Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-08-10 19:41:33 INFO
TEST-RUNNER
Test instance IokwKFHQjg6XVSd created
baseUrl
https://www.certification.openid.net/test/a/morph_oidc_client
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "response_mode": "form_post",
  "client_registration": "dynamic_client"
}
alias
morph_oidc_client
description
Testing morph oidc client with Form Post
planId
rlvHwXvRR0jje
config
{
  "alias": "morph_oidc_client",
  "description": "Testing morph oidc client with Form Post",
  "publish": "everything"
}
testName
oidcc-client-test-idtoken-sig-rs256
2020-08-10 19:41:34 SUCCESS
OIDCCGenerateServerConfigurationIdTokenSigningAlgRS256Only
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/morph_oidc_client/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/morph_oidc_client/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "RS256"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-08-10 19:41:34
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/a/morph_oidc_client/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/morph_oidc_client/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "RS256"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-08-10 19:41:34
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "_cuuXIbGsIeX_9PD8_yGkvdGxqwkqoIOxpSwubE5qBu_ZQCAkHYK0GVzmzRCgUlzKLVLAEvrD8q3AV-29gCi0hmDcsJrfdVMgWFemKQZl7kH_xwmxBn-zfaSG8nShYSdxNYxYuH2p_GN1rPyUfRuMhUsCQIp-ogb5I-60VojKP0",
      "kty": "RSA",
      "q": "wQdyYTQMwHnkG2K_UJQuhrB1MA1eyvGK0sX9uG_50WkR82orubF4LNmnqkm-bGJiEs5fZrNcp2lbM9-Nvsy9Zp2JB23saCszmFdVbUxCeeJthyXrbpfSb_uvlkuANaAAmyYkH7EiZ8og6WxLBx9Xr3NCVrDSq4mAidSVgrae03M",
      "d": "VDxVh5YPgkFTZvKs3wlVBAIsRLSdt3MBnB_6wKKh3eYI8tD1fk_DXs15XLlf07U4huaGY4eQgl2haGISzOoVse0gRuSJxgZKWF2958bcP5WccSLhZUHA0VHF_d9F43dq6pxFpdgKisC74TnlnziiVrQ4670ZqFjDDSXy6fAekl2QmAb4DoLvX2IDKm3ZmrjtTu19IZ9EaBjPuADaAWfanBBqx7ecr2FeO_a_10Qwa_O8hHMDL4pqChU7AmoIDsBGxyQ0z5DXHvYpKTU6tUPJK8UERXV__b2aygEfgzPQwp4I4GfoWVVa8nKRlOOZLR-DY-lUD6oovptLmeqBbs9mgQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "dd332214-ae25-4df1-be2a-0fdc6bd7beb5",
