Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-08-10 19:23:43 INFO
TEST-RUNNER
Test instance Gxl9hOYxLlt6xpH created
baseUrl
https://www.certification.openid.net/test/a/morph_oidc_client_basic
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "response_mode": "default",
  "client_registration": "dynamic_client"
}
alias
morph_oidc_client_basic
description
Testing morph oidc basic client
planId
8XtXosP8NfqAM
config
{
  "alias": "morph_oidc_client_basic",
  "description": "Testing morph oidc basic client",
  "publish": "everything"
}
testName
oidcc-client-test-idtoken-sig-rs256
2020-08-10 19:23:43 SUCCESS
OIDCCGenerateServerConfigurationIdTokenSigningAlgRS256Only
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/morph_oidc_client_basic/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client_basic/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client_basic/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/morph_oidc_client_basic/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client_basic/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client_basic/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "RS256"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-08-10 19:23:43
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/morph_oidc_client_basic/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client_basic/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client_basic/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/morph_oidc_client_basic/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client_basic/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client_basic/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "RS256"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-08-10 19:23:44
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "9WY6OaagXgImC0fwHPbVaIVO1gagYQqdNXZuXa2p3-QzXNaxFEXplTh-sR-GaP1jR3zrGO5jVyADaNxI7bDB2rNTr9YLYi3e4hiZ-AHsjLlGCstHgg8PRvoBZgttF8Q5vpsN--pUFGPG6cZWRPtraJTsF7kkpsrPqx4BSKt6Jzs",
      "kty": "RSA",
      "q": "ya-wq6ddGkRxan-80aCbpEuWzcams_hgH_CXTflZYyivR1F-krUEGzXjyYkrHvc0ug9PjAZzI2NrtFb_ufDd-VA9ZqSWtTrp92tK1OCZcOpMv5dcZpTcnDnnRIST5cHAPQ4VZKynt_dMSMfXRKK6VsAOqKxtNhAk9RyKnCHvPhs",
      "d": "ZfwXbf_N4OZyeGh-xxVSMsoAeIhe-CsPBfp68pym8uiqrZcLDX2WT9L59ZyGeZ3wMUA1sI90wtKtsqllasopjHZkL0tJikaNMyTTAJj440T7rTmk9Ek0X8LzmzZubBQMeV0WzvMUKia_TDU2WQPVKikRVJBri9u0VX7SIOOOyRzk7tlCN6RVpo03XggSexJs5ndZdNNKGEGGMoPIMVXBxIp0N4LT801_7NMWcGXPnuDsjd7T17qkg6O45t2Sn_z_kqIwBzK0uC3-fjL-F3A7FGm9WXUTgHNt9djyo2k-7qaWrobIH7DnQyVI2NfkwYJICMjyp-dBajKsxbQe5vaSzQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "03ee59fb-cbfd-4b28-a25c-3cd94a871a44",
      "qi": "q7AxH2Rlts188yk-n96LU-hl360V7YREHUw_Ck4Ce2XxWWgW0pojqM_7hJxDJvrvhUZ6rcsQ5NN32bsTt0Z5QOGmJv7ABsSuKwW68xGW0IxI0W_0URGpcyAbhBJNLcdAnopWAwx6sxWBS3xo4shceXzBToM1gyHR0YxahLu2mfw",
      "dp": "IHTw5ocfVs-58GwHWg1blINtNemSdMNOn6-WUVWSzkYEdRcAPMoyZsYeG5cr098PrnjbL2T4RqG5Ubkw_B8QxLhLLUqGHuoqPIU8eAzpGIO4u9y_DHipcJ3IaZLBTw9pA8jGRLdtf3Ti7jCJYH5Qanin8UtPia_xX5SMXuwvL9k",
