Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-08-17 19:02:14 INFO
TEST-RUNNER
Test instance Lp2FoRqf6ul6XW8 created
baseUrl
https://www.certification.openid.net/test/a/mew-tech.io
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "server_metadata": "discovery",
  "response_mode": "default",
  "client_registration": "dynamic_client"
}
alias
mew-tech.io
description
migration certification
planId
SsKwFAUT3v599
config
{
  "alias": "mew-tech.io",
  "description": "migration certification",
  "server": {
    "discoveryUrl": "https://aaa.mew-tech.io/.well-known/openid-configuration",
    "login_hint": "skhello@mew-tech.io"
  },
  "client": {
    "client_name": "basic-op-test-client-name-1"
  },
  "client2": {
    "client_name": "basic-op-test-client-name-2"
  }
}
testName
oidcc-refresh-token
2020-08-17 19:02:14 SUCCESS
CreateRedirectUri
Created redirect URI
redirect_uri
https://www.certification.openid.net/test/a/mew-tech.io/callback
2020-08-17 19:02:14
GetDynamicServerConfiguration
HTTP request
request_uri
https://aaa.mew-tech.io/.well-known/openid-configuration
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/cbor, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2020-08-17 19:02:15 RESPONSE
GetDynamicServerConfiguration
HTTP response
response_status_code
200 OK
response_status_text

                                
response_headers
{
  "date": "Mon, 17 Aug 2020 19:02:15 GMT",
  "server": "Apache/2.4.25 (Debian)",
  "cache-control": "no-cache",
  "x-content-type-options": "nosniff",
  "x-xss-protection": "1; mode\u003dblock",
  "x-frame-options": "DENY",
  "content-type": "application/json",
  "content-length": "2253",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive"
}
response_body
{
  "issuer" : "https://aaa.mew-tech.io/op",
  "authorization_endpoint" : "https://aaa.mew-tech.io/op/authorization",
  "request_parameter_supported" : true,
  "request_uri_parameter_supported" : true,
  "request_object_signing_alg_values_supported" : [ "NONE", "HS256", "HS384", "HS512", "RS256", "RS384", "RS512", "PS256", "PS384", "PS512", "ES256", "ES256K", "ES384", "ES512" ],
  "token_endpoint" : "https://aaa.mew-tech.io/op/token",
  "token_endpoint_auth_methods_supported" : [ "client_secret_basic", "client_secret_post", "client_secret_jwt", "private_key_jwt" ],
  "token_endpoint_auth_signing_alg_values_supported" : [ "HS256", "HS384", "HS512", "RS256", "RS384", "RS512", "PS256", "PS384", "PS512", "ES256", "ES256K", "ES384", "ES512" ],
  "userinfo_endpoint" : "https://aaa.mew-tech.io/op/userinfo",
  "userinfo_signing_alg_values_supported" : [ "HS256", "HS384", "HS512", "RS256", "RS384", "RS512", "PS256", "PS384", "PS512", "ES256", "ES256K", "ES384", "ES512" ],
  "registration_endpoint" : "https://aaa.mew-tech.io/op/clients",
  "jwks_uri" : "https://aaa.mew-tech.io/op/jwks",
  "registration_client_uri" : "https://aaa.mew-tech.io/op/clients",
  "grant_types_supported" : [ "authorization_code", "implicit", "refresh_token", "client_credentials" ],
  "response_types_supported" : [ "code", "code id_token", "code id_token token", "code token", "id_token", "id_token token" ],
  "subject_types_supported" : [ "public", "pairwise" ],
  "id_token_signing_alg_values_supported" : [ "HS256", "HS384", "HS512", "RS256", "RS384", "RS512", "PS256", "PS384", "PS512" ],
  "scopes_supported" : [ "address", "all", "basic", "email", "offline_access", "openid", "phone", "profile" ],
  "claims_supported" : [ "acr", "address", "at_hash", "aud", "auth_time", "birthdate", "c_hash", "email", "email_verified", "family_name", "gender", "given_name", "iss", "locale", "middle_name", "name", "nickname", "nonce", "phone_number", "phone_number_verified", "picture", "preferred_username", "profile", "refresh_token", "rt_hash", "sub", "updated_at", "website", "zoneinfo" ],
  "acr_values_supported" : [ "1", "2", "3" ],
  "check_session_iframe" : "https://aaa.mew-tech.io/op/session.html",
  "end_session_endpoint" : "https://aaa.mew-tech.io/op/logout"
}
2020-08-17 19:02:15
GetDynamicServerConfiguration
Downloaded server configuration
server_config_string
{
  "issuer" : "https://aaa.mew-tech.io/op",
  "authorization_endpoint" : "https://aaa.mew-tech.io/op/authorization",
  "request_parameter_supported" : true,
  "request_uri_parameter_supported" : true,
  "request_object_signing_alg_values_supported" : [ "NONE", "HS256", "HS384", "HS512", "RS256", "RS384", "RS512", "PS256", "PS384", "PS512", "ES256", "ES256K", "ES384", "ES512" ],
  "token_endpoint" : "https://aaa.mew-tech.io/op/token",
  "token_endpoint_auth_methods_supported" : [ "client_secret_basic", "client_secret_post", "client_secret_jwt", "private_key_jwt" ],
  "token_endpoint_auth_signing_alg_values_supported" : [ "HS256", "HS384", "HS512", "RS256", "RS384", "RS512", "PS256", "PS384", "PS512", "ES256", "ES256K", "ES384", "ES512" ],
  "userinfo_endpoint" : "https://aaa.mew-tech.io/op/userinfo",
  "userinfo_signing_alg_values_supported" : [ "HS256", "HS384", "HS512", "RS256", "RS384", "RS512", "PS256", "PS384", "PS512", "ES256", "ES256K", "ES384", "ES512" ],
  "registration_endpoint" : "https://aaa.mew-tech.io/op/clients",
  "jwks_uri" : "https://aaa.mew-tech.io/op/jwks",
  "registration_client_uri" : "https://aaa.mew-tech.io/op/clients",
  "grant_types_supported" : [ "authorization_code", "implicit", "refresh_token", "client_credentials" ],
  "response_types_supported" : [ "code", "code id_token", "code id_token token", "code token", "id_token", "id_token token" ],
  "subject_types_supported" : [ "public", "pairwise" ],
  "id_token_signing_alg_values_supported" : [ "HS256", "HS384", "HS512", "RS256", "RS384", "RS512", "PS256", "PS384", "PS512" ],
  "scopes_supported" : [ "address", "all", "basic", "email", "offline_access", "openid", "phone", "profile" ],
  "claims_supported" : [ "acr", "address", "at_hash", "aud", "auth_time", "birthdate", "c_hash", "email", "email_verified", "family_name", "gender", "given_name", "iss", "locale", "middle_name", "name", "nickname", "nonce", "phone_number", "phone_number_verified", "picture", "preferred_username", "profile", "refresh_token", "rt_hash", "sub", "updated_at", "website", "zoneinfo" ],
  "acr_values_supported" : [ "1", "2", "3" ],
  "check_session_iframe" : "https://aaa.mew-tech.io/op/session.html",
  "end_session_endpoint" : "https://aaa.mew-tech.io/op/logout"
}
2020-08-17 19:02:15 SUCCESS
GetDynamicServerConfiguration
Successfully parsed server configuration
issuer
https://aaa.mew-tech.io/op
authorization_endpoint
https://aaa.mew-tech.io/op/authorization
request_parameter_supported
true
request_uri_parameter_supported
true
request_object_signing_alg_values_supported
[
  "NONE",
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512",
  "PS256",
  "PS384",
  "PS512",
  "ES256",
  "ES256K",
  "ES384",
  "ES512"
]
token_endpoint
https://aaa.mew-tech.io/op/token
token_endpoint_auth_methods_supported
[
  "client_secret_basic",
  "client_secret_post",
  "client_secret_jwt",
  "private_key_jwt"
]
token_endpoint_auth_signing_alg_values_supported
[
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512",
  "PS256",
  "PS384",
  "PS512",
  "ES256",
  "ES256K",
  "ES384",
  "ES512"
]
userinfo_endpoint
https://aaa.mew-tech.io/op/userinfo
userinfo_signing_alg_values_supported
[
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512",
  "PS256",
  "PS384",
  "PS512",
  "ES256",
  "ES256K",
  "ES384",
  "ES512"
]
registration_endpoint
https://aaa.mew-tech.io/op/clients
jwks_uri
https://aaa.mew-tech.io/op/jwks
registration_client_uri
https://aaa.mew-tech.io/op/clients
grant_types_supported
[
  "authorization_code",
  "implicit",
  "refresh_token",
  "client_credentials"
]
response_types_supported
[
  "code",
  "code id_token",
  "code id_token token",
  "code token",
  "id_token",
  "id_token token"
]
subject_types_supported
[
  "public",
  "pairwise"
]
id_token_signing_alg_values_supported
[
  "HS256",
  "HS384",
  "HS512",
  "RS256",
  "RS384",
  "RS512",
  "PS256",
  "PS384",
  "PS512"
]
scopes_supported
[
  "address",
  "all",
  "basic",
  "email",
  "offline_access",
  "openid",
  "phone",
  "profile"
]
claims_supported
[
  "acr",
  "address",
  "at_hash",
  "aud",
  "auth_time",
  "birthdate",
  "c_hash",
  "email",
  "email_verified",
  "family_name",
  "gender",
  "given_name",
  "iss",
  "locale",
  "middle_name",
  "name",
  "nickname",
  "nonce",
  "phone_number",
  "phone_number_verified",
  "picture",
  "preferred_username",
  "profile",
  "refresh_token",
  "rt_hash",
  "sub",
  "updated_at",
  "website",
  "zoneinfo"
]
acr_values_supported
[
  "1",
  "2",
  "3"
]
check_session_iframe
https://aaa.mew-tech.io/op/session.html
end_session_endpoint
https://aaa.mew-tech.io/op/logout
2020-08-17 19:02:15 SUCCESS
CheckServerConfiguration
Found required server configuration keys
required
[
  "authorization_endpoint",
  "token_endpoint",
  "issuer"
]
2020-08-17 19:02:15 SUCCESS
ExtractTLSTestValuesFromServerConfiguration
Extracted TLS information from authorization server configuration
registration_endpoint
{
  "testHost": "aaa.mew-tech.io",
  "testPort": 443
}
authorization_endpoint
{
  "testHost": "aaa.mew-tech.io",
  "testPort": 443
}
token_endpoint
{
  "testHost": "aaa.mew-tech.io",
  "testPort": 443
}
userinfo_endpoint
{
  "testHost": "aaa.mew-tech.io",
  "testPort": 443
}
2020-08-17 19:02:15
FetchServerKeys
Fetching server key
jwks_uri
https://aaa.mew-tech.io/op/jwks
2020-08-17 19:02:15
FetchServerKeys
HTTP request
request_uri
https://aaa.mew-tech.io/op/jwks
request_method
GET
request_headers
{
  "accept": "text/plain, application/json, application/cbor, application/*+json, */*",
  "content-length": "0"
}
request_body

                                
2020-08-17 19:02:16 RESPONSE
FetchServerKeys
HTTP response
response_status_code
200 OK
response_status_text