      "qi": "Es4_vqBuveVxqMcukHW_jIfuPEQruwSCor-5BuOG45UJJHzBaHrZWtNlfKXj7btMKrsmvHnD3iYJs7T_t27GfFcGPKyBxwESWUzkXKHfnyREWUgTQhK9UQ1ztp76vpLvyUBFTXtWO3h8csgzi8tkSrv7eN9YSciCJ5GSlwVDHaU",
      "dp": "IMr0mJgBjEW46iFerGPwr4Sr7HfJtQ5hAl-sBhJUNNiA_nf2JLRb6VlyepdiEHqBGr1yF3O3x66VvuOzLE4gu6z4QxfD89pfrEf8hRSPCf-qfNgSWjxRpCM79cM6JG5iRFC4yOIRkNmxThCqOtSueGIr8m4JJon3sKyxouNWr7E",
      "dq": "BY1OR-d0WnDnE7aSZCHu-KbIqBoqWNH7uTZCpvRpjhFkl8i8-zlUiI22GdrHJFzsDzhqXAzapGIOYn6SmCNRa0sqrtEFlLVxZXdVmLAx1Umi9tkrXWH2howJr9v6ExDIE65UKakxoSSaL7ySp-DJ59z70nyBgreQv-YiasEP7ms",
      "n": "v13wapePw2ErGFVeAngDhqqG8oTrhOeoq9EQVXO9jjKbjYFsL8D5LAXk1ErwElxmMfhzYar8idn7OdGrgnUE7yD10A016AFH-YpZf_inCEBtGtRKeP_pc5loyD8TMT6-R1cucrQu4UoIiVnwCVsGzzcWSpiKV6BnIkxjh-g40Pmtsa-4qry0eDJwOxC4pL_2Xtl2OEZRBtB5joLfwzkeZhrQCm2SM_03uIxlkDaqzBm-o8ANSPMJBunJjETw8KmJALHaxcMoKlytGNArzNmR9VHi7PdpPu3_rqKdP_LIsFJfZ2XqhOED4CafQF_VUi6HZwkRHnRGcsPaECunornwpw"
    },
    {
      "kty": "EC",
      "d": "d12dkRq_3E5z-xUq9ESyiaxPjWpDaAnw2ddiX9V3I8k",
      "use": "sig",
      "crv": "P-256",
      "kid": "a707626f-c960-4fdc-a8a6-9372cc26d97e",
      "x": "nNEFZpsvFvIDp22NPVrpUZj3qom47ei8FXFN7WmUpi4",
      "y": "eg9NOYFhRl9RgFbWvZmmPtBEKSemxlKr1YjvR70Nwlg"
    },
    {
      "kty": "EC",
      "d": "w4VBCHY6PdMIrqW7Eu3NtkNbmbwBIzfoHo82rcPJ5kY",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "43968439-cf2a-43b3-9f8d-32b603238263",
      "x": "lNB2EnkZFCoLMhX7cn7qbxmP4gV8qrPsAKhWf3csws4",
      "y": "B0eI4GB-lpeGUaQefzsdau73zuetoQhpcXApIwp3-mc"
    },
    {
      "kty": "OKP",
      "d": "L6gCLEuO5vIMTwcRIfXJVUISO9ddpW9V73EjCy3f3aA",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "b6a46890-70be-4329-8733-a682dc3e81fe",
      "x": "tnzeowZkAfs6bizmM5kyxrrwAIo5AEhePC29ci24bN4"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "_eDzmtHSWTl18ztJnF_g5XlytA_xgjeJIl3FR8AjVgbYRXxZdxvOrXvu8wlwurlg5AGjJ38ZHMA-biqRKje2jjS8-_AkmXmGgqJNOBv3ywjaOFJtTPd3mtBFitO8lsHvrNEHtj02Zx62Y2sqhl7MEm7EHUPEhfRHIdeZ9VFiW7E",
      "kty": "RSA",
      "q": "zIN6m2Q8y-Qm_UCE5xEJCvpKzG68pbbXz-ke64vEpttZRs2_RHb3eKQQS-xeM8qInSlo0fGuLJD0MaNxyxV35g1LAQB0Pw6HEQN49wIatCdXjjiYHptFRgY6wm05acJk04Pl2EwAV1Jt4Yakx498L0jy4xNmdvp1DaYs9SQ7LPk",