      "dq": "VMCzqS6HfUZNssdC_YRUY1IwaQCVhQNWwZVEv8uMuJKcNYgVfGj89MJMmqA9sqGHUrikYN9E-xYIaJw2kliZru79HmkDu9yp_QLlS1emo0CSR-C_P4xGuI_Mk4py7BXjRsToUIoNYM1XDS6NU5ZeX54NiuwKaLGYFjiMNtg7xQk",
      "n": "wVWt8-T8R81BhNEVPfGok6h_FuUuwIgRuHaqVsyNyeVWuPJMSnC33PBwvSS1HSCLNX1aLVAFd4zmVixbWZ7GMYJ9O1zE7TqXn6F_cay72mVtNC2pLsOaFYOa86-ItVppj-Jhje6IRt-CjPsrKmzERzk3DcdpUvfRn6duzLPwuJFj0ukiQUAHUXngVUVPPGc5Lcmvag418EYx-_8ueIuxfdBg6zpknBScoAVVPMgSeruewWZxb6lchIRVYwUw5yXGXwCmWOLqJheyO5v3ZoNutiEN_Mta60D3mSwXxHfBTBwhVL8LLvUn1KmdwHiXmfqK_lkBnKfBIHH6dkg-5ndtOQ"
    },
    {
      "kty": "EC",
      "d": "UjO5aaHSE0xtGflddXBMo-aUugBvZcpzEoMwwdtGMnY",
      "use": "sig",
      "crv": "P-256",
      "kid": "7d955161-6c15-4d6d-b34a-da1b448880e3",
      "x": "r8WWvWGqtDT0EtonkayZUcZZiP3NfySDzp8Hp-DP1Xg",
      "y": "tqWjPpuxV_DVy29LcJyZpF3rDB9y3UxCM7qsQvBX2yE"
    },
    {
      "kty": "EC",
      "d": "Pet4jlAgq7AZPmbSi_KDZn69bYf-0ve4TawKTjy7iGA",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "b692e953-8a85-488d-a067-54c7af34f666",
      "x": "KeQ0DSV2N9sy82jgdX8xBfk1kv_7-hInUG8LzxlAzXE",
      "y": "DtuqflnkMBTY51Xip0uIX1qY5HPcejMGOI5lGa_LQ1k"
    },
    {
      "kty": "OKP",
      "d": "_27GWnBSM81NnXfoAfLJ7c02KBS35BZP1Xk-UzuLczU",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "6b3aa956-23fa-4277-a9c0-d2e745d7625b",
      "x": "LKJ4Kt3pB1VbGMMEviR9NEHzku5-B2B5FjXhzYVOQc4"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "3dYEHY1ERAc9fDHjNo-eJyxpqVZyB9rqiTa6bfGPQf39bPr7Nty8eYhEOKAUsjSmsuFo1nStR7C2Mgf4xIs-Wpota4kT4vs_PBg2FXDjl6CY-XI1I9nUlvfID3DbBLYHBC3PRpxbpjnvgHnOWx_pJVPCSe1dnN6O4yVKe_tig-c",
      "kty": "RSA",
      "q": "xbDcXjCwBB8zlRYUT8nYO4km-XJGJFrD6Guu2iQT1v82NWo1cONLHk69Xmfm_ah-FCY7yW7mTt69BYm56meEV2_tbJ4ka_Aim5L_Q-WRzzMmYsxy5Kbcy1xCqx6P5Zxx2NXF5ZMVQMy3RZxVNz09Lz37mXR8DG7JBL-uXsHwQpU",
      "d": "LeiDgpmmdSnQ4YBDtjHa4KB9pIuRfOMEcMSAUNas3lkKDpO3MNlSz8A_yJxg4pz4gNz0_Xa9OteMYQlVilYrX1WwOxDyfGbfRe4zTWdmeX91lbf6ypOXpt73UvbES8ejViFzg6yyhfiknpJia59gbuleRtGczqW9msYqD0SV1D35O9bmozo_9XsDY5-yrxjrz6jozlywecPn0P5ZVGauuWOcG4JkLy39VDDheh7UgYG243Adp4Q0XS5JYs7zdZxsjWHfAtolEHAkxYdD6qNkAtDtdqCbS6QU3uB9P3GgE0ECiYUyTIzKTNApVfBeqKfpQOeU8N-TiTkkm0O_8dU6KQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "2a893b49-6121-4636-bb5c-bd0a0bf2bec9",
      "qi": "niHJ9JUgebBvXQuZExx_km5skHGxid2Bwc3o-TbygmbgLtfdao6fXjiNaJexudc0N2rmJPV8Es-JYOAW12M5Dv2Vebe2vYtZJwIGhBzbZldTIDU00cm8OT3G-lLHNn2ySa_NuTmidzbpRZprMy-IQNq18ck2QFbXj5eluNsU8Rw",
      "dp": "BhNti22qF_7mxTcMlRr75vDFeBjhCKwLTnTMSGScWt9dCJYbOVZ0ZxO_Ypmn13WvtyiLWYxajqMdamNjgeaab5rXcaGQhOACzF-RY6by5N1GM1bYc8Hsm7HvrdSWexuNN6UVj0aLEBN4JtmvODm4hgg0QxgYP0qtOTV1Q84P1bM",
      "alg": "RSA-OAEP",
      "dq": "pQ_G7943GTn0F8cXrocZxJv_rsd7SV9_s9A1bm4xIpJ08KR9eoRNdEDKXMjkVWcZ3jkOMmImajQQH0-fq9hC577MvqRMRNN8EenquQY1eIt8wYFzbPbl4-Zkw_wAqfa2GBZl5gmo9TH41GZzwGuhapCWQsq_yKG3tf9V2EiWEwE",
      "n": "q07zQxxWNwOhTcBDBxAmwBMZPw8smExl6bZZI0YmhmPpFK4fZ7dn9TMy9LwriecA8e0bc_Lrt_J2R2svu18a085gatSwGVLrLrVunLuBUVGvhyhl1jOLXmsbplu7LfyTiS_oDaV0x2OMfNCvlXId-QAmBGZ-YOjuAYqssHe3A9ZIJYZss4uVnkG8rRjdZRpdh1NV6ebfROPNBmuW3VvlLA3cP-Hs4NfONhqN0bERBLiR_Vo3Be4piWkUksRWxWXkT0KR6C48J2jbSx-QbxjAObEb5j0hiJHKYu3p40liHxA_ZVN9dTuQ-j1GLsSs7AD4chg6hld8-Sln1bOXhehTcw"
