Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-07-10 01:12:34 INFO
TEST-RUNNER
Test instance aaaLrrjRKK created
baseUrl
https://www.certification.openid.net/test/a/openid4us
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "server_metadata": "discovery",
  "response_mode": "default",
  "client_registration": "dynamic_client"
}
alias
openid4us
description
planId
d6BE7uTcoAvAt
config
{
  "alias": "openid4us",
  "server": {
    "discoveryUrl": "https://connect.openid4.us:5443/.well-known/openid-configuration",
    "login_hint": "bob"
  },
  "client": {
    "client_name": "opend4Client1"
  },
  "client2": {
    "client_name": "openid4Client2"
  }
}
testName
oidcc-id-token-hint
2020-07-10 01:12:34 SUCCESS
CreateRedirectUri
Created redirect URI
redirect_uri
https://www.certification.openid.net/test/a/openid4us/callback
2020-07-10 01:12:34
GetDynamicServerConfiguration
HTTP request
request_uri
https://connect.openid4.us:5443/.well-known/openid-configuration
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/cbor, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2020-07-10 01:12:34 RESPONSE
GetDynamicServerConfiguration
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "date": "Fri, 10 Jul 2020 01:12:34 GMT",
  "server": "Apache/2.4.38 (Debian)",
  "access-control-allow-origin": "*",
  "content-length": "3625",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive",
  "content-type": "application/json"
}
response_body
{
 "version":"3.0",
 "issuer":"https:\/\/connect.openid4.us:5443\/phpOp",
 "authorization_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/auth",
 "token_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/token",
 "userinfo_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/userinfo",
 "check_session_iframe":"https:\/\/connect.openid4.us:5443\/phpOp\/opframe.php",
 "aggregation_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/aggregation",
 "end_session_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/endsession",
 "jwks_uri":"https:\/\/connect.openid4.us:5443\/phpOp\/op.jwk",
 "registration_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/registration",
 "scopes_supported":[
  "openid",
  "profile",
  "email",
  "address",
  "phone",
  "offline_access"
 ],
 "response_types_supported":[
  "code",
  "code token",
  "code id_token",
  "token",
  "id_token token",
  "code id_token token",
  "id_token"
 ],
 "grant_types_supported":[
  "authorization_code",
  "implicit"
 ],
 "acr_values_supported":[
  "acr1",
  "acr2",
  "acr3"
 ],
 "subject_types_supported":[
  "public",
  "pairwise"
 ],
 "userinfo_signing_alg_values_supported":[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
 ],
 "userinfo_encryption_alg_values_supported":[
  "RSA1_5",
  "RSA-OAEP"
 ],
 "userinfo_encryption_enc_values_supported":[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
 ],
 "id_token_signing_alg_values_supported":[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
 ],
 "id_token_encryption_alg_values_supported":[
  "RSA1_5",
  "RSA-OAEP"
 ],
 "id_token_encryption_enc_values_supported":[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
 ],
 "request_object_signing_alg_values_supported":[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
 ],
 "request_object_encryption_alg_values_supported":[
  "RSA1_5",
  "RSA-OAEP"
 ],
 "request_object_encryption_enc_values_supported":[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
 ],
 "aggregation_signing_alg_values_supported":[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
 ],
 "aggregation_encryption_alg_values_supported":[
  "RSA1_5",
  "RSA-OAEP"
 ],
 "aggregation_encryption_enc_values_supported":[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
 ],
 "token_endpoint_auth_methods_supported":[
  "client_secret_post",
  "client_secret_basic",
  "client_secret_jwt",
  "private_key_jwt"
 ],
 "token_endpoint_auth_signing_alg_values_supported":[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
 ],
 "display_values_supported":[
  "page"
 ],
 "claim_types_supported":[
  "normal"
 ],
 "claims_supported":[
  "name",
  "given_name",
  "family_name",
  "middle_name",
  "nickname",
  "preferred_username",
  "profile",
  "picture",
  "website",
  "email",
  "email_verified",
  "gender",
  "birthdate",
  "zoneinfo",
  "locale",
  "phone_number",
  "phone_number_verified",
  "address",
  "updated_at"
 ],
 "service_documentation":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/servicedocs",
 "claims_locales_supported":[
  "en-US"
 ],
 "ui_locales_supported":[
  "en-US"
 ],
 "require_request_uri_registration":false,
 "op_policy_uri":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/op_policy",
 "op_tos_uri":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/op_tos",
 "claims_parameter_supported":true,
 "request_parameter_supported":true,
 "request_uri_parameter_supported":true
}
2020-07-10 01:12:34
GetDynamicServerConfiguration
Downloaded server configuration
server_config_string
{
 "version":"3.0",
 "issuer":"https:\/\/connect.openid4.us:5443\/phpOp",
 "authorization_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/auth",
 "token_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/token",
 "userinfo_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/userinfo",
 "check_session_iframe":"https:\/\/connect.openid4.us:5443\/phpOp\/opframe.php",
 "aggregation_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/aggregation",
 "end_session_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/endsession",
 "jwks_uri":"https:\/\/connect.openid4.us:5443\/phpOp\/op.jwk",
 "registration_endpoint":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/registration",
 "scopes_supported":[
  "openid",
  "profile",
  "email",
  "address",
  "phone",
  "offline_access"
 ],
 "response_types_supported":[
  "code",
  "code token",
  "code id_token",
  "token",
  "id_token token",
  "code id_token token",
  "id_token"
 ],
 "grant_types_supported":[
  "authorization_code",
  "implicit"
 ],
 "acr_values_supported":[
  "acr1",
  "acr2",
  "acr3"
 ],
 "subject_types_supported":[
  "public",
  "pairwise"
 ],
 "userinfo_signing_alg_values_supported":[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
 ],
 "userinfo_encryption_alg_values_supported":[
  "RSA1_5",
  "RSA-OAEP"
 ],
 "userinfo_encryption_enc_values_supported":[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
 ],
 "id_token_signing_alg_values_supported":[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
 ],
 "id_token_encryption_alg_values_supported":[
  "RSA1_5",
  "RSA-OAEP"
 ],
 "id_token_encryption_enc_values_supported":[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
 ],
 "request_object_signing_alg_values_supported":[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
 ],
 "request_object_encryption_alg_values_supported":[
  "RSA1_5",
  "RSA-OAEP"
 ],
 "request_object_encryption_enc_values_supported":[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
 ],
 "aggregation_signing_alg_values_supported":[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
 ],
 "aggregation_encryption_alg_values_supported":[
  "RSA1_5",
  "RSA-OAEP"
 ],
 "aggregation_encryption_enc_values_supported":[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
 ],
 "token_endpoint_auth_methods_supported":[
  "client_secret_post",
  "client_secret_basic",
  "client_secret_jwt",
  "private_key_jwt"
 ],
 "token_endpoint_auth_signing_alg_values_supported":[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
 ],
 "display_values_supported":[
  "page"
 ],
 "claim_types_supported":[
  "normal"
 ],
 "claims_supported":[
  "name",
  "given_name",
  "family_name",
  "middle_name",
  "nickname",
  "preferred_username",
  "profile",
  "picture",
  "website",
  "email",
  "email_verified",
  "gender",
  "birthdate",
  "zoneinfo",
  "locale",
  "phone_number",
  "phone_number_verified",
  "address",
  "updated_at"
 ],
 "service_documentation":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/servicedocs",
 "claims_locales_supported":[
  "en-US"
 ],
 "ui_locales_supported":[
  "en-US"
 ],
 "require_request_uri_registration":false,
 "op_policy_uri":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/op_policy",
 "op_tos_uri":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/op_tos",
 "claims_parameter_supported":true,
 "request_parameter_supported":true,
 "request_uri_parameter_supported":true
}
2020-07-10 01:12:34 SUCCESS
GetDynamicServerConfiguration
Successfully parsed server configuration
version
3.0
issuer
https://connect.openid4.us:5443/phpOp
authorization_endpoint
https://connect.openid4.us:5443/phpOp/index.php/auth
token_endpoint