      "d": "h_hE04nJ9FP01yaLVlUttFbHwqwKu3Q5VCvRgLNtbQClCZyGL2CEAO9EOFNwE3Zvedg4vsaRx0WjExgqZ-aI8seyXplEEse10vkqa-ZpCHsIcqorhromMZGAvqjjAb0Es6ZPzoFQI2EVIGoYfomKm9FzUEJyOvFtzfkZL8nNu3XgrmwllShQ0c9zI-o-_4CxlwNZpwRQQRZp1aDZJg8FJRatjyjK7QukyQK_33ZDdUZyE3D4YiIS4MYbKB6f1ZClrblZevXE-qJ4WVzT6J23hqL1rlOxZL4A4Iwuzk_qnoL8_3D8RdoPwzsr3v5BHaPAcvhUn8IXpnVG7exF5kYQAQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "9fabcb29-e54e-4bb4-a012-3e5ae381fb05",
      "qi": "9XnuFEp3p7WlcPt2Gk2OMQh4B_7TfCC76ND2zAFEL-yN75kD31Bluri7ulf97RhJaN-DLolKequuHYCtthBJIAQqtv_A0NAAahlKOgKyxuPs6Fvk-p2N88vQ9tXI-HEuCVnU953gOc8s96Qn57AuHm0RHGTqbLXTDFVN0YDF82k",
      "dp": "TSWtgQ9fl0Nxxz7t6HnuMm1MYNEzd3l-z5WlHF-TnVGpKLxXx20IygkOHIZy3hr1CXRB6v-hVu5ISlvfDvAtJlt6Tii0Rnr6V_oP8wv0qZsADPtnQWs1yjKd30jmVv2J4n8Gk-dX_9ACZoWrP3fRFYzZRXdRYc9QSkVlAHoBpJE",
      "alg": "RSA-OAEP",
      "dq": "EQUIGRJ4dMdh70WFSe2DASTfQLAehvP2ddkCt7uD_BbZESliN4JnCeUtbgQXutuqDto5XO9t_Ut65v6hI7N_rOeCTG0LP4wn9WSClpvYORHlGXLgRfvKAg_WqAOK-aAx3-BkKmH4zUuQ1WntIKZyQUUi4X7l0hT51M71gtknC5E",
      "n": "ytGl01Ygbo3xtTSYIKHdYAyn9L3jJLmkUGQoiIMopjYtLm-XSGIAMeUuSNrCI0cOQ-nrn8lHff4CYax0WNmwWHnIqP6GIUHeOJUlsWo2t64PLrjDsAty7F_B0aEa6UC8meNObnrdWNobOxngKrWolbLliJxDG53KTEyshVTSWYaFzXpyoSoHb3eteS5eBVQhcOEGbbODI17FyOlSGfwA6o9Bjkg-Z3ZDtHUi0ZQ3TJfhh1vYXPtt4OmCzQsFo_pn8UqYAClYuGNE8KpLHf0OORyvVk9BBJBZRzHk_pODfbJyjGLPjgFbmyhF18PucWMYRWCICD6D-XAw0KyOFjibKQ"
    },
    {
      "kty": "EC",
      "d": "Iyl08Fkvc0qfdihVDcUj1NlyDx74yNMpYHe6mM9T95g",
      "use": "enc",
      "crv": "P-256",
      "kid": "85c1dcfb-1fa2-48d6-8259-b5afe951023e",
      "x": "UzEK-L905w4R4-V3emuZ3B4zasIIJt3NGZcS29i6r8I",
      "y": "wINhT9hryfFi-Ae2ysi0VNG2fsHmK3vx1FUQViCiT70",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "dd332214-ae25-4df1-be2a-0fdc6bd7beb5",
      "n": "v13wapePw2ErGFVeAngDhqqG8oTrhOeoq9EQVXO9jjKbjYFsL8D5LAXk1ErwElxmMfhzYar8idn7OdGrgnUE7yD10A016AFH-YpZf_inCEBtGtRKeP_pc5loyD8TMT6-R1cucrQu4UoIiVnwCVsGzzcWSpiKV6BnIkxjh-g40Pmtsa-4qry0eDJwOxC4pL_2Xtl2OEZRBtB5joLfwzkeZhrQCm2SM_03uIxlkDaqzBm-o8ANSPMJBunJjETw8KmJALHaxcMoKlytGNArzNmR9VHi7PdpPu3_rqKdP_LIsFJfZ2XqhOED4CafQF_VUi6HZwkRHnRGcsPaECunornwpw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "82fb1818-3fcd-491e-8ae9-0260dea4ed3a",