    },
    {
      "kty": "EC",
      "d": "_C8pquVirLuK_DLkHRIyrw2ct_wmhxT7ZHoTRNBoISk",
      "use": "enc",
      "crv": "P-256",
      "kid": "c63943fa-06db-49f5-b621-6613d2fe9b8c",
      "x": "axkpw76r2VaVU_2IWJQcBokyVbfW7Y7rc1G-PtGSvBU",
      "y": "LAJFLCpd4RX9bu4FwcFZKKe7vXo3IwARnWS9TsRexNU",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "03ee59fb-cbfd-4b28-a25c-3cd94a871a44",
      "n": "wVWt8-T8R81BhNEVPfGok6h_FuUuwIgRuHaqVsyNyeVWuPJMSnC33PBwvSS1HSCLNX1aLVAFd4zmVixbWZ7GMYJ9O1zE7TqXn6F_cay72mVtNC2pLsOaFYOa86-ItVppj-Jhje6IRt-CjPsrKmzERzk3DcdpUvfRn6duzLPwuJFj0ukiQUAHUXngVUVPPGc5Lcmvag418EYx-_8ueIuxfdBg6zpknBScoAVVPMgSeruewWZxb6lchIRVYwUw5yXGXwCmWOLqJheyO5v3ZoNutiEN_Mta60D3mSwXxHfBTBwhVL8LLvUn1KmdwHiXmfqK_lkBnKfBIHH6dkg-5ndtOQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "9e05ddc7-234f-41b1-8552-0470ffce8f7d",
      "n": "hwnPU8TnxODG5GfZoXRJmn6Z6TO1RGTAfBhlMpDqiZ-yzp3n7vtG2sNOGIFlz8ek9ytMNg681JzQiIEuCwbxnv8pKTuYfvulyUX6Zd9fUol1hw5M0Vh2srpDKxLtgYA-P2zFuWC9V7c6_uThnCzTK9MSXiDg7CEm2i9nvWea6RTK546gboX0rFLR37rET6YZUPSXuzOVQpvfsAaLBIMvXKsJzHKeuvBY9WMB95cR4eqqS9iMUqrklVr-3cRyqyzRdEVdpQukw6eODX2jCdYrm5EKwkkogFWWtxbnXTBq2u-FRCDlN2nCHI-Sz9eLUuSRluZ9Dg8dV4G7SKx8-airPw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "7d955161-6c15-4d6d-b34a-da1b448880e3",
      "x": "r8WWvWGqtDT0EtonkayZUcZZiP3NfySDzp8Hp-DP1Xg",
      "y": "tqWjPpuxV_DVy29LcJyZpF3rDB9y3UxCM7qsQvBX2yE"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "dd998085-638b-4293-a45b-17b5edaba309",
      "x": "mrn-9YnanwRt-gVtwjtjoZqoDZNnWWRwVhcqAR10XFs",
      "y": "x7MDohj-hiwZUNeS6qapTGsdGRd4ZZkhlWeyBb4EbYU"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "b692e953-8a85-488d-a067-54c7af34f666",
      "x": "KeQ0DSV2N9sy82jgdX8xBfk1kv_7-hInUG8LzxlAzXE",
      "y": "DtuqflnkMBTY51Xip0uIX1qY5HPcejMGOI5lGa_LQ1k"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "6b3aa956-23fa-4277-a9c0-d2e745d7625b",
      "x": "LKJ4Kt3pB1VbGMMEviR9NEHzku5-B2B5FjXhzYVOQc4"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "2a893b49-6121-4636-bb5c-bd0a0bf2bec9",
      "alg": "RSA-OAEP",
      "n": "q07zQxxWNwOhTcBDBxAmwBMZPw8smExl6bZZI0YmhmPpFK4fZ7dn9TMy9LwriecA8e0bc_Lrt_J2R2svu18a085gatSwGVLrLrVunLuBUVGvhyhl1jOLXmsbplu7LfyTiS_oDaV0x2OMfNCvlXId-QAmBGZ-YOjuAYqssHe3A9ZIJYZss4uVnkG8rRjdZRpdh1NV6ebfROPNBmuW3VvlLA3cP-Hs4NfONhqN0bERBLiR_Vo3Be4piWkUksRWxWXkT0KR6C48J2jbSx-QbxjAObEb5j0hiJHKYu3p40liHxA_ZVN9dTuQ-j1GLsSs7AD4chg6hld8-Sln1bOXhehTcw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "c63943fa-06db-49f5-b621-6613d2fe9b8c",
      "x": "axkpw76r2VaVU_2IWJQcBokyVbfW7Y7rc1G-PtGSvBU",
      "y": "LAJFLCpd4RX9bu4FwcFZKKe7vXo3IwARnWS9TsRexNU",
      "alg": "ECDH-ES"
    }
  ]
}
2020-08-10 19:23:44 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-08-10 19:23:44 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-08-10 19:23:44 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": "1580000000"
}
2020-08-10 19:23:44 SUCCESS
GetDynamicClientConfiguration
No client details on configuration, created an empty dynamic_client_registration_template object.
