP4x5vNb1sWYFIz9Cec_9vUEW35K5raIQlsH8TXJjYhXqdENJnMyzxjHyrtjZ5C8ZvrbuvkJR6f6wtsz9dEdH19gpv4VCvc_s8012aFf_zpkccxlwh7LaZsJgMDGxCa5vWnaa_z8o194a7953tAFylS18JXuvCuQrmratKlwODwoxj-6g7CG-OkUHui99Z7dEFwtTZIxvuwLx7xRtwfZisxJaxmMif64_aNVFxhAXuP2V96lBH-ESGFNEXhEqh-w"}]},"token_endpoint_auth_method":"client_secret_basic","response_types":["code"],"redirect_uris":["https://www.certification.openid.net/test/a/openid4us/callback"]}
2020-07-09 22:49:32 RESPONSE
CallDynamicRegistrationEndpoint
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "date": "Thu, 09 Jul 2020 22:49:32 GMT",
  "server": "Apache/2.4.38 (Debian)",
  "cache-control": "no-store",
  "pragma": "no-cache",
  "access-control-allow-origin": "*",
  "content-length": "1033",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive",
  "content-type": "application/json"
}
response_body
{"client_id":"ftTYq-WC3G-7Y8TtscAp8A","client_secret":"RsILqKu7cj6O6A","registration_access_token":"BGbQwxz7bpOVCg","registration_client_uri":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/client\/6yUZ1Aqben5FyFZQf5IxJA","client_id_issued_at":1594334972,"client_secret_expires_at":0,"client_name":"opend4Client1 5AITABvxNw","redirect_uris":["https:\/\/www.certification.openid.net\/test\/a\/openid4us\/callback"],"token_endpoint_auth_method":"client_secret_basic","jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"jBHDVPioxNHOC7vUcP1U75VlIY0ty95t9VpaC6Y9OhHNX4Ea6iuHmc4ZWiqi7iLg1aajGbCRyYLflyKwOlH96PHP4x5vNb1sWYFIz9Cec_9vUEW35K5raIQlsH8TXJjYhXqdENJnMyzxjHyrtjZ5C8ZvrbuvkJR6f6wtsz9dEdH19gpv4VCvc_s8012aFf_zpkccxlwh7LaZsJgMDGxCa5vWnaa_z8o194a7953tAFylS18JXuvCuQrmratKlwODwoxj-6g7CG-OkUHui99Z7dEFwtTZIxvuwLx7xRtwfZisxJaxmMif64_aNVFxhAXuP2V96lBH-ESGFNEXhEqh-w"}]},"response_types":["code"],"grant_types":["authorization_code"],"id_token_signed_response_alg":"RS256","aggregation_signed_response_alg":"RS256"}
2020-07-09 22:49:32
CallDynamicRegistrationEndpoint
Registration endpoint response
dynamic_registration_response
{"client_id":"ftTYq-WC3G-7Y8TtscAp8A","client_secret":"RsILqKu7cj6O6A","registration_access_token":"BGbQwxz7bpOVCg","registration_client_uri":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/client\/6yUZ1Aqben5FyFZQf5IxJA","client_id_issued_at":1594334972,"client_secret_expires_at":0,"client_name":"opend4Client1 5AITABvxNw","redirect_uris":["https:\/\/www.certification.openid.net\/test\/a\/openid4us\/callback"],"token_endpoint_auth_method":"client_secret_basic","jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"jBHDVPioxNHOC7vUcP1U75VlIY0ty95t9VpaC6Y9OhHNX4Ea6iuHmc4ZWiqi7iLg1aajGbCRyYLflyKwOlH96PHP4x5vNb1sWYFIz9Cec_9vUEW35K5raIQlsH8TXJjYhXqdENJnMyzxjHyrtjZ5C8ZvrbuvkJR6f6wtsz9dEdH19gpv4VCvc_s8012aFf_zpkccxlwh7LaZsJgMDGxCa5vWnaa_z8o194a7953tAFylS18JXuvCuQrmratKlwODwoxj-6g7CG-OkUHui99Z7dEFwtTZIxvuwLx7xRtwfZisxJaxmMif64_aNVFxhAXuP2V96lBH-ESGFNEXhEqh-w"}]},"response_types":["code"],"grant_types":["authorization_code"],"id_token_signed_response_alg":"RS256","aggregation_signed_response_alg":"RS256"}
2020-07-09 22:49:32
CallDynamicRegistrationEndpoint
Parsed registration endpoint response
client_id
ftTYq-WC3G-7Y8TtscAp8A