                                
response_headers
{
  "date": "Mon, 17 Aug 2020 19:02:16 GMT",
  "server": "Apache/2.4.25 (Debian)",
  "x-content-type-options": "nosniff",
  "x-xss-protection": "1; mode\u003dblock",
  "cache-control": "no-cache, no-store, max-age\u003d0, must-revalidate",
  "pragma": "no-cache",
  "expires": "0",
  "content-type": "application/json",
  "content-length": "9664",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive"
}
response_body
{"keys":[{"kty":"RSA","x5t#S256":"pQRhNcATHi9--fTzR8y46jyKkVlQuYWwx1WtLi5i1Z0","e":"AQAB","use":"sig","kid":"authnation","x5c":["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"],"key_ops":["sign","verify"],"n":"nFR3XnCMJyc0StJpwLOJYxXCvmUU-XRQI6mUU-enbJcWtUlQEceuMhfTMTXeodO0maxSkAiXl4ILlsXIuVo5aDwKCrc5yYy_Mjlx_yM8ZQ137FY9GW1UEBtuCDeDfz74oNK7VxLUAr5MlxxatUH9GUDrYdKO3SsQ-g0KzFeUVZYCXCVXJIJVWE29mll8s5P9H1M4Gfhew3-88YacgO5_GarLp6RIu91bqqOcoq5iSPfHFVEgHW6B6s8iaAtfHJ8gxB0Hdar5d0IhBdetUOpVk6HlHzyiOSFG1Z5db8l8wNB2_5wsqv4Oo-cV-c1Sv3OgWtuhsfL2frFxoBhviAyYhQ"},{"kty":"RSA","x5t#S256":"ZEFNZkxWkGCkfNedvQrg-03b6x2KN1RfZkmh9IOEJn4","e":"AQAB","use":"sig","kid":"authnation01","x5c":["MIIDbjCCAlagAwIBAgIJANpibpKX6nXUMA0GCSqGSIb3DQEBCwUAMGUxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZTYXhvbnkxEDAOBgNVBAcTB0dlcm1hbnkxDDAKBgNVBAoTA01FVzELMAkGA1UECxMCU0sxGDAWBgNVBAMTD2FhYS5tZXctdGVjaC5pbzAeFw0yMDA3MTQxMjEyMjBaFw0yMDEwMTIxMjEyMjBaMGUxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZTYXhvbnkxEDAOBgNVBAcTB0dlcm1hbnkxDDAKBgNVBAoTA01FVzELMAkGA1UECxMCU0sxGDAWBgNVBAMTD2FhYS5tZXctdGVjaC5pbzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALjsWJhewp2l5kcPgOd\/YPjSpn2qnXyj0sYWP\/7O4wEXK8tTGqzl4QNipWR4Xxzc9HrhMRPfZ0IQlqU4Zx6knuh52iXu0TKxg7A2kAf7p0T3jedpvKRcWv3bd7OQ3r6CFoyHWZoyw+rl2oxs2LtXfgKanlyFMj76JLz15Z4ogIGy5GPJ3DPjmNhvUYeZ2E7jB4aMK6QRIVO4RC8l54W6oVRwNxFDe7SpgC3GApbq6zbE\/B9u\/og5si7JnSOucq6aVIxJTA8QTbg36dJZ+rLCYL\/IQwnRnbRo3Ly+RMuf2Dj1pgQspEtOnL9jsxm3iFmRiR5DHihvtjms4qiJQpJqPZcCAwEAAaMhMB8wHQYDVR0OBBYEFJKtD\/XwTFyqAwMkRongBAsWMLhzMA0GCSqGSIb3DQEBCwUAA4IBAQAp73UivwRtZdSsYdBqKhf5BBVrWwdyCYdlQCBHjKVAbVfI+jSODh9CgeV4qJGYEXrSLHi99gZ54Zip9EBcLI6OHSM0OKwjFWtLikig1pWTFXS6EFxmb0V2mRBJI5+N8PXwErzZwwmkS07BO8NOVEc\/j5uEbOXZY05R0It2sI+ukfLJWxP4Q94lToSJQYrvOz5kSO9yZMwdlcNF3hzRFl7RjAqDMHwYo48sv2Z9t3bV15pC+jAzI02FdkKrEkWu0DwOa7o9NZgMgWTKQ7wkae3T7Y2ED0JhwEfyizH8nbKXpYKIdwrLXGQT2MfIRVRk4mLRg+sWA4ImkD4APxZcQAdN"],"key_ops":["sign","verify"],"n":"uOxYmF7CnaXmRw-A539g-NKmfaqdfKPSxhY__s7jARcry1MarOXhA2KlZHhfHNz0euExE99nQhCWpThnHqSe6HnaJe7RMrGDsDaQB_unRPeN52m8pFxa_dt3s5DevoIWjIdZmjLD6uXajGzYu1d-ApqeXIUyPvokvPXlniiAgbLkY8ncM-OY2G9Rh5nYTuMHhowrpBEhU7hELyXnhbqhVHA3EUN7tKmALcYClurrNsT8H27-iDmyLsmdI65yrppUjElMDxBNuDfp0ln6ssJgv8hDCdGdtGjcvL5Ey5_YOPWmBCykS06cv2OzGbeIWZGJHkMeKG-2OaziqIlCkmo9lw"},{"kty":"RSA","x5t#S256":"ttsMvLlc6h0hXfhe3lw7VAc8dMviMWc8XCNTow51izI","e":"AQAB","use":"sig","kid":"authnation02","x5c":["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"],"key_ops":["sign","verify"],"n":"m5j9yEcnAEH7TNGj1Mnyzs9Pdx11xIR25hACeU-dv0xHqSw7XvltRFcCUA6cErw1ortbrlfiuiiE71Q7C6zQ7rV9miu17P4KQMPSJ4_fwL5EbQEGYXTV-AHZtVWMLBNEJRQzNFVq8cMDKgEdiA0l6bobIeIYVYwN7q66_gFxNZNjP2ux9pGk4uj9QPxYQjIefoC7tvsTgYWrGoCwZK0Mv0X0D0HoE4XujutjdDqiEif8Kzmg1BghFGkwO8hrikF9d8o-f9INLl6pG_LbiN_FpWKZed_i8KnYCUQp9mv56YJCOwDFqIHhf992Dgu3tIhD7yOqVukY6UCbem9qYfaMeQ"},{"kty":"RSA","x5t#S256":"HsPEDMf8ZT6s0dTUtb8fMw6GZa_U3vWNGhsIDHQeWH0","e":"AQAB","use":"sig","kid":"authnation03","x5c":["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"],"key_ops":["sign","verify"],"n":"s1t1HxtM8_rANLGktnj7mnn4_ShPJ78YZMt0koMpOwYCDvtUUPhGVpm0XMflrz7s5TcCkN6t0Sq7R_i0FrNpDodJMwDXGJskmYLvdsAW9mtA52VlwV9ha6WbBdwtECnAHBYlvyWIxs0Py84uy3PrhNXGSAU2z82lYxCQx6yyINi-0M7fuvth1VNq6Mt0dJKBD6FlMdWCG_lZUAbgIdUFv4ZxlIehqBBH__4kZgnibu4z47_Cw0VRb5z_QV_EiYyT224jzivyWSP1klTBqJt1dk-B6C6QTrJLrH-TsOSXdODXgSnRGi36RUA75b4x1jXpsA6T95XPbzIC2BOLqfriJw"},{"kty":"RSA","x5t#S256":"-oVOz_yd7s4Qj5Rd-7FD6FOgVden0qELJ382DFz0esQ","e":"AQAB","use":"sig","kid":"2cc28b78-2a6e-4826-bedd-01feaab23204","x5c":["MIICqTCCAZGgAwIBAgIRAJhUT4\/mDkZjs5KRlimwKmMwDQYJKoZIhvcNAQELBQAwEDEOMAwGA1UEAxMFd29ybGQwHhcNMjAwODE3MTQyMTE1WhcNMjAwODE3MTQyMTE1WjAQMQ4wDAYDVQQDEwVoZWxsbzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAKGkFm+6gKNRMFT6QRzIXWAM6BKtdiGbvEMkXfgVyzQx\/gwpprZd\/5F7qn+3O8IZe0cWO2D5ecQEEKLVDRBWpWZzMjeuDrPnyqlVF68cenMqG5KaUVeE4\/smgFQhVTJXBbj4rq5oBPJw8wTZG0hEYLjeVRbNnoooAJ5AHDMMX9EEYuGomuRAvmjorrj3r77wTv7OTsGXsuj4r8IpDEeABvdZy5uw7kFhxBUDtwqLZypDSYIzWTuiVu8rkrpYsJkl94bKSwyiZs7Scy5ZFunoTZXWM4tWjB9xR8\/aGBSuWYQFr5UYBDfGFasNabgUw32KxPjk4f8du2Ga3U8QwbjJQTUCAwEAATANBgkqhkiG9w0BAQsFAAOCAQEAn42maEKGbnlVgmHNPt4QnfY9n2CQhjq4W+Wa+HYAPPaE2KqnkAxP635xbGeNr5ekjVcCzaBhDQgaSWjNo2jD8JDT6cxx1sw+eCdQKyNzad+X1wKWPNW78n8oPPQDLY0Evy43gtWLfyOLwnThhExdQt7uUc3l2Ek492RdBwvR\/kHsp0IMAW6rZTQKkr2o9dK2rq\/gjkrYLrL6xXHSAdKLewXCSohbCxVkLEonD\/++ZORgdXtRFJuwL0PU5i8tWONfKoiGEr6ozF7YaVKB4lJZyUyeMJELNyKIxy\/ziYYwdp8zTNxs1331v+eHckKHPq6BqWjZmrSk8aHu\/9y0pGy0bw=="],"key_ops":["sign","verify"],"n":"oaQWb7qAo1EwVPpBHMhdYAzoEq12IZu8QyRd-BXLNDH-DCmmtl3_kXuqf7c7whl7RxY7YPl5xAQQotUNEFalZnMyN64Os-fKqVUXrxx6cyobkppRV4Tj-yaAVCFVMlcFuPiurmgE8nDzBNkbSERguN5VFs2eiigAnkAcMwxf0QRi4aia5EC-aOiuuPevvvBO_s5OwZey6PivwikMR4AG91nLm7DuQWHEFQO3CotnKkNJgjNZO6JW7yuSuliwmSX3hspLDKJmztJzLlkW6ehNldYzi1aMH3FHz9oYFK5ZhAWvlRgEN8YVqw1puBTDfYrE-OTh_x27YZrdTxDBuMlBNQ"},{"kty":"RSA","x5t#S256":"hRoGSRZXjMDwOFzdH6GcFEAuIQino7lV2YTZmVDxOTU","e":"AQAB","use":"sig","kid":"f73ab4b0-4da8-4841-a3ce-bc40a664102b","x5c":["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"],"key_ops":["sign","verify"],"n":"tWlYoq8uTib5SQAW6d02tCxcPHxSJiUtLS23sfyald-UYh-0RVhytaHKdwD0Xn-OYYAjhegRsJKo7VJadjVzofPhgNNIyYZ0HTgQNC3wYx6B0T383YflCU5HgpZZrgx1-6DaX_V9d9fY-OxhozPVC8o5FROMBzawwpWtmFjCJBNQvhnTtKz1UEcxBkB01rD6plAkApBxuDjjF4BtFeqnj1d_bwOAQJgzQbs1w4kPisILe640tEVdJ-gj9HALF7AHlc_bLg9wWVBjIOXWjW8QW149QKhOQKNfdKdAcyqydYjLToOUflFzwdCjoSpkazj4uQ9vltydsENXJy1C6coeww"}]}
2020-08-17 19:02:16
FetchServerKeys
Found JWK set string
jwk_string
{"keys":[{"kty":"RSA","x5t#S256":"pQRhNcATHi9--fTzR8y46jyKkVlQuYWwx1WtLi5i1Z0","e":"AQAB","use":"sig","kid":"authnation","x5c":["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"],"key_ops":["sign","verify"],"n":"nFR3XnCMJyc0StJpwLOJYxXCvmUU-XRQI6mUU-enbJcWtUlQEceuMhfTMTXeodO0maxSkAiXl4ILlsXIuVo5aDwKCrc5yYy_Mjlx_yM8ZQ137FY9GW1UEBtuCDeDfz74oNK7VxLUAr5MlxxatUH9GUDrYdKO3SsQ-g0KzFeUVZYCXCVXJIJVWE29mll8s5P9H1M4Gfhew3-88YacgO5_GarLp6RIu91bqqOcoq5iSPfHFVEgHW6B6s8iaAtfHJ8gxB0Hdar5d0IhBdetUOpVk6HlHzyiOSFG1Z5db8l8wNB2_5wsqv4Oo-cV-c1Sv3OgWtuhsfL2frFxoBhviAyYhQ"},{"kty":"RSA","x5t#S256":"ZEFNZkxWkGCkfNedvQrg-03b6x2KN1RfZkmh9IOEJn4","e":"AQAB","use":"sig","kid":"authnation01","x5c":["MIIDbjCCAlagAwIBAgIJANpibpKX6nXUMA0GCSqGSIb3DQEBCwUAMGUxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZTYXhvbnkxEDAOBgNVBAcTB0dlcm1hbnkxDDAKBgNVBAoTA01FVzELMAkGA1UECxMCU0sxGDAWBgNVBAMTD2FhYS5tZXctdGVjaC5pbzAeFw0yMDA3MTQxMjEyMjBaFw0yMDEwMTIxMjEyMjBaMGUxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZTYXhvbnkxEDAOBgNVBAcTB0dlcm1hbnkxDDAKBgNVBAoTA01FVzELMAkGA1UECxMCU0sxGDAWBgNVBAMTD2FhYS5tZXctdGVjaC5pbzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALjsWJhewp2l5kcPgOd\/YPjSpn2qnXyj0sYWP\/7O4wEXK8tTGqzl4QNipWR4Xxzc9HrhMRPfZ0IQlqU4Zx6knuh52iXu0TKxg7A2kAf7p0T3jedpvKRcWv3bd7OQ3r6CFoyHWZoyw+rl2oxs2LtXfgKanlyFMj76JLz15Z4ogIGy5GPJ3DPjmNhvUYeZ2E7jB4aMK6QRIVO4RC8l54W6oVRwNxFDe7SpgC3GApbq6zbE\/B9u\/og5si7JnSOucq6aVIxJTA8QTbg36dJZ+rLCYL\/IQwnRnbRo3Ly+RMuf2Dj1pgQspEtOnL9jsxm3iFmRiR5DHihvtjms4qiJQpJqPZcCAwEAAaMhMB8wHQYDVR0OBBYEFJKtD\/XwTFyqAwMkRongBAsWMLhzMA0GCSqGSIb3DQEBCwUAA4IBAQAp73UivwRtZdSsYdBqKhf5BBVrWwdyCYdlQCBHjKVAbVfI+jSODh9CgeV4qJGYEXrSLHi99gZ54Zip9EBcLI6OHSM0OKwjFWtLikig1pWTFXS6EFxmb0V2mRBJI5+N8PXwErzZwwmkS07BO8NOVEc\/j5uEbOXZY05R0It2sI+ukfLJWxP4Q94lToSJQYrvOz5kSO9yZMwdlcNF3hzRFl7RjAqDMHwYo48sv2Z9t3bV15pC+jAzI02FdkKrEkWu0DwOa7o9NZgMgWTKQ7wkae3T7Y2ED0JhwEfyizH8nbKXpYKIdwrLXGQT2MfIRVRk4mLRg+sWA4ImkD4APxZcQAdN"],"key_ops":["sign","verify"],"n":"uOxYmF7CnaXmRw-A539g-NKmfaqdfKPSxhY__s7jARcry1MarOXhA2KlZHhfHNz0euExE99nQhCWpThnHqSe6HnaJe7RMrGDsDaQB_unRPeN52m8pFxa_dt3s5DevoIWjIdZmjLD6uXajGzYu1d-ApqeXIUyPvokvPXlniiAgbLkY8ncM-OY2G9Rh5nYTuMHhowrpBEhU7hELyXnhbqhVHA3EUN7tKmALcYClurrNsT8H27-iDmyLsmdI65yrppUjElMDxBNuDfp0ln6ssJgv8hDCdGdtGjcvL5Ey5_YOPWmBCykS06cv2OzGbeIWZGJHkMeKG-2OaziqIlCkmo9lw"},{"kty":"RSA","x5t#S256":"ttsMvLlc6h0hXfhe3lw7VAc8dMviMWc8XCNTow51izI","e":"AQAB","use":"sig","kid":"authnation02","x5c":["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"],"key_ops":["sign","verify"],"n":"m5j9yEcnAEH7TNGj1Mnyzs9Pdx11xIR25hACeU-dv0xHqSw7XvltRFcCUA6cErw1ortbrlfiuiiE71Q7C6zQ7rV9miu17P4KQMPSJ4_fwL5EbQEGYXTV-AHZtVWMLBNEJRQzNFVq8cMDKgEdiA0l6bobIeIYVYwN7q66_gFxNZNjP2ux9pGk4uj9QPxYQjIefoC7tvsTgYWrGoCwZK0Mv0X0D0HoE4XujutjdDqiEif8Kzmg1BghFGkwO8hrikF9d8o-f9INLl6pG_LbiN_FpWKZed_i8KnYCUQp9mv56YJCOwDFqIHhf992Dgu3tIhD7yOqVukY6UCbem9qYfaMeQ"},{"kty":"RSA","x5t#S256":"HsPEDMf8ZT6s0dTUtb8fMw6GZa_U3vWNGhsIDHQeWH0","e":"AQAB","use":"sig","kid":"authnation03","x5c":["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"],"key_ops":["sign","verify"],"n":"s1t1HxtM8_rANLGktnj7mnn4_ShPJ78YZMt0koMpOwYCDvtUUPhGVpm0XMflrz7s5TcCkN6t0Sq7R_i0FrNpDodJMwDXGJskmYLvdsAW9mtA52VlwV9ha6WbBdwtECnAHBYlvyWIxs0Py84uy3PrhNXGSAU2z82lYxCQx6yyINi-0M7fuvth1VNq6Mt0dJKBD6FlMdWCG_lZUAbgIdUFv4ZxlIehqBBH__4kZgnibu4z47_Cw0VRb5z_QV_EiYyT224jzivyWSP1klTBqJt1dk-B6C6QTrJLrH-TsOSXdODXgSnRGi36RUA75b4x1jXpsA6T95XPbzIC2BOLqfriJw"},{"kty":"RSA","x5t#S256":"-oVOz_yd7s4Qj5Rd-7FD6FOgVden0qELJ382DFz0esQ","e":"AQAB","use":"sig","kid":"2cc28b78-2a6e-4826-bedd-01feaab23204","x5c":["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"],"key_ops":["sign","verify"],"n":"oaQWb7qAo1EwVPpBHMhdYAzoEq12IZu8QyRd-BXLNDH-DCmmtl3_kXuqf7c7whl7RxY7YPl5xAQQotUNEFalZnMyN64Os-fKqVUXrxx6cyobkppRV4Tj-yaAVCFVMlcFuPiurmgE8nDzBNkbSERguN5VFs2eiigAnkAcMwxf0QRi4aia5EC-aOiuuPevvvBO_s5OwZey6PivwikMR4AG91nLm7DuQWHEFQO3CotnKkNJgjNZO6JW7yuSuliwmSX3hspLDKJmztJzLlkW6ehNldYzi1aMH3FHz9oYFK5ZhAWvlRgEN8YVqw1puBTDfYrE-OTh_x27YZrdTxDBuMlBNQ"},{"kty":"RSA","x5t#S256":"hRoGSRZXjMDwOFzdH6GcFEAuIQino7lV2YTZmVDxOTU","e":"AQAB","use":"sig","kid":"f73ab4b0-4da8-4841-a3ce-bc40a664102b","x5c":["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"],"key_ops":["sign","verify"],"n":"tWlYoq8uTib5SQAW6d02tCxcPHxSJiUtLS23sfyald-UYh-0RVhytaHKdwD0Xn-OYYAjhegRsJKo7VJadjVzofPhgNNIyYZ0HTgQNC3wYx6B0T383YflCU5HgpZZrgx1-6DaX_V9d9fY-OxhozPVC8o5FROMBzawwpWtmFjCJBNQvhnTtKz1UEcxBkB01rD6plAkApBxuDjjF4BtFeqnj1d_bwOAQJgzQbs1w4kPisILe640tEVdJ-gj9HALF7AHlc_bLg9wWVBjIOXWjW8QW149QKhOQKNfdKdAcyqydYjLToOUflFzwdCjoSpkazj4uQ9vltydsENXJy1C6coeww"}]}
2020-08-17 19:02:16 SUCCESS
FetchServerKeys
Found server JWK set
server_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "x5t#S256": "pQRhNcATHi9--fTzR8y46jyKkVlQuYWwx1WtLi5i1Z0",
      "e": "AQAB",
      "use": "sig",
      "kid": "authnation",
      "x5c": [
        "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\u003d"
      ],
      "key_ops": [
        "sign",
        "verify"
      ],
      "n": "nFR3XnCMJyc0StJpwLOJYxXCvmUU-XRQI6mUU-enbJcWtUlQEceuMhfTMTXeodO0maxSkAiXl4ILlsXIuVo5aDwKCrc5yYy_Mjlx_yM8ZQ137FY9GW1UEBtuCDeDfz74oNK7VxLUAr5MlxxatUH9GUDrYdKO3SsQ-g0KzFeUVZYCXCVXJIJVWE29mll8s5P9H1M4Gfhew3-88YacgO5_GarLp6RIu91bqqOcoq5iSPfHFVEgHW6B6s8iaAtfHJ8gxB0Hdar5d0IhBdetUOpVk6HlHzyiOSFG1Z5db8l8wNB2_5wsqv4Oo-cV-c1Sv3OgWtuhsfL2frFxoBhviAyYhQ"
    },
    {
      "kty": "RSA",
      "x5t#S256": "ZEFNZkxWkGCkfNedvQrg-03b6x2KN1RfZkmh9IOEJn4",
      "e": "AQAB",
      "use": "sig",
      "kid": "authnation01",
      "x5c": [
        "MIIDbjCCAlagAwIBAgIJANpibpKX6nXUMA0GCSqGSIb3DQEBCwUAMGUxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZTYXhvbnkxEDAOBgNVBAcTB0dlcm1hbnkxDDAKBgNVBAoTA01FVzELMAkGA1UECxMCU0sxGDAWBgNVBAMTD2FhYS5tZXctdGVjaC5pbzAeFw0yMDA3MTQxMjEyMjBaFw0yMDEwMTIxMjEyMjBaMGUxCzAJBgNVBAYTAkRFMQ8wDQYDVQQIEwZTYXhvbnkxEDAOBgNVBAcTB0dlcm1hbnkxDDAKBgNVBAoTA01FVzELMAkGA1UECxMCU0sxGDAWBgNVBAMTD2FhYS5tZXctdGVjaC5pbzCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBALjsWJhewp2l5kcPgOd/YPjSpn2qnXyj0sYWP/7O4wEXK8tTGqzl4QNipWR4Xxzc9HrhMRPfZ0IQlqU4Zx6knuh52iXu0TKxg7A2kAf7p0T3jedpvKRcWv3bd7OQ3r6CFoyHWZoyw+rl2oxs2LtXfgKanlyFMj76JLz15Z4ogIGy5GPJ3DPjmNhvUYeZ2E7jB4aMK6QRIVO4RC8l54W6oVRwNxFDe7SpgC3GApbq6zbE/B9u/og5si7JnSOucq6aVIxJTA8QTbg36dJZ+rLCYL/IQwnRnbRo3Ly+RMuf2Dj1pgQspEtOnL9jsxm3iFmRiR5DHihvtjms4qiJQpJqPZcCAwEAAaMhMB8wHQYDVR0OBBYEFJKtD/XwTFyqAwMkRongBAsWMLhzMA0GCSqGSIb3DQEBCwUAA4IBAQAp73UivwRtZdSsYdBqKhf5BBVrWwdyCYdlQCBHjKVAbVfI+jSODh9CgeV4qJGYEXrSLHi99gZ54Zip9EBcLI6OHSM0OKwjFWtLikig1pWTFXS6EFxmb0V2mRBJI5+N8PXwErzZwwmkS07BO8NOVEc/j5uEbOXZY05R0It2sI+ukfLJWxP4Q94lToSJQYrvOz5kSO9yZMwdlcNF3hzRFl7RjAqDMHwYo48sv2Z9t3bV15pC+jAzI02FdkKrEkWu0DwOa7o9NZgMgWTKQ7wkae3T7Y2ED0JhwEfyizH8nbKXpYKIdwrLXGQT2MfIRVRk4mLRg+sWA4ImkD4APxZcQAdN"
      ],
      "key_ops": [
        "sign",
        "verify"
      ],
      "n": "uOxYmF7CnaXmRw-A539g-NKmfaqdfKPSxhY__s7jARcry1MarOXhA2KlZHhfHNz0euExE99nQhCWpThnHqSe6HnaJe7RMrGDsDaQB_unRPeN52m8pFxa_dt3s5DevoIWjIdZmjLD6uXajGzYu1d-ApqeXIUyPvokvPXlniiAgbLkY8ncM-OY2G9Rh5nYTuMHhowrpBEhU7hELyXnhbqhVHA3EUN7tKmALcYClurrNsT8H27-iDmyLsmdI65yrppUjElMDxBNuDfp0ln6ssJgv8hDCdGdtGjcvL5Ey5_YOPWmBCykS06cv2OzGbeIWZGJHkMeKG-2OaziqIlCkmo9lw"
    },
    {
      "kty": "RSA",
      "x5t#S256": "ttsMvLlc6h0hXfhe3lw7VAc8dMviMWc8XCNTow51izI",
      "e": "AQAB",
      "use": "sig",
      "kid": "authnation02",
      "x5c": [
        "MIIDbTCCAlWgAwIBAgIIPeupkk9kmXMwDQYJKoZIhvcNAQELBQAwZTELMAkGA1UEBhMCREUxDzANBgNVBAgTBlNheG9ueTEQMA4GA1UEBxMHR2VybWFueTEMMAoGA1UEChMDTUVXMQswCQYDVQQLEwJTSzEYMBYGA1UEAxMPYWFhLm1ldy10ZWNoLmlvMB4XDTIwMDcxNDEyMTIyMloXDTIwMTAxMjEyMTIyMlowZTELMAkGA1UEBhMCREUxDzANBgNVBAgTBlNheG9ueTEQMA4GA1UEBxMHR2VybWFueTEMMAoGA1UEChMDTUVXMQswCQYDVQQLEwJTSzEYMBYGA1UEAxMPYWFhLm1ldy10ZWNoLmlvMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAm5j9yEcnAEH7TNGj1Mnyzs9Pdx11xIR25hACeU+dv0xHqSw7XvltRFcCUA6cErw1ortbrlfiuiiE71Q7C6zQ7rV9miu17P4KQMPSJ4/fwL5EbQEGYXTV+AHZtVWMLBNEJRQzNFVq8cMDKgEdiA0l6bobIeIYVYwN7q66/gFxNZNjP2ux9pGk4uj9QPxYQjIefoC7tvsTgYWrGoCwZK0Mv0X0D0HoE4XujutjdDqiEif8Kzmg1BghFGkwO8hrikF9d8o+f9INLl6pG/LbiN/FpWKZed/i8KnYCUQp9mv56YJCOwDFqIHhf992Dgu3tIhD7yOqVukY6UCbem9qYfaMeQIDAQABoyEwHzAdBgNVHQ4EFgQUjw+shMWiGgXNrueLHBLV+4mBHq8wDQYJKoZIhvcNAQELBQADggEBAB4LG1DvbQvMD+n0WJH0gmux76o1EJwy/rL0eKEiZ6KObshtjvrMwqV1QxkS5IPucCgRFkhGmJeEjxxvYuw2xuzI6ddXCKVIehc6YuwQZK/1xOG+givWYSJAytdVjxSZfmK69qFwn2vG111vpmMKvS2iULN4Q7QG3FG3BYTmyJ0wRQEHVSGb1OP9+R+tN5wx/U7mucD1YneM2uZfyGpGTHNGeu8Zwxl0cd/SDBjJwewhNpbKKU+H2nF3VTKdjtWRJGksQ9f/a7xw55Z4dAgcWUkAO3yWA9hlYXJI9qQ65752Gi0V9NaUKunUcKswpth6FPUyjdW02ROKm1W7w6L2fD8\u003d"
      ],
      "key_ops": [
        "sign",
        "verify"
      ],
      "n": "m5j9yEcnAEH7TNGj1Mnyzs9Pdx11xIR25hACeU-dv0xHqSw7XvltRFcCUA6cErw1ortbrlfiuiiE71Q7C6zQ7rV9miu17P4KQMPSJ4_fwL5EbQEGYXTV-AHZtVWMLBNEJRQzNFVq8cMDKgEdiA0l6bobIeIYVYwN7q66_gFxNZNjP2ux9pGk4uj9QPxYQjIefoC7tvsTgYWrGoCwZK0Mv0X0D0HoE4XujutjdDqiEif8Kzmg1BghFGkwO8hrikF9d8o-f9INLl6pG_LbiN_FpWKZed_i8KnYCUQp9mv56YJCOwDFqIHhf992Dgu3tIhD7yOqVukY6UCbem9qYfaMeQ"
    },
    {
      "kty": "RSA",
      "x5t#S256": "HsPEDMf8ZT6s0dTUtb8fMw6GZa_U3vWNGhsIDHQeWH0",
      "e": "AQAB",
      "use": "sig",
      "kid": "authnation03",
      "x5c": [
        "MIIDbTCCAlWgAwIBAgIIbPMO+CRt+UkwDQYJKoZIhvcNAQELBQAwZTELMAkGA1UEBhMCREUxDzANBgNVBAgTBlNheG9ueTEQMA4GA1UEBxMHR2VybWFueTEMMAoGA1UEChMDTUVXMQswCQYDVQQLEwJTSzEYMBYGA1UEAxMPYWFhLm1ldy10ZWNoLmlvMB4XDTIwMDcxNDEyMTIyNFoXDTIwMTAxMjEyMTIyNFowZTELMAkGA1UEBhMCREUxDzANBgNVBAgTBlNheG9ueTEQMA4GA1UEBxMHR2VybWFueTEMMAoGA1UEChMDTUVXMQswCQYDVQQLEwJTSzEYMBYGA1UEAxMPYWFhLm1ldy10ZWNoLmlvMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAs1t1HxtM8/rANLGktnj7mnn4/ShPJ78YZMt0koMpOwYCDvtUUPhGVpm0XMflrz7s5TcCkN6t0Sq7R/i0FrNpDodJMwDXGJskmYLvdsAW9mtA52VlwV9ha6WbBdwtECnAHBYlvyWIxs0Py84uy3PrhNXGSAU2z82lYxCQx6yyINi+0M7fuvth1VNq6Mt0dJKBD6FlMdWCG/lZUAbgIdUFv4ZxlIehqBBH//4kZgnibu4z47/Cw0VRb5z/QV/EiYyT224jzivyWSP1klTBqJt1dk+B6C6QTrJLrH+TsOSXdODXgSnRGi36RUA75b4x1jXpsA6T95XPbzIC2BOLqfriJwIDAQABoyEwHzAdBgNVHQ4EFgQUmdTi1CLz6RzuFY4MMNTdhGfYVR0wDQYJKoZIhvcNAQELBQADggEBAGr2h7+SwmfihMIp43uW9DpXdNg8BOjCIOPLPA+Q2mGY1zUcbJv1vh+6s0S+4wl6wgfguekjF5Y7ty+aT8KmA6TA14VfWaKDU3CPrqBEGoJh74K3ycV4OtzmjoMoHm3jE3qPbbz2n9wptktVSzHv9my7ajPq95V3VZy2ADQnKzKEhH0BadDLiY3PYQ99vjTaSoB87/nYf81f7DCg8Ax3lUS2mo54rPVjQucddSFvtiebyJbMBuKaRUL0f+85KRsJAbvbYY0nxdQFawzqCCsahIBXRp8NAtfCsTHvhH+O3aNe/Z6ItMzb+VnSuTw3587QVh/1OWDrPk4w+t3drd9BALY\u003d"
      ],
      "key_ops": [
        "sign",
        "verify"
      ],
      "n": "s1t1HxtM8_rANLGktnj7mnn4_ShPJ78YZMt0koMpOwYCDvtUUPhGVpm0XMflrz7s5TcCkN6t0Sq7R_i0FrNpDodJMwDXGJskmYLvdsAW9mtA52VlwV9ha6WbBdwtECnAHBYlvyWIxs0Py84uy3PrhNXGSAU2z82lYxCQx6yyINi-0M7fuvth1VNq6Mt0dJKBD6FlMdWCG_lZUAbgIdUFv4ZxlIehqBBH__4kZgnibu4z47_Cw0VRb5z_QV_EiYyT224jzivyWSP1klTBqJt1dk-B6C6QTrJLrH-TsOSXdODXgSnRGi36RUA75b4x1jXpsA6T95XPbzIC2BOLqfriJw"
    },
    {
      "kty": "RSA",
      "x5t#S256": "-oVOz_yd7s4Qj5Rd-7FD6FOgVden0qELJ382DFz0esQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "2cc28b78-2a6e-4826-bedd-01feaab23204",
      "x5c": [
        "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\u003d\u003d"
      ],
      "key_ops": [
        "sign",
        "verify"
      ],
      "n": "oaQWb7qAo1EwVPpBHMhdYAzoEq12IZu8QyRd-BXLNDH-DCmmtl3_kXuqf7c7whl7RxY7YPl5xAQQotUNEFalZnMyN64Os-fKqVUXrxx6cyobkppRV4Tj-yaAVCFVMlcFuPiurmgE8nDzBNkbSERguN5VFs2eiigAnkAcMwxf0QRi4aia5EC-aOiuuPevvvBO_s5OwZey6PivwikMR4AG91nLm7DuQWHEFQO3CotnKkNJgjNZO6JW7yuSuliwmSX3hspLDKJmztJzLlkW6ehNldYzi1aMH3FHz9oYFK5ZhAWvlRgEN8YVqw1puBTDfYrE-OTh_x27YZrdTxDBuMlBNQ"
    },
    {
      "kty": "RSA",
      "x5t#S256": "hRoGSRZXjMDwOFzdH6GcFEAuIQino7lV2YTZmVDxOTU",
      "e": "AQAB",
      "use": "sig",
      "kid": "f73ab4b0-4da8-4841-a3ce-bc40a664102b",
      "x5c": [
        "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"
      ],
      "key_ops": [
        "sign",
        "verify"
      ],
      "n": "tWlYoq8uTib5SQAW6d02tCxcPHxSJiUtLS23sfyald-UYh-0RVhytaHKdwD0Xn-OYYAjhegRsJKo7VJadjVzofPhgNNIyYZ0HTgQNC3wYx6B0T383YflCU5HgpZZrgx1-6DaX_V9d9fY-OxhozPVC8o5FROMBzawwpWtmFjCJBNQvhnTtKz1UEcxBkB01rD6plAkApBxuDjjF4BtFeqnj1d_bwOAQJgzQbs1w4kPisILe640tEVdJ-gj9HALF7AHlc_bLg9wWVBjIOXWjW8QW149QKhOQKNfdKdAcyqydYjLToOUflFzwdCjoSpkazj4uQ9vltydsENXJy1C6coeww"
    }
  ]
}
2020-08-17 19:02:16 SUCCESS
CheckServerKeysIsValid
Server JWKs is valid
server_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "x5t#S256": "pQRhNcATHi9--fTzR8y46jyKkVlQuYWwx1WtLi5i1Z0",
      "e": "AQAB",
      "use": "sig",
      "kid": "authnation",
      "x5c": [
        "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\u003d"
      ],
      "key_ops": [
        "sign",
        "verify"
      ],
      "n": "nFR3XnCMJyc0StJpwLOJYxXCvmUU-XRQI6mUU-enbJcWtUlQEceuMhfTMTXeodO0maxSkAiXl4ILlsXIuVo5aDwKCrc5yYy_Mjlx_yM8ZQ137FY9GW1UEBtuCDeDfz74oNK7VxLUAr5MlxxatUH9GUDrYdKO3SsQ-g0KzFeUVZYCXCVXJIJVWE29mll8s5P9H1M4Gfhew3-88YacgO5_GarLp6RIu91bqqOcoq5iSPfHFVEgHW6B6s8iaAtfHJ8gxB0Hdar5d0IhBdetUOpVk6HlHzyiOSFG1Z5db8l8wNB2_5wsqv4Oo-cV-c1Sv3OgWtuhsfL2frFxoBhviAyYhQ"
    },
    {
      "kty": "RSA",
      "x5t#S256": "ZEFNZkxWkGCkfNedvQrg-03b6x2KN1RfZkmh9IOEJn4",
      "e": "AQAB",
      "use": "sig",
      "kid": "authnation01",
      "x5c": [
        "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"
      ],
      "key_ops": [
        "sign",
        "verify"
      ],
      "n": "uOxYmF7CnaXmRw-A539g-NKmfaqdfKPSxhY__s7jARcry1MarOXhA2KlZHhfHNz0euExE99nQhCWpThnHqSe6HnaJe7RMrGDsDaQB_unRPeN52m8pFxa_dt3s5DevoIWjIdZmjLD6uXajGzYu1d-ApqeXIUyPvokvPXlniiAgbLkY8ncM-OY2G9Rh5nYTuMHhowrpBEhU7hELyXnhbqhVHA3EUN7tKmALcYClurrNsT8H27-iDmyLsmdI65yrppUjElMDxBNuDfp0ln6ssJgv8hDCdGdtGjcvL5Ey5_YOPWmBCykS06cv2OzGbeIWZGJHkMeKG-2OaziqIlCkmo9lw"
    },
    {
      "kty": "RSA",
      "x5t#S256": "ttsMvLlc6h0hXfhe3lw7VAc8dMviMWc8XCNTow51izI",
      "e": "AQAB",
      "use": "sig",
      "kid": "authnation02",
      "x5c": [
        "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\u003d"
      ],
      "key_ops": [
        "sign",
        "verify"
      ],
      "n": "m5j9yEcnAEH7TNGj1Mnyzs9Pdx11xIR25hACeU-dv0xHqSw7XvltRFcCUA6cErw1ortbrlfiuiiE71Q7C6zQ7rV9miu17P4KQMPSJ4_fwL5EbQEGYXTV-AHZtVWMLBNEJRQzNFVq8cMDKgEdiA0l6bobIeIYVYwN7q66_gFxNZNjP2ux9pGk4uj9QPxYQjIefoC7tvsTgYWrGoCwZK0Mv0X0D0HoE4XujutjdDqiEif8Kzmg1BghFGkwO8hrikF9d8o-f9INLl6pG_LbiN_FpWKZed_i8KnYCUQp9mv56YJCOwDFqIHhf992Dgu3tIhD7yOqVukY6UCbem9qYfaMeQ"
    },
    {
      "kty": "RSA",
      "x5t#S256": "HsPEDMf8ZT6s0dTUtb8fMw6GZa_U3vWNGhsIDHQeWH0",
      "e": "AQAB",
      "use": "sig",
      "kid": "authnation03",
      "x5c": [
        "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\u003d"
      ],
      "key_ops": [
        "sign",
        "verify"
      ],
      "n": "s1t1HxtM8_rANLGktnj7mnn4_ShPJ78YZMt0koMpOwYCDvtUUPhGVpm0XMflrz7s5TcCkN6t0Sq7R_i0FrNpDodJMwDXGJskmYLvdsAW9mtA52VlwV9ha6WbBdwtECnAHBYlvyWIxs0Py84uy3PrhNXGSAU2z82lYxCQx6yyINi-0M7fuvth1VNq6Mt0dJKBD6FlMdWCG_lZUAbgIdUFv4ZxlIehqBBH__4kZgnibu4z47_Cw0VRb5z_QV_EiYyT224jzivyWSP1klTBqJt1dk-B6C6QTrJLrH-TsOSXdODXgSnRGi36RUA75b4x1jXpsA6T95XPbzIC2BOLqfriJw"
    },
    {
      "kty": "RSA",
      "x5t#S256": "-oVOz_yd7s4Qj5Rd-7FD6FOgVden0qELJ382DFz0esQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "2cc28b78-2a6e-4826-bedd-01feaab23204",
      "x5c": [
        "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\u003d\u003d"
      ],
      "key_ops": [
        "sign",
        "verify"
      ],
      "n": "oaQWb7qAo1EwVPpBHMhdYAzoEq12IZu8QyRd-BXLNDH-DCmmtl3_kXuqf7c7whl7RxY7YPl5xAQQotUNEFalZnMyN64Os-fKqVUXrxx6cyobkppRV4Tj-yaAVCFVMlcFuPiurmgE8nDzBNkbSERguN5VFs2eiigAnkAcMwxf0QRi4aia5EC-aOiuuPevvvBO_s5OwZey6PivwikMR4AG91nLm7DuQWHEFQO3CotnKkNJgjNZO6JW7yuSuliwmSX3hspLDKJmztJzLlkW6ehNldYzi1aMH3FHz9oYFK5ZhAWvlRgEN8YVqw1puBTDfYrE-OTh_x27YZrdTxDBuMlBNQ"
    },
    {
      "kty": "RSA",
      "x5t#S256": "hRoGSRZXjMDwOFzdH6GcFEAuIQino7lV2YTZmVDxOTU",
      "e": "AQAB",
      "use": "sig",
      "kid": "f73ab4b0-4da8-4841-a3ce-bc40a664102b",
      "x5c": [
        "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"
      ],
      "key_ops": [
        "sign",
        "verify"
      ],
      "n": "tWlYoq8uTib5SQAW6d02tCxcPHxSJiUtLS23sfyald-UYh-0RVhytaHKdwD0Xn-OYYAjhegRsJKo7VJadjVzofPhgNNIyYZ0HTgQNC3wYx6B0T383YflCU5HgpZZrgx1-6DaX_V9d9fY-OxhozPVC8o5FROMBzawwpWtmFjCJBNQvhnTtKz1UEcxBkB01rD6plAkApBxuDjjF4BtFeqnj1d_bwOAQJgzQbs1w4kPisILe640tEVdJ-gj9HALF7AHlc_bLg9wWVBjIOXWjW8QW149QKhOQKNfdKdAcyqydYjLToOUflFzwdCjoSpkazj4uQ9vltydsENXJy1C6coeww"
    }
  ]
}
2020-08-17 19:02:16 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-08-17 19:02:16 SUCCESS
CheckForKeyIdInServerJWKs
All keys contain kids
2020-08-17 19:02:16 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-08-17 19:02:16 SUCCESS
EnsureServerJwksDoesNotContainPrivateOrSymmetricKeys
Jwks does not contain any private or symmetric keys
2020-08-17 19:02:16 SUCCESS
GetDynamicClientConfiguration
Created dynamic_client_registration_template object from the client configuration.
client_name
basic-op-test-client-name-1
2020-08-17 19:02:16 SUCCESS
GenerateRS256ClientJWKs
Generated client JWKs
client_jwks
{
  "keys": [
    {
      "p": "zYYnCE1_aVN-13u85Xgh3_m_hd7dKYIbrt3HjODB-SwzkVnN7XkOE-Gaf4-cGo5J7c6JMbvdiofUBKUWr5vRnVIR0uRBso4fBV6MbsR1Lm_BjxrUe096amtQ0-EaWGN8gijOobz-ydtchpifSr_7k8Y9jitff9aRGrEdTe7JEeM",
      "kty": "RSA",
      "q": "yArA5R5LPdTki3Usim6ibyJozwJLaZ7ljwuC6cWGWRuACW9a8P8xp_5jsyoDKnViPUq-JnwZ-ewwQieRrkR8osAYN4XOLXuuOEznDcqsQNADUTwwHlzwHtxp-ngyRJIUj4LZ6T_gsFtwkm10n8l9xYfou7QUf_HQV0bSyLwihQ0",
      "d": "l7EWxyTvukROr0DQ1571XZ8qdgsLtfbrNRYAerJS45N7F9H1N0dTUg4v3Hy_8zUy4a3AVdIFEsyHm_fBq-eFv0O1iCB76hL7xpeElMA8Eewgszkn3EL_3UikTyE81SKWlOXe3IJQhFSr8GfCvmF6NMCUra1JUgk6y7PFQ-2xtPsI_0cWxe0F-6BWaVo2VCO1TYuqD8iyVrcTdfHq0NMCVwQPww0GjxLCFHUY368pZabwQU7Uv1vArQyRagQfaAoEV80dWkeMTHA0BpCpreX3i8aeBJZTYgiYmfzr2VQweKJ1rqSgO35M3n1t7wPCV61BDWaB-tMAioYjQZIa_iwSUQ",
      "e": "AQAB",
      "use": "sig",
      "qi": "wVZaT6AUATAu4iTH74Y-O786CLpvRXCZ0eFHtZ_b_ZKGziPLF9zZU5q3gg6hQhu22lciLaQp054Ub3STN5VaCA-H9Rh_6FMGHIr64ySF4kOG63pPK5jCY-3MDJJMNJ2xP6xD8XA5RIgqcuOcALn4GbRb4BTjjVPs_0igzuSJcCY",
      "dp": "ciAUfJ_MKIic3rtvYV0cMmtU1tmypeIBzVCKBsin7d2FpSjhGQUntBKK4Fq2rGhm1Q7jUCKqGsriCNJDjrBP7bQtAZaOhMA2qZyfDsM47thP-09Cvlab-4wsDfvpzTsxYHWYiGeSdDTDZFpL2g5RfPWQKOoc1bgoS1Iem7AFJ1E",
      "alg": "RS256",
      "dq": "kJ4Nk9ZRyPKnAxcDy1RuQ-_ZW4aqJEKGbOKCkySEmtjhuHBzi3TCXlPvmfAOd9yC2BK34zSmxuJ0hO78R8MlY7eCCmnGg2U9r2ARTgwueXCoZUsg8mJ4CaeJSlUo6h-9k36isRjIBFcmzAUrYfUV4v79Ru3KQDD-UIpYClzQi-U",
      "n": "oJlwmJF31lSEt4SYUrXnJ-kSn5KyJeBLFd2ZOckWESXJCy28Q7Wz7YMQaah1x-SyhQThSZkaOy2oiwTHe150eBpa6mmSrsO8YbZZsX5lCFitbTHpm4zy8OhCmSegemkTS2By4SDyvFrzV2IiL2k8ckkbMlJLLo1frRWM4Yy1BETWNuyzOKRdkFl4NHLC8fMWmTZ_luMF8kl7kY5sG142LuGtlzanyAePoz8OwdPHfJTX5n-WrL2pMmgrRGngOMNayTXl4u6Pt5rwEJfsA9faK0YajqJwNBiH0ZD2MSKBAZanQjX9xFEupvehM5vwzd_p-nw04t-Hk4oFwYkyqqbXhw"
    }
  ]
}
public_client_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "alg": "RS256",
      "n": "oJlwmJF31lSEt4SYUrXnJ-kSn5KyJeBLFd2ZOckWESXJCy28Q7Wz7YMQaah1x-SyhQThSZkaOy2oiwTHe150eBpa6mmSrsO8YbZZsX5lCFitbTHpm4zy8OhCmSegemkTS2By4SDyvFrzV2IiL2k8ckkbMlJLLo1frRWM4Yy1BETWNuyzOKRdkFl4NHLC8fMWmTZ_luMF8kl7kY5sG142LuGtlzanyAePoz8OwdPHfJTX5n-WrL2pMmgrRGngOMNayTXl4u6Pt5rwEJfsA9faK0YajqJwNBiH0ZD2MSKBAZanQjX9xFEupvehM5vwzd_p-nw04t-Hk4oFwYkyqqbXhw"
    }
  ]
}
2020-08-17 19:02:16 SUCCESS
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-08-17 19:02:16 SUCCESS
CreateDynamicRegistrationRequest
Created dynamic registration request
client_name
basic-op-test-client-name-1 Lp2FoRqf6ul6XW8
2020-08-17 19:02:16
AddAuthorizationCodeGrantTypeToDynamicRegistrationRequest
Added 'authorization_code' to 'grant_types'
grant_types
[
  "authorization_code"
]
2020-08-17 19:02:16
AddPublicJwksToDynamicRegistrationRequest
Added client public JWKS to dynamic registration request
dynamic_registration_request
{
  "client_name": "basic-op-test-client-name-1 Lp2FoRqf6ul6XW8",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "oJlwmJF31lSEt4SYUrXnJ-kSn5KyJeBLFd2ZOckWESXJCy28Q7Wz7YMQaah1x-SyhQThSZkaOy2oiwTHe150eBpa6mmSrsO8YbZZsX5lCFitbTHpm4zy8OhCmSegemkTS2By4SDyvFrzV2IiL2k8ckkbMlJLLo1frRWM4Yy1BETWNuyzOKRdkFl4NHLC8fMWmTZ_luMF8kl7kY5sG142LuGtlzanyAePoz8OwdPHfJTX5n-WrL2pMmgrRGngOMNayTXl4u6Pt5rwEJfsA9faK0YajqJwNBiH0ZD2MSKBAZanQjX9xFEupvehM5vwzd_p-nw04t-Hk4oFwYkyqqbXhw"
      }
    ]
  }
}
2020-08-17 19:02:16
AddTokenEndpointAuthMethodToDynamicRegistrationRequestFromEnvironment
Added token endpoint auth method to dynamic registration request
dynamic_registration_request
{
  "client_name": "basic-op-test-client-name-1 Lp2FoRqf6ul6XW8",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "oJlwmJF31lSEt4SYUrXnJ-kSn5KyJeBLFd2ZOckWESXJCy28Q7Wz7YMQaah1x-SyhQThSZkaOy2oiwTHe150eBpa6mmSrsO8YbZZsX5lCFitbTHpm4zy8OhCmSegemkTS2By4SDyvFrzV2IiL2k8ckkbMlJLLo1frRWM4Yy1BETWNuyzOKRdkFl4NHLC8fMWmTZ_luMF8kl7kY5sG142LuGtlzanyAePoz8OwdPHfJTX5n-WrL2pMmgrRGngOMNayTXl4u6Pt5rwEJfsA9faK0YajqJwNBiH0ZD2MSKBAZanQjX9xFEupvehM5vwzd_p-nw04t-Hk4oFwYkyqqbXhw"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic"
}
2020-08-17 19:02:16
AddResponseTypesArrayToDynamicRegistrationRequestFromEnvironment
Added response_types array to dynamic registration request
dynamic_registration_request
{
  "client_name": "basic-op-test-client-name-1 Lp2FoRqf6ul6XW8",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "oJlwmJF31lSEt4SYUrXnJ-kSn5KyJeBLFd2ZOckWESXJCy28Q7Wz7YMQaah1x-SyhQThSZkaOy2oiwTHe150eBpa6mmSrsO8YbZZsX5lCFitbTHpm4zy8OhCmSegemkTS2By4SDyvFrzV2IiL2k8ckkbMlJLLo1frRWM4Yy1BETWNuyzOKRdkFl4NHLC8fMWmTZ_luMF8kl7kY5sG142LuGtlzanyAePoz8OwdPHfJTX5n-WrL2pMmgrRGngOMNayTXl4u6Pt5rwEJfsA9faK0YajqJwNBiH0ZD2MSKBAZanQjX9xFEupvehM5vwzd_p-nw04t-Hk4oFwYkyqqbXhw"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ]
}
2020-08-17 19:02:16
AddRedirectUriToDynamicRegistrationRequest
Added redirect_uris array to dynamic registration request
dynamic_registration_request
{
  "client_name": "basic-op-test-client-name-1 Lp2FoRqf6ul6XW8",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "oJlwmJF31lSEt4SYUrXnJ-kSn5KyJeBLFd2ZOckWESXJCy28Q7Wz7YMQaah1x-SyhQThSZkaOy2oiwTHe150eBpa6mmSrsO8YbZZsX5lCFitbTHpm4zy8OhCmSegemkTS2By4SDyvFrzV2IiL2k8ckkbMlJLLo1frRWM4Yy1BETWNuyzOKRdkFl4NHLC8fMWmTZ_luMF8kl7kY5sG142LuGtlzanyAePoz8OwdPHfJTX5n-WrL2pMmgrRGngOMNayTXl4u6Pt5rwEJfsA9faK0YajqJwNBiH0ZD2MSKBAZanQjX9xFEupvehM5vwzd_p-nw04t-Hk4oFwYkyqqbXhw"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "redirect_uris": [
    "https://www.certification.openid.net/test/a/mew-tech.io/callback"
  ]
}
2020-08-17 19:02:16
AddContactsToDynamicRegistrationRequest
Added contacts array to dynamic registration request
dynamic_registration_request
{
  "client_name": "basic-op-test-client-name-1 Lp2FoRqf6ul6XW8",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "oJlwmJF31lSEt4SYUrXnJ-kSn5KyJeBLFd2ZOckWESXJCy28Q7Wz7YMQaah1x-SyhQThSZkaOy2oiwTHe150eBpa6mmSrsO8YbZZsX5lCFitbTHpm4zy8OhCmSegemkTS2By4SDyvFrzV2IiL2k8ckkbMlJLLo1frRWM4Yy1BETWNuyzOKRdkFl4NHLC8fMWmTZ_luMF8kl7kY5sG142LuGtlzanyAePoz8OwdPHfJTX5n-WrL2pMmgrRGngOMNayTXl4u6Pt5rwEJfsA9faK0YajqJwNBiH0ZD2MSKBAZanQjX9xFEupvehM5vwzd_p-nw04t-Hk4oFwYkyqqbXhw"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "redirect_uris": [
    "https://www.certification.openid.net/test/a/mew-tech.io/callback"
  ],
  "contacts": [
    "certification@oidf.org"
  ]
}
2020-08-17 19:02:16
AddRefreshTokenGrantTypeToDynamicRegistrationRequest
Added 'refresh_token' to 'grant_types'
grant_types
[
  "authorization_code",
  "refresh_token"
]
2020-08-17 19:02:16
CallDynamicRegistrationEndpoint
HTTP request
request_uri
https://aaa.mew-tech.io/op/clients
request_method
POST
request_headers
{
  "accept": "application/json",
  "accept-charset": "utf-8",
  "content-type": "application/json",
  "content-length": "732"
}
request_body
{"client_name":"basic-op-test-client-name-1 Lp2FoRqf6ul6XW8","grant_types":["authorization_code","refresh_token"],"jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"oJlwmJF31lSEt4SYUrXnJ-kSn5KyJeBLFd2ZOckWESXJCy28Q7Wz7YMQaah1x-SyhQThSZkaOy2oiwTHe150eBpa6mmSrsO8YbZZsX5lCFitbTHpm4zy8OhCmSegemkTS2By4SDyvFrzV2IiL2k8ckkbMlJLLo1frRWM4Yy1BETWNuyzOKRdkFl4NHLC8fMWmTZ_luMF8kl7kY5sG142LuGtlzanyAePoz8OwdPHfJTX5n-WrL2pMmgrRGngOMNayTXl4u6Pt5rwEJfsA9faK0YajqJwNBiH0ZD2MSKBAZanQjX9xFEupvehM5vwzd_p-nw04t-Hk4oFwYkyqqbXhw"}]},"token_endpoint_auth_method":"client_secret_basic","response_types":["code"],"redirect_uris":["https://www.certification.openid.net/test/a/mew-tech.io/callback"],"contacts":["certification@oidf.org"]}
2020-08-17 19:02:17 RESPONSE
CallDynamicRegistrationEndpoint
HTTP response
response_status_code
201 CREATED
response_status_text