https://connect.openid4.us:5443/phpOp/index.php/token
userinfo_endpoint
https://connect.openid4.us:5443/phpOp/index.php/userinfo
check_session_iframe
https://connect.openid4.us:5443/phpOp/opframe.php
aggregation_endpoint
https://connect.openid4.us:5443/phpOp/index.php/aggregation
end_session_endpoint
https://connect.openid4.us:5443/phpOp/index.php/endsession
jwks_uri
https://connect.openid4.us:5443/phpOp/op.jwk
registration_endpoint
https://connect.openid4.us:5443/phpOp/index.php/registration
scopes_supported
[
  "openid",
  "profile",
  "email",
  "address",
  "phone",
  "offline_access"
]
response_types_supported
[
  "code",
  "code token",
  "code id_token",
  "token",
  "id_token token",
  "code id_token token",
  "id_token"
]
grant_types_supported
[
  "authorization_code",
  "implicit"
]
acr_values_supported
[
  "acr1",
  "acr2",
  "acr3"
]
subject_types_supported
[
  "public",
  "pairwise"
]
userinfo_signing_alg_values_supported
[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
]
userinfo_encryption_alg_values_supported
[
  "RSA1_5",
  "RSA-OAEP"
]
userinfo_encryption_enc_values_supported
[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
]
id_token_signing_alg_values_supported
[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
]
id_token_encryption_alg_values_supported
[
  "RSA1_5",
  "RSA-OAEP"
]
id_token_encryption_enc_values_supported
[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
]
request_object_signing_alg_values_supported
[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
]
request_object_encryption_alg_values_supported
[
  "RSA1_5",
  "RSA-OAEP"
]
request_object_encryption_enc_values_supported
[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
]
aggregation_signing_alg_values_supported
[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
]
aggregation_encryption_alg_values_supported
[
  "RSA1_5",
  "RSA-OAEP"
]
aggregation_encryption_enc_values_supported
[
  "A128CBC-HS256",
  "A256CBC-HS512",
  "A128GCM",
  "A256GCM"
]
token_endpoint_auth_methods_supported
[
  "client_secret_post",
  "client_secret_basic",
  "client_secret_jwt",
  "private_key_jwt"
]
token_endpoint_auth_signing_alg_values_supported
[
  "none",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512"
]
display_values_supported
[
  "page"
]
claim_types_supported
[
  "normal"
]
claims_supported
[
  "name",
  "given_name",
  "family_name",
  "middle_name",
  "nickname",
  "preferred_username",
  "profile",
  "picture",
  "website",
  "email",
  "email_verified",
  "gender",
  "birthdate",
  "zoneinfo",
  "locale",
  "phone_number",
  "phone_number_verified",
  "address",
  "updated_at"
]
service_documentation
https://connect.openid4.us:5443/phpOp/index.php/servicedocs
claims_locales_supported
[
  "en-US"
]
ui_locales_supported
[
  "en-US"
]
require_request_uri_registration
false
op_policy_uri
https://connect.openid4.us:5443/phpOp/index.php/op_policy
op_tos_uri
https://connect.openid4.us:5443/phpOp/index.php/op_tos
claims_parameter_supported
true
request_parameter_supported
true
request_uri_parameter_supported
true
2020-07-10 01:12:34 SUCCESS
CheckServerConfiguration
Found required server configuration keys
required
[
  "authorization_endpoint",
  "token_endpoint",
  "issuer"
]
2020-07-10 01:12:34 SUCCESS
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
registration_endpoint
{
  "testHost": "connect.openid4.us",
  "testPort": 5443
}
authorization_endpoint
{
  "testHost": "connect.openid4.us",
  "testPort": 5443
}
token_endpoint
{
  "testHost": "connect.openid4.us",
  "testPort": 5443
}
userinfo_endpoint
{
  "testHost": "connect.openid4.us",
  "testPort": 5443
}
2020-07-10 01:12:34
FetchServerKeys
Fetching server key
jwks_uri
https://connect.openid4.us:5443/phpOp/op.jwk
2020-07-10 01:12:34
FetchServerKeys
HTTP request
request_uri
https://connect.openid4.us:5443/phpOp/op.jwk
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/cbor, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2020-07-10 01:12:34 RESPONSE
FetchServerKeys
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "date": "Fri, 10 Jul 2020 01:12:34 GMT",
  "server": "Apache/2.4.38 (Debian)",
  "last-modified": "Sat, 04 Apr 2020 01:04:41 GMT",
  "etag": "\"3e7-5a26c9e6d9151\"",
  "accept-ranges": "bytes",
  "content-length": "999",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive"
}
response_body
{
    "keys": [
        {
            "kty":"RSA",
            "n":"w9x1sXTkzuxJRHfLYdCv1DN2SsD90ufkSt_HOSjM7PSFsh-yGrqP85Hia2y_2bogz03L4GUrrGBXk8OlKxEK_U1QxhhRYyFKuyo2Y6jx2t8RXCE1duskyRikcEFMQtfacZiNeLlr_0SqlxQJBNgBi_e3g3UIFzyEXpRQS7X0AJ6xuRLT7-Nl1BT3QSB-cBsENgHb10zQNaOG3VnyNehrtofHzPyF4PO4q1dVK7qaqyjp50sX7ya7TXqG3e0dNV-vyIN5AVG-UKOGiON8XB9UQj0x4zWiIa7PYG298m6Jx_26ZLNU0RyF3kXbUzwDBdpOyhXjoyOwQ1V42BxDyqhaow",
            "e":"AQAB",
            "kid":"PHPOP-00S",
            "use":"sig"
        },
        {
            "kty":"RSA",
            "n":"1RuG1vnups95HRtpHE33XJdD23Uj4-nt4m5yDUicE843BqMOo27Zx-WNF2vRVU_xOjFoPcs5v59j0YF8D-GI8ocUHYsADy6CSUNLToYYUHYrh_QMp3EdB2gmD0rjav4RddZ7HymIoAGLPvrVztMLdRnJ71TZjdzkkT3dQ5_-t8tpukoMGOCiI-F4bMl6KynKV3h5Deb-o4_rZc5OnVQSywymy33HrlsCHBgrv8MWswzw8SxdOxnbLJFETuciqdM9fhIcJgBnzzcw3iaAsBFRpfP95Zw9_eZYUTu2XcWx6XRsQKfBaKMy8NzV55SaQDdJgycrpUX4_bUfWR861708Fw",
            "e":"AQAB",
            "kid":"PHPOP-00E",
            "use":"enc"
        }
    ]
}


2020-07-10 01:12:34
FetchServerKeys
Found JWK set string
jwk_string
{
    "keys": [
        {
            "kty":"RSA",
            "n":"w9x1sXTkzuxJRHfLYdCv1DN2SsD90ufkSt_HOSjM7PSFsh-yGrqP85Hia2y_2bogz03L4GUrrGBXk8OlKxEK_U1QxhhRYyFKuyo2Y6jx2t8RXCE1duskyRikcEFMQtfacZiNeLlr_0SqlxQJBNgBi_e3g3UIFzyEXpRQS7X0AJ6xuRLT7-Nl1BT3QSB-cBsENgHb10zQNaOG3VnyNehrtofHzPyF4PO4q1dVK7qaqyjp50sX7ya7TXqG3e0dNV-vyIN5AVG-UKOGiON8XB9UQj0x4zWiIa7PYG298m6Jx_26ZLNU0RyF3kXbUzwDBdpOyhXjoyOwQ1V42BxDyqhaow",
            "e":"AQAB",
            "kid":"PHPOP-00S",
            "use":"sig"
        },
        {
            "kty":"RSA",
            "n":"1RuG1vnups95HRtpHE33XJdD23Uj4-nt4m5yDUicE843BqMOo27Zx-WNF2vRVU_xOjFoPcs5v59j0YF8D-GI8ocUHYsADy6CSUNLToYYUHYrh_QMp3EdB2gmD0rjav4RddZ7HymIoAGLPvrVztMLdRnJ71TZjdzkkT3dQ5_-t8tpukoMGOCiI-F4bMl6KynKV3h5Deb-o4_rZc5OnVQSywymy33HrlsCHBgrv8MWswzw8SxdOxnbLJFETuciqdM9fhIcJgBnzzcw3iaAsBFRpfP95Zw9_eZYUTu2XcWx6XRsQKfBaKMy8NzV55SaQDdJgycrpUX4_bUfWR861708Fw",
            "e":"AQAB",
            "kid":"PHPOP-00E",
            "use":"enc"
        }
    ]
}


2020-07-10 01:12:34 SUCCESS
FetchServerKeys
Found server JWK set
server_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "n": "w9x1sXTkzuxJRHfLYdCv1DN2SsD90ufkSt_HOSjM7PSFsh-yGrqP85Hia2y_2bogz03L4GUrrGBXk8OlKxEK_U1QxhhRYyFKuyo2Y6jx2t8RXCE1duskyRikcEFMQtfacZiNeLlr_0SqlxQJBNgBi_e3g3UIFzyEXpRQS7X0AJ6xuRLT7-Nl1BT3QSB-cBsENgHb10zQNaOG3VnyNehrtofHzPyF4PO4q1dVK7qaqyjp50sX7ya7TXqG3e0dNV-vyIN5AVG-UKOGiON8XB9UQj0x4zWiIa7PYG298m6Jx_26ZLNU0RyF3kXbUzwDBdpOyhXjoyOwQ1V42BxDyqhaow",
      "e": "AQAB",
      "kid": "PHPOP-00S",
      "use": "sig"
    },
    {
      "kty": "RSA",
      "n": "1RuG1vnups95HRtpHE33XJdD23Uj4-nt4m5yDUicE843BqMOo27Zx-WNF2vRVU_xOjFoPcs5v59j0YF8D-GI8ocUHYsADy6CSUNLToYYUHYrh_QMp3EdB2gmD0rjav4RddZ7HymIoAGLPvrVztMLdRnJ71TZjdzkkT3dQ5_-t8tpukoMGOCiI-F4bMl6KynKV3h5Deb-o4_rZc5OnVQSywymy33HrlsCHBgrv8MWswzw8SxdOxnbLJFETuciqdM9fhIcJgBnzzcw3iaAsBFRpfP95Zw9_eZYUTu2XcWx6XRsQKfBaKMy8NzV55SaQDdJgycrpUX4_bUfWR861708Fw",
      "e": "AQAB",
      "kid": "PHPOP-00E",
      "use": "enc"
    }
  ]
}
2020-07-10 01:12:34 SUCCESS
CheckServerKeysIsValid
Server JWKs is valid
server_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "n": "w9x1sXTkzuxJRHfLYdCv1DN2SsD90ufkSt_HOSjM7PSFsh-yGrqP85Hia2y_2bogz03L4GUrrGBXk8OlKxEK_U1QxhhRYyFKuyo2Y6jx2t8RXCE1duskyRikcEFMQtfacZiNeLlr_0SqlxQJBNgBi_e3g3UIFzyEXpRQS7X0AJ6xuRLT7-Nl1BT3QSB-cBsENgHb10zQNaOG3VnyNehrtofHzPyF4PO4q1dVK7qaqyjp50sX7ya7TXqG3e0dNV-vyIN5AVG-UKOGiON8XB9UQj0x4zWiIa7PYG298m6Jx_26ZLNU0RyF3kXbUzwDBdpOyhXjoyOwQ1V42BxDyqhaow",
      "e": "AQAB",
      "kid": "PHPOP-00S",
      "use": "sig"
    },
    {
      "kty": "RSA",
      "n": "1RuG1vnups95HRtpHE33XJdD23Uj4-nt4m5yDUicE843BqMOo27Zx-WNF2vRVU_xOjFoPcs5v59j0YF8D-GI8ocUHYsADy6CSUNLToYYUHYrh_QMp3EdB2gmD0rjav4RddZ7HymIoAGLPvrVztMLdRnJ71TZjdzkkT3dQ5_-t8tpukoMGOCiI-F4bMl6KynKV3h5Deb-o4_rZc5OnVQSywymy33HrlsCHBgrv8MWswzw8SxdOxnbLJFETuciqdM9fhIcJgBnzzcw3iaAsBFRpfP95Zw9_eZYUTu2XcWx6XRsQKfBaKMy8NzV55SaQDdJgycrpUX4_bUfWR861708Fw",
      "e": "AQAB",
      "kid": "PHPOP-00E",
      "use": "enc"
    }
  ]
}
2020-07-10 01:12:34 SUCCESS
ValidateServerJWKs
Valid server JWKs
2020-07-10 01:12:34 SUCCESS
CheckForKeyIdInServerJWKs
All keys contain kids
2020-07-10 01:12:34 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-07-10 01:12:34 SUCCESS