client_secret
RsILqKu7cj6O6A
registration_access_token
BGbQwxz7bpOVCg
registration_client_uri
https://connect.openid4.us:5443/phpOp/index.php/client/6yUZ1Aqben5FyFZQf5IxJA
client_id_issued_at
1594334972
client_secret_expires_at
0
client_name
opend4Client1 5AITABvxNw
redirect_uris
[
  "https://www.certification.openid.net/test/a/openid4us/callback"
]
token_endpoint_auth_method
client_secret_basic
jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "alg": "RS256",
      "n": "jBHDVPioxNHOC7vUcP1U75VlIY0ty95t9VpaC6Y9OhHNX4Ea6iuHmc4ZWiqi7iLg1aajGbCRyYLflyKwOlH96PHP4x5vNb1sWYFIz9Cec_9vUEW35K5raIQlsH8TXJjYhXqdENJnMyzxjHyrtjZ5C8ZvrbuvkJR6f6wtsz9dEdH19gpv4VCvc_s8012aFf_zpkccxlwh7LaZsJgMDGxCa5vWnaa_z8o194a7953tAFylS18JXuvCuQrmratKlwODwoxj-6g7CG-OkUHui99Z7dEFwtTZIxvuwLx7xRtwfZisxJaxmMif64_aNVFxhAXuP2V96lBH-ESGFNEXhEqh-w"
    }
  ]
}
response_types
[
  "code"
]
grant_types
[
  "authorization_code"
]
id_token_signed_response_alg
RS256
aggregation_signed_response_alg
RS256
2020-07-09 22:49:32 SUCCESS
CallDynamicRegistrationEndpoint
Extracted dynamic registration management credentials
registration_client_uri
https://connect.openid4.us:5443/phpOp/index.php/client/6yUZ1Aqben5FyFZQf5IxJA
registration_access_token
BGbQwxz7bpOVCg
2020-07-09 22:49:32
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
scope
openid
2020-07-09 22:49:32 SUCCESS
EnsureServerConfigurationSupportsClientSecretBasic
token_endpoint_auth_methods_supported
actual
[
  "client_secret_post",
  "client_secret_basic",
  "client_secret_jwt",
  "private_key_jwt"
]
expected
[
  "client_secret_basic"
]
minimum_matches_required
1
2020-07-09 22:49:32 SUCCESS
SetProtectedResourceUrlToUserInfoEndpoint
Set protected resource URL
protected_resource_url
https://connect.openid4.us:5443/phpOp/index.php/userinfo
2020-07-09 22:49:32 SUCCESS
CreateBadRedirectUri
Created redirect URI
redirect_uri
https://www.certification.openid.net/test/a/openid4us/0wJP0a8CWW
2020-07-09 22:49:33
oidcc-ensure-registered-redirect-uri
Setup Done
Make request to authorization endpoint
2020-07-09 22:49:33 SUCCESS
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
client_id
ftTYq-WC3G-7Y8TtscAp8A
redirect_uri
https://www.certification.openid.net/test/a/openid4us/0wJP0a8CWW
scope
openid
2020-07-09 22:49:33
CreateRandomStateValue
Created state value
requested_state_length
10
state
9oikxjbZMV
2020-07-09 22:49:33 SUCCESS
AddStateToAuthorizationEndpointRequest
Added state parameter to request
client_id
ftTYq-WC3G-7Y8TtscAp8A
redirect_uri
https://www.certification.openid.net/test/a/openid4us/0wJP0a8CWW
scope
openid
state
9oikxjbZMV
2020-07-09 22:49:33
CreateRandomNonceValue
Created nonce value
requested_nonce_length
10
nonce
jTnBR3mf0z
2020-07-09 22:49:33 SUCCESS
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
client_id
ftTYq-WC3G-7Y8TtscAp8A
redirect_uri
https://www.certification.openid.net/test/a/openid4us/0wJP0a8CWW
scope
openid
state
9oikxjbZMV
nonce
jTnBR3mf0z
2020-07-09 22:49:33 SUCCESS
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
client_id
ftTYq-WC3G-7Y8TtscAp8A
redirect_uri
https://www.certification.openid.net/test/a/openid4us/0wJP0a8CWW