                                
response_headers
{
  "date": "Mon, 17 Aug 2020 19:02:16 GMT",
  "server": "Apache/2.4.25 (Debian)",
  "cache-control": "no-store",
  "pragma": "no-cache",
  "x-content-type-options": "nosniff",
  "x-xss-protection": "1; mode\u003dblock",
  "content-type": "application/json;charset\u003dUTF-8",
  "content-length": "1176",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive"
}
response_body
{"post_logout_redirect_uris":[],"grant_types":["authorization_code"],"jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"oJlwmJF31lSEt4SYUrXnJ-kSn5KyJeBLFd2ZOckWESXJCy28Q7Wz7YMQaah1x-SyhQThSZkaOy2oiwTHe150eBpa6mmSrsO8YbZZsX5lCFitbTHpm4zy8OhCmSegemkTS2By4SDyvFrzV2IiL2k8ckkbMlJLLo1frRWM4Yy1BETWNuyzOKRdkFl4NHLC8fMWmTZ_luMF8kl7kY5sG142LuGtlzanyAePoz8OwdPHfJTX5n-WrL2pMmgrRGngOMNayTXl4u6Pt5rwEJfsA9faK0YajqJwNBiH0ZD2MSKBAZanQjX9xFEupvehM5vwzd_p-nw04t-Hk4oFwYkyqqbXhw"}]},"subject_type":"pairwise","application_type":"web","registration_client_uri":"https:\/\/aaa.mew-tech.io\/op\/clients","redirect_uris":["https:\/\/www.certification.openid.net\/test\/a\/mew-tech.io\/callback"],"registration_access_token":"dEQIyv3UmPR1ut7aTYL-3BosDt9SDP4I","token_endpoint_auth_method":"client_secret_basic","client_id":"4c3244c2-4b51-41ba-bb83-2d54a5519e8d","software_id":"UNKNOWN","client_secret_expires_at":0,"scope":"","software_version":"UNKNOWN","client_id_issued_at":1597690936,"client_secret":"3w3JnR9dZ7lfJpzAUo2A8eML\/ELnH4EuJbt1\/7xHHIQ","client_name":"basic-op-test-client-name-1 Lp2FoRqf6ul6XW8","response_types":["code"],"id_token_signed_response_alg":"RS256"}
2020-08-17 19:02:17
CallDynamicRegistrationEndpoint
Registration endpoint response
dynamic_registration_response
{"post_logout_redirect_uris":[],"grant_types":["authorization_code"],"jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"oJlwmJF31lSEt4SYUrXnJ-kSn5KyJeBLFd2ZOckWESXJCy28Q7Wz7YMQaah1x-SyhQThSZkaOy2oiwTHe150eBpa6mmSrsO8YbZZsX5lCFitbTHpm4zy8OhCmSegemkTS2By4SDyvFrzV2IiL2k8ckkbMlJLLo1frRWM4Yy1BETWNuyzOKRdkFl4NHLC8fMWmTZ_luMF8kl7kY5sG142LuGtlzanyAePoz8OwdPHfJTX5n-WrL2pMmgrRGngOMNayTXl4u6Pt5rwEJfsA9faK0YajqJwNBiH0ZD2MSKBAZanQjX9xFEupvehM5vwzd_p-nw04t-Hk4oFwYkyqqbXhw"}]},"subject_type":"pairwise","application_type":"web","registration_client_uri":"https:\/\/aaa.mew-tech.io\/op\/clients","redirect_uris":["https:\/\/www.certification.openid.net\/test\/a\/mew-tech.io\/callback"],"registration_access_token":"dEQIyv3UmPR1ut7aTYL-3BosDt9SDP4I","token_endpoint_auth_method":"client_secret_basic","client_id":"4c3244c2-4b51-41ba-bb83-2d54a5519e8d","software_id":"UNKNOWN","client_secret_expires_at":0,"scope":"","software_version":"UNKNOWN","client_id_issued_at":1597690936,"client_secret":"3w3JnR9dZ7lfJpzAUo2A8eML\/ELnH4EuJbt1\/7xHHIQ","client_name":"basic-op-test-client-name-1 Lp2FoRqf6ul6XW8","response_types":["code"],"id_token_signed_response_alg":"RS256"}
2020-08-17 19:02:17
CallDynamicRegistrationEndpoint
Parsed registration endpoint response
post_logout_redirect_uris
[]
grant_types
[
  "authorization_code"
]
jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "alg": "RS256",
      "n": "oJlwmJF31lSEt4SYUrXnJ-kSn5KyJeBLFd2ZOckWESXJCy28Q7Wz7YMQaah1x-SyhQThSZkaOy2oiwTHe150eBpa6mmSrsO8YbZZsX5lCFitbTHpm4zy8OhCmSegemkTS2By4SDyvFrzV2IiL2k8ckkbMlJLLo1frRWM4Yy1BETWNuyzOKRdkFl4NHLC8fMWmTZ_luMF8kl7kY5sG142LuGtlzanyAePoz8OwdPHfJTX5n-WrL2pMmgrRGngOMNayTXl4u6Pt5rwEJfsA9faK0YajqJwNBiH0ZD2MSKBAZanQjX9xFEupvehM5vwzd_p-nw04t-Hk4oFwYkyqqbXhw"
    }
  ]
}
subject_type
pairwise
application_type
web
registration_client_uri
https://aaa.mew-tech.io/op/clients
redirect_uris
[
  "https://www.certification.openid.net/test/a/mew-tech.io/callback"
]
registration_access_token
dEQIyv3UmPR1ut7aTYL-3BosDt9SDP4I
token_endpoint_auth_method
client_secret_basic
client_id
4c3244c2-4b51-41ba-bb83-2d54a5519e8d
software_id
UNKNOWN
client_secret_expires_at
0
scope