2020-08-10 19:23:44
oidcc-client-test-idtoken-sig-rs256
Setup Done
2020-08-10 19:24:18 INCOMING
oidcc-client-test-idtoken-sig-rs256
Incoming HTTP request to test instance Gxl9hOYxLlt6xpH
incoming_headers
{
  "host": "www.certification.openid.net",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "0",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
2020-08-10 19:24:18 OUTGOING
oidcc-client-test-idtoken-sig-rs256
Response to HTTP request to test instance Gxl9hOYxLlt6xpH
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/a/morph_oidc_client_basic/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client_basic/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client_basic/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/morph_oidc_client_basic/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client_basic/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client_basic/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "RS256"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2020-08-10 19:24:18 INCOMING
oidcc-client-test-idtoken-sig-rs256
Incoming HTTP request to test instance Gxl9hOYxLlt6xpH
incoming_headers
{
  "host": "www.certification.openid.net",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "339",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
{"redirect_uris":["https://morph-oidc-client.strid.ninja/auth/cb","https://www.certification.openid.net/test/a/morph_oidc_client_basic/callback"],"response_types":["code"],"grant_types":["authorization_code"],"contacts":["ulrik.strid@outlook.com"],"client_name":"basic_morph_oidc_client","token_endpoint_auth_method":"client_secret_basic"}
Registration endpoint
2020-08-10 19:24:18 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "redirect_uris": [
    "https://morph-oidc-client.strid.ninja/auth/cb",
    "https://www.certification.openid.net/test/a/morph_oidc_client_basic/callback"
  ],
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "contacts": [
    "ulrik.strid@outlook.com"
  ],
  "client_name": "basic_morph_oidc_client",
  "token_endpoint_auth_method": "client_secret_basic"
}
2020-08-10 19:24:18 SUCCESS
EnsureRegistrationRequestContainsAtLeastOneContact
Registration request contains valid contacts
contacts
[
  "ulrik.strid@outlook.com"
]
2020-08-10 19:24:18 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2020-08-10 19:24:18 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://morph-oidc-client.strid.ninja/auth/cb",
  "https://www.certification.openid.net/test/a/morph_oidc_client_basic/callback"
]
2020-08-10 19:24:18 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2020-08-10 19:24:18 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2020-08-10 19:24:18 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2020-08-10 19:24:18 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2020-08-10 19:24:18 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2020-08-10 19:24:18 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2020-08-10 19:24:18 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2020-08-10 19:24:18 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-08-10 19:24:18 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2020-08-10 19:24:18 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2020-08-10 19:24:18 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2020-08-10 19:24:18 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2020-08-10 19:24:18 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2020-08-10 19:24:18 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2020-08-10 19:24:18 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2020-08-10 19:24:18 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2020-08-10 19:24:18 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2020-08-10 19:24:18 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2020-08-10 19:24:18 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "redirect_uris": [
    "https://morph-oidc-client.strid.ninja/auth/cb",
    "https://www.certification.openid.net/test/a/morph_oidc_client_basic/callback"
  ],
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "contacts": [
    "ulrik.strid@outlook.com"
  ],
  "client_name": "basic_morph_oidc_client",
  "token_endpoint_auth_method": "client_secret_basic",
  "client_id": "client_EwHdmMqhDpSqFqS86297:}-,,"
}
2020-08-10 19:24:18
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_ShlrAHyumekMbSKZaHeqNkwWhlAVqfDkoNJIdRcWJJRMJnWDrM8259199413|;}@/