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
2020-07-10 01:12:34 SUCCESS
GetDynamicClientConfiguration
Found a dynamic_client_registration_template object
client_name
opend4Client1
2020-07-10 01:12:34 SUCCESS
GenerateRS256ClientJWKs
Generated client JWKs
client_jwks
{
  "keys": [
    {
      "p": "7Dd_QRZa1s_fkoQzouiX-UTTkwMBdBBc4QkXoadSIvjJC3lartDhf9oP98wBc7nRV6ygTyHD3ReF-qkfBiHjcTrOtNanoHrNdvJ1fRdZVZa2IM3dAYjoMPNQGmaPvsJaI9DSV5j763sGdKUU4q1b8GQ7sGFjpCAyJxZsodFcTD0",
      "kty": "RSA",
      "q": "yy7R6g74SnvVFlH9-D2Ug50MuWob5a4Y8peKib3WB5QBK3vs9uX1QKQcF4Bgbx4Z86iJTfz65mJggSFEqKnmbT1rIp5khDEMLYW7dU2hzxhBYx66g77Kx4n-s6Byq7Mvn1V1cgRY_hZYVRWmi8nKkVYcwopgi9VjQv7D0j9HQrM",
      "d": "WgR3naZ8f8lIkAKoCRGEmAF_kvmP1F53-YMB0M96rGdzp2_cOCktXb2OUwnd5PQoStj_Vx7ia76Ad6V_8mTaq1ntzgRopcx-9pfUhASSwEoWvjV49rjtBrfXqja5lv8KT1ZaKeomcLgeF_fuOLHxBCDw6P1PxLXQtV2XkyYbrKrdiCnCC1loNmPeOGD_gzaUUt6SwphtOe24BK8YVfVi-re2BVCI9Ej6hVxcaBvVzkhcFOU7j1_-jx8UoQwo2opZ5_V7M9syq98SJNMUTdaKPKX6vVscUrCz-FCVgFhpSrWblM235QDJIqlMRwjrhR2X9z2tfM1HHGtG2PPArrBr6Q",
      "e": "AQAB",
      "use": "sig",
      "qi": "ooaYCyfZl-8cPSX21uVUQ-8cOyvryis9CacMtphOZL_gIDvjU0rlCrKpc9qbuxaVjTpvJ8Vf3UhKHaAA8NT0DORCvjKutM1Nb9Am9LyPZNT3AgTQMp84JKHzn0Igqx246gpGXNiKpzbsMebhgLhtoa65mEe9AeYZB--USqFWE2U",
      "dp": "S-r-PCX6JgYDPey9R8NnbJbBRQN3SR0lLLImZS8Ih_LbcpObIIpDnzqvXR207cOv03TIxQX-FCXGSqxmKytjFPYojxhaIYq2VF9SgVSqwoZAnMRtHlwo--qHOSTzWATQwagQolSpyqHsjjqsPromzVj5khOK2an7VHKxkURfXKU",
      "alg": "RS256",
      "dq": "iMM2FncHF5Osxb5g1cQVgFWo5_ENYBdEwZ3RaY-3ThiIhQ2AXlxBLcaJBiSqRIEddM3fxfffpk1XqfOLtH_QE33A7GdzPyuIh-e5W2bq4GvyL1bSsrUs5wzyvVPle7878eLjD-DvSfAeev78wKEOUa-F4kikXds_WiwEATQIslM",
      "n": "u3s1ksHapNssY8R7IwUMpZdCk6La4IrcELfjuDC2ElrPGs1ziFJgVPVeDzcHLI7_84OsudVEwh7mfxOL20ySaIN6rMRyAz9K1MQn9dsSMJu8_5Y7TzbrtxzomDfwKoFIqUn9BkqSrIrY4IYfnqK1MdA4cY6lYPa2cLILiswcPI433iGLgwI-R-g2B8ojRi37If3DKD2wEIn4Qb3paJJRW2_5N8zgZv0C-p64Pn89Ap2YUjAA-vIAHoLg5lMzD4jaiu7AkQ-tqFNNC2OEqX0mOPzMZeQdIsWyIj5UMpUe2UU_V2WcIG7K5Hpd6565zwPLD13lwe6B7iJ6ZXWFVxwIpw"
    }
  ]
}
public_client_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "alg": "RS256",
      "n": "u3s1ksHapNssY8R7IwUMpZdCk6La4IrcELfjuDC2ElrPGs1ziFJgVPVeDzcHLI7_84OsudVEwh7mfxOL20ySaIN6rMRyAz9K1MQn9dsSMJu8_5Y7TzbrtxzomDfwKoFIqUn9BkqSrIrY4IYfnqK1MdA4cY6lYPa2cLILiswcPI433iGLgwI-R-g2B8ojRi37If3DKD2wEIn4Qb3paJJRW2_5N8zgZv0C-p64Pn89Ap2YUjAA-vIAHoLg5lMzD4jaiu7AkQ-tqFNNC2OEqX0mOPzMZeQdIsWyIj5UMpUe2UU_V2WcIG7K5Hpd6565zwPLD13lwe6B7iJ6ZXWFVxwIpw"
    }
  ]
}
2020-07-10 01:12:34 SUCCESS
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-07-10 01:12:34 SUCCESS
CreateDynamicRegistrationRequest
Created dynamic registration request
client_name
opend4Client1 aaaLrrjRKK
2020-07-10 01:12:34
AddAuthorizationCodeGrantTypeToDynamicRegistrationRequest
Added 'authorization_code' to 'grant_types'
grant_types
[
  "authorization_code"
]
2020-07-10 01:12:34
AddPublicJwksToDynamicRegistrationRequest
Added client public JWKS to dynamic registration request
dynamic_registration_request
{
  "client_name": "opend4Client1 aaaLrrjRKK",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "u3s1ksHapNssY8R7IwUMpZdCk6La4IrcELfjuDC2ElrPGs1ziFJgVPVeDzcHLI7_84OsudVEwh7mfxOL20ySaIN6rMRyAz9K1MQn9dsSMJu8_5Y7TzbrtxzomDfwKoFIqUn9BkqSrIrY4IYfnqK1MdA4cY6lYPa2cLILiswcPI433iGLgwI-R-g2B8ojRi37If3DKD2wEIn4Qb3paJJRW2_5N8zgZv0C-p64Pn89Ap2YUjAA-vIAHoLg5lMzD4jaiu7AkQ-tqFNNC2OEqX0mOPzMZeQdIsWyIj5UMpUe2UU_V2WcIG7K5Hpd6565zwPLD13lwe6B7iJ6ZXWFVxwIpw"
      }
    ]
  }
}
2020-07-10 01:12:34
AddTokenEndpointAuthMethodToDynamicRegistrationRequestFromEnvironment
Added token endpoint auth method to dynamic registration request
dynamic_registration_request
{
  "client_name": "opend4Client1 aaaLrrjRKK",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "u3s1ksHapNssY8R7IwUMpZdCk6La4IrcELfjuDC2ElrPGs1ziFJgVPVeDzcHLI7_84OsudVEwh7mfxOL20ySaIN6rMRyAz9K1MQn9dsSMJu8_5Y7TzbrtxzomDfwKoFIqUn9BkqSrIrY4IYfnqK1MdA4cY6lYPa2cLILiswcPI433iGLgwI-R-g2B8ojRi37If3DKD2wEIn4Qb3paJJRW2_5N8zgZv0C-p64Pn89Ap2YUjAA-vIAHoLg5lMzD4jaiu7AkQ-tqFNNC2OEqX0mOPzMZeQdIsWyIj5UMpUe2UU_V2WcIG7K5Hpd6565zwPLD13lwe6B7iJ6ZXWFVxwIpw"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic"
}
2020-07-10 01:12:34
AddResponseTypesArrayToDynamicRegistrationRequestFromEnvironment
Added response_types array to dynamic registration request
dynamic_registration_request
{
  "client_name": "opend4Client1 aaaLrrjRKK",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "u3s1ksHapNssY8R7IwUMpZdCk6La4IrcELfjuDC2ElrPGs1ziFJgVPVeDzcHLI7_84OsudVEwh7mfxOL20ySaIN6rMRyAz9K1MQn9dsSMJu8_5Y7TzbrtxzomDfwKoFIqUn9BkqSrIrY4IYfnqK1MdA4cY6lYPa2cLILiswcPI433iGLgwI-R-g2B8ojRi37If3DKD2wEIn4Qb3paJJRW2_5N8zgZv0C-p64Pn89Ap2YUjAA-vIAHoLg5lMzD4jaiu7AkQ-tqFNNC2OEqX0mOPzMZeQdIsWyIj5UMpUe2UU_V2WcIG7K5Hpd6565zwPLD13lwe6B7iJ6ZXWFVxwIpw"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ]
}
2020-07-10 01:12:34
AddRedirectUriToDynamicRegistrationRequest
Added redirect_uris array to dynamic registration request
dynamic_registration_request
{
  "client_name": "opend4Client1 aaaLrrjRKK",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "u3s1ksHapNssY8R7IwUMpZdCk6La4IrcELfjuDC2ElrPGs1ziFJgVPVeDzcHLI7_84OsudVEwh7mfxOL20ySaIN6rMRyAz9K1MQn9dsSMJu8_5Y7TzbrtxzomDfwKoFIqUn9BkqSrIrY4IYfnqK1MdA4cY6lYPa2cLILiswcPI433iGLgwI-R-g2B8ojRi37If3DKD2wEIn4Qb3paJJRW2_5N8zgZv0C-p64Pn89Ap2YUjAA-vIAHoLg5lMzD4jaiu7AkQ-tqFNNC2OEqX0mOPzMZeQdIsWyIj5UMpUe2UU_V2WcIG7K5Hpd6565zwPLD13lwe6B7iJ6ZXWFVxwIpw"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "redirect_uris": [
    "https://www.certification.openid.net/test/a/openid4us/callback"
  ]
}
2020-07-10 01:12:34
CallDynamicRegistrationEndpoint
HTTP request
request_uri
https://connect.openid4.us:5443/phpOp/index.php/registration
request_method
POST
request_headers
{
  "accept": "application/json",
  "accept-charset": "utf-8",
  "content-type": "application/json",
  "content-length": "657"
}
request_body
{"client_name":"opend4Client1 aaaLrrjRKK","grant_types":["authorization_code"],"jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"u3s1ksHapNssY8R7IwUMpZdCk6La4IrcELfjuDC2ElrPGs1ziFJgVPVeDzcHLI7_84OsudVEwh7mfxOL20ySaIN6rMRyAz9K1MQn9dsSMJu8_5Y7TzbrtxzomDfwKoFIqUn9BkqSrIrY4IYfnqK1MdA4cY6lYPa2cLILiswcPI433iGLgwI-R-g2B8ojRi37If3DKD2wEIn4Qb3paJJRW2_5N8zgZv0C-p64Pn89Ap2YUjAA-vIAHoLg5lMzD4jaiu7AkQ-tqFNNC2OEqX0mOPzMZeQdIsWyIj5UMpUe2UU_V2WcIG7K5Hpd6565zwPLD13lwe6B7iJ6ZXWFVxwIpw"}]},"token_endpoint_auth_method":"client_secret_basic","response_types":["code"],"redirect_uris":["https://www.certification.openid.net/test/a/openid4us/callback"]}
2020-07-10 01:12:35 RESPONSE
CallDynamicRegistrationEndpoint
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "date": "Fri, 10 Jul 2020 01:12:35 GMT",
  "server": "Apache/2.4.38 (Debian)",
  "cache-control": "no-store",
  "pragma": "no-cache",
  "access-control-allow-origin": "*",
  "content-length": "1033",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive",
  "content-type": "application/json"
}
response_body
{"client_id":"uW9X2CIrWE2eqI2MAOjgBA","client_secret":"jwfGL9_Z0QuBlA","registration_access_token":"7XZzSLV7VURLhA","registration_client_uri":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/client\/9lS8xixmcM-GYCqGAamejA","client_id_issued_at":1594343555,"client_secret_expires_at":0,"client_name":"opend4Client1 aaaLrrjRKK","redirect_uris":["https:\/\/www.certification.openid.net\/test\/a\/openid4us\/callback"],"token_endpoint_auth_method":"client_secret_basic","jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"u3s1ksHapNssY8R7IwUMpZdCk6La4IrcELfjuDC2ElrPGs1ziFJgVPVeDzcHLI7_84OsudVEwh7mfxOL20ySaIN6rMRyAz9K1MQn9dsSMJu8_5Y7TzbrtxzomDfwKoFIqUn9BkqSrIrY4IYfnqK1MdA4cY6lYPa2cLILiswcPI433iGLgwI-R-g2B8ojRi37If3DKD2wEIn4Qb3paJJRW2_5N8zgZv0C-p64Pn89Ap2YUjAA-vIAHoLg5lMzD4jaiu7AkQ-tqFNNC2OEqX0mOPzMZeQdIsWyIj5UMpUe2UU_V2WcIG7K5Hpd6565zwPLD13lwe6B7iJ6ZXWFVxwIpw"}]},"response_types":["code"],"grant_types":["authorization_code"],"id_token_signed_response_alg":"RS256","aggregation_signed_response_alg":"RS256"}
2020-07-10 01:12:35
CallDynamicRegistrationEndpoint
Registration endpoint response
dynamic_registration_response
{"client_id":"uW9X2CIrWE2eqI2MAOjgBA","client_secret":"jwfGL9_Z0QuBlA","registration_access_token":"7XZzSLV7VURLhA","registration_client_uri":"https:\/\/connect.openid4.us:5443\/phpOp\/index.php\/client\/9lS8xixmcM-GYCqGAamejA","client_id_issued_at":1594343555,"client_secret_expires_at":0,"client_name":"opend4Client1 aaaLrrjRKK","redirect_uris":["https:\/\/www.certification.openid.net\/test\/a\/openid4us\/callback"],"token_endpoint_auth_method":"client_secret_basic","jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"u3s1ksHapNssY8R7IwUMpZdCk6La4IrcELfjuDC2ElrPGs1ziFJgVPVeDzcHLI7_84OsudVEwh7mfxOL20ySaIN6rMRyAz9K1MQn9dsSMJu8_5Y7TzbrtxzomDfwKoFIqUn9BkqSrIrY4IYfnqK1MdA4cY6lYPa2cLILiswcPI433iGLgwI-R-g2B8ojRi37If3DKD2wEIn4Qb3paJJRW2_5N8zgZv0C-p64Pn89Ap2YUjAA-vIAHoLg5lMzD4jaiu7AkQ-tqFNNC2OEqX0mOPzMZeQdIsWyIj5UMpUe2UU_V2WcIG7K5Hpd6565zwPLD13lwe6B7iJ6ZXWFVxwIpw"}]},"response_types":["code"],"grant_types":["authorization_code"],"id_token_signed_response_alg":"RS256","aggregation_signed_response_alg":"RS256"}