                                
software_version
UNKNOWN
client_id_issued_at
1597690936
client_secret
3w3JnR9dZ7lfJpzAUo2A8eML/ELnH4EuJbt1/7xHHIQ
client_name
basic-op-test-client-name-1 Lp2FoRqf6ul6XW8
response_types
[
  "code"
]
id_token_signed_response_alg
RS256
2020-08-17 19:02:17 SUCCESS
CallDynamicRegistrationEndpoint
Extracted dynamic registration management credentials
registration_client_uri
https://aaa.mew-tech.io/op/clients
registration_access_token
dEQIyv3UmPR1ut7aTYL-3BosDt9SDP4I
2020-08-17 19:02:17
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
scope
openid
2020-08-17 19:02:17
SetScopeInClientConfigurationToOpenIdOfflineAccessIfServerSupportsOfflineAccess
Set scope in client configuration to "openid offline_access"as 'scope_supported' contains 'offline_access'
scope
openid offline_access
2020-08-17 19:02:17 SUCCESS
EnsureServerConfigurationSupportsClientSecretBasic
token_endpoint_auth_methods_supported
actual
[
  "client_secret_basic",
  "client_secret_post",
  "client_secret_jwt",
  "private_key_jwt"
]
expected
[
  "client_secret_basic"
]
minimum_matches_required
1
2020-08-17 19:02:17 SUCCESS
GetDynamicClient2Configuration
Found a dynamic_client_registration_template object
client_name
basic-op-test-client-name-2
2020-08-17 19:02:17 SUCCESS
GenerateRS256ClientJWKs
Generated client JWKs
client_jwks
{
  "keys": [
    {
      "p": "yDuOM_oVUIuOPaf_a1c4N0bZE2JtDiv6f_22BOoSk_ePUnT1u6Qhor1JgWG5j6GLwGyjTze3z_DpZrT4XlXftZ5nx5qdUmk_A64jozkjc8AQ-PFEwgM2FV5mVz4w5YVOC8J5ZiY7epjU-T61jnFG54KlFg4cnMnjbcynAlGN3EU",
      "kty": "RSA",
      "q": "vQARkmyIHd6d_DWNuPLxeejRxwAv0-vQe8rpk-s5K3GH-GA7WF_5Zar7hJsx4tRCXGrCy2I-Aj2HcBKzcglJpwz6Q3NgUsyFbkL7KoK1utmZ17Y30SoOClDFq60XdVVPQmvces4YEH2EKRxMSt6ZesbFwOmyHukFWjbvgwaOqyc",
      "d": "joQjmgciujZrltHUFDgDAZST7L_X34AiUQeI_3KQXylDaM_NiDS7aY2mdCE82HvFwVjf785rEEFOZMrGFek-xOH2ZNa8oL0E_15UQ41B8150KRohbAa-dhntuU0-w9sqRwoW3q3mz5q_2H6PeR6cqTk28jgsUIWaD9Pcn1hCkX_P8VfC2QPJEPRMV_cT3Z7nu5_vYRoq3nQbPALOp3lJiQTZMOTuFcgneyULoUNgNRa9cnq0bD-1vuRPyoTdjCbCi2w6uMQ-j6QS5PsPkysUiT9BcRnCFYnUd_OSZALznm293tmRiudJZ5y-PpYyPzo7gcO3UWsk5HJ5xZht3GJHUQ",
      "e": "AQAB",
      "use": "sig",
      "qi": "HIkKJaF-JO_0bHa4r6mRsby1lykrT9N6O5mWqq0DriC8Q9eRWEgX-GBS3yZtaWPlJ1SIQtTkHKK32YXvgNhdV_dsRfi3WGCf9x5omjPQCRq83iX_NEScAlnzbwjBsjEBPWDiPEf2JPBzXnV7sLeNPBrkk8HAFnz0dAL6wKApDYI",
      "dp": "v7CsSbxQLYT9Dq_Hiea9DcZIyRMAXoHh1ih42imQ0ZE9523LVvEhtl_KgA-jiwrX9MbMbWllErCLceUspXtGqOPWbLPritrxFb_fpEJuW0Dzvq-T6L0USM7P4RPL0d-VwRJUEGPnq02nDlpni8-MVtSu4PdvkvaAQTycYk7bJZU",
      "alg": "RS256",
      "dq": "QrcpfMRu8AxLPGIzGtw3PU9f7Z01RNtzBp_EAAECd0FmO9jMWg_W23qVumOGIonGuxS8mkqdlPDfREJ1sYVxyFQea3zovZGQcDGYs5LcT47MbYbXATCVMDL-8_Dv3O02Qz4L4BWsDPYhltl0XOFi0CImYEieJacfyo6l0VyZM_U",
      "n": "k9QFutrt4LVp9ZF-xcKOOWNIcXcd8KbgS6FLLDgsWYjvvpnZBZewcsiH8-iA6ysQOEQCqSW3sc1QlRP8qgKg2S3CCQQIjiSzNDmM0svcDhoTTQij-fi7qn4fkYL-mkBRkDRffuF62SIrqLOsHEo4QRyZI5huLdNLgbzne8T7N8rgM0B-c81S4b0It-RFTGLoqliW85No9IOOr40XVMPOZS_GKPeJ5s_o48EHBLQGTbyehQ0Ki0LJ6w9OoIiWhkEkBKONlTw5_b3oXRmrEU-yEu-25Pkp_2ha2Pp5w6-XylLd_11olfjAisfq5mgceu7HYw_fljGbLXUDuK_8-wSlgw"
    }
  ]
}
public_client_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "alg": "RS256",
      "n": "k9QFutrt4LVp9ZF-xcKOOWNIcXcd8KbgS6FLLDgsWYjvvpnZBZewcsiH8-iA6ysQOEQCqSW3sc1QlRP8qgKg2S3CCQQIjiSzNDmM0svcDhoTTQij-fi7qn4fkYL-mkBRkDRffuF62SIrqLOsHEo4QRyZI5huLdNLgbzne8T7N8rgM0B-c81S4b0It-RFTGLoqliW85No9IOOr40XVMPOZS_GKPeJ5s_o48EHBLQGTbyehQ0Ki0LJ6w9OoIiWhkEkBKONlTw5_b3oXRmrEU-yEu-25Pkp_2ha2Pp5w6-XylLd_11olfjAisfq5mgceu7HYw_fljGbLXUDuK_8-wSlgw"
    }
  ]
}
2020-08-17 19:02:17 SUCCESS
CheckDistinctKeyIdValueInClientJWKs
Distinct 'kid' value in all keys of client_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-08-17 19:02:17 SUCCESS
CreateDynamicRegistrationRequest
Created dynamic registration request
client_name
basic-op-test-client-name-2 Lp2FoRqf6ul6XW8
2020-08-17 19:02:17
AddAuthorizationCodeGrantTypeToDynamicRegistrationRequest
Added 'authorization_code' to 'grant_types'
grant_types
[
  "authorization_code"
]
2020-08-17 19:02:17
AddPublicJwksToDynamicRegistrationRequest
Added client public JWKS to dynamic registration request
dynamic_registration_request
{
  "client_name": "basic-op-test-client-name-2 Lp2FoRqf6ul6XW8",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "k9QFutrt4LVp9ZF-xcKOOWNIcXcd8KbgS6FLLDgsWYjvvpnZBZewcsiH8-iA6ysQOEQCqSW3sc1QlRP8qgKg2S3CCQQIjiSzNDmM0svcDhoTTQij-fi7qn4fkYL-mkBRkDRffuF62SIrqLOsHEo4QRyZI5huLdNLgbzne8T7N8rgM0B-c81S4b0It-RFTGLoqliW85No9IOOr40XVMPOZS_GKPeJ5s_o48EHBLQGTbyehQ0Ki0LJ6w9OoIiWhkEkBKONlTw5_b3oXRmrEU-yEu-25Pkp_2ha2Pp5w6-XylLd_11olfjAisfq5mgceu7HYw_fljGbLXUDuK_8-wSlgw"
      }
    ]
  }
}
2020-08-17 19:02:17
AddTokenEndpointAuthMethodToDynamicRegistrationRequestFromEnvironment
Added token endpoint auth method to dynamic registration request
dynamic_registration_request
{
  "client_name": "basic-op-test-client-name-2 Lp2FoRqf6ul6XW8",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "k9QFutrt4LVp9ZF-xcKOOWNIcXcd8KbgS6FLLDgsWYjvvpnZBZewcsiH8-iA6ysQOEQCqSW3sc1QlRP8qgKg2S3CCQQIjiSzNDmM0svcDhoTTQij-fi7qn4fkYL-mkBRkDRffuF62SIrqLOsHEo4QRyZI5huLdNLgbzne8T7N8rgM0B-c81S4b0It-RFTGLoqliW85No9IOOr40XVMPOZS_GKPeJ5s_o48EHBLQGTbyehQ0Ki0LJ6w9OoIiWhkEkBKONlTw5_b3oXRmrEU-yEu-25Pkp_2ha2Pp5w6-XylLd_11olfjAisfq5mgceu7HYw_fljGbLXUDuK_8-wSlgw"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic"
}
2020-08-17 19:02:17
AddResponseTypesArrayToDynamicRegistrationRequestFromEnvironment
Added response_types array to dynamic registration request
dynamic_registration_request
{
  "client_name": "basic-op-test-client-name-2 Lp2FoRqf6ul6XW8",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "k9QFutrt4LVp9ZF-xcKOOWNIcXcd8KbgS6FLLDgsWYjvvpnZBZewcsiH8-iA6ysQOEQCqSW3sc1QlRP8qgKg2S3CCQQIjiSzNDmM0svcDhoTTQij-fi7qn4fkYL-mkBRkDRffuF62SIrqLOsHEo4QRyZI5huLdNLgbzne8T7N8rgM0B-c81S4b0It-RFTGLoqliW85No9IOOr40XVMPOZS_GKPeJ5s_o48EHBLQGTbyehQ0Ki0LJ6w9OoIiWhkEkBKONlTw5_b3oXRmrEU-yEu-25Pkp_2ha2Pp5w6-XylLd_11olfjAisfq5mgceu7HYw_fljGbLXUDuK_8-wSlgw"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ]
}
2020-08-17 19:02:17
AddRedirectUriToDynamicRegistrationRequest
Added redirect_uris array to dynamic registration request
dynamic_registration_request
{
  "client_name": "basic-op-test-client-name-2 Lp2FoRqf6ul6XW8",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "k9QFutrt4LVp9ZF-xcKOOWNIcXcd8KbgS6FLLDgsWYjvvpnZBZewcsiH8-iA6ysQOEQCqSW3sc1QlRP8qgKg2S3CCQQIjiSzNDmM0svcDhoTTQij-fi7qn4fkYL-mkBRkDRffuF62SIrqLOsHEo4QRyZI5huLdNLgbzne8T7N8rgM0B-c81S4b0It-RFTGLoqliW85No9IOOr40XVMPOZS_GKPeJ5s_o48EHBLQGTbyehQ0Ki0LJ6w9OoIiWhkEkBKONlTw5_b3oXRmrEU-yEu-25Pkp_2ha2Pp5w6-XylLd_11olfjAisfq5mgceu7HYw_fljGbLXUDuK_8-wSlgw"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "redirect_uris": [
    "https://www.certification.openid.net/test/a/mew-tech.io/callback"
  ]
}
2020-08-17 19:02:17
AddContactsToDynamicRegistrationRequest
Added contacts array to dynamic registration request
dynamic_registration_request
{
  "client_name": "basic-op-test-client-name-2 Lp2FoRqf6ul6XW8",
  "grant_types": [
    "authorization_code"
  ],
  "jwks": {
    "keys": [
      {
        "kty": "RSA",
        "e": "AQAB",
        "use": "sig",
        "alg": "RS256",
        "n": "k9QFutrt4LVp9ZF-xcKOOWNIcXcd8KbgS6FLLDgsWYjvvpnZBZewcsiH8-iA6ysQOEQCqSW3sc1QlRP8qgKg2S3CCQQIjiSzNDmM0svcDhoTTQij-fi7qn4fkYL-mkBRkDRffuF62SIrqLOsHEo4QRyZI5huLdNLgbzne8T7N8rgM0B-c81S4b0It-RFTGLoqliW85No9IOOr40XVMPOZS_GKPeJ5s_o48EHBLQGTbyehQ0Ki0LJ6w9OoIiWhkEkBKONlTw5_b3oXRmrEU-yEu-25Pkp_2ha2Pp5w6-XylLd_11olfjAisfq5mgceu7HYw_fljGbLXUDuK_8-wSlgw"
      }
    ]
  },
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "redirect_uris": [
    "https://www.certification.openid.net/test/a/mew-tech.io/callback"
  ],
  "contacts": [
    "certification@oidf.org"
  ]
}
2020-08-17 19:02:17
AddRefreshTokenGrantTypeToDynamicRegistrationRequest
Added 'refresh_token' to 'grant_types'
grant_types
[
  "authorization_code",
  "refresh_token"
]
2020-08-17 19:02:17
CallDynamicRegistrationEndpoint
HTTP request
request_uri
https://aaa.mew-tech.io/op/clients
request_method
POST
request_headers
{
  "accept": "application/json",
  "accept-charset": "utf-8",
  "content-type": "application/json",
  "content-length": "732"
}
request_body
{"client_name":"basic-op-test-client-name-2 Lp2FoRqf6ul6XW8","grant_types":["authorization_code","refresh_token"],"jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"k9QFutrt4LVp9ZF-xcKOOWNIcXcd8KbgS6FLLDgsWYjvvpnZBZewcsiH8-iA6ysQOEQCqSW3sc1QlRP8qgKg2S3CCQQIjiSzNDmM0svcDhoTTQij-fi7qn4fkYL-mkBRkDRffuF62SIrqLOsHEo4QRyZI5huLdNLgbzne8T7N8rgM0B-c81S4b0It-RFTGLoqliW85No9IOOr40XVMPOZS_GKPeJ5s_o48EHBLQGTbyehQ0Ki0LJ6w9OoIiWhkEkBKONlTw5_b3oXRmrEU-yEu-25Pkp_2ha2Pp5w6-XylLd_11olfjAisfq5mgceu7HYw_fljGbLXUDuK_8-wSlgw"}]},"token_endpoint_auth_method":"client_secret_basic","response_types":["code"],"redirect_uris":["https://www.certification.openid.net/test/a/mew-tech.io/callback"],"contacts":["certification@oidf.org"]}
2020-08-17 19:02:17 RESPONSE
CallDynamicRegistrationEndpoint
HTTP response
response_status_code
201 CREATED
response_status_text

                                
response_headers
{
  "date": "Mon, 17 Aug 2020 19:02:17 GMT",
  "server": "Apache/2.4.25 (Debian)",
  "cache-control": "no-store",
  "pragma": "no-cache",
  "x-content-type-options": "nosniff",
  "x-xss-protection": "1; mode\u003dblock",
  "content-type": "application/json;charset\u003dUTF-8",
  "content-length": "1175",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive"
}
response_body
{"post_logout_redirect_uris":[],"grant_types":["authorization_code"],"jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"k9QFutrt4LVp9ZF-xcKOOWNIcXcd8KbgS6FLLDgsWYjvvpnZBZewcsiH8-iA6ysQOEQCqSW3sc1QlRP8qgKg2S3CCQQIjiSzNDmM0svcDhoTTQij-fi7qn4fkYL-mkBRkDRffuF62SIrqLOsHEo4QRyZI5huLdNLgbzne8T7N8rgM0B-c81S4b0It-RFTGLoqliW85No9IOOr40XVMPOZS_GKPeJ5s_o48EHBLQGTbyehQ0Ki0LJ6w9OoIiWhkEkBKONlTw5_b3oXRmrEU-yEu-25Pkp_2ha2Pp5w6-XylLd_11olfjAisfq5mgceu7HYw_fljGbLXUDuK_8-wSlgw"}]},"subject_type":"pairwise","application_type":"web","registration_client_uri":"https:\/\/aaa.mew-tech.io\/op\/clients","redirect_uris":["https:\/\/www.certification.openid.net\/test\/a\/mew-tech.io\/callback"],"registration_access_token":"J52r6YtAM4oYnKh7zY2GkNr-zxZMHLNr","token_endpoint_auth_method":"client_secret_basic","client_id":"79ca5bc6-edf0-492f-84b8-e1e88bf1bb83","software_id":"UNKNOWN","client_secret_expires_at":0,"scope":"","software_version":"UNKNOWN","client_id_issued_at":1597690937,"client_secret":"\/dzZkmCWkqpSOGN5TrzMjPw2OyBJ3zJxN8kwVfF6GtU","client_name":"basic-op-test-client-name-2 Lp2FoRqf6ul6XW8","response_types":["code"],"id_token_signed_response_alg":"RS256"}
2020-08-17 19:02:17
CallDynamicRegistrationEndpoint
Registration endpoint response
dynamic_registration_response
{"post_logout_redirect_uris":[],"grant_types":["authorization_code"],"jwks":{"keys":[{"kty":"RSA","e":"AQAB","use":"sig","alg":"RS256","n":"k9QFutrt4LVp9ZF-xcKOOWNIcXcd8KbgS6FLLDgsWYjvvpnZBZewcsiH8-iA6ysQOEQCqSW3sc1QlRP8qgKg2S3CCQQIjiSzNDmM0svcDhoTTQij-fi7qn4fkYL-mkBRkDRffuF62SIrqLOsHEo4QRyZI5huLdNLgbzne8T7N8rgM0B-c81S4b0It-RFTGLoqliW85No9IOOr40XVMPOZS_GKPeJ5s_o48EHBLQGTbyehQ0Ki0LJ6w9OoIiWhkEkBKONlTw5_b3oXRmrEU-yEu-25Pkp_2ha2Pp5w6-XylLd_11olfjAisfq5mgceu7HYw_fljGbLXUDuK_8-wSlgw"}]},"subject_type":"pairwise","application_type":"web","registration_client_uri":"https:\/\/aaa.mew-tech.io\/op\/clients","redirect_uris":["https:\/\/www.certification.openid.net\/test\/a\/mew-tech.io\/callback"],"registration_access_token":"J52r6YtAM4oYnKh7zY2GkNr-zxZMHLNr","token_endpoint_auth_method":"client_secret_basic","client_id":"79ca5bc6-edf0-492f-84b8-e1e88bf1bb83","software_id":"UNKNOWN","client_secret_expires_at":0,"scope":"","software_version":"UNKNOWN","client_id_issued_at":1597690937,"client_secret":"\/dzZkmCWkqpSOGN5TrzMjPw2OyBJ3zJxN8kwVfF6GtU","client_name":"basic-op-test-client-name-2 Lp2FoRqf6ul6XW8","response_types":["code"],"id_token_signed_response_alg":"RS256"}
2020-08-17 19:02:17
CallDynamicRegistrationEndpoint
Parsed registration endpoint response
post_logout_redirect_uris
[]
grant_types
[
  "authorization_code"
]
jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "alg": "RS256",
      "n": "k9QFutrt4LVp9ZF-xcKOOWNIcXcd8KbgS6FLLDgsWYjvvpnZBZewcsiH8-iA6ysQOEQCqSW3sc1QlRP8qgKg2S3CCQQIjiSzNDmM0svcDhoTTQij-fi7qn4fkYL-mkBRkDRffuF62SIrqLOsHEo4QRyZI5huLdNLgbzne8T7N8rgM0B-c81S4b0It-RFTGLoqliW85No9IOOr40XVMPOZS_GKPeJ5s_o48EHBLQGTbyehQ0Ki0LJ6w9OoIiWhkEkBKONlTw5_b3oXRmrEU-yEu-25Pkp_2ha2Pp5w6-XylLd_11olfjAisfq5mgceu7HYw_fljGbLXUDuK_8-wSlgw"
    }
  ]
}
subject_type
pairwise
application_type
web
registration_client_uri
https://aaa.mew-tech.io/op/clients
redirect_uris
[
  "https://www.certification.openid.net/test/a/mew-tech.io/callback"
]
registration_access_token
J52r6YtAM4oYnKh7zY2GkNr-zxZMHLNr
token_endpoint_auth_method
client_secret_basic
client_id
79ca5bc6-edf0-492f-84b8-e1e88bf1bb83
software_id
UNKNOWN
client_secret_expires_at
0
scope