      "n": "hQXS9_8NKtgZ6IaV2fBcXfYs5VndmaomPfLxdKQkcgjneBRJW8phbP-m0HE87dw8Z_vp_i-NStBfv8G2ViLPXYitqvG-0HdtcuWYC_85vD72K8QLf8lGWsz2WgDsbWXFA_8E3ppG7gHfOGGy99FxFFkbR7CQAEHKQglMEa20JVmFeIaiSpzG_klJ6-Xydbd4mepIG6gtC2OB6aIEDbpNamgpnHYgccByu5Q9VAwd4GZkOQBAkMKvqcUOuFXHl5XSMQvQsH6E3gWCK1JiaqNsHPRfh8AAiSeyYXmmHjavSSUiqe9NykCtSQgmt36yszjFnpXKjyHSV_FI0bTchDt2FQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "a707626f-c960-4fdc-a8a6-9372cc26d97e",
      "x": "nNEFZpsvFvIDp22NPVrpUZj3qom47ei8FXFN7WmUpi4",
      "y": "eg9NOYFhRl9RgFbWvZmmPtBEKSemxlKr1YjvR70Nwlg"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "1f9ee22c-6e55-4b73-8a60-8b95d91ccc87",
      "x": "4q8_Q-l6kx0iRlsBHLMrOZRE9yL0f3t_cuCGs2uug4o",
      "y": "YkanozTL8shTOUNn1Gdp6EqCzNIU9eL3efcm5SIFhRI"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "43968439-cf2a-43b3-9f8d-32b603238263",
      "x": "lNB2EnkZFCoLMhX7cn7qbxmP4gV8qrPsAKhWf3csws4",
      "y": "B0eI4GB-lpeGUaQefzsdau73zuetoQhpcXApIwp3-mc"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "b6a46890-70be-4329-8733-a682dc3e81fe",
      "x": "tnzeowZkAfs6bizmM5kyxrrwAIo5AEhePC29ci24bN4"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "9fabcb29-e54e-4bb4-a012-3e5ae381fb05",
      "alg": "RSA-OAEP",
      "n": "ytGl01Ygbo3xtTSYIKHdYAyn9L3jJLmkUGQoiIMopjYtLm-XSGIAMeUuSNrCI0cOQ-nrn8lHff4CYax0WNmwWHnIqP6GIUHeOJUlsWo2t64PLrjDsAty7F_B0aEa6UC8meNObnrdWNobOxngKrWolbLliJxDG53KTEyshVTSWYaFzXpyoSoHb3eteS5eBVQhcOEGbbODI17FyOlSGfwA6o9Bjkg-Z3ZDtHUi0ZQ3TJfhh1vYXPtt4OmCzQsFo_pn8UqYAClYuGNE8KpLHf0OORyvVk9BBJBZRzHk_pODfbJyjGLPjgFbmyhF18PucWMYRWCICD6D-XAw0KyOFjibKQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "85c1dcfb-1fa2-48d6-8259-b5afe951023e",
      "x": "UzEK-L905w4R4-V3emuZ3B4zasIIJt3NGZcS29i6r8I",
      "y": "wINhT9hryfFi-Ae2ysi0VNG2fsHmK3vx1FUQViCiT70",
      "alg": "ECDH-ES"
    }
  ]
}
2020-08-10 19:41:34 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-08-10 19:41:34 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-08-10 19:41:34 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": "1580000000"
}
2020-08-10 19:41:34 SUCCESS
GetDynamicClientConfiguration
No client details on configuration, created an empty dynamic_client_registration_template object.