2020-08-10 19:24:18 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2020-08-10 19:24:18
SetClientIdTokenSignedResponseAlgToRS256
Set id_token_signed_response_alg to RS256 for the registered client
client
{
  "redirect_uris": [
    "https://morph-oidc-client.strid.ninja/auth/cb",
    "https://www.certification.openid.net/test/a/morph_oidc_client_basic/callback"
  ],
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "contacts": [
    "ulrik.strid@outlook.com"
  ],
  "client_name": "basic_morph_oidc_client",
  "token_endpoint_auth_method": "client_secret_basic",
  "client_id": "client_EwHdmMqhDpSqFqS86297:}-,,",
  "client_secret": "secret_ShlrAHyumekMbSKZaHeqNkwWhlAVqfDkoNJIdRcWJJRMJnWDrM8259199413|;}@/",
  "id_token_signed_response_alg": "RS256"
}
2020-08-10 19:24:18 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "redirect_uris": [
    "https://morph-oidc-client.strid.ninja/auth/cb",
    "https://www.certification.openid.net/test/a/morph_oidc_client_basic/callback"
  ],
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "contacts": [
    "ulrik.strid@outlook.com"
  ],
  "client_name": "basic_morph_oidc_client",
  "token_endpoint_auth_method": "client_secret_basic",
  "client_id": "client_EwHdmMqhDpSqFqS86297:}-,,",
  "client_secret": "secret_ShlrAHyumekMbSKZaHeqNkwWhlAVqfDkoNJIdRcWJJRMJnWDrM8259199413|;}@/",
  "id_token_signed_response_alg": "RS256"
}
2020-08-10 19:24:18 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2020-08-10 19:24:18
SetServerSigningAlgToRS256
Successfully set signing algorithm to RS256
2020-08-10 19:24:18
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2020-08-10 19:24:18 OUTGOING
oidcc-client-test-idtoken-sig-rs256
Response to HTTP request to test instance Gxl9hOYxLlt6xpH
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "redirect_uris": [
    "https://morph-oidc-client.strid.ninja/auth/cb",
    "https://www.certification.openid.net/test/a/morph_oidc_client_basic/callback"
  ],
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "contacts": [
    "ulrik.strid@outlook.com"
  ],
  "client_name": "basic_morph_oidc_client",
  "token_endpoint_auth_method": "client_secret_basic",
  "client_id": "client_EwHdmMqhDpSqFqS86297:}-,,",
  "client_secret": "secret_ShlrAHyumekMbSKZaHeqNkwWhlAVqfDkoNJIdRcWJJRMJnWDrM8259199413|;}@/",
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2020-08-10 19:24:18 INCOMING
oidcc-client-test-idtoken-sig-rs256
Incoming HTTP request to test instance Gxl9hOYxLlt6xpH
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:79.0) Gecko/20100101 Firefox/79.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "referer": "https://morph-oidc-client.strid.ninja/",
  "dnt": "1",
  "cookie": "expected_tab\u003dmicrosoftonline; welcome_info_name\u003dUlrik%20Strid; JSESSIONID\u003dCB87DB255579AE321C16855066F1AF5F",
  "upgrade-insecure-requests": "1",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "response_type": "code",
  "client_id": "client_EwHdmMqhDpSqFqS86297:}-,,",
  "redirect_uri": "https://morph-oidc-client.strid.ninja/auth/cb",
  "scope": "openid profile email",
  "state": "9c9594c9-11a5-4c1c-8c39-9512ea468652",
  "nonce": "015c3366-2bf7-4e56-b03f-111ed9daec37"
}
incoming_body
Authorization endpoint
2020-08-10 19:24:18 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2020-08-10 19:24:18 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "profile",
  "email"
]
expected
openid
2020-08-10 19:24:18 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "response_type": "code",
  "client_id": "client_EwHdmMqhDpSqFqS86297:}-,,",
  "redirect_uri": "https://morph-oidc-client.strid.ninja/auth/cb",
  "scope": "openid profile email",
  "state": "9c9594c9-11a5-4c1c-8c39-9512ea468652",
  "nonce": "015c3366-2bf7-4e56-b03f-111ed9daec37"
}
2020-08-10 19:24:18 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid profile email
2020-08-10 19:24:18 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
015c3366-2bf7-4e56-b03f-111ed9daec37
2020-08-10 19:24:18 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2020-08-10 19:24:18 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_EwHdmMqhDpSqFqS86297:}-,,
2020-08-10 19:24:18 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://morph-oidc-client.strid.ninja/auth/cb
expected
[
  "https://morph-oidc-client.strid.ninja/auth/cb",
  "https://www.certification.openid.net/test/a/morph_oidc_client_basic/callback"
]
2020-08-10 19:24:18 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "profile",
  "email"
]
expected
openid