                                
software_version
UNKNOWN
client_id_issued_at
1597690937
client_secret
/dzZkmCWkqpSOGN5TrzMjPw2OyBJ3zJxN8kwVfF6GtU
client_name
basic-op-test-client-name-2 Lp2FoRqf6ul6XW8
response_types
[
  "code"
]
id_token_signed_response_alg
RS256
2020-08-17 19:02:17 SUCCESS
CallDynamicRegistrationEndpoint
Extracted dynamic registration management credentials
registration_client_uri
https://aaa.mew-tech.io/op/clients
registration_access_token
J52r6YtAM4oYnKh7zY2GkNr-zxZMHLNr
2020-08-17 19:02:17
SetScopeInClientConfigurationToOpenId
Set scope in client configuration to "openid"
scope
openid
2020-08-17 19:02:17
SetScopeInClientConfigurationToOpenIdOfflineAccessIfServerSupportsOfflineAccess
Set scope in client configuration to "openid offline_access"as 'scope_supported' contains 'offline_access'
scope
openid offline_access
2020-08-17 19:02:17 SUCCESS
EnsureServerConfigurationSupportsClientSecretBasic
token_endpoint_auth_methods_supported
actual
[
  "client_secret_basic",
  "client_secret_post",
  "client_secret_jwt",
  "private_key_jwt"
]
expected
[
  "client_secret_basic"
]
minimum_matches_required
1
2020-08-17 19:02:17 SUCCESS
SetProtectedResourceUrlToUserInfoEndpoint
userinfo_endpoint will be used to test access token. The user info is not a mandatory to implement feature in the OpenID Connect specification, but is mandatory for certification.
protected_resource_url
https://aaa.mew-tech.io/op/userinfo
2020-08-17 19:02:17
oidcc-refresh-token
Setup Done
Make request to authorization endpoint
2020-08-17 19:02:17 SUCCESS
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
client_id
4c3244c2-4b51-41ba-bb83-2d54a5519e8d
redirect_uri
https://www.certification.openid.net/test/a/mew-tech.io/callback
scope
openid offline_access
2020-08-17 19:02:17
CreateRandomStateValue
Created state value
requested_state_length
10
state
8W11WxyLNT
2020-08-17 19:02:17 SUCCESS
AddStateToAuthorizationEndpointRequest
Added state parameter to request
client_id
4c3244c2-4b51-41ba-bb83-2d54a5519e8d
redirect_uri
https://www.certification.openid.net/test/a/mew-tech.io/callback
scope
openid offline_access
state
8W11WxyLNT
2020-08-17 19:02:17
CreateRandomNonceValue
Created nonce value
requested_nonce_length
10
nonce
JE57uSKFtF
2020-08-17 19:02:17 SUCCESS
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
client_id
4c3244c2-4b51-41ba-bb83-2d54a5519e8d
redirect_uri
https://www.certification.openid.net/test/a/mew-tech.io/callback
scope
openid offline_access
state
8W11WxyLNT
nonce
JE57uSKFtF
2020-08-17 19:02:17 SUCCESS
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
client_id
4c3244c2-4b51-41ba-bb83-2d54a5519e8d
redirect_uri
https://www.certification.openid.net/test/a/mew-tech.io/callback
scope
openid offline_access
state
8W11WxyLNT
nonce
JE57uSKFtF
response_type
code
2020-08-17 19:02:17 SUCCESS
AddPromptConsentToAuthorizationEndpointRequestIfScopeContainsOfflineAccess
Added prompt=consent to authorization endpoint request
client_id
4c3244c2-4b51-41ba-bb83-2d54a5519e8d
redirect_uri
https://www.certification.openid.net/test/a/mew-tech.io/callback
scope
openid offline_access
state
8W11WxyLNT
nonce
JE57uSKFtF
response_type
code
prompt
consent
2020-08-17 19:02:17 SUCCESS
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
redirect_to_authorization_endpoint
https://aaa.mew-tech.io/op/authorization?client_id=4c3244c2-4b51-41ba-bb83-2d54a5519e8d&redirect_uri=https://www.certification.openid.net/test/a/mew-tech.io/callback&scope=openid%20offline_access&state=8W11WxyLNT&nonce=JE57uSKFtF&response_type=code&prompt=consent
2020-08-17 19:02:17 REDIRECT
oidcc-refresh-token
Redirecting to authorization endpoint
redirect_to
https://aaa.mew-tech.io/op/authorization?client_id=4c3244c2-4b51-41ba-bb83-2d54a5519e8d&redirect_uri=https://www.certification.openid.net/test/a/mew-tech.io/callback&scope=openid%20offline_access&state=8W11WxyLNT&nonce=JE57uSKFtF&response_type=code&prompt=consent
2020-08-17 19:02:20 INCOMING
oidcc-refresh-token
Incoming HTTP request to test instance Lp2FoRqf6ul6XW8
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:79.0) Gecko/20100101 Firefox/79.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/webp,*/*;q\u003d0.8",
  "accept-language": "de,en-US;q\u003d0.7,en;q\u003d0.3",
  "accept-encoding": "gzip, deflate, br",
  "referer": "https://www.certification.openid.net/log-detail.html?log\u003dLp2FoRqf6ul6XW8",
  "cookie": "__utma\u003d201319536.590862407.1595057286.1597571094.1597602342.17; __utmz\u003d201319536.1597571094.16.6.utmcsr\u003dcertification.openid.net|utmccn\u003d(referral)|utmcmd\u003dreferral|utmcct\u003d/plan-detail.html; JSESSIONID\u003dD3589E40C40ABAC68C7C7A3A000F0DFB",
  "upgrade-insecure-requests": "1",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
callback
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "code": "PoeCNyVKGhMs285F_TlbPlUx50TFpa0_",
  "state": "8W11WxyLNT",
  "session_state": "ef4b14d1fe61d1733bbcf061b5264ba56687b024d1cb4a6ab4d478190141dc1e.4H4MfX-4sAMq-GkHEK4eYQ"
}
incoming_body
2020-08-17 19:02:20 SUCCESS
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
implicit_submit
{
  "path": "implicit/p8aYEUBzsCNiX4kFjTrj",
  "fullUrl": "https://www.certification.openid.net/test/a/mew-tech.io/implicit/p8aYEUBzsCNiX4kFjTrj"
}
2020-08-17 19:02:20 OUTGOING
oidcc-refresh-token
Response to HTTP request to test instance Lp2FoRqf6ul6XW8
outgoing
ModelAndView [view="implicitCallback"; model={implicitSubmitUrl=https://www.certification.openid.net/test/a/mew-tech.io/implicit/p8aYEUBzsCNiX4kFjTrj, returnUrl=/log-detail.html?log=Lp2FoRqf6ul6XW8}]
outgoing_path
callback
2020-08-17 19:02:21 INCOMING
oidcc-refresh-token
Incoming HTTP request to test instance Lp2FoRqf6ul6XW8
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:79.0) Gecko/20100101 Firefox/79.0",
  "accept": "*/*",
  "accept-language": "de,en-US;q\u003d0.7,en;q\u003d0.3",
  "accept-encoding": "gzip, deflate, br",
  "content-type": "text/plain",
  "x-requested-with": "XMLHttpRequest",
  "origin": "https://www.certification.openid.net",
  "referer": "https://www.certification.openid.net/test/a/mew-tech.io/callback?code\u003dPoeCNyVKGhMs285F_TlbPlUx50TFpa0_\u0026state\u003d8W11WxyLNT\u0026session_state\u003def4b14d1fe61d1733bbcf061b5264ba56687b024d1cb4a6ab4d478190141dc1e.4H4MfX-4sAMq-GkHEK4eYQ",
  "cookie": "__utma\u003d201319536.590862407.1595057286.1597571094.1597602342.17; __utmz\u003d201319536.1597571094.16.6.utmcsr\u003dcertification.openid.net|utmccn\u003d(referral)|utmcmd\u003dreferral|utmcct\u003d/plan-detail.html; JSESSIONID\u003dD3589E40C40ABAC68C7C7A3A000F0DFB",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "0",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
implicit/p8aYEUBzsCNiX4kFjTrj
incoming_body_form_params
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
2020-08-17 19:02:21 OUTGOING
oidcc-refresh-token
Response to HTTP request to test instance Lp2FoRqf6ul6XW8
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [/log-detail.html?log=Lp2FoRqf6ul6XW8]
outgoing_path
implicit/p8aYEUBzsCNiX4kFjTrj
2020-08-17 19:02:21 SUCCESS
ExtractImplicitHashToCallbackResponse
implicit_hash is empty
2020-08-17 19:02:21 REDIRECT-IN
oidcc-refresh-token
Authorization endpoint response captured
url_query
{
  "code": "PoeCNyVKGhMs285F_TlbPlUx50TFpa0_",
  "state": "8W11WxyLNT",
  "session_state": "ef4b14d1fe61d1733bbcf061b5264ba56687b024d1cb4a6ab4d478190141dc1e.4H4MfX-4sAMq-GkHEK4eYQ"
}
headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:79.0) Gecko/20100101 Firefox/79.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/webp,*/*;q\u003d0.8",
  "accept-language": "de,en-US;q\u003d0.7,en;q\u003d0.3",
  "accept-encoding": "gzip, deflate, br",
  "referer": "https://www.certification.openid.net/log-detail.html?log\u003dLp2FoRqf6ul6XW8",
  "cookie": "__utma\u003d201319536.590862407.1595057286.1597571094.1597602342.17; __utmz\u003d201319536.1597571094.16.6.utmcsr\u003dcertification.openid.net|utmccn\u003d(referral)|utmcmd\u003dreferral|utmcct\u003d/plan-detail.html; JSESSIONID\u003dD3589E40C40ABAC68C7C7A3A000F0DFB",
  "upgrade-insecure-requests": "1",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
http_method
GET
url_fragment
{}
post_body
Verify authorization endpoint response
2020-08-17 19:02:21 SUCCESS
CheckMatchingCallbackParameters
Callback parameters successfully verified
2020-08-17 19:02:21 SUCCESS
CheckIfAuthorizationEndpointError
No error from authorization endpoint
2020-08-17 19:02:21 SUCCESS
CheckMatchingStateParameter
State parameter correctly returned
state
8W11WxyLNT
2020-08-17 19:02:21 SUCCESS
ExtractAuthorizationCodeFromAuthorizationResponse
Found authorization code
code
PoeCNyVKGhMs285F_TlbPlUx50TFpa0_
2020-08-17 19:02:21 SUCCESS
CreateTokenEndpointRequestForAuthorizationCodeGrant
grant_type
authorization_code
code
PoeCNyVKGhMs285F_TlbPlUx50TFpa0_
redirect_uri
https://www.certification.openid.net/test/a/mew-tech.io/callback
2020-08-17 19:02:21 SUCCESS
AddBasicAuthClientSecretAuthenticationParameters
Added basic authorization header
Authorization
Basic NGMzMjQ0YzItNGI1MS00MWJhLWJiODMtMmQ1NGE1NTE5ZThkOjN3M0puUjlkWjdsZkpwekFVbzJBOGVNTC9FTG5INEV1SmJ0MS83eEhISVE=
2020-08-17 19:02:21
CallTokenEndpoint
HTTP request
request_uri
https://aaa.mew-tech.io/op/token
request_method
POST
request_headers
{
  "accept": "application/json;charset\u003dUTF-8",
  "authorization": "Basic NGMzMjQ0YzItNGI1MS00MWJhLWJiODMtMmQ1NGE1NTE5ZThkOjN3M0puUjlkWjdsZkpwekFVbzJBOGVNTC9FTG5INEV1SmJ0MS83eEhISVE\u003d",
  "accept-charset": "utf-8",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "content-length": "159"
}
request_body
grant_type=authorization_code&code=PoeCNyVKGhMs285F_TlbPlUx50TFpa0_&redirect_uri=https%3A%2F%2Fwww.certification.openid.net%2Ftest%2Fa%2Fmew-tech.io%2Fcallback
2020-08-17 19:02:21 RESPONSE
CallTokenEndpoint
HTTP response
response_status_code
200 OK
response_status_text

                                
response_headers
{
  "date": "Mon, 17 Aug 2020 19:02:21 GMT",
  "server": "Apache/2.4.25 (Debian)",
  "cache-control": "no-store",
  "pragma": "no-cache",
  "x-content-type-options": "nosniff",
  "x-xss-protection": "1; mode\u003dblock",
  "content-type": "application/json;charset\u003dUTF-8",
  "content-length": "1020",
  "set-cookie": "JSESSIONID\u003dC5A47ECB9E49ED301FEDEC7039DE8FB7; Path\u003d/; HttpOnly",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive"
}
response_body
{"access_token":"0wxny2KAmKf4MxKzNs3HpJiYYnjHkeeH","refresh_token":"4WPIJxL2lo-iL98dEew8wH65zaInOcoY","id_token":"eyJraWQiOiJmNzNhYjRiMC00ZGE4LTQ4NDEtYTNjZS1iYzQwYTY2NDEwMmIiLCJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQmJlV244eWN5VFE0ZUV6YU5WbldRZyIsInN1YiI6IjM5MThmYmI3LWJiNWEtNGYzOS1iNmYxLTJlOGExMWJiNDcyMiIsImF1ZCI6IjRjMzI0NGMyLTRiNTEtNDFiYS1iYjgzLTJkNTRhNTUxOWU4ZCIsImNfaGFzaCI6IlM0aWpVVENoMEpWRDRyLWFlY1A4Y1EiLCJhY3IiOiIzIiwiYXV0aF90aW1lIjoxNTk3NjkwNzkwLCJpc3MiOiJodHRwczovL2FhYS5tZXctdGVjaC5pby9vcCIsImV4cCI6MTU5NzY5MzA0MSwiaWF0IjoxNTk3NjkwOTQxLCJub25jZSI6IkpFNTd1U0tGdEYiLCJydF9oYXNoIjoia0xJSmsyUnQ3S1pUN2ZBOGpQVGFpQSJ9.jr0wpXddnCtG2pJUzhAhguAQwpfzMJFrSndwmzDpT8HIvKGLSpLoYjJHCO2clG7PoJ_zT-inMPW2LoTR-wr9OulLxh3oZI1iaRZHyvHWhI98E6rYsccukgfDI6N8H-JddL_-hQ-skF2J6sSm2Ge-lya228KXk768cVI0is_tOJqeL20v-Gr1a46SkiZrgQDFg-RCkPnoOKqwgiZ6cA199h750mOcCvmktTacYzfs8fVbplUXmC-Sl494CkXDqK8XErBAIuxSF8UnG_Ul3m4NnTXVZYLKU998U3L0J3HT-glOVnjRKMISXe65epQ7KiZAV0n5uOhd370Otr3ZIYnyYw","token_type":"Bearer","expires_in":1800}
2020-08-17 19:02:21
CallTokenEndpoint
Token endpoint response
token_endpoint_response
{"access_token":"0wxny2KAmKf4MxKzNs3HpJiYYnjHkeeH","refresh_token":"4WPIJxL2lo-iL98dEew8wH65zaInOcoY","id_token":"eyJraWQiOiJmNzNhYjRiMC00ZGE4LTQ4NDEtYTNjZS1iYzQwYTY2NDEwMmIiLCJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQmJlV244eWN5VFE0ZUV6YU5WbldRZyIsInN1YiI6IjM5MThmYmI3LWJiNWEtNGYzOS1iNmYxLTJlOGExMWJiNDcyMiIsImF1ZCI6IjRjMzI0NGMyLTRiNTEtNDFiYS1iYjgzLTJkNTRhNTUxOWU4ZCIsImNfaGFzaCI6IlM0aWpVVENoMEpWRDRyLWFlY1A4Y1EiLCJhY3IiOiIzIiwiYXV0aF90aW1lIjoxNTk3NjkwNzkwLCJpc3MiOiJodHRwczovL2FhYS5tZXctdGVjaC5pby9vcCIsImV4cCI6MTU5NzY5MzA0MSwiaWF0IjoxNTk3NjkwOTQxLCJub25jZSI6IkpFNTd1U0tGdEYiLCJydF9oYXNoIjoia0xJSmsyUnQ3S1pUN2ZBOGpQVGFpQSJ9.jr0wpXddnCtG2pJUzhAhguAQwpfzMJFrSndwmzDpT8HIvKGLSpLoYjJHCO2clG7PoJ_zT-inMPW2LoTR-wr9OulLxh3oZI1iaRZHyvHWhI98E6rYsccukgfDI6N8H-JddL_-hQ-skF2J6sSm2Ge-lya228KXk768cVI0is_tOJqeL20v-Gr1a46SkiZrgQDFg-RCkPnoOKqwgiZ6cA199h750mOcCvmktTacYzfs8fVbplUXmC-Sl494CkXDqK8XErBAIuxSF8UnG_Ul3m4NnTXVZYLKU998U3L0J3HT-glOVnjRKMISXe65epQ7KiZAV0n5uOhd370Otr3ZIYnyYw","token_type":"Bearer","expires_in":1800}
2020-08-17 19:02:21 SUCCESS
CallTokenEndpoint
Parsed token endpoint response
access_token
0wxny2KAmKf4MxKzNs3HpJiYYnjHkeeH
refresh_token
4WPIJxL2lo-iL98dEew8wH65zaInOcoY
id_token
eyJraWQiOiJmNzNhYjRiMC00ZGE4LTQ4NDEtYTNjZS1iYzQwYTY2NDEwMmIiLCJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQmJlV244eWN5VFE0ZUV6YU5WbldRZyIsInN1YiI6IjM5MThmYmI3LWJiNWEtNGYzOS1iNmYxLTJlOGExMWJiNDcyMiIsImF1ZCI6IjRjMzI0NGMyLTRiNTEtNDFiYS1iYjgzLTJkNTRhNTUxOWU4ZCIsImNfaGFzaCI6IlM0aWpVVENoMEpWRDRyLWFlY1A4Y1EiLCJhY3IiOiIzIiwiYXV0aF90aW1lIjoxNTk3NjkwNzkwLCJpc3MiOiJodHRwczovL2FhYS5tZXctdGVjaC5pby9vcCIsImV4cCI6MTU5NzY5MzA0MSwiaWF0IjoxNTk3NjkwOTQxLCJub25jZSI6IkpFNTd1U0tGdEYiLCJydF9oYXNoIjoia0xJSmsyUnQ3S1pUN2ZBOGpQVGFpQSJ9.jr0wpXddnCtG2pJUzhAhguAQwpfzMJFrSndwmzDpT8HIvKGLSpLoYjJHCO2clG7PoJ_zT-inMPW2LoTR-wr9OulLxh3oZI1iaRZHyvHWhI98E6rYsccukgfDI6N8H-JddL_-hQ-skF2J6sSm2Ge-lya228KXk768cVI0is_tOJqeL20v-Gr1a46SkiZrgQDFg-RCkPnoOKqwgiZ6cA199h750mOcCvmktTacYzfs8fVbplUXmC-Sl494CkXDqK8XErBAIuxSF8UnG_Ul3m4NnTXVZYLKU998U3L0J3HT-glOVnjRKMISXe65epQ7KiZAV0n5uOhd370Otr3ZIYnyYw
token_type
Bearer
expires_in
1800
2020-08-17 19:02:21 SUCCESS
CheckIfTokenEndpointResponseError
No error from token endpoint
2020-08-17 19:02:21 SUCCESS
CheckForAccessTokenValue
Found an access token
access_token
0wxny2KAmKf4MxKzNs3HpJiYYnjHkeeH
2020-08-17 19:02:21 SUCCESS
ExtractAccessTokenFromTokenResponse
Extracted the access token
value
0wxny2KAmKf4MxKzNs3HpJiYYnjHkeeH
type
Bearer
2020-08-17 19:02:21 SUCCESS
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
expires_in
1800
2020-08-17 19:02:21 SUCCESS
ValidateExpiresIn
expires_in passed all validation checks
expires_in
1800
2020-08-17 19:02:21 SUCCESS
CheckForRefreshTokenValue
Found a refresh token
refresh_token
4WPIJxL2lo-iL98dEew8wH65zaInOcoY
2020-08-17 19:02:21 SUCCESS
ExtractIdTokenFromTokenResponse
Found and parsed the id_token from token_endpoint_response
value
eyJraWQiOiJmNzNhYjRiMC00ZGE4LTQ4NDEtYTNjZS1iYzQwYTY2NDEwMmIiLCJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQmJlV244eWN5VFE0ZUV6YU5WbldRZyIsInN1YiI6IjM5MThmYmI3LWJiNWEtNGYzOS1iNmYxLTJlOGExMWJiNDcyMiIsImF1ZCI6IjRjMzI0NGMyLTRiNTEtNDFiYS1iYjgzLTJkNTRhNTUxOWU4ZCIsImNfaGFzaCI6IlM0aWpVVENoMEpWRDRyLWFlY1A4Y1EiLCJhY3IiOiIzIiwiYXV0aF90aW1lIjoxNTk3NjkwNzkwLCJpc3MiOiJodHRwczovL2FhYS5tZXctdGVjaC5pby9vcCIsImV4cCI6MTU5NzY5MzA0MSwiaWF0IjoxNTk3NjkwOTQxLCJub25jZSI6IkpFNTd1U0tGdEYiLCJydF9oYXNoIjoia0xJSmsyUnQ3S1pUN2ZBOGpQVGFpQSJ9.jr0wpXddnCtG2pJUzhAhguAQwpfzMJFrSndwmzDpT8HIvKGLSpLoYjJHCO2clG7PoJ_zT-inMPW2LoTR-wr9OulLxh3oZI1iaRZHyvHWhI98E6rYsccukgfDI6N8H-JddL_-hQ-skF2J6sSm2Ge-lya228KXk768cVI0is_tOJqeL20v-Gr1a46SkiZrgQDFg-RCkPnoOKqwgiZ6cA199h750mOcCvmktTacYzfs8fVbplUXmC-Sl494CkXDqK8XErBAIuxSF8UnG_Ul3m4NnTXVZYLKU998U3L0J3HT-glOVnjRKMISXe65epQ7KiZAV0n5uOhd370Otr3ZIYnyYw
header
{
  "kid": "f73ab4b0-4da8-4841-a3ce-bc40a664102b",
  "typ": "JWT",
  "alg": "RS256"
}
claims
{
  "at_hash": "BbeWn8ycyTQ4eEzaNVnWQg",
  "sub": "3918fbb7-bb5a-4f39-b6f1-2e8a11bb4722",
  "aud": "4c3244c2-4b51-41ba-bb83-2d54a5519e8d",
  "c_hash": "S4ijUTCh0JVD4r-aecP8cQ",
  "acr": "3",
  "auth_time": 1597690790,
  "iss": "https://aaa.mew-tech.io/op",
  "exp": 1597693041,
  "iat": 1597690941,
  "nonce": "JE57uSKFtF",
  "rt_hash": "kLIJk2Rt7KZT7fA8jPTaiA"
}
2020-08-17 19:02:21 SUCCESS
ValidateIdToken
ID token iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
2020-08-17 19:02:21 SUCCESS
ValidateIdTokenNonce
Nonce values match
nonce
JE57uSKFtF
2020-08-17 19:02:21 SUCCESS
ValidateIdTokenACRClaimAgainstRequest
Nothing to check; the conformance suite did not request an acr claim in request object
2020-08-17 19:02:21 SUCCESS
ValidateIdTokenSignature
id_token signature validated
id_token
eyJraWQiOiJmNzNhYjRiMC00ZGE4LTQ4NDEtYTNjZS1iYzQwYTY2NDEwMmIiLCJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQmJlV244eWN5VFE0ZUV6YU5WbldRZyIsInN1YiI6IjM5MThmYmI3LWJiNWEtNGYzOS1iNmYxLTJlOGExMWJiNDcyMiIsImF1ZCI6IjRjMzI0NGMyLTRiNTEtNDFiYS1iYjgzLTJkNTRhNTUxOWU4ZCIsImNfaGFzaCI6IlM0aWpVVENoMEpWRDRyLWFlY1A4Y1EiLCJhY3IiOiIzIiwiYXV0aF90aW1lIjoxNTk3NjkwNzkwLCJpc3MiOiJodHRwczovL2FhYS5tZXctdGVjaC5pby9vcCIsImV4cCI6MTU5NzY5MzA0MSwiaWF0IjoxNTk3NjkwOTQxLCJub25jZSI6IkpFNTd1U0tGdEYiLCJydF9oYXNoIjoia0xJSmsyUnQ3S1pUN2ZBOGpQVGFpQSJ9.jr0wpXddnCtG2pJUzhAhguAQwpfzMJFrSndwmzDpT8HIvKGLSpLoYjJHCO2clG7PoJ_zT-inMPW2LoTR-wr9OulLxh3oZI1iaRZHyvHWhI98E6rYsccukgfDI6N8H-JddL_-hQ-skF2J6sSm2Ge-lya228KXk768cVI0is_tOJqeL20v-Gr1a46SkiZrgQDFg-RCkPnoOKqwgiZ6cA199h750mOcCvmktTacYzfs8fVbplUXmC-Sl494CkXDqK8XErBAIuxSF8UnG_Ul3m4NnTXVZYLKU998U3L0J3HT-glOVnjRKMISXe65epQ7KiZAV0n5uOhd370Otr3ZIYnyYw
2020-08-17 19:02:21 SUCCESS
ValidateIdTokenSignatureUsingKid
id_token signature validated
id_token
eyJraWQiOiJmNzNhYjRiMC00ZGE4LTQ4NDEtYTNjZS1iYzQwYTY2NDEwMmIiLCJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQmJlV244eWN5VFE0ZUV6YU5WbldRZyIsInN1YiI6IjM5MThmYmI3LWJiNWEtNGYzOS1iNmYxLTJlOGExMWJiNDcyMiIsImF1ZCI6IjRjMzI0NGMyLTRiNTEtNDFiYS1iYjgzLTJkNTRhNTUxOWU4ZCIsImNfaGFzaCI6IlM0aWpVVENoMEpWRDRyLWFlY1A4Y1EiLCJhY3IiOiIzIiwiYXV0aF90aW1lIjoxNTk3NjkwNzkwLCJpc3MiOiJodHRwczovL2FhYS5tZXctdGVjaC5pby9vcCIsImV4cCI6MTU5NzY5MzA0MSwiaWF0IjoxNTk3NjkwOTQxLCJub25jZSI6IkpFNTd1U0tGdEYiLCJydF9oYXNoIjoia0xJSmsyUnQ3S1pUN2ZBOGpQVGFpQSJ9.jr0wpXddnCtG2pJUzhAhguAQwpfzMJFrSndwmzDpT8HIvKGLSpLoYjJHCO2clG7PoJ_zT-inMPW2LoTR-wr9OulLxh3oZI1iaRZHyvHWhI98E6rYsccukgfDI6N8H-JddL_-hQ-skF2J6sSm2Ge-lya228KXk768cVI0is_tOJqeL20v-Gr1a46SkiZrgQDFg-RCkPnoOKqwgiZ6cA199h750mOcCvmktTacYzfs8fVbplUXmC-Sl494CkXDqK8XErBAIuxSF8UnG_Ul3m4NnTXVZYLKU998U3L0J3HT-glOVnjRKMISXe65epQ7KiZAV0n5uOhd370Otr3ZIYnyYw
2020-08-17 19:02:21 SUCCESS
CheckForSubjectInIdToken
Found 'sub' in id_token
sub
3918fbb7-bb5a-4f39-b6f1-2e8a11bb4722
2020-08-17 19:02:21 SUCCESS
ExtractRefreshTokenFromTokenResponse
Extracted refresh token from response
refresh_token
4WPIJxL2lo-iL98dEew8wH65zaInOcoY
2020-08-17 19:02:21 SUCCESS
EnsureServerConfigurationSupportsRefreshToken
The server configuration indicates support for refresh tokens
supported_grant_types
[
  "authorization_code",
  "implicit",
  "refresh_token",
  "client_credentials"
]
2020-08-17 19:02:21 SUCCESS
EnsureRefreshTokenContainsAllowedCharactersOnly
Refresh token does not contain any illegal characters
Refresh Token Request
2020-08-17 19:02:21 SUCCESS
CreateRefreshTokenRequest
Created token endpoint request parameters
grant_type
refresh_token
refresh_token
4WPIJxL2lo-iL98dEew8wH65zaInOcoY
2020-08-17 19:02:21 SUCCESS
AddScopeToTokenEndpointRequest
Added scope of 'openid offline_access' to token endpoint request
grant_type
refresh_token
refresh_token
4WPIJxL2lo-iL98dEew8wH65zaInOcoY
scope
openid offline_access
2020-08-17 19:02:21 SUCCESS
AddBasicAuthClientSecretAuthenticationParameters
Added basic authorization header
Authorization
Basic NGMzMjQ0YzItNGI1MS00MWJhLWJiODMtMmQ1NGE1NTE5ZThkOjN3M0puUjlkWjdsZkpwekFVbzJBOGVNTC9FTG5INEV1SmJ0MS83eEhISVE=
2020-08-17 19:02:21 SUCCESS
WaitForOneSecond
Pausing for 1 seconds
2020-08-17 19:02:22 SUCCESS
WaitForOneSecond
Woke up after 1 seconds sleep
2020-08-17 19:02:22
CallTokenEndpointAndReturnFullResponse
HTTP request
request_uri
https://aaa.mew-tech.io/op/token
request_method
POST
request_headers
{
  "accept": "application/json;charset\u003dUTF-8",
  "authorization": "Basic NGMzMjQ0YzItNGI1MS00MWJhLWJiODMtMmQ1NGE1NTE5ZThkOjN3M0puUjlkWjdsZkpwekFVbzJBOGVNTC9FTG5INEV1SmJ0MS83eEhISVE\u003d",
  "accept-charset": "utf-8",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "content-length": "99"
}
request_body
grant_type=refresh_token&refresh_token=4WPIJxL2lo-iL98dEew8wH65zaInOcoY&scope=openid+offline_access
2020-08-17 19:02:23 RESPONSE
CallTokenEndpointAndReturnFullResponse
HTTP response
response_status_code
200 OK
response_status_text