2020-08-10 19:41:34
oidcc-client-test-idtoken-sig-rs256
Setup Done
2020-08-10 19:42:16 INCOMING
oidcc-client-test-idtoken-sig-rs256
Incoming HTTP request to test instance IokwKFHQjg6XVSd
incoming_headers
{
  "host": "www.certification.openid.net",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "0",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
2020-08-10 19:42:16 OUTGOING
oidcc-client-test-idtoken-sig-rs256
Response to HTTP request to test instance IokwKFHQjg6XVSd
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/a/morph_oidc_client/",
  "authorization_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client/token",
  "jwks_uri": "https://www.certification.openid.net/test/a/morph_oidc_client/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/a/morph_oidc_client/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "RS256"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2020-08-10 19:42:16 INCOMING
oidcc-client-test-idtoken-sig-rs256
Incoming HTTP request to test instance IokwKFHQjg6XVSd
incoming_headers
{
  "host": "www.certification.openid.net",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "337",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
{"redirect_uris":["https://morph-oidc-client.strid.ninja/auth/cb","https://www.certification.openid.net/test/a/morph_oidc_client/callback"],"response_types":["code"],"grant_types":["authorization_code"],"contacts":["ulrik.strid@outlook.com"],"client_name":"form_post_morph_oidc_client","token_endpoint_auth_method":"client_secret_basic"}
Registration endpoint
2020-08-10 19:42:16 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "redirect_uris": [
    "https://morph-oidc-client.strid.ninja/auth/cb",
    "https://www.certification.openid.net/test/a/morph_oidc_client/callback"
  ],
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "contacts": [
    "ulrik.strid@outlook.com"
  ],
  "client_name": "form_post_morph_oidc_client",
  "token_endpoint_auth_method": "client_secret_basic"
}
2020-08-10 19:42:16 SUCCESS
EnsureRegistrationRequestContainsAtLeastOneContact
Registration request contains valid contacts
contacts
[
  "ulrik.strid@outlook.com"
]
2020-08-10 19:42:16 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2020-08-10 19:42:16 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://morph-oidc-client.strid.ninja/auth/cb",
  "https://www.certification.openid.net/test/a/morph_oidc_client/callback"
]
2020-08-10 19:42:16 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2020-08-10 19:42:16 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2020-08-10 19:42:16 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2020-08-10 19:42:16 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2020-08-10 19:42:16 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2020-08-10 19:42:16 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2020-08-10 19:42:16 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2020-08-10 19:42:16 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-08-10 19:42:16 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2020-08-10 19:42:16 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2020-08-10 19:42:16 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2020-08-10 19:42:16 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2020-08-10 19:42:16 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2020-08-10 19:42:16 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2020-08-10 19:42:16 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2020-08-10 19:42:16 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2020-08-10 19:42:16 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2020-08-10 19:42:16 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2020-08-10 19:42:16 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "redirect_uris": [
    "https://morph-oidc-client.strid.ninja/auth/cb",
    "https://www.certification.openid.net/test/a/morph_oidc_client/callback"
  ],
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "contacts": [
    "ulrik.strid@outlook.com"
  ],
  "client_name": "form_post_morph_oidc_client",
  "token_endpoint_auth_method": "client_secret_basic",
  "client_id": "client_tbRcpgSDjbLOaRE40695:)*|!"