2020-08-10 19:24:18 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2020-08-10 19:24:18 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
n4I6ieL26Z
2020-08-10 19:24:18 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
cCGRK7tIEEx9Opg3YTqXxQ
2020-08-10 19:24:18 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://morph-oidc-client.strid.ninja/auth/cb",
  "state": "9c9594c9-11a5-4c1c-8c39-9512ea468652"
}
2020-08-10 19:24:18 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://morph-oidc-client.strid.ninja/auth/cb",
  "state": "9c9594c9-11a5-4c1c-8c39-9512ea468652",
  "code": "n4I6ieL26Z"
}
2020-08-10 19:24:18
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
https://morph-oidc-client.strid.ninja/auth/cb?state=9c9594c9-11a5-4c1c-8c39-9512ea468652&code=n4I6ieL26Z
2020-08-10 19:24:18 OUTGOING
oidcc-client-test-idtoken-sig-rs256
Response to HTTP request to test instance Gxl9hOYxLlt6xpH
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [https://morph-oidc-client.strid.ninja/auth/cb?state=9c9594c9-11a5-4c1c-8c39-9512ea468652&code=n4I6ieL26Z]
outgoing_path
authorize
2020-08-10 19:24:18 INCOMING
oidcc-client-test-idtoken-sig-rs256
Incoming HTTP request to test instance Gxl9hOYxLlt6xpH
incoming_headers
{
  "host": "www.certification.openid.net",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "0",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
2020-08-10 19:24:18 OUTGOING
oidcc-client-test-idtoken-sig-rs256
Response to HTTP request to test instance Gxl9hOYxLlt6xpH
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "03ee59fb-cbfd-4b28-a25c-3cd94a871a44",
      "n": "wVWt8-T8R81BhNEVPfGok6h_FuUuwIgRuHaqVsyNyeVWuPJMSnC33PBwvSS1HSCLNX1aLVAFd4zmVixbWZ7GMYJ9O1zE7TqXn6F_cay72mVtNC2pLsOaFYOa86-ItVppj-Jhje6IRt-CjPsrKmzERzk3DcdpUvfRn6duzLPwuJFj0ukiQUAHUXngVUVPPGc5Lcmvag418EYx-_8ueIuxfdBg6zpknBScoAVVPMgSeruewWZxb6lchIRVYwUw5yXGXwCmWOLqJheyO5v3ZoNutiEN_Mta60D3mSwXxHfBTBwhVL8LLvUn1KmdwHiXmfqK_lkBnKfBIHH6dkg-5ndtOQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "9e05ddc7-234f-41b1-8552-0470ffce8f7d",
      "n": "hwnPU8TnxODG5GfZoXRJmn6Z6TO1RGTAfBhlMpDqiZ-yzp3n7vtG2sNOGIFlz8ek9ytMNg681JzQiIEuCwbxnv8pKTuYfvulyUX6Zd9fUol1hw5M0Vh2srpDKxLtgYA-P2zFuWC9V7c6_uThnCzTK9MSXiDg7CEm2i9nvWea6RTK546gboX0rFLR37rET6YZUPSXuzOVQpvfsAaLBIMvXKsJzHKeuvBY9WMB95cR4eqqS9iMUqrklVr-3cRyqyzRdEVdpQukw6eODX2jCdYrm5EKwkkogFWWtxbnXTBq2u-FRCDlN2nCHI-Sz9eLUuSRluZ9Dg8dV4G7SKx8-airPw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "7d955161-6c15-4d6d-b34a-da1b448880e3",
      "x": "r8WWvWGqtDT0EtonkayZUcZZiP3NfySDzp8Hp-DP1Xg",
      "y": "tqWjPpuxV_DVy29LcJyZpF3rDB9y3UxCM7qsQvBX2yE"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "dd998085-638b-4293-a45b-17b5edaba309",
      "x": "mrn-9YnanwRt-gVtwjtjoZqoDZNnWWRwVhcqAR10XFs",
      "y": "x7MDohj-hiwZUNeS6qapTGsdGRd4ZZkhlWeyBb4EbYU"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "b692e953-8a85-488d-a067-54c7af34f666",
      "x": "KeQ0DSV2N9sy82jgdX8xBfk1kv_7-hInUG8LzxlAzXE",
      "y": "DtuqflnkMBTY51Xip0uIX1qY5HPcejMGOI5lGa_LQ1k"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "6b3aa956-23fa-4277-a9c0-d2e745d7625b",
      "x": "LKJ4Kt3pB1VbGMMEviR9NEHzku5-B2B5FjXhzYVOQc4"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "2a893b49-6121-4636-bb5c-bd0a0bf2bec9",
      "alg": "RSA-OAEP",
      "n": "q07zQxxWNwOhTcBDBxAmwBMZPw8smExl6bZZI0YmhmPpFK4fZ7dn9TMy9LwriecA8e0bc_Lrt_J2R2svu18a085gatSwGVLrLrVunLuBUVGvhyhl1jOLXmsbplu7LfyTiS_oDaV0x2OMfNCvlXId-QAmBGZ-YOjuAYqssHe3A9ZIJYZss4uVnkG8rRjdZRpdh1NV6ebfROPNBmuW3VvlLA3cP-Hs4NfONhqN0bERBLiR_Vo3Be4piWkUksRWxWXkT0KR6C48J2jbSx-QbxjAObEb5j0hiJHKYu3p40liHxA_ZVN9dTuQ-j1GLsSs7AD4chg6hld8-Sln1bOXhehTcw"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "c63943fa-06db-49f5-b621-6613d2fe9b8c",
      "x": "axkpw76r2VaVU_2IWJQcBokyVbfW7Y7rc1G-PtGSvBU",
      "y": "LAJFLCpd4RX9bu4FwcFZKKe7vXo3IwARnWS9TsRexNU",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2020-08-10 19:24:18 INCOMING
oidcc-client-test-idtoken-sig-rs256
Incoming HTTP request to test instance Gxl9hOYxLlt6xpH
incoming_headers
{
  "host": "www.certification.openid.net",
  "authorization": "Basic Y2xpZW50X0V3SGRtTXFoRHBTcUZxUzg2Mjk3JTNBJTdELSUyQyUyQzpzZWNyZXRfU2hsckFIeXVtZWtNYlNLWmFIZXFOa3dXaGxBVnFmRGtvTkpJZFJjV0pKUk1KbldEck04MjU5MTk5NDEzJTdDJTNCJTdEJTQwJTJG",
  "content-type": "application/x-www-form-urlencoded",
  "accept": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "259",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "grant_type": "authorization_code",
  "scope": "openid",
  "code": "n4I6ieL26Z",