2020-07-10 01:12:35
CallDynamicRegistrationEndpoint
Parsed registration endpoint response
client_id
uW9X2CIrWE2eqI2MAOjgBA
client_secret
jwfGL9_Z0QuBlA
registration_access_token
7XZzSLV7VURLhA
registration_client_uri
https://connect.openid4.us:5443/phpOp/index.php/client/9lS8xixmcM-GYCqGAamejA
client_id_issued_at
1594343555
client_secret_expires_at
0
client_name
opend4Client1 aaaLrrjRKK
redirect_uris
[
  "https://www.certification.openid.net/test/a/openid4us/callback"
]
token_endpoint_auth_method
client_secret_basic
jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "alg": "RS256",
      "n": "u3s1ksHapNssY8R7IwUMpZdCk6La4IrcELfjuDC2ElrPGs1ziFJgVPVeDzcHLI7_84OsudVEwh7mfxOL20ySaIN6rMRyAz9K1MQn9dsSMJu8_5Y7TzbrtxzomDfwKoFIqUn9BkqSrIrY4IYfnqK1MdA4cY6lYPa2cLILiswcPI433iGLgwI-R-g2B8ojRi37If3DKD2wEIn4Qb3paJJRW2_5N8zgZv0C-p64Pn89Ap2YUjAA-vIAHoLg5lMzD4jaiu7AkQ-tqFNNC2OEqX0mOPzMZeQdIsWyIj5UMpUe2UU_V2WcIG7K5Hpd6565zwPLD13lwe6B7iJ6ZXWFVxwIpw"
    }
  ]
}
response_types
[
  "code"
]
grant_types
[
  "authorization_code"
]
id_token_signed_response_alg
RS256
aggregation_signed_response_alg
RS256
2020-07-10 01:12:35 SUCCESS
CallDynamicRegistrationEndpoint
Extracted dynamic registration management credentials
registration_client_uri
https://connect.openid4.us:5443/phpOp/index.php/client/9lS8xixmcM-GYCqGAamejA
registration_access_token
7XZzSLV7VURLhA
2020-07-10 01:12:35
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
scope
openid
2020-07-10 01:12:35 SUCCESS
EnsureServerConfigurationSupportsClientSecretBasic
token_endpoint_auth_methods_supported
actual
[
  "client_secret_post",
  "client_secret_basic",
  "client_secret_jwt",
  "private_key_jwt"
]
expected
[
  "client_secret_basic"
]
minimum_matches_required
1
2020-07-10 01:12:35 SUCCESS
SetProtectedResourceUrlToUserInfoEndpoint
Set protected resource URL
protected_resource_url
https://connect.openid4.us:5443/phpOp/index.php/userinfo
2020-07-10 01:12:35
oidcc-id-token-hint
Setup Done
Make request to authorization endpoint
2020-07-10 01:12:35 SUCCESS
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
client_id
uW9X2CIrWE2eqI2MAOjgBA
redirect_uri
https://www.certification.openid.net/test/a/openid4us/callback
scope
openid
2020-07-10 01:12:35
CreateRandomStateValue
Created state value
requested_state_length
10
state
o8Y5a1M7J6
2020-07-10 01:12:35 SUCCESS
AddStateToAuthorizationEndpointRequest
Added state parameter to request
client_id
uW9X2CIrWE2eqI2MAOjgBA
redirect_uri
https://www.certification.openid.net/test/a/openid4us/callback
scope
openid
state
o8Y5a1M7J6
2020-07-10 01:12:35
CreateRandomNonceValue
Created nonce value
requested_nonce_length
10
nonce
7pPiJtwolO
2020-07-10 01:12:35 SUCCESS
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
client_id
uW9X2CIrWE2eqI2MAOjgBA
redirect_uri
https://www.certification.openid.net/test/a/openid4us/callback
scope
openid
state
o8Y5a1M7J6
nonce
7pPiJtwolO
2020-07-10 01:12:35 SUCCESS
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
client_id
uW9X2CIrWE2eqI2MAOjgBA
redirect_uri
https://www.certification.openid.net/test/a/openid4us/callback
scope
openid
state
o8Y5a1M7J6
nonce
7pPiJtwolO
response_type
code
2020-07-10 01:12:35 SUCCESS
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
redirect_to_authorization_endpoint
https://connect.openid4.us:5443/phpOp/index.php/auth?client_id=uW9X2CIrWE2eqI2MAOjgBA&redirect_uri=https://www.certification.openid.net/test/a/openid4us/callback&scope=openid&state=o8Y5a1M7J6&nonce=7pPiJtwolO&response_type=code
2020-07-10 01:12:35 REDIRECT
oidcc-id-token-hint
Redirecting to authorization endpoint
redirect_to
https://connect.openid4.us:5443/phpOp/index.php/auth?client_id=uW9X2CIrWE2eqI2MAOjgBA&redirect_uri=https://www.certification.openid.net/test/a/openid4us/callback&scope=openid&state=o8Y5a1M7J6&nonce=7pPiJtwolO&response_type=code
2020-07-10 01:12:48 INCOMING
oidcc-id-token-hint
Incoming HTTP request to test instance aaaLrrjRKK
incoming_headers
{
  "host": "www.certification.openid.net",
  "cache-control": "max-age\u003d0",
  "upgrade-insecure-requests": "1",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "cross-site",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "referer": "https://connect.openid4.us:5443/phpOp/index.php/auth?client_id\u003duW9X2CIrWE2eqI2MAOjgBA\u0026redirect_uri\u003dhttps://www.certification.openid.net/test/a/openid4us/callback\u0026scope\u003dopenid\u0026state\u003do8Y5a1M7J6\u0026nonce\u003d7pPiJtwolO\u0026response_type\u003dcode",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en-US,en;q\u003d0.9",
  "cookie": "__utmc\u003d201319536; __utmz\u003d201319536.1594325901.21.5.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); JSESSIONID\u003d33BF84B4F1B877BF3C997B8B5D1A12A4; __utma\u003d201319536.314738283.1556667502.1594325901.1594333993.22",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
callback
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "state": "o8Y5a1M7J6",
  "session_state": "2c76a18a5647438634d8bd41099253e6fcf7d1666b93a10d8c656942b87445bd.4675c7ca73cb13cb219c9fcad6534d57",
  "code": "dkkEDybn8LOhA6NXidit75qFZSJp7WaGV9QcaU3uxFE"
}
incoming_body
2020-07-10 01:12:48 SUCCESS
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
implicit_submit
{
  "path": "implicit/jlL57oM9BMCRrwMq16Fr",
  "fullUrl": "https://www.certification.openid.net/test/a/openid4us/implicit/jlL57oM9BMCRrwMq16Fr"
}
2020-07-10 01:12:48 OUTGOING
oidcc-id-token-hint
Response to HTTP request to test instance aaaLrrjRKK
outgoing
ModelAndView [view="implicitCallback"; model={implicitSubmitUrl=https://www.certification.openid.net/test/a/openid4us/implicit/jlL57oM9BMCRrwMq16Fr, returnUrl=/log-detail.html?log=aaaLrrjRKK}]
outgoing_path
callback
2020-07-10 01:12:48 INCOMING
oidcc-id-token-hint
Incoming HTTP request to test instance aaaLrrjRKK
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "*/*",
  "x-requested-with": "XMLHttpRequest",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36",
  "content-type": "text/plain",
  "origin": "https://www.certification.openid.net",
  "sec-fetch-site": "same-origin",
  "sec-fetch-mode": "cors",
  "sec-fetch-dest": "empty",
  "referer": "https://www.certification.openid.net/test/a/openid4us/callback?state\u003do8Y5a1M7J6\u0026session_state\u003d2c76a18a5647438634d8bd41099253e6fcf7d1666b93a10d8c656942b87445bd.4675c7ca73cb13cb219c9fcad6534d57\u0026code\u003ddkkEDybn8LOhA6NXidit75qFZSJp7WaGV9QcaU3uxFE",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en-US,en;q\u003d0.9",
  "cookie": "__utmc\u003d201319536; __utmz\u003d201319536.1594325901.21.5.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); JSESSIONID\u003d33BF84B4F1B877BF3C997B8B5D1A12A4; __utma\u003d201319536.314738283.1556667502.1594325901.1594333993.22",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "0",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
implicit/jlL57oM9BMCRrwMq16Fr
incoming_body_form_params
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
2020-07-10 01:12:48 OUTGOING
oidcc-id-token-hint
Response to HTTP request to test instance aaaLrrjRKK
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [/log-detail.html?log=aaaLrrjRKK]
outgoing_path
implicit/jlL57oM9BMCRrwMq16Fr
2020-07-10 01:12:48 SUCCESS
ExtractImplicitHashToCallbackResponse
implicit_hash is empty
2020-07-10 01:12:48 REDIRECT-IN
oidcc-id-token-hint
Authorization endpoint response captured
url_query
{
  "state": "o8Y5a1M7J6",
  "session_state": "2c76a18a5647438634d8bd41099253e6fcf7d1666b93a10d8c656942b87445bd.4675c7ca73cb13cb219c9fcad6534d57",
  "code": "dkkEDybn8LOhA6NXidit75qFZSJp7WaGV9QcaU3uxFE"
}
headers
{
  "host": "www.certification.openid.net",
  "cache-control": "max-age\u003d0",
  "upgrade-insecure-requests": "1",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "cross-site",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "referer": "https://connect.openid4.us:5443/phpOp/index.php/auth?client_id\u003duW9X2CIrWE2eqI2MAOjgBA\u0026redirect_uri\u003dhttps://www.certification.openid.net/test/a/openid4us/callback\u0026scope\u003dopenid\u0026state\u003do8Y5a1M7J6\u0026nonce\u003d7pPiJtwolO\u0026response_type\u003dcode",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en-US,en;q\u003d0.9",