}
2020-08-10 19:42:16
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_qyEsUMhuAwVAlovxgmpjCbwUbvhTWgisDxzwjZNcbZVWruPrJB0839425244,/@"&
2020-08-10 19:42:16 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2020-08-10 19:42:16
SetClientIdTokenSignedResponseAlgToRS256
Set id_token_signed_response_alg to RS256 for the registered client
client
{
  "redirect_uris": [
    "https://morph-oidc-client.strid.ninja/auth/cb",
    "https://www.certification.openid.net/test/a/morph_oidc_client/callback"
  ],
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "contacts": [
    "ulrik.strid@outlook.com"
  ],
  "client_name": "form_post_morph_oidc_client",
  "token_endpoint_auth_method": "client_secret_basic",
  "client_id": "client_tbRcpgSDjbLOaRE40695:)*|!",
  "client_secret": "secret_qyEsUMhuAwVAlovxgmpjCbwUbvhTWgisDxzwjZNcbZVWruPrJB0839425244,/@\"\u0026",
  "id_token_signed_response_alg": "RS256"
}
2020-08-10 19:42:16 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "redirect_uris": [
    "https://morph-oidc-client.strid.ninja/auth/cb",
    "https://www.certification.openid.net/test/a/morph_oidc_client/callback"
  ],
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "contacts": [
    "ulrik.strid@outlook.com"
  ],
  "client_name": "form_post_morph_oidc_client",
  "token_endpoint_auth_method": "client_secret_basic",
  "client_id": "client_tbRcpgSDjbLOaRE40695:)*|!",
  "client_secret": "secret_qyEsUMhuAwVAlovxgmpjCbwUbvhTWgisDxzwjZNcbZVWruPrJB0839425244,/@\"\u0026",
  "id_token_signed_response_alg": "RS256"
}
2020-08-10 19:42:16 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2020-08-10 19:42:16
SetServerSigningAlgToRS256
Successfully set signing algorithm to RS256
2020-08-10 19:42:16
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2020-08-10 19:42:16 OUTGOING
oidcc-client-test-idtoken-sig-rs256
Response to HTTP request to test instance IokwKFHQjg6XVSd
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "redirect_uris": [
    "https://morph-oidc-client.strid.ninja/auth/cb",
    "https://www.certification.openid.net/test/a/morph_oidc_client/callback"
  ],
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "contacts": [
    "ulrik.strid@outlook.com"
  ],
  "client_name": "form_post_morph_oidc_client",
  "token_endpoint_auth_method": "client_secret_basic",
  "client_id": "client_tbRcpgSDjbLOaRE40695:)*|!",
  "client_secret": "secret_qyEsUMhuAwVAlovxgmpjCbwUbvhTWgisDxzwjZNcbZVWruPrJB0839425244,/@\"\u0026",
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2020-08-10 19:42:17 INCOMING
oidcc-client-test-idtoken-sig-rs256
Incoming HTTP request to test instance IokwKFHQjg6XVSd
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:79.0) Gecko/20100101 Firefox/79.0",
  "accept": "text/html,application/xhtml+xml,application/xml;q\u003d0.9,image/webp,*/*;q\u003d0.8",
  "accept-language": "en-US,en;q\u003d0.5",
  "accept-encoding": "gzip, deflate, br",
  "referer": "https://morph-oidc-client.strid.ninja/",
  "dnt": "1",
  "cookie": "expected_tab\u003dmicrosoftonline; welcome_info_name\u003dUlrik%20Strid; JSESSIONID\u003dCB87DB255579AE321C16855066F1AF5F",
  "upgrade-insecure-requests": "1",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "response_type": "code",
  "client_id": "client_tbRcpgSDjbLOaRE40695:)*|!",
  "redirect_uri": "https://morph-oidc-client.strid.ninja/auth/cb",
  "scope": "openid profile email",
  "state": "122fe540-3c11-476a-9a70-71b62424ce36",
  "nonce": "3bca8929-6142-4e3c-80aa-35f9fae4eaed"
}
incoming_body
Authorization endpoint
2020-08-10 19:42:17 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2020-08-10 19:42:17 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid",
  "profile",
  "email"
]
expected
openid
2020-08-10 19:42:17 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "response_type": "code",
  "client_id": "client_tbRcpgSDjbLOaRE40695:)*|!",
  "redirect_uri": "https://morph-oidc-client.strid.ninja/auth/cb",
  "scope": "openid profile email",
  "state": "122fe540-3c11-476a-9a70-71b62424ce36",
  "nonce": "3bca8929-6142-4e3c-80aa-35f9fae4eaed"
}
2020-08-10 19:42:17 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid profile email
2020-08-10 19:42:17 SUCCESS
ExtractNonceFromAuthorizationRequest
Extracted nonce
nonce
3bca8929-6142-4e3c-80aa-35f9fae4eaed
2020-08-10 19:42:17 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2020-08-10 19:42:17 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_tbRcpgSDjbLOaRE40695:)*|!