  "client_id": "client_EwHdmMqhDpSqFqS86297:}-,,",
  "client_secret": "secret_ShlrAHyumekMbSKZaHeqNkwWhlAVqfDkoNJIdRcWJJRMJnWDrM8259199413|;}@/",
  "redirect_uri": "https://morph-oidc-client.strid.ninja/auth/cb"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
grant_type=authorization_code&scope=openid&code=n4I6ieL26Z&client_id=client_EwHdmMqhDpSqFqS86297%3A%7D-%2C%2C&client_secret=secret_ShlrAHyumekMbSKZaHeqNkwWhlAVqfDkoNJIdRcWJJRMJnWDrM8259199413%7C%3B%7D%40%2F&redirect_uri=https%3A%2F%2Fmorph-oidc-client.strid.ninja%2Fauth%2Fcb
Token endpoint
2020-08-10 19:24:18 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
client_EwHdmMqhDpSqFqS86297:}-,,
client_secret
secret_ShlrAHyumekMbSKZaHeqNkwWhlAVqfDkoNJIdRcWJJRMJnWDrM8259199413|;}@/
method
client_secret_basic
2020-08-10 19:24:18 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2020-08-10 19:24:18 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
n4I6ieL26Z
2020-08-10 19:24:18 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://morph-oidc-client.strid.ninja/auth/cb
2020-08-10 19:24:18 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
ZHLqzFPsHPPHdtFQE6xSuuAqIpOM5Fa3Ygt6n5CJhjuxM1Zfgu
2020-08-10 19:24:18 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
Xg_1WNedv2Mn_vwbVYHqLg
2020-08-10 19:24:18 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/morph_oidc_client_basic/
sub
user-subject-1234531
aud
client_EwHdmMqhDpSqFqS86297:}-,,
nonce
015c3366-2bf7-4e56-b03f-111ed9daec37
iat
1597087458
exp
1597087758
2020-08-10 19:24:18 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
Xg_1WNedv2Mn_vwbVYHqLg
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/morph_oidc_client_basic/",
  "sub": "user-subject-1234531",
  "aud": "client_EwHdmMqhDpSqFqS86297:}-,,",
  "nonce": "015c3366-2bf7-4e56-b03f-111ed9daec37",
  "iat": 1597087458,
  "exp": 1597087758,
  "at_hash": "Xg_1WNedv2Mn_vwbVYHqLg"
}
2020-08-10 19:24:18 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiIwM2VlNTlmYi1jYmZkLTRiMjgtYTI1Yy0zY2Q5NGE4NzFhNDQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiWGdfMVdOZWR2Mk1uX3Z3YlZZSHFMZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X0V3SGRtTXFoRHBTcUZxUzg2Mjk3On0tLCwiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvbW9ycGhfb2lkY19jbGllbnRfYmFzaWNcLyIsImV4cCI6MTU5NzA4Nzc1OCwibm9uY2UiOiIwMTVjMzM2Ni0yYmY3LTRlNTYtYjAzZi0xMTFlZDlkYWVjMzciLCJpYXQiOjE1OTcwODc0NTh9.Z2fSu61zvqDHg-uDNjh9_5-OMne2gGp3K1sM8C_Q9jZg5ia9ldRQ_nsh3EJXbMtBrdrXWF9-UHR2ySMEgPTkJ6fLnIyY4LUvkMWVscZkKkfsvMwTYVFnK3jbKNoPzpjkRRYH0WwdQ0IGkgRFv258_9l2S26KZdPdLpYl3JleV9SpKj3kiU2olU9ot2b1WDqXUAMasD8sNysuN1_ylgR9szi60FAxQuUFOTMBJPQ1DW2XQ1qxwR4clVbkdCxHMvKz7vt34XNgN-iY01DM8_X0nC-Hm4sQvxoucf9_hOkvvTvRLJd6xChdM2QUae--ucJKf4pN4Mtg9L1N1K49Elg_6w
key
{"p":"9WY6OaagXgImC0fwHPbVaIVO1gagYQqdNXZuXa2p3-QzXNaxFEXplTh-sR-GaP1jR3zrGO5jVyADaNxI7bDB2rNTr9YLYi3e4hiZ-AHsjLlGCstHgg8PRvoBZgttF8Q5vpsN--pUFGPG6cZWRPtraJTsF7kkpsrPqx4BSKt6Jzs","kty":"RSA","q":"ya-wq6ddGkRxan-80aCbpEuWzcams_hgH_CXTflZYyivR1F-krUEGzXjyYkrHvc0ug9PjAZzI2NrtFb_ufDd-VA9ZqSWtTrp92tK1OCZcOpMv5dcZpTcnDnnRIST5cHAPQ4VZKynt_dMSMfXRKK6VsAOqKxtNhAk9RyKnCHvPhs","d":"ZfwXbf_N4OZyeGh-xxVSMsoAeIhe-CsPBfp68pym8uiqrZcLDX2WT9L59ZyGeZ3wMUA1sI90wtKtsqllasopjHZkL0tJikaNMyTTAJj440T7rTmk9Ek0X8LzmzZubBQMeV0WzvMUKia_TDU2WQPVKikRVJBri9u0VX7SIOOOyRzk7tlCN6RVpo03XggSexJs5ndZdNNKGEGGMoPIMVXBxIp0N4LT801_7NMWcGXPnuDsjd7T17qkg6O45t2Sn_z_kqIwBzK0uC3-fjL-F3A7FGm9WXUTgHNt9djyo2k-7qaWrobIH7DnQyVI2NfkwYJICMjyp-dBajKsxbQe5vaSzQ","e":"AQAB","use":"sig","kid":"03ee59fb-cbfd-4b28-a25c-3cd94a871a44","qi":"q7AxH2Rlts188yk-n96LU-hl360V7YREHUw_Ck4Ce2XxWWgW0pojqM_7hJxDJvrvhUZ6rcsQ5NN32bsTt0Z5QOGmJv7ABsSuKwW68xGW0IxI0W_0URGpcyAbhBJNLcdAnopWAwx6sxWBS3xo4shceXzBToM1gyHR0YxahLu2mfw","dp":"IHTw5ocfVs-58GwHWg1blINtNemSdMNOn6-WUVWSzkYEdRcAPMoyZsYeG5cr098PrnjbL2T4RqG5Ubkw_B8QxLhLLUqGHuoqPIU8eAzpGIO4u9y_DHipcJ3IaZLBTw9pA8jGRLdtf3Ti7jCJYH5Qanin8UtPia_xX5SMXuwvL9k","dq":"VMCzqS6HfUZNssdC_YRUY1IwaQCVhQNWwZVEv8uMuJKcNYgVfGj89MJMmqA9sqGHUrikYN9E-xYIaJw2kliZru79HmkDu9yp_QLlS1emo0CSR-C_P4xGuI_Mk4py7BXjRsToUIoNYM1XDS6NU5ZeX54NiuwKaLGYFjiMNtg7xQk","n":"wVWt8-T8R81BhNEVPfGok6h_FuUuwIgRuHaqVsyNyeVWuPJMSnC33PBwvSS1HSCLNX1aLVAFd4zmVixbWZ7GMYJ9O1zE7TqXn6F_cay72mVtNC2pLsOaFYOa86-ItVppj-Jhje6IRt-CjPsrKmzERzk3DcdpUvfRn6duzLPwuJFj0ukiQUAHUXngVUVPPGc5Lcmvag418EYx-_8ueIuxfdBg6zpknBScoAVVPMgSeruewWZxb6lchIRVYwUw5yXGXwCmWOLqJheyO5v3ZoNutiEN_Mta60D3mSwXxHfBTBwhVL8LLvUn1KmdwHiXmfqK_lkBnKfBIHH6dkg-5ndtOQ"}
algorithm
RS256
2020-08-10 19:24:18 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-08-10 19:24:18 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