  "cookie": "__utmc\u003d201319536; __utmz\u003d201319536.1594325901.21.5.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); JSESSIONID\u003d33BF84B4F1B877BF3C997B8B5D1A12A4; __utma\u003d201319536.314738283.1556667502.1594325901.1594333993.22",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
http_method
GET
url_fragment
{}
post_body
Verify authorization endpoint response
2020-07-10 01:12:48 SUCCESS
CheckMatchingCallbackParameters
Callback parameters successfully verified
2020-07-10 01:12:48 SUCCESS
CheckIfAuthorizationEndpointError
No error from authorization endpoint
2020-07-10 01:12:48 SUCCESS
CheckMatchingStateParameter
State parameter correctly returned
state
o8Y5a1M7J6
2020-07-10 01:12:48 SUCCESS
ExtractAuthorizationCodeFromAuthorizationResponse
Found authorization code
code
dkkEDybn8LOhA6NXidit75qFZSJp7WaGV9QcaU3uxFE
2020-07-10 01:12:48 SUCCESS
CreateTokenEndpointRequestForAuthorizationCodeGrant
grant_type
authorization_code
code
dkkEDybn8LOhA6NXidit75qFZSJp7WaGV9QcaU3uxFE
redirect_uri
https://www.certification.openid.net/test/a/openid4us/callback
2020-07-10 01:12:48 SUCCESS
AddBasicAuthClientSecretAuthenticationParameters
Added basic authorization header
Authorization
Basic dVc5WDJDSXJXRTJlcUkyTUFPamdCQTpqd2ZHTDlfWjBRdUJsQQ==
2020-07-10 01:12:48
CallTokenEndpoint
HTTP request
request_uri
https://connect.openid4.us:5443/phpOp/index.php/token
request_method
POST
request_headers
{
  "accept": "application/json;charset\u003dUTF-8",
  "authorization": "Basic dVc5WDJDSXJXRTJlcUkyTUFPamdCQTpqd2ZHTDlfWjBRdUJsQQ\u003d\u003d",
  "accept-charset": "utf-8",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "content-length": "168"
}
request_body
grant_type=authorization_code&code=dkkEDybn8LOhA6NXidit75qFZSJp7WaGV9QcaU3uxFE&redirect_uri=https%3A%2F%2Fwww.certification.openid.net%2Ftest%2Fa%2Fopenid4us%2Fcallback
2020-07-10 01:12:48 RESPONSE
CallTokenEndpoint
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "date": "Fri, 10 Jul 2020 01:12:48 GMT",
  "server": "Apache/2.4.38 (Debian)",
  "set-cookie": "PHPSESSID\u003dbqk2pjgngm5c7m9uov5q881lt0; path\u003d/",
  "expires": "Thu, 19 Nov 1981 08:52:00 GMT",
  "cache-control": "no-store",
  "pragma": "no-cache",
  "content-length": "908",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive",
  "content-type": "application/json"
}
response_body
{"access_token":"CMpGcoAh3RNaXIqipw0QuN3iKcuSMqZ4P0XBI6q_ydI","token_type":"Bearer","expires_in":3600,"id_token":"eyJhbGciOiJSUzI1NiIsImprdSI6Imh0dHBzOlwvXC9jb25uZWN0Lm9wZW5pZDQudXM6NTQ0M1wvcGhwT3BcL29wLmp3ayIsImtpZCI6IlBIUE9QLTAwUyJ9.eyJpc3MiOiJodHRwczpcL1wvY29ubmVjdC5vcGVuaWQ0LnVzOjU0NDNcL3BocE9wIiwic3ViIjoiYTI0NzY5ZDZjZGUyOTJmODlhYmYxMjlkOWM0YTNmMDY2OTA0ZjkxNzE3NDEzYTNiYTA2ODYyZjhlM2E4NzJjYyIsImF1ZCI6WyJ1VzlYMkNJcldFMmVxSTJNQU9qZ0JBIl0sImV4cCI6MTU5NDM0Mzg2OCwiaWF0IjoxNTk0MzQzNTY4LCJub25jZSI6IjdwUGlKdHdvbE8iLCJhdF9oYXNoIjoiT1VZdmZNRGtyWEJUT1VKM0F6VXY2USJ9.NFpzXRDanh84r7a9feVE18mzLFoL2vynTNREPMVsovI51EpuPDAKph2SpPOdEpWuYjz_lKypUEYKzG5TzEoL4-MijS6GHDPIor5OZ5kzqDdoUySMbl-dbMrKQPPVdjW73q9Ykg1Nuh67FmjDTvkl7z6_Absp0kW3VzgKJKbbRzdfJzFUpSI4oFr4kayB-Hcl2KYxBM1nd9fDITAvYLaXn5ydIbHYrUeQD-5rSXktOXBESJKAaoDRLxzm0-gjRzAGCeLnM5R9txATrmTU-CGl8Og4LMtlI6Qw4FP9ScqvoGNFgzdAHgc0VV0PeEyRgcQ1cNGzJxuFgTit_RvCmFb62A"}
2020-07-10 01:12:48
CallTokenEndpoint
Token endpoint response
token_endpoint_response
{"access_token":"CMpGcoAh3RNaXIqipw0QuN3iKcuSMqZ4P0XBI6q_ydI","token_type":"Bearer","expires_in":3600,"id_token":"eyJhbGciOiJSUzI1NiIsImprdSI6Imh0dHBzOlwvXC9jb25uZWN0Lm9wZW5pZDQudXM6NTQ0M1wvcGhwT3BcL29wLmp3ayIsImtpZCI6IlBIUE9QLTAwUyJ9.eyJpc3MiOiJodHRwczpcL1wvY29ubmVjdC5vcGVuaWQ0LnVzOjU0NDNcL3BocE9wIiwic3ViIjoiYTI0NzY5ZDZjZGUyOTJmODlhYmYxMjlkOWM0YTNmMDY2OTA0ZjkxNzE3NDEzYTNiYTA2ODYyZjhlM2E4NzJjYyIsImF1ZCI6WyJ1VzlYMkNJcldFMmVxSTJNQU9qZ0JBIl0sImV4cCI6MTU5NDM0Mzg2OCwiaWF0IjoxNTk0MzQzNTY4LCJub25jZSI6IjdwUGlKdHdvbE8iLCJhdF9oYXNoIjoiT1VZdmZNRGtyWEJUT1VKM0F6VXY2USJ9.NFpzXRDanh84r7a9feVE18mzLFoL2vynTNREPMVsovI51EpuPDAKph2SpPOdEpWuYjz_lKypUEYKzG5TzEoL4-MijS6GHDPIor5OZ5kzqDdoUySMbl-dbMrKQPPVdjW73q9Ykg1Nuh67FmjDTvkl7z6_Absp0kW3VzgKJKbbRzdfJzFUpSI4oFr4kayB-Hcl2KYxBM1nd9fDITAvYLaXn5ydIbHYrUeQD-5rSXktOXBESJKAaoDRLxzm0-gjRzAGCeLnM5R9txATrmTU-CGl8Og4LMtlI6Qw4FP9ScqvoGNFgzdAHgc0VV0PeEyRgcQ1cNGzJxuFgTit_RvCmFb62A"}
2020-07-10 01:12:48 SUCCESS
CallTokenEndpoint
Parsed token endpoint response
access_token
CMpGcoAh3RNaXIqipw0QuN3iKcuSMqZ4P0XBI6q_ydI
token_type
Bearer
expires_in
3600
id_token
eyJhbGciOiJSUzI1NiIsImprdSI6Imh0dHBzOlwvXC9jb25uZWN0Lm9wZW5pZDQudXM6NTQ0M1wvcGhwT3BcL29wLmp3ayIsImtpZCI6IlBIUE9QLTAwUyJ9.eyJpc3MiOiJodHRwczpcL1wvY29ubmVjdC5vcGVuaWQ0LnVzOjU0NDNcL3BocE9wIiwic3ViIjoiYTI0NzY5ZDZjZGUyOTJmODlhYmYxMjlkOWM0YTNmMDY2OTA0ZjkxNzE3NDEzYTNiYTA2ODYyZjhlM2E4NzJjYyIsImF1ZCI6WyJ1VzlYMkNJcldFMmVxSTJNQU9qZ0JBIl0sImV4cCI6MTU5NDM0Mzg2OCwiaWF0IjoxNTk0MzQzNTY4LCJub25jZSI6IjdwUGlKdHdvbE8iLCJhdF9oYXNoIjoiT1VZdmZNRGtyWEJUT1VKM0F6VXY2USJ9.NFpzXRDanh84r7a9feVE18mzLFoL2vynTNREPMVsovI51EpuPDAKph2SpPOdEpWuYjz_lKypUEYKzG5TzEoL4-MijS6GHDPIor5OZ5kzqDdoUySMbl-dbMrKQPPVdjW73q9Ykg1Nuh67FmjDTvkl7z6_Absp0kW3VzgKJKbbRzdfJzFUpSI4oFr4kayB-Hcl2KYxBM1nd9fDITAvYLaXn5ydIbHYrUeQD-5rSXktOXBESJKAaoDRLxzm0-gjRzAGCeLnM5R9txATrmTU-CGl8Og4LMtlI6Qw4FP9ScqvoGNFgzdAHgc0VV0PeEyRgcQ1cNGzJxuFgTit_RvCmFb62A
2020-07-10 01:12:48 SUCCESS
CheckIfTokenEndpointResponseError
No error from token endpoint
2020-07-10 01:12:48 SUCCESS
CheckForAccessTokenValue
Found an access token
access_token
CMpGcoAh3RNaXIqipw0QuN3iKcuSMqZ4P0XBI6q_ydI
2020-07-10 01:12:48 SUCCESS
ExtractAccessTokenFromTokenResponse
Extracted the access token
value
CMpGcoAh3RNaXIqipw0QuN3iKcuSMqZ4P0XBI6q_ydI
type
Bearer
2020-07-10 01:12:48 SUCCESS
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
expires_in
3600
2020-07-10 01:12:48 SUCCESS
ValidateExpiresIn
expires_in passed all validation checks
expires_in
3600
2020-07-10 01:12:48 INFO
CheckForRefreshTokenValue
Couldn't find refresh token
2020-07-10 01:12:48 SUCCESS
ExtractIdTokenFromTokenResponse
Found and parsed the id_token from token_endpoint_response
value
eyJhbGciOiJSUzI1NiIsImprdSI6Imh0dHBzOlwvXC9jb25uZWN0Lm9wZW5pZDQudXM6NTQ0M1wvcGhwT3BcL29wLmp3ayIsImtpZCI6IlBIUE9QLTAwUyJ9.eyJpc3MiOiJodHRwczpcL1wvY29ubmVjdC5vcGVuaWQ0LnVzOjU0NDNcL3BocE9wIiwic3ViIjoiYTI0NzY5ZDZjZGUyOTJmODlhYmYxMjlkOWM0YTNmMDY2OTA0ZjkxNzE3NDEzYTNiYTA2ODYyZjhlM2E4NzJjYyIsImF1ZCI6WyJ1VzlYMkNJcldFMmVxSTJNQU9qZ0JBIl0sImV4cCI6MTU5NDM0Mzg2OCwiaWF0IjoxNTk0MzQzNTY4LCJub25jZSI6IjdwUGlKdHdvbE8iLCJhdF9oYXNoIjoiT1VZdmZNRGtyWEJUT1VKM0F6VXY2USJ9.NFpzXRDanh84r7a9feVE18mzLFoL2vynTNREPMVsovI51EpuPDAKph2SpPOdEpWuYjz_lKypUEYKzG5TzEoL4-MijS6GHDPIor5OZ5kzqDdoUySMbl-dbMrKQPPVdjW73q9Ykg1Nuh67FmjDTvkl7z6_Absp0kW3VzgKJKbbRzdfJzFUpSI4oFr4kayB-Hcl2KYxBM1nd9fDITAvYLaXn5ydIbHYrUeQD-5rSXktOXBESJKAaoDRLxzm0-gjRzAGCeLnM5R9txATrmTU-CGl8Og4LMtlI6Qw4FP9ScqvoGNFgzdAHgc0VV0PeEyRgcQ1cNGzJxuFgTit_RvCmFb62A
header
{
  "jku": "https://connect.openid4.us:5443/phpOp/op.jwk",
  "kid": "PHPOP-00S",
  "alg": "RS256"
}
claims
{
  "at_hash": "OUYvfMDkrXBTOUJ3AzUv6Q",
  "sub": "a24769d6cde292f89abf129d9c4a3f066904f91717413a3ba06862f8e3a872cc",
  "aud": "uW9X2CIrWE2eqI2MAOjgBA",
  "iss": "https://connect.openid4.us:5443/phpOp",
  "exp": 1594343868,
  "iat": 1594343568,
  "nonce": "7pPiJtwolO"
}
2020-07-10 01:12:48 SUCCESS
ValidateIdToken
ID token iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
2020-07-10 01:12:48 SUCCESS
ValidateIdTokenNonce
Nonce values match
nonce
7pPiJtwolO
2020-07-10 01:12:48 SUCCESS
ValidateIdTokenACRClaimAgainstRequest
Nothing to check; the conformance suite did not request an acr claim in request object
2020-07-10 01:12:48 SUCCESS
ValidateIdTokenSignature
id_token signature validated
id_token
eyJhbGciOiJSUzI1NiIsImprdSI6Imh0dHBzOlwvXC9jb25uZWN0Lm9wZW5pZDQudXM6NTQ0M1wvcGhwT3BcL29wLmp3ayIsImtpZCI6IlBIUE9QLTAwUyJ9.eyJpc3MiOiJodHRwczpcL1wvY29ubmVjdC5vcGVuaWQ0LnVzOjU0NDNcL3BocE9wIiwic3ViIjoiYTI0NzY5ZDZjZGUyOTJmODlhYmYxMjlkOWM0YTNmMDY2OTA0ZjkxNzE3NDEzYTNiYTA2ODYyZjhlM2E4NzJjYyIsImF1ZCI6WyJ1VzlYMkNJcldFMmVxSTJNQU9qZ0JBIl0sImV4cCI6MTU5NDM0Mzg2OCwiaWF0IjoxNTk0MzQzNTY4LCJub25jZSI6IjdwUGlKdHdvbE8iLCJhdF9oYXNoIjoiT1VZdmZNRGtyWEJUT1VKM0F6VXY2USJ9.NFpzXRDanh84r7a9feVE18mzLFoL2vynTNREPMVsovI51EpuPDAKph2SpPOdEpWuYjz_lKypUEYKzG5TzEoL4-MijS6GHDPIor5OZ5kzqDdoUySMbl-dbMrKQPPVdjW73q9Ykg1Nuh67FmjDTvkl7z6_Absp0kW3VzgKJKbbRzdfJzFUpSI4oFr4kayB-Hcl2KYxBM1nd9fDITAvYLaXn5ydIbHYrUeQD-5rSXktOXBESJKAaoDRLxzm0-gjRzAGCeLnM5R9txATrmTU-CGl8Og4LMtlI6Qw4FP9ScqvoGNFgzdAHgc0VV0PeEyRgcQ1cNGzJxuFgTit_RvCmFb62A
2020-07-10 01:12:48 SUCCESS
ValidateIdTokenSignatureUsingKid
id_token signature validated
id_token