scope
openid
state
9oikxjbZMV
nonce
jTnBR3mf0z
response_type
code
2020-07-09 22:49:33 SUCCESS
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
redirect_to_authorization_endpoint
https://connect.openid4.us:5443/phpOp/index.php/auth?client_id=ftTYq-WC3G-7Y8TtscAp8A&redirect_uri=https://www.certification.openid.net/test/a/openid4us/0wJP0a8CWW&scope=openid&state=9oikxjbZMV&nonce=jTnBR3mf0z&response_type=code
2020-07-09 22:49:33 REDIRECT
oidcc-ensure-registered-redirect-uri
Redirecting to authorization endpoint
redirect_to
https://connect.openid4.us:5443/phpOp/index.php/auth?client_id=ftTYq-WC3G-7Y8TtscAp8A&redirect_uri=https://www.certification.openid.net/test/a/openid4us/0wJP0a8CWW&scope=openid&state=9oikxjbZMV&nonce=jTnBR3mf0z&response_type=code
2020-07-09 22:49:33 REVIEW IMAGE
ExpectRedirectUriErrorPage
Show redirect URI error page
img
updatedAt
1594335033170
2020-07-09 22:50:36 FINISHED
oidcc-ensure-registered-redirect-uri
Test has run to completion
testmodule_result
REVIEW
Unregister dynamically registered client
2020-07-09 22:50:36
UnregisterDynamicallyRegisteredClient
HTTP request
request_uri
https://connect.openid4.us:5443/phpOp/index.php/client/6yUZ1Aqben5FyFZQf5IxJA
request_method
DELETE
request_headers
{
  "accept": "application/json",
  "accept-charset": "utf-8",
  "authorization": "Bearer BGbQwxz7bpOVCg",
  "content-length": "0"
}
request_body

                                
2020-07-09 22:50:36 RESPONSE
UnregisterDynamicallyRegisteredClient
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "date": "Thu, 09 Jul 2020 22:50:36 GMT",
  "server": "Apache/2.4.38 (Debian)",
  "set-cookie": "PHPSESSID\u003dk6bqpot43csi8i5h38png6s7o5; path\u003d/",
  "expires": "Thu, 19 Nov 1981 08:52:00 GMT",
  "cache-control": "no-store",
  "pragma": "no-cache",
  "content-length": "926",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive",
  "content-type": "application/json"
}
response_body
{
 "client_id_issued_at":1594334972,
 "client_id":"ftTYq-WC3G-7Y8TtscAp8A",
 "client_secret":"RsILqKu7cj6O6A",
 "client_name":"opend4Client1 5AITABvxNw",
 "redirect_uris":[
  "https:\/\/www.certification.openid.net\/test\/a\/openid4us\/callback"
 ],
 "token_endpoint_auth_method":"client_secret_basic",
 "jwks":{
  "keys":[
   {
    "kty":"RSA",
    "e":"AQAB",
    "use":"sig",
    "alg":"RS256",
    "n":"jBHDVPioxNHOC7vUcP1U75VlIY0ty95t9VpaC6Y9OhHNX4Ea6iuHmc4ZWiqi7iLg1aajGbCRyYLflyKwOlH96PHP4x5vNb1sWYFIz9Cec_9vUEW35K5raIQlsH8TXJjYhXqdENJnMyzxjHyrtjZ5C8ZvrbuvkJR6f6wtsz9dEdH19gpv4VCvc_s8012aFf_zpkccxlwh7LaZsJgMDGxCa5vWnaa_z8o194a7953tAFylS18JXuvCuQrmratKlwODwoxj-6g7CG-OkUHui99Z7dEFwtTZIxvuwLx7xRtwfZisxJaxmMif64_aNVFxhAXuP2V96lBH-ESGFNEXhEqh-w"
   }
  ]
 },
 "id_token_signed_response_alg":"RS256",
 "aggregation_signed_response_alg":"RS256",
 "grant_types":[
  "authorization_code"
 ],
 "response_types":[
  "code"
 ]
}
2020-07-09 22:50:36 INFO
UnregisterDynamicallyRegisteredClient
registration_client_uri returned a http status code other than 204 No Content
code
OK
2020-07-09 22:50:41
TEST-RUNNER
Alias has now been claimed by another test
alias
openid4us
new_test_id
8axEjmvrBC
Test Results