ZHLqzFPsHPPHdtFQE6xSuuAqIpOM5Fa3Ygt6n5CJhjuxM1Zfgu
token_type
Bearer
id_token
eyJraWQiOiIwM2VlNTlmYi1jYmZkLTRiMjgtYTI1Yy0zY2Q5NGE4NzFhNDQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiWGdfMVdOZWR2Mk1uX3Z3YlZZSHFMZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X0V3SGRtTXFoRHBTcUZxUzg2Mjk3On0tLCwiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvbW9ycGhfb2lkY19jbGllbnRfYmFzaWNcLyIsImV4cCI6MTU5NzA4Nzc1OCwibm9uY2UiOiIwMTVjMzM2Ni0yYmY3LTRlNTYtYjAzZi0xMTFlZDlkYWVjMzciLCJpYXQiOjE1OTcwODc0NTh9.Z2fSu61zvqDHg-uDNjh9_5-OMne2gGp3K1sM8C_Q9jZg5ia9ldRQ_nsh3EJXbMtBrdrXWF9-UHR2ySMEgPTkJ6fLnIyY4LUvkMWVscZkKkfsvMwTYVFnK3jbKNoPzpjkRRYH0WwdQ0IGkgRFv258_9l2S26KZdPdLpYl3JleV9SpKj3kiU2olU9ot2b1WDqXUAMasD8sNysuN1_ylgR9szi60FAxQuUFOTMBJPQ1DW2XQ1qxwR4clVbkdCxHMvKz7vt34XNgN-iY01DM8_X0nC-Hm4sQvxoucf9_hOkvvTvRLJd6xChdM2QUae--ucJKf4pN4Mtg9L1N1K49Elg_6w
scope
openid profile email
2020-08-10 19:24:18 OUTGOING
oidcc-client-test-idtoken-sig-rs256
Response to HTTP request to test instance Gxl9hOYxLlt6xpH
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "ZHLqzFPsHPPHdtFQE6xSuuAqIpOM5Fa3Ygt6n5CJhjuxM1Zfgu",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiIwM2VlNTlmYi1jYmZkLTRiMjgtYTI1Yy0zY2Q5NGE4NzFhNDQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiWGdfMVdOZWR2Mk1uX3Z3YlZZSHFMZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X0V3SGRtTXFoRHBTcUZxUzg2Mjk3On0tLCwiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvbW9ycGhfb2lkY19jbGllbnRfYmFzaWNcLyIsImV4cCI6MTU5NzA4Nzc1OCwibm9uY2UiOiIwMTVjMzM2Ni0yYmY3LTRlNTYtYjAzZi0xMTFlZDlkYWVjMzciLCJpYXQiOjE1OTcwODc0NTh9.Z2fSu61zvqDHg-uDNjh9_5-OMne2gGp3K1sM8C_Q9jZg5ia9ldRQ_nsh3EJXbMtBrdrXWF9-UHR2ySMEgPTkJ6fLnIyY4LUvkMWVscZkKkfsvMwTYVFnK3jbKNoPzpjkRRYH0WwdQ0IGkgRFv258_9l2S26KZdPdLpYl3JleV9SpKj3kiU2olU9ot2b1WDqXUAMasD8sNysuN1_ylgR9szi60FAxQuUFOTMBJPQ1DW2XQ1qxwR4clVbkdCxHMvKz7vt34XNgN-iY01DM8_X0nC-Hm4sQvxoucf9_hOkvvTvRLJd6xChdM2QUae--ucJKf4pN4Mtg9L1N1K49Elg_6w",
  "scope": "openid profile email"
}
outgoing_path
token
2020-08-10 19:24:18 INCOMING
oidcc-client-test-idtoken-sig-rs256
Incoming HTTP request to test instance Gxl9hOYxLlt6xpH
incoming_headers
{
  "host": "www.certification.openid.net",
  "authorization": "Bearer ZHLqzFPsHPPHdtFQE6xSuuAqIpOM5Fa3Ygt6n5CJhjuxM1Zfgu",
  "accept": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "0",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
userinfo
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Userinfo endpoint
2020-08-10 19:24:18 SUCCESS
OIDCCExtractBearerAccessTokenFromRequest
Found access token on incoming request
access_token
ZHLqzFPsHPPHdtFQE6xSuuAqIpOM5Fa3Ygt6n5CJhjuxM1Zfgu
2020-08-10 19:24:18 SUCCESS
RequireBearerAccessToken
Found access token in request
actual
ZHLqzFPsHPPHdtFQE6xSuuAqIpOM5Fa3Ygt6n5CJhjuxM1Zfgu
2020-08-10 19:24:18 SUCCESS
FilterUserInfoForScopes
User info endpoint output
sub
user-subject-1234531
website
https://openid.net/
zoneinfo
America/Los_Angeles
birthdate
2000-02-03
gender
female
preferred_username
d.tu
given_name
Demo
middle_name
Theresa
locale
en-US
updated_at
1580000000
name
Demo T. User
nickname
Dee
family_name
User
email
user@example.com
email_verified
false
2020-08-10 19:24:18
ClearAccessTokenFromRequest
Condition ran but did not log anything
2020-08-10 19:24:18 INFO
AddIssAndAudToUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-08-10 19:24:18 INFO
SignUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-08-10 19:24:18 INFO
EncryptUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_encrypted_response_alg
path
userinfo_encrypted_response_alg
mapped
object
client
2020-08-10 19:24:18 OUTGOING
oidcc-client-test-idtoken-sig-rs256
Response to HTTP request to test instance Gxl9hOYxLlt6xpH
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "sub": "user-subject-1234531",
  "website": "https://openid.net/",
  "zoneinfo": "America/Los_Angeles",
  "birthdate": "2000-02-03",
  "gender": "female",
  "preferred_username": "d.tu",
  "given_name": "Demo",
  "middle_name": "Theresa",
  "locale": "en-US",
  "updated_at": "1580000000",
  "name": "Demo T. User",
  "nickname": "Dee",
  "family_name": "User",
  "email": "user@example.com",
  "email_verified": false
}
outgoing_path
userinfo
2020-08-10 19:24:18 FINISHED
oidcc-client-test-idtoken-sig-rs256
Test has run to completion
testmodule_result
PASSED
2020-08-10 19:24:40
TEST-RUNNER
Alias has now been claimed by another test
alias
morph_oidc_client_basic
new_test_id
LMQUNWis6GbkWxZ
Test Results