eyJhbGciOiJSUzI1NiIsImprdSI6Imh0dHBzOlwvXC9jb25uZWN0Lm9wZW5pZDQudXM6NTQ0M1wvcGhwT3BcL29wLmp3ayIsImtpZCI6IlBIUE9QLTAwUyJ9.eyJpc3MiOiJodHRwczpcL1wvY29ubmVjdC5vcGVuaWQ0LnVzOjU0NDNcL3BocE9wIiwic3ViIjoiYTI0NzY5ZDZjZGUyOTJmODlhYmYxMjlkOWM0YTNmMDY2OTA0ZjkxNzE3NDEzYTNiYTA2ODYyZjhlM2E4NzJjYyIsImF1ZCI6WyJ1VzlYMkNJcldFMmVxSTJNQU9qZ0JBIl0sImV4cCI6MTU5NDM0Mzg2OCwiaWF0IjoxNTk0MzQzNTY4LCJub25jZSI6IjdwUGlKdHdvbE8iLCJhdF9oYXNoIjoiT1VZdmZNRGtyWEJUT1VKM0F6VXY2USJ9.NFpzXRDanh84r7a9feVE18mzLFoL2vynTNREPMVsovI51EpuPDAKph2SpPOdEpWuYjz_lKypUEYKzG5TzEoL4-MijS6GHDPIor5OZ5kzqDdoUySMbl-dbMrKQPPVdjW73q9Ykg1Nuh67FmjDTvkl7z6_Absp0kW3VzgKJKbbRzdfJzFUpSI4oFr4kayB-Hcl2KYxBM1nd9fDITAvYLaXn5ydIbHYrUeQD-5rSXktOXBESJKAaoDRLxzm0-gjRzAGCeLnM5R9txATrmTU-CGl8Og4LMtlI6Qw4FP9ScqvoGNFgzdAHgc0VV0PeEyRgcQ1cNGzJxuFgTit_RvCmFb62A
2020-07-10 01:12:48 SUCCESS
CheckForSubjectInIdToken
Found 'sub' in id_token
sub
a24769d6cde292f89abf129d9c4a3f066904f91717413a3ba06862f8e3a872cc
Userinfo endpoint tests
2020-07-10 01:12:48
CallProtectedResourceWithBearerToken
HTTP request
request_uri
https://connect.openid4.us:5443/phpOp/index.php/userinfo
request_method
GET
request_headers
{
  "accept": "application/json;charset\u003dUTF-8",
  "authorization": "Bearer CMpGcoAh3RNaXIqipw0QuN3iKcuSMqZ4P0XBI6q_ydI",
  "accept-charset": "utf-8",
  "content-length": "0"
}
request_body

                                
2020-07-10 01:12:49 RESPONSE
CallProtectedResourceWithBearerToken
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "date": "Fri, 10 Jul 2020 01:12:49 GMT",
  "server": "Apache/2.4.38 (Debian)",
  "cache-control": "no-store",
  "pragma": "no-cache",
  "access-control-allow-origin": "*",
  "content-length": "74",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive",
  "content-type": "application/json"
}
response_body
{"sub":"a24769d6cde292f89abf129d9c4a3f066904f91717413a3ba06862f8e3a872cc"}
2020-07-10 01:12:49 SUCCESS
CallProtectedResourceWithBearerToken
Got a response from the resource endpoint
headers
{
  "date": "Fri, 10 Jul 2020 01:12:49 GMT",
  "server": "Apache/2.4.38 (Debian)",
  "cache-control": "no-store",
  "pragma": "no-cache",
  "access-control-allow-origin": "*",
  "content-length": "74",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive",
  "content-type": "application/json"
}
status_code
{
  "code": 200
}
body
{"sub":"a24769d6cde292f89abf129d9c4a3f066904f91717413a3ba06862f8e3a872cc"}
Second authorization: Make request to authorization endpoint
2020-07-10 01:12:49 SUCCESS
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
client_id
uW9X2CIrWE2eqI2MAOjgBA
redirect_uri
https://www.certification.openid.net/test/a/openid4us/callback
scope
openid
2020-07-10 01:12:49
CreateRandomStateValue
Created state value
requested_state_length
10
state
cRaiyUzarQ
2020-07-10 01:12:49 SUCCESS
AddStateToAuthorizationEndpointRequest
Added state parameter to request
client_id
uW9X2CIrWE2eqI2MAOjgBA
redirect_uri
https://www.certification.openid.net/test/a/openid4us/callback
scope
openid
state
cRaiyUzarQ
2020-07-10 01:12:49
CreateRandomNonceValue
Created nonce value
requested_nonce_length
10
nonce
kE3Z5BuonE
2020-07-10 01:12:49 SUCCESS
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
client_id
uW9X2CIrWE2eqI2MAOjgBA
redirect_uri
https://www.certification.openid.net/test/a/openid4us/callback
scope
openid
state
cRaiyUzarQ
nonce
kE3Z5BuonE
2020-07-10 01:12:49 SUCCESS
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
client_id
uW9X2CIrWE2eqI2MAOjgBA
redirect_uri
https://www.certification.openid.net/test/a/openid4us/callback
scope
openid
state
cRaiyUzarQ
nonce
kE3Z5BuonE
response_type
code
2020-07-10 01:12:49 SUCCESS
AddPromptNoneToAuthorizationEndpointRequest
Added prompt=none to authorization endpoint request
client_id
uW9X2CIrWE2eqI2MAOjgBA
redirect_uri
https://www.certification.openid.net/test/a/openid4us/callback
scope
openid
state
cRaiyUzarQ
nonce
kE3Z5BuonE
response_type
code
prompt
none
2020-07-10 01:12:49 SUCCESS
AddIdTokenHintFromFirstLoginToAuthorizationEndpointRequest
Added id_token_hint to authorization endpoint request
client_id
uW9X2CIrWE2eqI2MAOjgBA
redirect_uri
https://www.certification.openid.net/test/a/openid4us/callback
scope
openid
state
cRaiyUzarQ
nonce
kE3Z5BuonE
response_type
code
prompt
none
id_token_hint
eyJhbGciOiJSUzI1NiIsImprdSI6Imh0dHBzOlwvXC9jb25uZWN0Lm9wZW5pZDQudXM6NTQ0M1wvcGhwT3BcL29wLmp3ayIsImtpZCI6IlBIUE9QLTAwUyJ9.eyJpc3MiOiJodHRwczpcL1wvY29ubmVjdC5vcGVuaWQ0LnVzOjU0NDNcL3BocE9wIiwic3ViIjoiYTI0NzY5ZDZjZGUyOTJmODlhYmYxMjlkOWM0YTNmMDY2OTA0ZjkxNzE3NDEzYTNiYTA2ODYyZjhlM2E4NzJjYyIsImF1ZCI6WyJ1VzlYMkNJcldFMmVxSTJNQU9qZ0JBIl0sImV4cCI6MTU5NDM0Mzg2OCwiaWF0IjoxNTk0MzQzNTY4LCJub25jZSI6IjdwUGlKdHdvbE8iLCJhdF9oYXNoIjoiT1VZdmZNRGtyWEJUT1VKM0F6VXY2USJ9.NFpzXRDanh84r7a9feVE18mzLFoL2vynTNREPMVsovI51EpuPDAKph2SpPOdEpWuYjz_lKypUEYKzG5TzEoL4-MijS6GHDPIor5OZ5kzqDdoUySMbl-dbMrKQPPVdjW73q9Ykg1Nuh67FmjDTvkl7z6_Absp0kW3VzgKJKbbRzdfJzFUpSI4oFr4kayB-Hcl2KYxBM1nd9fDITAvYLaXn5ydIbHYrUeQD-5rSXktOXBESJKAaoDRLxzm0-gjRzAGCeLnM5R9txATrmTU-CGl8Og4LMtlI6Qw4FP9ScqvoGNFgzdAHgc0VV0PeEyRgcQ1cNGzJxuFgTit_RvCmFb62A
2020-07-10 01:12:49 SUCCESS
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
redirect_to_authorization_endpoint
https://connect.openid4.us:5443/phpOp/index.php/auth?client_id=uW9X2CIrWE2eqI2MAOjgBA&redirect_uri=https://www.certification.openid.net/test/a/openid4us/callback&scope=openid&state=cRaiyUzarQ&nonce=kE3Z5BuonE&response_type=code&prompt=none&id_token_hint=eyJhbGciOiJSUzI1NiIsImprdSI6Imh0dHBzOlwvXC9jb25uZWN0Lm9wZW5pZDQudXM6NTQ0M1wvcGhwT3BcL29wLmp3ayIsImtpZCI6IlBIUE9QLTAwUyJ9.eyJpc3MiOiJodHRwczpcL1wvY29ubmVjdC5vcGVuaWQ0LnVzOjU0NDNcL3BocE9wIiwic3ViIjoiYTI0NzY5ZDZjZGUyOTJmODlhYmYxMjlkOWM0YTNmMDY2OTA0ZjkxNzE3NDEzYTNiYTA2ODYyZjhlM2E4NzJjYyIsImF1ZCI6WyJ1VzlYMkNJcldFMmVxSTJNQU9qZ0JBIl0sImV4cCI6MTU5NDM0Mzg2OCwiaWF0IjoxNTk0MzQzNTY4LCJub25jZSI6IjdwUGlKdHdvbE8iLCJhdF9oYXNoIjoiT1VZdmZNRGtyWEJUT1VKM0F6VXY2USJ9.NFpzXRDanh84r7a9feVE18mzLFoL2vynTNREPMVsovI51EpuPDAKph2SpPOdEpWuYjz_lKypUEYKzG5TzEoL4-MijS6GHDPIor5OZ5kzqDdoUySMbl-dbMrKQPPVdjW73q9Ykg1Nuh67FmjDTvkl7z6_Absp0kW3VzgKJKbbRzdfJzFUpSI4oFr4kayB-Hcl2KYxBM1nd9fDITAvYLaXn5ydIbHYrUeQD-5rSXktOXBESJKAaoDRLxzm0-gjRzAGCeLnM5R9txATrmTU-CGl8Og4LMtlI6Qw4FP9ScqvoGNFgzdAHgc0VV0PeEyRgcQ1cNGzJxuFgTit_RvCmFb62A
2020-07-10 01:12:49 REDIRECT
oidcc-id-token-hint
Redirecting to authorization endpoint
redirect_to
https://connect.openid4.us:5443/phpOp/index.php/auth?client_id=uW9X2CIrWE2eqI2MAOjgBA&redirect_uri=https://www.certification.openid.net/test/a/openid4us/callback&scope=openid&state=cRaiyUzarQ&nonce=kE3Z5BuonE&response_type=code&prompt=none&id_token_hint=eyJhbGciOiJSUzI1NiIsImprdSI6Imh0dHBzOlwvXC9jb25uZWN0Lm9wZW5pZDQudXM6NTQ0M1wvcGhwT3BcL29wLmp3ayIsImtpZCI6IlBIUE9QLTAwUyJ9.eyJpc3MiOiJodHRwczpcL1wvY29ubmVjdC5vcGVuaWQ0LnVzOjU0NDNcL3BocE9wIiwic3ViIjoiYTI0NzY5ZDZjZGUyOTJmODlhYmYxMjlkOWM0YTNmMDY2OTA0ZjkxNzE3NDEzYTNiYTA2ODYyZjhlM2E4NzJjYyIsImF1ZCI6WyJ1VzlYMkNJcldFMmVxSTJNQU9qZ0JBIl0sImV4cCI6MTU5NDM0Mzg2OCwiaWF0IjoxNTk0MzQzNTY4LCJub25jZSI6IjdwUGlKdHdvbE8iLCJhdF9oYXNoIjoiT1VZdmZNRGtyWEJUT1VKM0F6VXY2USJ9.NFpzXRDanh84r7a9feVE18mzLFoL2vynTNREPMVsovI51EpuPDAKph2SpPOdEpWuYjz_lKypUEYKzG5TzEoL4-MijS6GHDPIor5OZ5kzqDdoUySMbl-dbMrKQPPVdjW73q9Ykg1Nuh67FmjDTvkl7z6_Absp0kW3VzgKJKbbRzdfJzFUpSI4oFr4kayB-Hcl2KYxBM1nd9fDITAvYLaXn5ydIbHYrUeQD-5rSXktOXBESJKAaoDRLxzm0-gjRzAGCeLnM5R9txATrmTU-CGl8Og4LMtlI6Qw4FP9ScqvoGNFgzdAHgc0VV0PeEyRgcQ1cNGzJxuFgTit_RvCmFb62A
2020-07-10 01:12:54 INCOMING
oidcc-id-token-hint
Incoming HTTP request to test instance aaaLrrjRKK
incoming_headers
{
  "host": "www.certification.openid.net",
  "upgrade-insecure-requests": "1",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "cross-site",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "referer": "https://www.certification.openid.net/log-detail.html?log\u003daaaLrrjRKK",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en-US,en;q\u003d0.9",
  "cookie": "__utmc\u003d201319536; __utmz\u003d201319536.1594325901.21.5.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); JSESSIONID\u003d33BF84B4F1B877BF3C997B8B5D1A12A4; __utma\u003d201319536.314738283.1556667502.1594325901.1594333993.22",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
callback
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "state": "cRaiyUzarQ",
  "session_state": "7bd26bfcffd5e865899c3b654470aff916c73395a3af64a28549ade1344a4956.a5a6b85208aa14dbdd47d0301a4dc53f",
  "code": "ok7hQB3vIv3lQwkPGYCXjwE764u3sPobPRmFclXyJgU"
}
incoming_body
2020-07-10 01:12:54 SUCCESS
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
implicit_submit
{
  "path": "implicit/QYREljFCxg23q6nH7gYm",
  "fullUrl": "https://www.certification.openid.net/test/a/openid4us/implicit/QYREljFCxg23q6nH7gYm"
}
2020-07-10 01:12:54 OUTGOING
oidcc-id-token-hint
Response to HTTP request to test instance aaaLrrjRKK
outgoing