                                
response_headers
{
  "date": "Mon, 17 Aug 2020 19:02:23 GMT",
  "server": "Apache/2.4.25 (Debian)",
  "cache-control": "no-store",
  "pragma": "no-cache",
  "x-content-type-options": "nosniff",
  "x-xss-protection": "1; mode\u003dblock",
  "content-type": "application/json;charset\u003dUTF-8",
  "content-length": "975",
  "set-cookie": "JSESSIONID\u003d29A9942F1EBEC63CDD324B3B1DB5B650; Path\u003d/; HttpOnly",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive"
}
response_body
{"access_token":"LSG8--ydVgPnV5slPN2Pu7MLD1Tde9xw","refresh_token":"sppnaGG23J6lLZXAoS5CntA6Sbz5W6yf","id_token":"eyJraWQiOiJmNzNhYjRiMC00ZGE4LTQ4NDEtYTNjZS1iYzQwYTY2NDEwMmIiLCJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiaHB0NS1ObGo2UTQ5V254TlJ1TVdSQSIsInN1YiI6IjM5MThmYmI3LWJiNWEtNGYzOS1iNmYxLTJlOGExMWJiNDcyMiIsImF1ZCI6IjRjMzI0NGMyLTRiNTEtNDFiYS1iYjgzLTJkNTRhNTUxOWU4ZCIsImFjciI6IjMiLCJhdXRoX3RpbWUiOjE1OTc2OTA3OTAsImlzcyI6Imh0dHBzOi8vYWFhLm1ldy10ZWNoLmlvL29wIiwiZXhwIjoxNTk3NjkzMDQzLCJpYXQiOjE1OTc2OTA5NDMsIm5vbmNlIjoiSkU1N3VTS0Z0RiIsInJ0X2hhc2giOiI1UGdFS0JWT2NrdnBUS2FGUy1FT0Z3In0.iTXUXxQUHuWhSEgRsK1-XbKSpRFlPjNpEAgJdRvPu1KJsokFjmyj1cXVxBAu7lZjRF6tdLEWF2nymjsBctaE-gjKA32BLIPiO8YD8OG7OhmkZB-IJaezmreP2JEHDy-jN1SmPpGPa19l9cM-R-AfUq3I7xUt4mn-NAjU6MFxPoOSl-mqSclhIPxBVjn3PFw78Jr9St_WhIcuQJLmkI_7LC42CMVVveHTUYELFpvgkU2pcYzdO4d71Ak72bKHvhR_UkQOwM6fvFEZ9TQxFNBKj28X0dkV64-arJ95d_Iz8V_eJF2nlbOEe0kBizB3TWNJB5CiKmsGMEUkhFK87jOf8Q","token_type":"Bearer","expires_in":1800}
2020-08-17 19:02:23 SUCCESS
CallTokenEndpointAndReturnFullResponse
Parsed token endpoint response
access_token
LSG8--ydVgPnV5slPN2Pu7MLD1Tde9xw
refresh_token
sppnaGG23J6lLZXAoS5CntA6Sbz5W6yf
id_token
eyJraWQiOiJmNzNhYjRiMC00ZGE4LTQ4NDEtYTNjZS1iYzQwYTY2NDEwMmIiLCJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiaHB0NS1ObGo2UTQ5V254TlJ1TVdSQSIsInN1YiI6IjM5MThmYmI3LWJiNWEtNGYzOS1iNmYxLTJlOGExMWJiNDcyMiIsImF1ZCI6IjRjMzI0NGMyLTRiNTEtNDFiYS1iYjgzLTJkNTRhNTUxOWU4ZCIsImFjciI6IjMiLCJhdXRoX3RpbWUiOjE1OTc2OTA3OTAsImlzcyI6Imh0dHBzOi8vYWFhLm1ldy10ZWNoLmlvL29wIiwiZXhwIjoxNTk3NjkzMDQzLCJpYXQiOjE1OTc2OTA5NDMsIm5vbmNlIjoiSkU1N3VTS0Z0RiIsInJ0X2hhc2giOiI1UGdFS0JWT2NrdnBUS2FGUy1FT0Z3In0.iTXUXxQUHuWhSEgRsK1-XbKSpRFlPjNpEAgJdRvPu1KJsokFjmyj1cXVxBAu7lZjRF6tdLEWF2nymjsBctaE-gjKA32BLIPiO8YD8OG7OhmkZB-IJaezmreP2JEHDy-jN1SmPpGPa19l9cM-R-AfUq3I7xUt4mn-NAjU6MFxPoOSl-mqSclhIPxBVjn3PFw78Jr9St_WhIcuQJLmkI_7LC42CMVVveHTUYELFpvgkU2pcYzdO4d71Ak72bKHvhR_UkQOwM6fvFEZ9TQxFNBKj28X0dkV64-arJ95d_Iz8V_eJF2nlbOEe0kBizB3TWNJB5CiKmsGMEUkhFK87jOf8Q
token_type
Bearer
expires_in
1800
2020-08-17 19:02:23 SUCCESS
CheckTokenEndpointHttpStatus200
Token endpoint http status code was 200
2020-08-17 19:02:23 SUCCESS
CheckTokenEndpointReturnedJsonContentType
token_endpoint_response_headers Content-Type: header is application/json
2020-08-17 19:02:23 SUCCESS
CheckTokenEndpointCacheHeaders
Checked 'pragma' and 'cache-control' in the headers of token_endpoint_response.
2020-08-17 19:02:23 SUCCESS
CheckIfTokenEndpointResponseError
No error from token endpoint
2020-08-17 19:02:23 SUCCESS
ExtractAccessTokenFromTokenResponse
Extracted the access token
value
LSG8--ydVgPnV5slPN2Pu7MLD1Tde9xw
type
Bearer
2020-08-17 19:02:23 SUCCESS
CheckTokenTypeIsBearer
Token type is bearer
2020-08-17 19:02:23 SUCCESS
EnsureMinimumAccessTokenEntropy
Calculated shannon entropy seems sufficient
actual
147.24511249783654
expected
96.0
2020-08-17 19:02:23 SUCCESS
EnsureAccessTokenContainsAllowedCharactersOnly
Access token does not contain any illegal characters
2020-08-17 19:02:23 SUCCESS
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
expires_in
1800
2020-08-17 19:02:23 SUCCESS
ValidateExpiresIn
expires_in passed all validation checks
expires_in
1800
2020-08-17 19:02:23 SUCCESS
EnsureAccessTokenValuesAreDifferent
Access token values are not the same
first_access_token
0wxny2KAmKf4MxKzNs3HpJiYYnjHkeeH
second_access_token
LSG8--ydVgPnV5slPN2Pu7MLD1Tde9xw
2020-08-17 19:02:23 SUCCESS
ExtractIdTokenFromTokenResponse
Found and parsed the id_token from token_endpoint_response
value
eyJraWQiOiJmNzNhYjRiMC00ZGE4LTQ4NDEtYTNjZS1iYzQwYTY2NDEwMmIiLCJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiaHB0NS1ObGo2UTQ5V254TlJ1TVdSQSIsInN1YiI6IjM5MThmYmI3LWJiNWEtNGYzOS1iNmYxLTJlOGExMWJiNDcyMiIsImF1ZCI6IjRjMzI0NGMyLTRiNTEtNDFiYS1iYjgzLTJkNTRhNTUxOWU4ZCIsImFjciI6IjMiLCJhdXRoX3RpbWUiOjE1OTc2OTA3OTAsImlzcyI6Imh0dHBzOi8vYWFhLm1ldy10ZWNoLmlvL29wIiwiZXhwIjoxNTk3NjkzMDQzLCJpYXQiOjE1OTc2OTA5NDMsIm5vbmNlIjoiSkU1N3VTS0Z0RiIsInJ0X2hhc2giOiI1UGdFS0JWT2NrdnBUS2FGUy1FT0Z3In0.iTXUXxQUHuWhSEgRsK1-XbKSpRFlPjNpEAgJdRvPu1KJsokFjmyj1cXVxBAu7lZjRF6tdLEWF2nymjsBctaE-gjKA32BLIPiO8YD8OG7OhmkZB-IJaezmreP2JEHDy-jN1SmPpGPa19l9cM-R-AfUq3I7xUt4mn-NAjU6MFxPoOSl-mqSclhIPxBVjn3PFw78Jr9St_WhIcuQJLmkI_7LC42CMVVveHTUYELFpvgkU2pcYzdO4d71Ak72bKHvhR_UkQOwM6fvFEZ9TQxFNBKj28X0dkV64-arJ95d_Iz8V_eJF2nlbOEe0kBizB3TWNJB5CiKmsGMEUkhFK87jOf8Q
header
{
  "kid": "f73ab4b0-4da8-4841-a3ce-bc40a664102b",
  "typ": "JWT",
  "alg": "RS256"
}
claims
{
  "at_hash": "hpt5-Nlj6Q49WnxNRuMWRA",
  "sub": "3918fbb7-bb5a-4f39-b6f1-2e8a11bb4722",
  "aud": "4c3244c2-4b51-41ba-bb83-2d54a5519e8d",
  "acr": "3",
  "auth_time": 1597690790,
  "iss": "https://aaa.mew-tech.io/op",
  "exp": 1597693043,
  "iat": 1597690943,
  "nonce": "JE57uSKFtF",
  "rt_hash": "5PgEKBVOckvpTKaFS-EOFw"
}
2020-08-17 19:02:23 SUCCESS
ExtractRefreshTokenFromTokenResponse
Extracted refresh token from response
refresh_token
sppnaGG23J6lLZXAoS5CntA6Sbz5W6yf
2020-08-17 19:02:23 SUCCESS
EnsureMinimumRefreshTokenLength
Refresh token is of sufficient length
actual
256
required
128
2020-08-17 19:02:23 SUCCESS
EnsureMinimumRefreshTokenEntropy
Calculated shannon entropy seems sufficient
actual
143.24511249783654
expected
96.0
2020-08-17 19:02:23 SUCCESS
CompareIdTokenClaims
Validated id token claims successfully
iss
{
  "first": "https://aaa.mew-tech.io/op",
  "second": "https://aaa.mew-tech.io/op",
  "note": "Values are expected to be equal"
}
sub
{
  "first": "3918fbb7-bb5a-4f39-b6f1-2e8a11bb4722",
  "second": "3918fbb7-bb5a-4f39-b6f1-2e8a11bb4722",
  "note": "Values are expected to be equal"
}
iat
{
  "first": 1597690941,
  "second": 1597690943,
  "note": "Values are expected to be different"
}
aud
{
  "first": "4c3244c2-4b51-41ba-bb83-2d54a5519e8d",
  "second": "4c3244c2-4b51-41ba-bb83-2d54a5519e8d",
  "note": "Values are expected to be equal"
}
auth_time
{
  "first": 1597690790,
  "second": 1597690790,
  "note": "Values are expected to be equal"
}
azp
Id tokens do not contain azp claims
Userinfo endpoint tests
2020-08-17 19:02:23
CallProtectedResourceWithBearerToken
HTTP request
request_uri
https://aaa.mew-tech.io/op/userinfo
request_method
GET
request_headers
{
  "accept": "application/json;charset\u003dUTF-8",
  "authorization": "Bearer LSG8--ydVgPnV5slPN2Pu7MLD1Tde9xw",
  "accept-charset": "utf-8",
  "content-length": "0"
}
request_body

                                
2020-08-17 19:02:23 RESPONSE
CallProtectedResourceWithBearerToken
HTTP response
response_status_code
200 OK
response_status_text