ModelAndView [view="implicitCallback"; model={implicitSubmitUrl=https://www.certification.openid.net/test/a/openid4us/implicit/QYREljFCxg23q6nH7gYm, returnUrl=/log-detail.html?log=aaaLrrjRKK}]
outgoing_path
callback
2020-07-10 01:12:55 INCOMING
oidcc-id-token-hint
Incoming HTTP request to test instance aaaLrrjRKK
incoming_headers
{
  "host": "www.certification.openid.net",
  "accept": "*/*",
  "x-requested-with": "XMLHttpRequest",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36",
  "content-type": "text/plain",
  "origin": "https://www.certification.openid.net",
  "sec-fetch-site": "same-origin",
  "sec-fetch-mode": "cors",
  "sec-fetch-dest": "empty",
  "referer": "https://www.certification.openid.net/test/a/openid4us/callback?state\u003dcRaiyUzarQ\u0026session_state\u003d7bd26bfcffd5e865899c3b654470aff916c73395a3af64a28549ade1344a4956.a5a6b85208aa14dbdd47d0301a4dc53f\u0026code\u003dok7hQB3vIv3lQwkPGYCXjwE764u3sPobPRmFclXyJgU",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en-US,en;q\u003d0.9",
  "cookie": "__utmc\u003d201319536; __utmz\u003d201319536.1594325901.21.5.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); JSESSIONID\u003d33BF84B4F1B877BF3C997B8B5D1A12A4; __utma\u003d201319536.314738283.1556667502.1594325901.1594333993.22",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "0",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
implicit/QYREljFCxg23q6nH7gYm
incoming_body_form_params
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
2020-07-10 01:12:55 OUTGOING
oidcc-id-token-hint
Response to HTTP request to test instance aaaLrrjRKK
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [/log-detail.html?log=aaaLrrjRKK]
outgoing_path
implicit/QYREljFCxg23q6nH7gYm
2020-07-10 01:12:55 SUCCESS
ExtractImplicitHashToCallbackResponse
implicit_hash is empty
2020-07-10 01:12:55 REDIRECT-IN
oidcc-id-token-hint
Authorization endpoint response captured
url_query
{
  "state": "cRaiyUzarQ",
  "session_state": "7bd26bfcffd5e865899c3b654470aff916c73395a3af64a28549ade1344a4956.a5a6b85208aa14dbdd47d0301a4dc53f",
  "code": "ok7hQB3vIv3lQwkPGYCXjwE764u3sPobPRmFclXyJgU"
}
headers
{
  "host": "www.certification.openid.net",
  "upgrade-insecure-requests": "1",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.116 Safari/537.36",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/webp,image/apng,*/*;q\u003d0.8,application/signed-exchange;v\u003db3;q\u003d0.9",
  "sec-fetch-site": "cross-site",
  "sec-fetch-mode": "navigate",
  "sec-fetch-user": "?1",
  "sec-fetch-dest": "document",
  "referer": "https://www.certification.openid.net/log-detail.html?log\u003daaaLrrjRKK",
  "accept-encoding": "gzip, deflate, br",
  "accept-language": "en-US,en;q\u003d0.9",
  "cookie": "__utmc\u003d201319536; __utmz\u003d201319536.1594325901.21.5.utmcsr\u003dgoogle|utmccn\u003d(organic)|utmcmd\u003dorganic|utmctr\u003d(not%20provided); JSESSIONID\u003d33BF84B4F1B877BF3C997B8B5D1A12A4; __utma\u003d201319536.314738283.1556667502.1594325901.1594333993.22",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
http_method
GET
url_fragment
{}
post_body
Second authorization: Verify authorization endpoint response
2020-07-10 01:12:55 SUCCESS
CheckMatchingCallbackParameters
Callback parameters successfully verified
2020-07-10 01:12:55 SUCCESS
CheckIfAuthorizationEndpointError
No error from authorization endpoint
2020-07-10 01:12:55 SUCCESS
CheckMatchingStateParameter
State parameter correctly returned
state
cRaiyUzarQ
2020-07-10 01:12:55 SUCCESS
ExtractAuthorizationCodeFromAuthorizationResponse
Found authorization code
code
ok7hQB3vIv3lQwkPGYCXjwE764u3sPobPRmFclXyJgU
2020-07-10 01:12:55 SUCCESS
CreateTokenEndpointRequestForAuthorizationCodeGrant
grant_type
authorization_code
code
ok7hQB3vIv3lQwkPGYCXjwE764u3sPobPRmFclXyJgU
redirect_uri
https://www.certification.openid.net/test/a/openid4us/callback
2020-07-10 01:12:55 SUCCESS
AddBasicAuthClientSecretAuthenticationParameters
Added basic authorization header
Authorization
Basic dVc5WDJDSXJXRTJlcUkyTUFPamdCQTpqd2ZHTDlfWjBRdUJsQQ==
2020-07-10 01:12:55
CallTokenEndpoint
HTTP request
request_uri
https://connect.openid4.us:5443/phpOp/index.php/token
request_method
POST
request_headers
{
  "accept": "application/json;charset\u003dUTF-8",
  "authorization": "Basic dVc5WDJDSXJXRTJlcUkyTUFPamdCQTpqd2ZHTDlfWjBRdUJsQQ\u003d\u003d",
  "accept-charset": "utf-8",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "content-length": "168"
}
request_body
grant_type=authorization_code&code=ok7hQB3vIv3lQwkPGYCXjwE764u3sPobPRmFclXyJgU&redirect_uri=https%3A%2F%2Fwww.certification.openid.net%2Ftest%2Fa%2Fopenid4us%2Fcallback
2020-07-10 01:12:55 RESPONSE
CallTokenEndpoint
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "date": "Fri, 10 Jul 2020 01:12:55 GMT",
  "server": "Apache/2.4.38 (Debian)",
  "set-cookie": "PHPSESSID\u003dbqk2pjgngm5c7m9uov5q881lt0; path\u003d/",
  "expires": "Thu, 19 Nov 1981 08:52:00 GMT",
  "cache-control": "no-store",
  "pragma": "no-cache",
  "content-length": "908",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive",
  "content-type": "application/json"
}
response_body
{"access_token":"DUEyCl3F14RnH_POHUxK0maMKM6J5yW9GIumWlPFS1w","token_type":"Bearer","expires_in":3600,"id_token":"eyJhbGciOiJSUzI1NiIsImprdSI6Imh0dHBzOlwvXC9jb25uZWN0Lm9wZW5pZDQudXM6NTQ0M1wvcGhwT3BcL29wLmp3ayIsImtpZCI6IlBIUE9QLTAwUyJ9.eyJpc3MiOiJodHRwczpcL1wvY29ubmVjdC5vcGVuaWQ0LnVzOjU0NDNcL3BocE9wIiwic3ViIjoiYTI0NzY5ZDZjZGUyOTJmODlhYmYxMjlkOWM0YTNmMDY2OTA0ZjkxNzE3NDEzYTNiYTA2ODYyZjhlM2E4NzJjYyIsImF1ZCI6WyJ1VzlYMkNJcldFMmVxSTJNQU9qZ0JBIl0sImV4cCI6MTU5NDM0Mzg3NSwiaWF0IjoxNTk0MzQzNTc1LCJub25jZSI6ImtFM1o1QnVvbkUiLCJhdF9oYXNoIjoicVU1OFRzbURzRE5UakNzekxDdm12QSJ9.kB9JYTZPL4kCO1-02niCXWnI7TusQ2agFXsVbiGGRJV_4GveOqUBbXiuPPGIFHW1v0tGWX_C1KmqHXPME0tD_eF9lIjMWoywswj3wOKqHfdtJjkb2Ug4qiXEbQc1QTsQVKv7hyJ7NMuglnt0L3SnZTXpAT9yMrZZsl6EbEJVnOgnXN8fFiODOLNb_zMspKXSHf3U_OS1ook7LbCAujttst9WRPrYqYnOl5V9ZenBG26Gi4lDrWPFUN0aySxiVl_wImmmOpn5qt29Lx8uuQSOelyqzOqwZ-h9koye5FtUKcT65fprAyrAgY3x70K0dGHQCfvy2T2GXfq12jf7B9vZLA"}
2020-07-10 01:12:55
CallTokenEndpoint
Token endpoint response
token_endpoint_response
{"access_token":"DUEyCl3F14RnH_POHUxK0maMKM6J5yW9GIumWlPFS1w","token_type":"Bearer","expires_in":3600,"id_token":"eyJhbGciOiJSUzI1NiIsImprdSI6Imh0dHBzOlwvXC9jb25uZWN0Lm9wZW5pZDQudXM6NTQ0M1wvcGhwT3BcL29wLmp3ayIsImtpZCI6IlBIUE9QLTAwUyJ9.eyJpc3MiOiJodHRwczpcL1wvY29ubmVjdC5vcGVuaWQ0LnVzOjU0NDNcL3BocE9wIiwic3ViIjoiYTI0NzY5ZDZjZGUyOTJmODlhYmYxMjlkOWM0YTNmMDY2OTA0ZjkxNzE3NDEzYTNiYTA2ODYyZjhlM2E4NzJjYyIsImF1ZCI6WyJ1VzlYMkNJcldFMmVxSTJNQU9qZ0JBIl0sImV4cCI6MTU5NDM0Mzg3NSwiaWF0IjoxNTk0MzQzNTc1LCJub25jZSI6ImtFM1o1QnVvbkUiLCJhdF9oYXNoIjoicVU1OFRzbURzRE5UakNzekxDdm12QSJ9.kB9JYTZPL4kCO1-02niCXWnI7TusQ2agFXsVbiGGRJV_4GveOqUBbXiuPPGIFHW1v0tGWX_C1KmqHXPME0tD_eF9lIjMWoywswj3wOKqHfdtJjkb2Ug4qiXEbQc1QTsQVKv7hyJ7NMuglnt0L3SnZTXpAT9yMrZZsl6EbEJVnOgnXN8fFiODOLNb_zMspKXSHf3U_OS1ook7LbCAujttst9WRPrYqYnOl5V9ZenBG26Gi4lDrWPFUN0aySxiVl_wImmmOpn5qt29Lx8uuQSOelyqzOqwZ-h9koye5FtUKcT65fprAyrAgY3x70K0dGHQCfvy2T2GXfq12jf7B9vZLA"}
2020-07-10 01:12:55 SUCCESS
CallTokenEndpoint
Parsed token endpoint response
access_token
DUEyCl3F14RnH_POHUxK0maMKM6J5yW9GIumWlPFS1w
token_type
Bearer
expires_in
3600
id_token
eyJhbGciOiJSUzI1NiIsImprdSI6Imh0dHBzOlwvXC9jb25uZWN0Lm9wZW5pZDQudXM6NTQ0M1wvcGhwT3BcL29wLmp3ayIsImtpZCI6IlBIUE9QLTAwUyJ9.eyJpc3MiOiJodHRwczpcL1wvY29ubmVjdC5vcGVuaWQ0LnVzOjU0NDNcL3BocE9wIiwic3ViIjoiYTI0NzY5ZDZjZGUyOTJmODlhYmYxMjlkOWM0YTNmMDY2OTA0ZjkxNzE3NDEzYTNiYTA2ODYyZjhlM2E4NzJjYyIsImF1ZCI6WyJ1VzlYMkNJcldFMmVxSTJNQU9qZ0JBIl0sImV4cCI6MTU5NDM0Mzg3NSwiaWF0IjoxNTk0MzQzNTc1LCJub25jZSI6ImtFM1o1QnVvbkUiLCJhdF9oYXNoIjoicVU1OFRzbURzRE5UakNzekxDdm12QSJ9.kB9JYTZPL4kCO1-02niCXWnI7TusQ2agFXsVbiGGRJV_4GveOqUBbXiuPPGIFHW1v0tGWX_C1KmqHXPME0tD_eF9lIjMWoywswj3wOKqHfdtJjkb2Ug4qiXEbQc1QTsQVKv7hyJ7NMuglnt0L3SnZTXpAT9yMrZZsl6EbEJVnOgnXN8fFiODOLNb_zMspKXSHf3U_OS1ook7LbCAujttst9WRPrYqYnOl5V9ZenBG26Gi4lDrWPFUN0aySxiVl_wImmmOpn5qt29Lx8uuQSOelyqzOqwZ-h9koye5FtUKcT65fprAyrAgY3x70K0dGHQCfvy2T2GXfq12jf7B9vZLA
2020-07-10 01:12:55 SUCCESS
CheckIfTokenEndpointResponseError
No error from token endpoint
2020-07-10 01:12:55 SUCCESS
CheckForAccessTokenValue
Found an access token
access_token
DUEyCl3F14RnH_POHUxK0maMKM6J5yW9GIumWlPFS1w
2020-07-10 01:12:55 SUCCESS
ExtractAccessTokenFromTokenResponse
Extracted the access token
value
DUEyCl3F14RnH_POHUxK0maMKM6J5yW9GIumWlPFS1w
type
Bearer
2020-07-10 01:12:55 SUCCESS
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
expires_in
3600
2020-07-10 01:12:55 SUCCESS
ValidateExpiresIn
expires_in passed all validation checks
expires_in
3600
2020-07-10 01:12:55 INFO
CheckForRefreshTokenValue
Couldn't find refresh token
2020-07-10 01:12:55 SUCCESS
ExtractIdTokenFromTokenResponse
Found and parsed the id_token from token_endpoint_response
value
eyJhbGciOiJSUzI1NiIsImprdSI6Imh0dHBzOlwvXC9jb25uZWN0Lm9wZW5pZDQudXM6NTQ0M1wvcGhwT3BcL29wLmp3ayIsImtpZCI6IlBIUE9QLTAwUyJ9.eyJpc3MiOiJodHRwczpcL1wvY29ubmVjdC5vcGVuaWQ0LnVzOjU0NDNcL3BocE9wIiwic3ViIjoiYTI0NzY5ZDZjZGUyOTJmODlhYmYxMjlkOWM0YTNmMDY2OTA0ZjkxNzE3NDEzYTNiYTA2ODYyZjhlM2E4NzJjYyIsImF1ZCI6WyJ1VzlYMkNJcldFMmVxSTJNQU9qZ0JBIl0sImV4cCI6MTU5NDM0Mzg3NSwiaWF0IjoxNTk0MzQzNTc1LCJub25jZSI6ImtFM1o1QnVvbkUiLCJhdF9oYXNoIjoicVU1OFRzbURzRE5UakNzekxDdm12QSJ9.kB9JYTZPL4kCO1-02niCXWnI7TusQ2agFXsVbiGGRJV_4GveOqUBbXiuPPGIFHW1v0tGWX_C1KmqHXPME0tD_eF9lIjMWoywswj3wOKqHfdtJjkb2Ug4qiXEbQc1QTsQVKv7hyJ7NMuglnt0L3SnZTXpAT9yMrZZsl6EbEJVnOgnXN8fFiODOLNb_zMspKXSHf3U_OS1ook7LbCAujttst9WRPrYqYnOl5V9ZenBG26Gi4lDrWPFUN0aySxiVl_wImmmOpn5qt29Lx8uuQSOelyqzOqwZ-h9koye5FtUKcT65fprAyrAgY3x70K0dGHQCfvy2T2GXfq12jf7B9vZLA
header
{
  "jku": "https://connect.openid4.us:5443/phpOp/op.jwk",
  "kid": "PHPOP-00S",
  "alg": "RS256"
}
claims
{
  "at_hash": "qU58TsmDsDNTjCszLCvmvA",
  "sub": "a24769d6cde292f89abf129d9c4a3f066904f91717413a3ba06862f8e3a872cc",
  "aud": "uW9X2CIrWE2eqI2MAOjgBA",
  "iss": "https://connect.openid4.us:5443/phpOp",
  "exp": 1594343875,
  "iat": 1594343575,
  "nonce": "kE3Z5BuonE"
}
2020-07-10 01:12:55 SUCCESS
ValidateIdToken
ID token iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
2020-07-10 01:12:55 SUCCESS
ValidateIdTokenNonce
Nonce values match
nonce
kE3Z5BuonE
2020-07-10 01:12:55 SUCCESS
ValidateIdTokenACRClaimAgainstRequest
Nothing to check; the conformance suite did not request an acr claim in request object
2020-07-10 01:12:55 SUCCESS
ValidateIdTokenSignature
id_token signature validated
id_token
eyJhbGciOiJSUzI1NiIsImprdSI6Imh0dHBzOlwvXC9jb25uZWN0Lm9wZW5pZDQudXM6NTQ0M1wvcGhwT3BcL29wLmp3ayIsImtpZCI6IlBIUE9QLTAwUyJ9.eyJpc3MiOiJodHRwczpcL1wvY29ubmVjdC5vcGVuaWQ0LnVzOjU0NDNcL3BocE9wIiwic3ViIjoiYTI0NzY5ZDZjZGUyOTJmODlhYmYxMjlkOWM0YTNmMDY2OTA0ZjkxNzE3NDEzYTNiYTA2ODYyZjhlM2E4NzJjYyIsImF1ZCI6WyJ1VzlYMkNJcldFMmVxSTJNQU9qZ0JBIl0sImV4cCI6MTU5NDM0Mzg3NSwiaWF0IjoxNTk0MzQzNTc1LCJub25jZSI6ImtFM1o1QnVvbkUiLCJhdF9oYXNoIjoicVU1OFRzbURzRE5UakNzekxDdm12QSJ9.kB9JYTZPL4kCO1-02niCXWnI7TusQ2agFXsVbiGGRJV_4GveOqUBbXiuPPGIFHW1v0tGWX_C1KmqHXPME0tD_eF9lIjMWoywswj3wOKqHfdtJjkb2Ug4qiXEbQc1QTsQVKv7hyJ7NMuglnt0L3SnZTXpAT9yMrZZsl6EbEJVnOgnXN8fFiODOLNb_zMspKXSHf3U_OS1ook7LbCAujttst9WRPrYqYnOl5V9ZenBG26Gi4lDrWPFUN0aySxiVl_wImmmOpn5qt29Lx8uuQSOelyqzOqwZ-h9koye5FtUKcT65fprAyrAgY3x70K0dGHQCfvy2T2GXfq12jf7B9vZLA
2020-07-10 01:12:55 SUCCESS
ValidateIdTokenSignatureUsingKid
id_token signature validated
id_token
eyJhbGciOiJSUzI1NiIsImprdSI6Imh0dHBzOlwvXC9jb25uZWN0Lm9wZW5pZDQudXM6NTQ0M1wvcGhwT3BcL29wLmp3ayIsImtpZCI6IlBIUE9QLTAwUyJ9.eyJpc3MiOiJodHRwczpcL1wvY29ubmVjdC5vcGVuaWQ0LnVzOjU0NDNcL3BocE9wIiwic3ViIjoiYTI0NzY5ZDZjZGUyOTJmODlhYmYxMjlkOWM0YTNmMDY2OTA0ZjkxNzE3NDEzYTNiYTA2ODYyZjhlM2E4NzJjYyIsImF1ZCI6WyJ1VzlYMkNJcldFMmVxSTJNQU9qZ0JBIl0sImV4cCI6MTU5NDM0Mzg3NSwiaWF0IjoxNTk0MzQzNTc1LCJub25jZSI6ImtFM1o1QnVvbkUiLCJhdF9oYXNoIjoicVU1OFRzbURzRE5UakNzekxDdm12QSJ9.kB9JYTZPL4kCO1-02niCXWnI7TusQ2agFXsVbiGGRJV_4GveOqUBbXiuPPGIFHW1v0tGWX_C1KmqHXPME0tD_eF9lIjMWoywswj3wOKqHfdtJjkb2Ug4qiXEbQc1QTsQVKv7hyJ7NMuglnt0L3SnZTXpAT9yMrZZsl6EbEJVnOgnXN8fFiODOLNb_zMspKXSHf3U_OS1ook7LbCAujttst9WRPrYqYnOl5V9ZenBG26Gi4lDrWPFUN0aySxiVl_wImmmOpn5qt29Lx8uuQSOelyqzOqwZ-h9koye5FtUKcT65fprAyrAgY3x70K0dGHQCfvy2T2GXfq12jf7B9vZLA
2020-07-10 01:12:55 SUCCESS
CheckForSubjectInIdToken
Found 'sub' in id_token
sub
a24769d6cde292f89abf129d9c4a3f066904f91717413a3ba06862f8e3a872cc
Second authorization: Userinfo endpoint tests
2020-07-10 01:12:55
CallProtectedResourceWithBearerToken
HTTP request
request_uri
https://connect.openid4.us:5443/phpOp/index.php/userinfo
request_method
GET
request_headers
{
  "accept": "application/json;charset\u003dUTF-8",
  "authorization": "Bearer DUEyCl3F14RnH_POHUxK0maMKM6J5yW9GIumWlPFS1w",
  "accept-charset": "utf-8",
  "content-length": "0"
}
request_body

                                
2020-07-10 01:12:55 RESPONSE
CallProtectedResourceWithBearerToken
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "date": "Fri, 10 Jul 2020 01:12:55 GMT",
  "server": "Apache/2.4.38 (Debian)",
  "cache-control": "no-store",
  "pragma": "no-cache",
  "access-control-allow-origin": "*",
  "content-length": "74",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive",
  "content-type": "application/json"
}
response_body
{"sub":"a24769d6cde292f89abf129d9c4a3f066904f91717413a3ba06862f8e3a872cc"}
2020-07-10 01:12:55 SUCCESS
CallProtectedResourceWithBearerToken
Got a response from the resource endpoint
headers
{
  "date": "Fri, 10 Jul 2020 01:12:55 GMT",
  "server": "Apache/2.4.38 (Debian)",
  "cache-control": "no-store",
  "pragma": "no-cache",
  "access-control-allow-origin": "*",
  "content-length": "74",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive",
  "content-type": "application/json"
}
status_code
{
  "code": 200
}
body
{"sub":"a24769d6cde292f89abf129d9c4a3f066904f91717413a3ba06862f8e3a872cc"}
2020-07-10 01:12:55
CheckIdTokenAuthTimeClaimsSameIfPresent
auth_time cannot be checked as it is missing from the id_tokens for at least one of the authorizations
first_id_token
{
  "at_hash": "OUYvfMDkrXBTOUJ3AzUv6Q",
  "sub": "a24769d6cde292f89abf129d9c4a3f066904f91717413a3ba06862f8e3a872cc",
  "aud": "uW9X2CIrWE2eqI2MAOjgBA",
  "iss": "https://connect.openid4.us:5443/phpOp",
  "exp": 1594343868,
  "iat": 1594343568,
  "nonce": "7pPiJtwolO"
}
second_id_token
{
  "at_hash": "qU58TsmDsDNTjCszLCvmvA",
  "sub": "a24769d6cde292f89abf129d9c4a3f066904f91717413a3ba06862f8e3a872cc",
  "aud": "uW9X2CIrWE2eqI2MAOjgBA",
  "iss": "https://connect.openid4.us:5443/phpOp",
  "exp": 1594343875,
  "iat": 1594343575,
  "nonce": "kE3Z5BuonE"
}
2020-07-10 01:12:55 SUCCESS
CheckIdTokenSubConsistentForSecondAuthorization
sub is the same in the second id_token
first_id_token
{
  "at_hash": "OUYvfMDkrXBTOUJ3AzUv6Q",
  "sub": "a24769d6cde292f89abf129d9c4a3f066904f91717413a3ba06862f8e3a872cc",
  "aud": "uW9X2CIrWE2eqI2MAOjgBA",
  "iss": "https://connect.openid4.us:5443/phpOp",
  "exp": 1594343868,
  "iat": 1594343568,
  "nonce": "7pPiJtwolO"
}
second_id_token
{
  "at_hash": "qU58TsmDsDNTjCszLCvmvA",
  "sub": "a24769d6cde292f89abf129d9c4a3f066904f91717413a3ba06862f8e3a872cc",
  "aud": "uW9X2CIrWE2eqI2MAOjgBA",
  "iss": "https://connect.openid4.us:5443/phpOp",
  "exp": 1594343875,
  "iat": 1594343575,
  "nonce": "kE3Z5BuonE"
}
2020-07-10 01:12:55 FINISHED
oidcc-id-token-hint
Test has run to completion
testmodule_result
PASSED
Unregister dynamically registered client
2020-07-10 01:12:55
UnregisterDynamicallyRegisteredClient
HTTP request
request_uri
https://connect.openid4.us:5443/phpOp/index.php/client/9lS8xixmcM-GYCqGAamejA
request_method
DELETE
request_headers
{
  "accept": "application/json",
  "accept-charset": "utf-8",
  "authorization": "Bearer 7XZzSLV7VURLhA",
  "content-length": "0"
}
request_body

                                
2020-07-10 01:12:56 RESPONSE
UnregisterDynamicallyRegisteredClient
HTTP response
response_status_code
200 OK
response_status_text
OK
response_headers
{
  "date": "Fri, 10 Jul 2020 01:12:56 GMT",
  "server": "Apache/2.4.38 (Debian)",
  "set-cookie": "PHPSESSID\u003dfni9lepvall1slbreb52t9vkp1; path\u003d/",
  "expires": "Thu, 19 Nov 1981 08:52:00 GMT",
  "cache-control": "no-store",
  "pragma": "no-cache",
  "content-length": "926",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive",
  "content-type": "application/json"
}
response_body
{
 "client_id_issued_at":1594343555,
 "client_id":"uW9X2CIrWE2eqI2MAOjgBA",
 "client_secret":"jwfGL9_Z0QuBlA",
 "client_name":"opend4Client1 aaaLrrjRKK",
 "redirect_uris":[
  "https:\/\/www.certification.openid.net\/test\/a\/openid4us\/callback"
 ],
 "token_endpoint_auth_method":"client_secret_basic",
 "jwks":{
  "keys":[
   {
    "kty":"RSA",
    "e":"AQAB",
    "use":"sig",
    "alg":"RS256",
    "n":"u3s1ksHapNssY8R7IwUMpZdCk6La4IrcELfjuDC2ElrPGs1ziFJgVPVeDzcHLI7_84OsudVEwh7mfxOL20ySaIN6rMRyAz9K1MQn9dsSMJu8_5Y7TzbrtxzomDfwKoFIqUn9BkqSrIrY4IYfnqK1MdA4cY6lYPa2cLILiswcPI433iGLgwI-R-g2B8ojRi37If3DKD2wEIn4Qb3paJJRW2_5N8zgZv0C-p64Pn89Ap2YUjAA-vIAHoLg5lMzD4jaiu7AkQ-tqFNNC2OEqX0mOPzMZeQdIsWyIj5UMpUe2UU_V2WcIG7K5Hpd6565zwPLD13lwe6B7iJ6ZXWFVxwIpw"
   }
  ]
 },
 "id_token_signed_response_alg":"RS256",
 "aggregation_signed_response_alg":"RS256",
 "grant_types":[
  "authorization_code"
 ],
 "response_types":[
  "code"
 ]
}
2020-07-10 01:12:56 INFO
UnregisterDynamicallyRegisteredClient
registration_client_uri returned a http status code other than 204 No Content
code
OK
2020-07-10 01:13:04
TEST-RUNNER
Alias has now been claimed by another test
alias
openid4us
new_test_id
6pPYAgR8qD
Test Results