                                
response_headers
{
  "date": "Mon, 17 Aug 2020 19:02:23 GMT",
  "server": "Apache/2.4.25 (Debian)",
  "x-content-type-options": "nosniff",
  "x-xss-protection": "1; mode\u003dblock",
  "cache-control": "no-cache, no-store, max-age\u003d0, must-revalidate",
  "pragma": "no-cache",
  "expires": "0",
  "content-type": "application/json;charset\u003dUTF-8",
  "content-length": "46",
  "set-cookie": "JSESSIONID\u003d7C657695BC7DD7E513853600AA1D7B15; Path\u003d/; HttpOnly",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive"
}
response_body
{"sub":"3918fbb7-bb5a-4f39-b6f1-2e8a11bb4722"}
2020-08-17 19:02:23 SUCCESS
CallProtectedResourceWithBearerToken
Got a response from the resource endpoint
headers
{
  "date": "Mon, 17 Aug 2020 19:02:23 GMT",
  "server": "Apache/2.4.25 (Debian)",
  "x-content-type-options": "nosniff",
  "x-xss-protection": "1; mode\u003dblock",
  "cache-control": "no-cache, no-store, max-age\u003d0, must-revalidate",
  "pragma": "no-cache",
  "expires": "0",
  "content-type": "application/json;charset\u003dUTF-8",
  "content-length": "46",
  "set-cookie": "JSESSIONID\u003d7C657695BC7DD7E513853600AA1D7B15; Path\u003d/; HttpOnly",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive"
}
status_code
{
  "code": 200
}
body
{"sub":"3918fbb7-bb5a-4f39-b6f1-2e8a11bb4722"}
Second client: Make request to authorization endpoint
2020-08-17 19:02:23 SUCCESS
CreateAuthorizationEndpointRequestFromClientInformation
Created authorization endpoint request
client_id
79ca5bc6-edf0-492f-84b8-e1e88bf1bb83
redirect_uri
https://www.certification.openid.net/test/a/mew-tech.io/callback
scope
openid offline_access
2020-08-17 19:02:23
CreateRandomStateValue
Created state value
requested_state_length
10
state
YPL3TaD0Wy
2020-08-17 19:02:23 SUCCESS
AddStateToAuthorizationEndpointRequest
Added state parameter to request
client_id
79ca5bc6-edf0-492f-84b8-e1e88bf1bb83
redirect_uri
https://www.certification.openid.net/test/a/mew-tech.io/callback
scope
openid offline_access
state
YPL3TaD0Wy
2020-08-17 19:02:23
CreateRandomNonceValue
Created nonce value
requested_nonce_length
10
nonce
CS4Zjnc0g2
2020-08-17 19:02:23 SUCCESS
AddNonceToAuthorizationEndpointRequest
Added nonce parameter to request
client_id
79ca5bc6-edf0-492f-84b8-e1e88bf1bb83
redirect_uri
https://www.certification.openid.net/test/a/mew-tech.io/callback
scope
openid offline_access
state
YPL3TaD0Wy
nonce
CS4Zjnc0g2
2020-08-17 19:02:23 SUCCESS
SetAuthorizationEndpointRequestResponseTypeFromEnvironment
Added response_type parameter to request
client_id
79ca5bc6-edf0-492f-84b8-e1e88bf1bb83
redirect_uri
https://www.certification.openid.net/test/a/mew-tech.io/callback
scope
openid offline_access
state
YPL3TaD0Wy
nonce
CS4Zjnc0g2
response_type
code
2020-08-17 19:02:23 SUCCESS
AddPromptConsentToAuthorizationEndpointRequestIfScopeContainsOfflineAccess
Added prompt=consent to authorization endpoint request
client_id
79ca5bc6-edf0-492f-84b8-e1e88bf1bb83
redirect_uri
https://www.certification.openid.net/test/a/mew-tech.io/callback
scope
openid offline_access
state
YPL3TaD0Wy
nonce
CS4Zjnc0g2
response_type
code
prompt
consent
2020-08-17 19:02:23 SUCCESS
BuildPlainRedirectToAuthorizationEndpoint
Sending to authorization endpoint
redirect_to_authorization_endpoint
https://aaa.mew-tech.io/op/authorization?client_id=79ca5bc6-edf0-492f-84b8-e1e88bf1bb83&redirect_uri=https://www.certification.openid.net/test/a/mew-tech.io/callback&scope=openid%20offline_access&state=YPL3TaD0Wy&nonce=CS4Zjnc0g2&response_type=code&prompt=consent
2020-08-17 19:02:23 REDIRECT
oidcc-refresh-token
Redirecting to authorization endpoint
redirect_to
https://aaa.mew-tech.io/op/authorization?client_id=79ca5bc6-edf0-492f-84b8-e1e88bf1bb83&redirect_uri=https://www.certification.openid.net/test/a/mew-tech.io/callback&scope=openid%20offline_access&state=YPL3TaD0Wy&nonce=CS4Zjnc0g2&response_type=code&prompt=consent
2020-08-17 19:02:27 INCOMING
oidcc-refresh-token
Incoming HTTP request to test instance Lp2FoRqf6ul6XW8
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:79.0) Gecko/20100101 Firefox/79.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/webp,*/*;q\u003d0.8",
  "accept-language": "de,en-US;q\u003d0.7,en;q\u003d0.3",
  "accept-encoding": "gzip, deflate, br",
  "referer": "https://www.certification.openid.net/log-detail.html?log\u003dLp2FoRqf6ul6XW8",
  "cookie": "__utma\u003d201319536.590862407.1595057286.1597571094.1597602342.17; __utmz\u003d201319536.1597571094.16.6.utmcsr\u003dcertification.openid.net|utmccn\u003d(referral)|utmcmd\u003dreferral|utmcct\u003d/plan-detail.html; JSESSIONID\u003dD3589E40C40ABAC68C7C7A3A000F0DFB",
  "upgrade-insecure-requests": "1",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
callback
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "code": "F_V1KfahcfarC0qteEs59nepodT-mdwH",
  "state": "YPL3TaD0Wy",
  "session_state": "81d6eb13462df48594bb98866fe4b67f304e21d244722e52264d19006a0ecc7c.TU6Kkm50FWWa1wgFO2-r1Q"
}
incoming_body
2020-08-17 19:02:27 SUCCESS
CreateRandomImplicitSubmitUrl
Created random implicit submission URL
implicit_submit
{
  "path": "implicit/xqEtGX9CE7BraxJjOEe3",
  "fullUrl": "https://www.certification.openid.net/test/a/mew-tech.io/implicit/xqEtGX9CE7BraxJjOEe3"
}
2020-08-17 19:02:27 OUTGOING
oidcc-refresh-token
Response to HTTP request to test instance Lp2FoRqf6ul6XW8
outgoing
ModelAndView [view="implicitCallback"; model={implicitSubmitUrl=https://www.certification.openid.net/test/a/mew-tech.io/implicit/xqEtGX9CE7BraxJjOEe3, returnUrl=/log-detail.html?log=Lp2FoRqf6ul6XW8}]
outgoing_path
callback
2020-08-17 19:02:27 INCOMING
oidcc-refresh-token
Incoming HTTP request to test instance Lp2FoRqf6ul6XW8
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:79.0) Gecko/20100101 Firefox/79.0",
  "accept": "*/*",
  "accept-language": "de,en-US;q\u003d0.7,en;q\u003d0.3",
  "accept-encoding": "gzip, deflate, br",
  "content-type": "text/plain",
  "x-requested-with": "XMLHttpRequest",
  "origin": "https://www.certification.openid.net",
  "referer": "https://www.certification.openid.net/test/a/mew-tech.io/callback?code\u003dF_V1KfahcfarC0qteEs59nepodT-mdwH\u0026state\u003dYPL3TaD0Wy\u0026session_state\u003d81d6eb13462df48594bb98866fe4b67f304e21d244722e52264d19006a0ecc7c.TU6Kkm50FWWa1wgFO2-r1Q",
  "cookie": "__utma\u003d201319536.590862407.1595057286.1597571094.1597602342.17; __utmz\u003d201319536.1597571094.16.6.utmcsr\u003dcertification.openid.net|utmccn\u003d(referral)|utmcmd\u003dreferral|utmcct\u003d/plan-detail.html; JSESSIONID\u003dD3589E40C40ABAC68C7C7A3A000F0DFB",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "0",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
implicit/xqEtGX9CE7BraxJjOEe3
incoming_body_form_params
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
2020-08-17 19:02:27 OUTGOING
oidcc-refresh-token
Response to HTTP request to test instance Lp2FoRqf6ul6XW8
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [/log-detail.html?log=Lp2FoRqf6ul6XW8]
outgoing_path
implicit/xqEtGX9CE7BraxJjOEe3
2020-08-17 19:02:27 SUCCESS
ExtractImplicitHashToCallbackResponse
implicit_hash is empty
2020-08-17 19:02:27 REDIRECT-IN
oidcc-refresh-token
Authorization endpoint response captured
url_query
{
  "code": "F_V1KfahcfarC0qteEs59nepodT-mdwH",
  "state": "YPL3TaD0Wy",
  "session_state": "81d6eb13462df48594bb98866fe4b67f304e21d244722e52264d19006a0ecc7c.TU6Kkm50FWWa1wgFO2-r1Q"
}
headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:79.0) Gecko/20100101 Firefox/79.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/webp,*/*;q\u003d0.8",
  "accept-language": "de,en-US;q\u003d0.7,en;q\u003d0.3",
  "accept-encoding": "gzip, deflate, br",
  "referer": "https://www.certification.openid.net/log-detail.html?log\u003dLp2FoRqf6ul6XW8",
  "cookie": "__utma\u003d201319536.590862407.1595057286.1597571094.1597602342.17; __utmz\u003d201319536.1597571094.16.6.utmcsr\u003dcertification.openid.net|utmccn\u003d(referral)|utmcmd\u003dreferral|utmcct\u003d/plan-detail.html; JSESSIONID\u003dD3589E40C40ABAC68C7C7A3A000F0DFB",
  "upgrade-insecure-requests": "1",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
http_method
GET
url_fragment
{}
post_body
Second client: Verify authorization endpoint response
2020-08-17 19:02:27 SUCCESS
CheckMatchingCallbackParameters
Callback parameters successfully verified
2020-08-17 19:02:27 SUCCESS
CheckIfAuthorizationEndpointError
No error from authorization endpoint
2020-08-17 19:02:27 SUCCESS
CheckMatchingStateParameter
State parameter correctly returned
state
YPL3TaD0Wy
2020-08-17 19:02:27 SUCCESS
ExtractAuthorizationCodeFromAuthorizationResponse
Found authorization code
code
F_V1KfahcfarC0qteEs59nepodT-mdwH
2020-08-17 19:02:27 SUCCESS
CreateTokenEndpointRequestForAuthorizationCodeGrant
grant_type
authorization_code
code
F_V1KfahcfarC0qteEs59nepodT-mdwH
redirect_uri
https://www.certification.openid.net/test/a/mew-tech.io/callback
2020-08-17 19:02:27 SUCCESS
AddBasicAuthClientSecretAuthenticationParameters
Added basic authorization header
Authorization
Basic NzljYTViYzYtZWRmMC00OTJmLTg0YjgtZTFlODhiZjFiYjgzOi9kelprbUNXa3FwU09HTjVUcnpNalB3Mk95Qkozekp4Tjhrd1ZmRjZHdFU=
2020-08-17 19:02:27
CallTokenEndpoint
HTTP request
request_uri
https://aaa.mew-tech.io/op/token
request_method
POST
request_headers
{
  "accept": "application/json;charset\u003dUTF-8",
  "authorization": "Basic NzljYTViYzYtZWRmMC00OTJmLTg0YjgtZTFlODhiZjFiYjgzOi9kelprbUNXa3FwU09HTjVUcnpNalB3Mk95Qkozekp4Tjhrd1ZmRjZHdFU\u003d",
  "accept-charset": "utf-8",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "content-length": "159"
}
request_body
grant_type=authorization_code&code=F_V1KfahcfarC0qteEs59nepodT-mdwH&redirect_uri=https%3A%2F%2Fwww.certification.openid.net%2Ftest%2Fa%2Fmew-tech.io%2Fcallback
2020-08-17 19:02:28 RESPONSE
CallTokenEndpoint
HTTP response
response_status_code
200 OK
response_status_text

                                
response_headers
{
  "date": "Mon, 17 Aug 2020 19:02:27 GMT",
  "server": "Apache/2.4.25 (Debian)",
  "cache-control": "no-store",
  "pragma": "no-cache",
  "x-content-type-options": "nosniff",
  "x-xss-protection": "1; mode\u003dblock",
  "content-type": "application/json;charset\u003dUTF-8",
  "content-length": "1020",
  "set-cookie": "JSESSIONID\u003d8D9DEAB7199354C759B549317C5E2757; Path\u003d/; HttpOnly",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive"
}
response_body
{"access_token":"JnMiPBfVBJpwbWsw3qYNf3WHccVfkJds","refresh_token":"9oB-4yGnQpW8hs_MP-8i1A7FmrIbEV9R","id_token":"eyJraWQiOiJmNzNhYjRiMC00ZGE4LTQ4NDEtYTNjZS1iYzQwYTY2NDEwMmIiLCJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiR1JtLVIxenVMN192TmhHbEM2X1NCdyIsInN1YiI6IjM5MThmYmI3LWJiNWEtNGYzOS1iNmYxLTJlOGExMWJiNDcyMiIsImF1ZCI6Ijc5Y2E1YmM2LWVkZjAtNDkyZi04NGI4LWUxZTg4YmYxYmI4MyIsImNfaGFzaCI6Ik9UcTFlcXlPNkVNVDJScWlYZzA4dWciLCJhY3IiOiIzIiwiYXV0aF90aW1lIjoxNTk3NjkwNzkwLCJpc3MiOiJodHRwczovL2FhYS5tZXctdGVjaC5pby9vcCIsImV4cCI6MTU5NzY5MzA0OCwiaWF0IjoxNTk3NjkwOTQ4LCJub25jZSI6IkNTNFpqbmMwZzIiLCJydF9oYXNoIjoicE5hQWs0cF9WOUd1WDVVU2NVTnlJZyJ9.VmdabSVtt76KBUKr3TkPZTaXFq_oTymhn7FzpeJxUeUJ7lzh6Mrdmj0WuRL4mZGcqzfalDD4YNkY2NhzxNZgsmxWKuC8n87-HX6TKanXms4enWrUu6RKKYeu59lE73YIkFcQjNZb6uZnIZWybHHtP3y-PqUO-V8bJkB4YpSIIoSavjWMhq2uPviCkkTx0NSeFFtZiTJoTcO8pZV5uAcETS3e2d5vypKT7k2r9RC5HBusUA-5YepNYXm7_n1RI2PAfPw05gZaJz2B_rGVxL2KtmVKIAfFUB61X9RoCGPIkh1-N5qrmUzZJ_dk6PYznPhKh3bL3lhcch9g6OW1rDYCuQ","token_type":"Bearer","expires_in":1800}
2020-08-17 19:02:28
CallTokenEndpoint
Token endpoint response
token_endpoint_response
{"access_token":"JnMiPBfVBJpwbWsw3qYNf3WHccVfkJds","refresh_token":"9oB-4yGnQpW8hs_MP-8i1A7FmrIbEV9R","id_token":"eyJraWQiOiJmNzNhYjRiMC00ZGE4LTQ4NDEtYTNjZS1iYzQwYTY2NDEwMmIiLCJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiR1JtLVIxenVMN192TmhHbEM2X1NCdyIsInN1YiI6IjM5MThmYmI3LWJiNWEtNGYzOS1iNmYxLTJlOGExMWJiNDcyMiIsImF1ZCI6Ijc5Y2E1YmM2LWVkZjAtNDkyZi04NGI4LWUxZTg4YmYxYmI4MyIsImNfaGFzaCI6Ik9UcTFlcXlPNkVNVDJScWlYZzA4dWciLCJhY3IiOiIzIiwiYXV0aF90aW1lIjoxNTk3NjkwNzkwLCJpc3MiOiJodHRwczovL2FhYS5tZXctdGVjaC5pby9vcCIsImV4cCI6MTU5NzY5MzA0OCwiaWF0IjoxNTk3NjkwOTQ4LCJub25jZSI6IkNTNFpqbmMwZzIiLCJydF9oYXNoIjoicE5hQWs0cF9WOUd1WDVVU2NVTnlJZyJ9.VmdabSVtt76KBUKr3TkPZTaXFq_oTymhn7FzpeJxUeUJ7lzh6Mrdmj0WuRL4mZGcqzfalDD4YNkY2NhzxNZgsmxWKuC8n87-HX6TKanXms4enWrUu6RKKYeu59lE73YIkFcQjNZb6uZnIZWybHHtP3y-PqUO-V8bJkB4YpSIIoSavjWMhq2uPviCkkTx0NSeFFtZiTJoTcO8pZV5uAcETS3e2d5vypKT7k2r9RC5HBusUA-5YepNYXm7_n1RI2PAfPw05gZaJz2B_rGVxL2KtmVKIAfFUB61X9RoCGPIkh1-N5qrmUzZJ_dk6PYznPhKh3bL3lhcch9g6OW1rDYCuQ","token_type":"Bearer","expires_in":1800}
2020-08-17 19:02:28 SUCCESS
CallTokenEndpoint
Parsed token endpoint response
access_token
JnMiPBfVBJpwbWsw3qYNf3WHccVfkJds
refresh_token
9oB-4yGnQpW8hs_MP-8i1A7FmrIbEV9R
id_token
eyJraWQiOiJmNzNhYjRiMC00ZGE4LTQ4NDEtYTNjZS1iYzQwYTY2NDEwMmIiLCJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiR1JtLVIxenVMN192TmhHbEM2X1NCdyIsInN1YiI6IjM5MThmYmI3LWJiNWEtNGYzOS1iNmYxLTJlOGExMWJiNDcyMiIsImF1ZCI6Ijc5Y2E1YmM2LWVkZjAtNDkyZi04NGI4LWUxZTg4YmYxYmI4MyIsImNfaGFzaCI6Ik9UcTFlcXlPNkVNVDJScWlYZzA4dWciLCJhY3IiOiIzIiwiYXV0aF90aW1lIjoxNTk3NjkwNzkwLCJpc3MiOiJodHRwczovL2FhYS5tZXctdGVjaC5pby9vcCIsImV4cCI6MTU5NzY5MzA0OCwiaWF0IjoxNTk3NjkwOTQ4LCJub25jZSI6IkNTNFpqbmMwZzIiLCJydF9oYXNoIjoicE5hQWs0cF9WOUd1WDVVU2NVTnlJZyJ9.VmdabSVtt76KBUKr3TkPZTaXFq_oTymhn7FzpeJxUeUJ7lzh6Mrdmj0WuRL4mZGcqzfalDD4YNkY2NhzxNZgsmxWKuC8n87-HX6TKanXms4enWrUu6RKKYeu59lE73YIkFcQjNZb6uZnIZWybHHtP3y-PqUO-V8bJkB4YpSIIoSavjWMhq2uPviCkkTx0NSeFFtZiTJoTcO8pZV5uAcETS3e2d5vypKT7k2r9RC5HBusUA-5YepNYXm7_n1RI2PAfPw05gZaJz2B_rGVxL2KtmVKIAfFUB61X9RoCGPIkh1-N5qrmUzZJ_dk6PYznPhKh3bL3lhcch9g6OW1rDYCuQ
token_type
Bearer
expires_in
1800
2020-08-17 19:02:28 SUCCESS
CheckIfTokenEndpointResponseError
No error from token endpoint
2020-08-17 19:02:28 SUCCESS
CheckForAccessTokenValue
Found an access token
access_token
JnMiPBfVBJpwbWsw3qYNf3WHccVfkJds
2020-08-17 19:02:28 SUCCESS
ExtractAccessTokenFromTokenResponse
Extracted the access token
value
JnMiPBfVBJpwbWsw3qYNf3WHccVfkJds
type
Bearer
2020-08-17 19:02:28 SUCCESS
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
expires_in
1800
2020-08-17 19:02:28 SUCCESS
ValidateExpiresIn
expires_in passed all validation checks
expires_in
1800
2020-08-17 19:02:28 SUCCESS
CheckForRefreshTokenValue
Found a refresh token
refresh_token
9oB-4yGnQpW8hs_MP-8i1A7FmrIbEV9R
2020-08-17 19:02:28 SUCCESS
ExtractIdTokenFromTokenResponse
Found and parsed the id_token from token_endpoint_response
value
eyJraWQiOiJmNzNhYjRiMC00ZGE4LTQ4NDEtYTNjZS1iYzQwYTY2NDEwMmIiLCJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiR1JtLVIxenVMN192TmhHbEM2X1NCdyIsInN1YiI6IjM5MThmYmI3LWJiNWEtNGYzOS1iNmYxLTJlOGExMWJiNDcyMiIsImF1ZCI6Ijc5Y2E1YmM2LWVkZjAtNDkyZi04NGI4LWUxZTg4YmYxYmI4MyIsImNfaGFzaCI6Ik9UcTFlcXlPNkVNVDJScWlYZzA4dWciLCJhY3IiOiIzIiwiYXV0aF90aW1lIjoxNTk3NjkwNzkwLCJpc3MiOiJodHRwczovL2FhYS5tZXctdGVjaC5pby9vcCIsImV4cCI6MTU5NzY5MzA0OCwiaWF0IjoxNTk3NjkwOTQ4LCJub25jZSI6IkNTNFpqbmMwZzIiLCJydF9oYXNoIjoicE5hQWs0cF9WOUd1WDVVU2NVTnlJZyJ9.VmdabSVtt76KBUKr3TkPZTaXFq_oTymhn7FzpeJxUeUJ7lzh6Mrdmj0WuRL4mZGcqzfalDD4YNkY2NhzxNZgsmxWKuC8n87-HX6TKanXms4enWrUu6RKKYeu59lE73YIkFcQjNZb6uZnIZWybHHtP3y-PqUO-V8bJkB4YpSIIoSavjWMhq2uPviCkkTx0NSeFFtZiTJoTcO8pZV5uAcETS3e2d5vypKT7k2r9RC5HBusUA-5YepNYXm7_n1RI2PAfPw05gZaJz2B_rGVxL2KtmVKIAfFUB61X9RoCGPIkh1-N5qrmUzZJ_dk6PYznPhKh3bL3lhcch9g6OW1rDYCuQ
header
{
  "kid": "f73ab4b0-4da8-4841-a3ce-bc40a664102b",
  "typ": "JWT",
  "alg": "RS256"
}
claims
{
  "at_hash": "GRm-R1zuL7_vNhGlC6_SBw",
  "sub": "3918fbb7-bb5a-4f39-b6f1-2e8a11bb4722",
  "aud": "79ca5bc6-edf0-492f-84b8-e1e88bf1bb83",
  "c_hash": "OTq1eqyO6EMT2RqiXg08ug",
  "acr": "3",
  "auth_time": 1597690790,
  "iss": "https://aaa.mew-tech.io/op",
  "exp": 1597693048,
  "iat": 1597690948,
  "nonce": "CS4Zjnc0g2",
  "rt_hash": "pNaAk4p_V9GuX5UScUNyIg"
}
2020-08-17 19:02:28 SUCCESS
ValidateIdToken
ID token iss, aud, exp, iat, auth_time, acr & nbf claims passed validation checks
2020-08-17 19:02:28 SUCCESS
ValidateIdTokenNonce
Nonce values match
nonce
CS4Zjnc0g2
2020-08-17 19:02:28 SUCCESS
ValidateIdTokenACRClaimAgainstRequest
Nothing to check; the conformance suite did not request an acr claim in request object
2020-08-17 19:02:28 SUCCESS
ValidateIdTokenSignature
id_token signature validated
id_token
eyJraWQiOiJmNzNhYjRiMC00ZGE4LTQ4NDEtYTNjZS1iYzQwYTY2NDEwMmIiLCJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiR1JtLVIxenVMN192TmhHbEM2X1NCdyIsInN1YiI6IjM5MThmYmI3LWJiNWEtNGYzOS1iNmYxLTJlOGExMWJiNDcyMiIsImF1ZCI6Ijc5Y2E1YmM2LWVkZjAtNDkyZi04NGI4LWUxZTg4YmYxYmI4MyIsImNfaGFzaCI6Ik9UcTFlcXlPNkVNVDJScWlYZzA4dWciLCJhY3IiOiIzIiwiYXV0aF90aW1lIjoxNTk3NjkwNzkwLCJpc3MiOiJodHRwczovL2FhYS5tZXctdGVjaC5pby9vcCIsImV4cCI6MTU5NzY5MzA0OCwiaWF0IjoxNTk3NjkwOTQ4LCJub25jZSI6IkNTNFpqbmMwZzIiLCJydF9oYXNoIjoicE5hQWs0cF9WOUd1WDVVU2NVTnlJZyJ9.VmdabSVtt76KBUKr3TkPZTaXFq_oTymhn7FzpeJxUeUJ7lzh6Mrdmj0WuRL4mZGcqzfalDD4YNkY2NhzxNZgsmxWKuC8n87-HX6TKanXms4enWrUu6RKKYeu59lE73YIkFcQjNZb6uZnIZWybHHtP3y-PqUO-V8bJkB4YpSIIoSavjWMhq2uPviCkkTx0NSeFFtZiTJoTcO8pZV5uAcETS3e2d5vypKT7k2r9RC5HBusUA-5YepNYXm7_n1RI2PAfPw05gZaJz2B_rGVxL2KtmVKIAfFUB61X9RoCGPIkh1-N5qrmUzZJ_dk6PYznPhKh3bL3lhcch9g6OW1rDYCuQ
2020-08-17 19:02:28 SUCCESS
ValidateIdTokenSignatureUsingKid
id_token signature validated
id_token
eyJraWQiOiJmNzNhYjRiMC00ZGE4LTQ4NDEtYTNjZS1iYzQwYTY2NDEwMmIiLCJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiR1JtLVIxenVMN192TmhHbEM2X1NCdyIsInN1YiI6IjM5MThmYmI3LWJiNWEtNGYzOS1iNmYxLTJlOGExMWJiNDcyMiIsImF1ZCI6Ijc5Y2E1YmM2LWVkZjAtNDkyZi04NGI4LWUxZTg4YmYxYmI4MyIsImNfaGFzaCI6Ik9UcTFlcXlPNkVNVDJScWlYZzA4dWciLCJhY3IiOiIzIiwiYXV0aF90aW1lIjoxNTk3NjkwNzkwLCJpc3MiOiJodHRwczovL2FhYS5tZXctdGVjaC5pby9vcCIsImV4cCI6MTU5NzY5MzA0OCwiaWF0IjoxNTk3NjkwOTQ4LCJub25jZSI6IkNTNFpqbmMwZzIiLCJydF9oYXNoIjoicE5hQWs0cF9WOUd1WDVVU2NVTnlJZyJ9.VmdabSVtt76KBUKr3TkPZTaXFq_oTymhn7FzpeJxUeUJ7lzh6Mrdmj0WuRL4mZGcqzfalDD4YNkY2NhzxNZgsmxWKuC8n87-HX6TKanXms4enWrUu6RKKYeu59lE73YIkFcQjNZb6uZnIZWybHHtP3y-PqUO-V8bJkB4YpSIIoSavjWMhq2uPviCkkTx0NSeFFtZiTJoTcO8pZV5uAcETS3e2d5vypKT7k2r9RC5HBusUA-5YepNYXm7_n1RI2PAfPw05gZaJz2B_rGVxL2KtmVKIAfFUB61X9RoCGPIkh1-N5qrmUzZJ_dk6PYznPhKh3bL3lhcch9g6OW1rDYCuQ
2020-08-17 19:02:28 SUCCESS
CheckForSubjectInIdToken
Found 'sub' in id_token
sub
3918fbb7-bb5a-4f39-b6f1-2e8a11bb4722
2020-08-17 19:02:28 SUCCESS
ExtractRefreshTokenFromTokenResponse
Extracted refresh token from response
refresh_token
9oB-4yGnQpW8hs_MP-8i1A7FmrIbEV9R
2020-08-17 19:02:28 SUCCESS
EnsureServerConfigurationSupportsRefreshToken
The server configuration indicates support for refresh tokens
supported_grant_types
[
  "authorization_code",
  "implicit",
  "refresh_token",
  "client_credentials"
]
2020-08-17 19:02:28 SUCCESS
EnsureRefreshTokenContainsAllowedCharactersOnly
Refresh token does not contain any illegal characters
Second client: Refresh Token Request
2020-08-17 19:02:28 SUCCESS
CreateRefreshTokenRequest
Created token endpoint request parameters
grant_type
refresh_token
refresh_token
9oB-4yGnQpW8hs_MP-8i1A7FmrIbEV9R
2020-08-17 19:02:28 SUCCESS
AddBasicAuthClientSecretAuthenticationParameters
Added basic authorization header
Authorization
Basic NzljYTViYzYtZWRmMC00OTJmLTg0YjgtZTFlODhiZjFiYjgzOi9kelprbUNXa3FwU09HTjVUcnpNalB3Mk95Qkozekp4Tjhrd1ZmRjZHdFU=
2020-08-17 19:02:28 SUCCESS
WaitForOneSecond
Pausing for 1 seconds
2020-08-17 19:02:29 SUCCESS
WaitForOneSecond
Woke up after 1 seconds sleep
2020-08-17 19:02:29
CallTokenEndpointAndReturnFullResponse
HTTP request
request_uri
https://aaa.mew-tech.io/op/token
request_method
POST
request_headers
{
  "accept": "application/json;charset\u003dUTF-8",
  "authorization": "Basic NzljYTViYzYtZWRmMC00OTJmLTg0YjgtZTFlODhiZjFiYjgzOi9kelprbUNXa3FwU09HTjVUcnpNalB3Mk95Qkozekp4Tjhrd1ZmRjZHdFU\u003d",
  "accept-charset": "utf-8",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "content-length": "71"
}
request_body
grant_type=refresh_token&refresh_token=9oB-4yGnQpW8hs_MP-8i1A7FmrIbEV9R
2020-08-17 19:02:29 RESPONSE
CallTokenEndpointAndReturnFullResponse
HTTP response
response_status_code
200 OK
response_status_text

                                
response_headers
{
  "date": "Mon, 17 Aug 2020 19:02:29 GMT",
  "server": "Apache/2.4.25 (Debian)",
  "cache-control": "no-store",
  "pragma": "no-cache",
  "x-content-type-options": "nosniff",
  "x-xss-protection": "1; mode\u003dblock",
  "content-type": "application/json;charset\u003dUTF-8",
  "content-length": "975",
  "set-cookie": "JSESSIONID\u003d5EFDC4E262C2006331269FDBEC2B58DC; Path\u003d/; HttpOnly",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive"
}
response_body
{"access_token":"D_T0PCkmILtFQrrcR2gTLupUJdMRq4Gf","refresh_token":"O-BPxszh3Z1hIZtiClho0mpXVOiQM3YS","id_token":"eyJraWQiOiJmNzNhYjRiMC00ZGE4LTQ4NDEtYTNjZS1iYzQwYTY2NDEwMmIiLCJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiTlB3ci1DUDk1Q0s1UWVtUVlUYWZIQSIsInN1YiI6IjM5MThmYmI3LWJiNWEtNGYzOS1iNmYxLTJlOGExMWJiNDcyMiIsImF1ZCI6Ijc5Y2E1YmM2LWVkZjAtNDkyZi04NGI4LWUxZTg4YmYxYmI4MyIsImFjciI6IjMiLCJhdXRoX3RpbWUiOjE1OTc2OTA3OTAsImlzcyI6Imh0dHBzOi8vYWFhLm1ldy10ZWNoLmlvL29wIiwiZXhwIjoxNTk3NjkzMDQ5LCJpYXQiOjE1OTc2OTA5NDksIm5vbmNlIjoiQ1M0WmpuYzBnMiIsInJ0X2hhc2giOiJieVk2V282ZWlnZFk1SEdWNm5RQ1N3In0.GWUKJbjbBQ4xAoE7c1KWTOGxf42l2MUwqoFvZd9Kw_kdu2OSXrsTSWURn5RzN4D28o7XFZXS-lw7TnfbPzUsxXvqppKIW9SKfQ_Macytnt7vau-TvCWOfArtvwvyjgk0sdvsQnO3DqH9mjVeclXCPDWsGMxro5p2xB-p7rosYQAAwt3COUIq1gn8rDSSutaL0GS8-3EN8BE442ok7Pa-djN7qcvqVIob8VeoIkcqTRcLNUW46KkvO8VUVepTDwjtvtvAt-DpVujGk9HwilVu3vSV6ST17z9ZSZOL0frhcrS3GcOmdJERZc6xI5xJieCRPW8FHZXjpkEAHVuhXmLnTA","token_type":"Bearer","expires_in":1800}
2020-08-17 19:02:29 SUCCESS
CallTokenEndpointAndReturnFullResponse
Parsed token endpoint response
access_token
D_T0PCkmILtFQrrcR2gTLupUJdMRq4Gf
refresh_token
O-BPxszh3Z1hIZtiClho0mpXVOiQM3YS
id_token
eyJraWQiOiJmNzNhYjRiMC00ZGE4LTQ4NDEtYTNjZS1iYzQwYTY2NDEwMmIiLCJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiTlB3ci1DUDk1Q0s1UWVtUVlUYWZIQSIsInN1YiI6IjM5MThmYmI3LWJiNWEtNGYzOS1iNmYxLTJlOGExMWJiNDcyMiIsImF1ZCI6Ijc5Y2E1YmM2LWVkZjAtNDkyZi04NGI4LWUxZTg4YmYxYmI4MyIsImFjciI6IjMiLCJhdXRoX3RpbWUiOjE1OTc2OTA3OTAsImlzcyI6Imh0dHBzOi8vYWFhLm1ldy10ZWNoLmlvL29wIiwiZXhwIjoxNTk3NjkzMDQ5LCJpYXQiOjE1OTc2OTA5NDksIm5vbmNlIjoiQ1M0WmpuYzBnMiIsInJ0X2hhc2giOiJieVk2V282ZWlnZFk1SEdWNm5RQ1N3In0.GWUKJbjbBQ4xAoE7c1KWTOGxf42l2MUwqoFvZd9Kw_kdu2OSXrsTSWURn5RzN4D28o7XFZXS-lw7TnfbPzUsxXvqppKIW9SKfQ_Macytnt7vau-TvCWOfArtvwvyjgk0sdvsQnO3DqH9mjVeclXCPDWsGMxro5p2xB-p7rosYQAAwt3COUIq1gn8rDSSutaL0GS8-3EN8BE442ok7Pa-djN7qcvqVIob8VeoIkcqTRcLNUW46KkvO8VUVepTDwjtvtvAt-DpVujGk9HwilVu3vSV6ST17z9ZSZOL0frhcrS3GcOmdJERZc6xI5xJieCRPW8FHZXjpkEAHVuhXmLnTA
token_type
Bearer
expires_in
1800
2020-08-17 19:02:29 SUCCESS
CheckTokenEndpointHttpStatus200
Token endpoint http status code was 200
2020-08-17 19:02:29 SUCCESS
CheckTokenEndpointReturnedJsonContentType
token_endpoint_response_headers Content-Type: header is application/json
2020-08-17 19:02:29 SUCCESS
CheckTokenEndpointCacheHeaders
Checked 'pragma' and 'cache-control' in the headers of token_endpoint_response.
2020-08-17 19:02:29 SUCCESS
CheckIfTokenEndpointResponseError
No error from token endpoint
2020-08-17 19:02:29 SUCCESS
ExtractAccessTokenFromTokenResponse
Extracted the access token
value
D_T0PCkmILtFQrrcR2gTLupUJdMRq4Gf
type
Bearer
2020-08-17 19:02:29 SUCCESS
CheckTokenTypeIsBearer
Token type is bearer
2020-08-17 19:02:29 SUCCESS
EnsureMinimumAccessTokenEntropy
Calculated shannon entropy seems sufficient
actual
152.0
expected
96.0
2020-08-17 19:02:29 SUCCESS
EnsureAccessTokenContainsAllowedCharactersOnly
Access token does not contain any illegal characters
2020-08-17 19:02:29 SUCCESS
ExtractExpiresInFromTokenEndpointResponse
Extracted 'expires_in'
expires_in
1800
2020-08-17 19:02:29 SUCCESS
ValidateExpiresIn
expires_in passed all validation checks
expires_in
1800
2020-08-17 19:02:29 SUCCESS
EnsureAccessTokenValuesAreDifferent
Access token values are not the same
first_access_token
JnMiPBfVBJpwbWsw3qYNf3WHccVfkJds
second_access_token
D_T0PCkmILtFQrrcR2gTLupUJdMRq4Gf
2020-08-17 19:02:29 SUCCESS
ExtractIdTokenFromTokenResponse
Found and parsed the id_token from token_endpoint_response
value
eyJraWQiOiJmNzNhYjRiMC00ZGE4LTQ4NDEtYTNjZS1iYzQwYTY2NDEwMmIiLCJ0eXAiOiJKV1QiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiTlB3ci1DUDk1Q0s1UWVtUVlUYWZIQSIsInN1YiI6IjM5MThmYmI3LWJiNWEtNGYzOS1iNmYxLTJlOGExMWJiNDcyMiIsImF1ZCI6Ijc5Y2E1YmM2LWVkZjAtNDkyZi04NGI4LWUxZTg4YmYxYmI4MyIsImFjciI6IjMiLCJhdXRoX3RpbWUiOjE1OTc2OTA3OTAsImlzcyI6Imh0dHBzOi8vYWFhLm1ldy10ZWNoLmlvL29wIiwiZXhwIjoxNTk3NjkzMDQ5LCJpYXQiOjE1OTc2OTA5NDksIm5vbmNlIjoiQ1M0WmpuYzBnMiIsInJ0X2hhc2giOiJieVk2V282ZWlnZFk1SEdWNm5RQ1N3In0.GWUKJbjbBQ4xAoE7c1KWTOGxf42l2MUwqoFvZd9Kw_kdu2OSXrsTSWURn5RzN4D28o7XFZXS-lw7TnfbPzUsxXvqppKIW9SKfQ_Macytnt7vau-TvCWOfArtvwvyjgk0sdvsQnO3DqH9mjVeclXCPDWsGMxro5p2xB-p7rosYQAAwt3COUIq1gn8rDSSutaL0GS8-3EN8BE442ok7Pa-djN7qcvqVIob8VeoIkcqTRcLNUW46KkvO8VUVepTDwjtvtvAt-DpVujGk9HwilVu3vSV6ST17z9ZSZOL0frhcrS3GcOmdJERZc6xI5xJieCRPW8FHZXjpkEAHVuhXmLnTA
header
{
  "kid": "f73ab4b0-4da8-4841-a3ce-bc40a664102b",
  "typ": "JWT",
  "alg": "RS256"
}
claims
{
  "at_hash": "NPwr-CP95CK5QemQYTafHA",
  "sub": "3918fbb7-bb5a-4f39-b6f1-2e8a11bb4722",
  "aud": "79ca5bc6-edf0-492f-84b8-e1e88bf1bb83",
  "acr": "3",
  "auth_time": 1597690790,
  "iss": "https://aaa.mew-tech.io/op",
  "exp": 1597693049,
  "iat": 1597690949,
  "nonce": "CS4Zjnc0g2",
  "rt_hash": "byY6Wo6eigdY5HGV6nQCSw"
}
2020-08-17 19:02:29 SUCCESS
ExtractRefreshTokenFromTokenResponse
Extracted refresh token from response
refresh_token
O-BPxszh3Z1hIZtiClho0mpXVOiQM3YS
2020-08-17 19:02:29 SUCCESS
EnsureMinimumRefreshTokenLength
Refresh token is of sufficient length
actual
256
required
128
2020-08-17 19:02:29 SUCCESS
EnsureMinimumRefreshTokenEntropy
Calculated shannon entropy seems sufficient
actual
147.24511249783654
expected
96.0
2020-08-17 19:02:29 SUCCESS
CompareIdTokenClaims
Validated id token claims successfully
iss
{
  "first": "https://aaa.mew-tech.io/op",
  "second": "https://aaa.mew-tech.io/op",
  "note": "Values are expected to be equal"
}
sub
{
  "first": "3918fbb7-bb5a-4f39-b6f1-2e8a11bb4722",
  "second": "3918fbb7-bb5a-4f39-b6f1-2e8a11bb4722",
  "note": "Values are expected to be equal"
}
iat
{
  "first": 1597690948,
  "second": 1597690949,
  "note": "Values are expected to be different"
}
aud
{
  "first": "79ca5bc6-edf0-492f-84b8-e1e88bf1bb83",
  "second": "79ca5bc6-edf0-492f-84b8-e1e88bf1bb83",
  "note": "Values are expected to be equal"
}
auth_time
{
  "first": 1597690790,
  "second": 1597690790,
  "note": "Values are expected to be equal"
}
azp
Id tokens do not contain azp claims
Second client: Userinfo endpoint tests
2020-08-17 19:02:29
CallProtectedResourceWithBearerToken
HTTP request
request_uri
https://aaa.mew-tech.io/op/userinfo
request_method
GET
request_headers
{
  "accept": "application/json;charset\u003dUTF-8",
  "authorization": "Bearer D_T0PCkmILtFQrrcR2gTLupUJdMRq4Gf",
  "accept-charset": "utf-8",
  "content-length": "0"
}
request_body

                                
2020-08-17 19:02:30 RESPONSE
CallProtectedResourceWithBearerToken
HTTP response
response_status_code
200 OK
response_status_text

                                
response_headers
{
  "date": "Mon, 17 Aug 2020 19:02:29 GMT",
  "server": "Apache/2.4.25 (Debian)",
  "x-content-type-options": "nosniff",
  "x-xss-protection": "1; mode\u003dblock",
  "cache-control": "no-cache, no-store, max-age\u003d0, must-revalidate",
  "pragma": "no-cache",
  "expires": "0",
  "content-type": "application/json;charset\u003dUTF-8",
  "content-length": "46",
  "set-cookie": "JSESSIONID\u003d8CC7219F000CA8065C94D32496B04D1E; Path\u003d/; HttpOnly",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive"
}
response_body
{"sub":"3918fbb7-bb5a-4f39-b6f1-2e8a11bb4722"}
2020-08-17 19:02:30 SUCCESS
CallProtectedResourceWithBearerToken
Got a response from the resource endpoint
headers
{
  "date": "Mon, 17 Aug 2020 19:02:29 GMT",
  "server": "Apache/2.4.25 (Debian)",
  "x-content-type-options": "nosniff",
  "x-xss-protection": "1; mode\u003dblock",
  "cache-control": "no-cache, no-store, max-age\u003d0, must-revalidate",
  "pragma": "no-cache",
  "expires": "0",
  "content-type": "application/json;charset\u003dUTF-8",
  "content-length": "46",
  "set-cookie": "JSESSIONID\u003d8CC7219F000CA8065C94D32496B04D1E; Path\u003d/; HttpOnly",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive"
}
status_code
{
  "code": 200
}
body
{"sub":"3918fbb7-bb5a-4f39-b6f1-2e8a11bb4722"}
Attempting to use refresh_token issued to client 2 with client 1
2020-08-17 19:02:30 SUCCESS
CreateRefreshTokenRequest
Created token endpoint request parameters
grant_type
refresh_token
refresh_token
O-BPxszh3Z1hIZtiClho0mpXVOiQM3YS
2020-08-17 19:02:30 SUCCESS
AddScopeToTokenEndpointRequest
Added scope of 'openid offline_access' to token endpoint request
grant_type
refresh_token
refresh_token
O-BPxszh3Z1hIZtiClho0mpXVOiQM3YS
scope
openid offline_access
2020-08-17 19:02:30 SUCCESS
AddBasicAuthClientSecretAuthenticationParameters
Added basic authorization header
Authorization
Basic NGMzMjQ0YzItNGI1MS00MWJhLWJiODMtMmQ1NGE1NTE5ZThkOjN3M0puUjlkWjdsZkpwekFVbzJBOGVNTC9FTG5INEV1SmJ0MS83eEhISVE=
2020-08-17 19:02:30
CallTokenEndpointAndReturnFullResponse
HTTP request
request_uri
https://aaa.mew-tech.io/op/token
request_method
POST
request_headers
{
  "accept": "application/json;charset\u003dUTF-8",
  "authorization": "Basic NGMzMjQ0YzItNGI1MS00MWJhLWJiODMtMmQ1NGE1NTE5ZThkOjN3M0puUjlkWjdsZkpwekFVbzJBOGVNTC9FTG5INEV1SmJ0MS83eEhISVE\u003d",
  "accept-charset": "utf-8",
  "content-type": "application/x-www-form-urlencoded;charset\u003dUTF-8",
  "content-length": "99"
}
request_body
grant_type=refresh_token&refresh_token=O-BPxszh3Z1hIZtiClho0mpXVOiQM3YS&scope=openid+offline_access
2020-08-17 19:02:30 RESPONSE
CallTokenEndpointAndReturnFullResponse
HTTP response
response_status_code
400 BAD_REQUEST
response_status_text

                                
response_headers
{
  "date": "Mon, 17 Aug 2020 19:02:29 GMT",
  "server": "Apache/2.4.25 (Debian)",
  "x-content-type-options": "nosniff",
  "x-xss-protection": "1; mode\u003dblock",
  "cache-control": "no-cache, no-store, max-age\u003d0, must-revalidate",
  "pragma": "no-cache",
  "expires": "0",
  "content-type": "application/json",
  "connection": "close",
  "transfer-encoding": "chunked"
}
response_body
{"error_description":"client not allowed","error":"invalid_grant"}
2020-08-17 19:02:30 SUCCESS
CallTokenEndpointAndReturnFullResponse
Parsed token endpoint response
error_description
client not allowed
error
invalid_grant
2020-08-17 19:02:30 SUCCESS
ValidateErrorFromTokenEndpointResponseError
Token endpoint response error returned valid 'error' field
error
invalid_grant
2020-08-17 19:02:30 SUCCESS
CheckTokenEndpointHttpStatus400
Token endpoint http status code was 400
2020-08-17 19:02:30 SUCCESS
CheckTokenEndpointReturnedJsonContentType
token_endpoint_response_headers Content-Type: header is application/json
2020-08-17 19:02:30 SUCCESS
CheckErrorFromTokenEndpointResponseErrorInvalidGrant
Token Endpoint response error returned expected 'error' of 'invalid_grant'
error
invalid_grant
2020-08-17 19:02:30 FINISHED
oidcc-refresh-token
Test has run to completion
testmodule_result
PASSED
Unregister dynamically registered client
2020-08-17 19:02:30
UnregisterDynamicallyRegisteredClient
HTTP request
request_uri
https://aaa.mew-tech.io/op/clients
request_method
DELETE
request_headers
{
  "accept": "application/json",
  "accept-charset": "utf-8",
  "authorization": "Bearer dEQIyv3UmPR1ut7aTYL-3BosDt9SDP4I",
  "content-length": "0"
}
request_body

                                
2020-08-17 19:02:31 RESPONSE
UnregisterDynamicallyRegisteredClient
HTTP response
response_status_code
204 NO_CONTENT
response_status_text

                                
response_headers
{
  "date": "Mon, 17 Aug 2020 19:02:31 GMT",
  "server": "Apache/2.4.25 (Debian)",
  "cache-control": "no-store",
  "pragma": "no-cache",
  "x-content-type-options": "nosniff",
  "x-xss-protection": "1; mode\u003dblock",
  "set-cookie": "JSESSIONID\u003dA30D84B353A9CED77365F8DD444B853D; Path\u003d/; HttpOnly",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive"
}
response_body

                                
2020-08-17 19:02:31 SUCCESS
UnregisterDynamicallyRegisteredClient
Client successfully unregistered
Second client: Unregister dynamically registered client
2020-08-17 19:02:31
UnregisterDynamicallyRegisteredClient
HTTP request
request_uri
https://aaa.mew-tech.io/op/clients
request_method
DELETE
request_headers
{
  "accept": "application/json",
  "accept-charset": "utf-8",
  "authorization": "Bearer J52r6YtAM4oYnKh7zY2GkNr-zxZMHLNr",
  "content-length": "0"
}
request_body

                                
2020-08-17 19:02:31 RESPONSE
UnregisterDynamicallyRegisteredClient
HTTP response
response_status_code
204 NO_CONTENT
response_status_text

                                
response_headers
{
  "date": "Mon, 17 Aug 2020 19:02:31 GMT",
  "server": "Apache/2.4.25 (Debian)",
  "cache-control": "no-store",
  "pragma": "no-cache",
  "x-content-type-options": "nosniff",
  "x-xss-protection": "1; mode\u003dblock",
  "set-cookie": "JSESSIONID\u003dB900DFDA2C0F68A89381A9D6DADB6920; Path\u003d/; HttpOnly",
  "keep-alive": "timeout\u003d5, max\u003d100",
  "connection": "Keep-Alive"
}
response_body

                                
2020-08-17 19:02:31 SUCCESS
UnregisterDynamicallyRegisteredClient
Client successfully unregistered
Test Results