2020-08-10 19:42:17 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://morph-oidc-client.strid.ninja/auth/cb
expected
[
  "https://morph-oidc-client.strid.ninja/auth/cb",
  "https://www.certification.openid.net/test/a/morph_oidc_client/callback"
]
2020-08-10 19:42:17 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid",
  "profile",
  "email"
]
expected
openid
2020-08-10 19:42:17 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2020-08-10 19:42:17 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
KBUa2M2zgr
2020-08-10 19:42:17 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
EAm1fwr5PzCTnl7n3-B1Iw
2020-08-10 19:42:17 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://morph-oidc-client.strid.ninja/auth/cb",
  "state": "122fe540-3c11-476a-9a70-71b62424ce36"
}
2020-08-10 19:42:17 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://morph-oidc-client.strid.ninja/auth/cb",
  "state": "122fe540-3c11-476a-9a70-71b62424ce36",
  "code": "KBUa2M2zgr"
}
2020-08-10 19:42:17 OUTGOING
oidcc-client-test-idtoken-sig-rs256
Response to HTTP request to test instance IokwKFHQjg6XVSd
outgoing
ModelAndView [view="formPostResponseMode"; model={formAction=https://morph-oidc-client.strid.ninja/auth/cb, formParameters={"state":"122fe540-3c11-476a-9a70-71b62424ce36","code":"KBUa2M2zgr"}}]
outgoing_path
authorize
2020-08-10 19:42:17 INCOMING
oidcc-client-test-idtoken-sig-rs256
Incoming HTTP request to test instance IokwKFHQjg6XVSd
incoming_headers
{
  "host": "www.certification.openid.net",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "0",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
2020-08-10 19:42:17 OUTGOING
oidcc-client-test-idtoken-sig-rs256
Response to HTTP request to test instance IokwKFHQjg6XVSd
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "dd332214-ae25-4df1-be2a-0fdc6bd7beb5",
      "n": "v13wapePw2ErGFVeAngDhqqG8oTrhOeoq9EQVXO9jjKbjYFsL8D5LAXk1ErwElxmMfhzYar8idn7OdGrgnUE7yD10A016AFH-YpZf_inCEBtGtRKeP_pc5loyD8TMT6-R1cucrQu4UoIiVnwCVsGzzcWSpiKV6BnIkxjh-g40Pmtsa-4qry0eDJwOxC4pL_2Xtl2OEZRBtB5joLfwzkeZhrQCm2SM_03uIxlkDaqzBm-o8ANSPMJBunJjETw8KmJALHaxcMoKlytGNArzNmR9VHi7PdpPu3_rqKdP_LIsFJfZ2XqhOED4CafQF_VUi6HZwkRHnRGcsPaECunornwpw"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "82fb1818-3fcd-491e-8ae9-0260dea4ed3a",
      "n": "hQXS9_8NKtgZ6IaV2fBcXfYs5VndmaomPfLxdKQkcgjneBRJW8phbP-m0HE87dw8Z_vp_i-NStBfv8G2ViLPXYitqvG-0HdtcuWYC_85vD72K8QLf8lGWsz2WgDsbWXFA_8E3ppG7gHfOGGy99FxFFkbR7CQAEHKQglMEa20JVmFeIaiSpzG_klJ6-Xydbd4mepIG6gtC2OB6aIEDbpNamgpnHYgccByu5Q9VAwd4GZkOQBAkMKvqcUOuFXHl5XSMQvQsH6E3gWCK1JiaqNsHPRfh8AAiSeyYXmmHjavSSUiqe9NykCtSQgmt36yszjFnpXKjyHSV_FI0bTchDt2FQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "a707626f-c960-4fdc-a8a6-9372cc26d97e",
      "x": "nNEFZpsvFvIDp22NPVrpUZj3qom47ei8FXFN7WmUpi4",
      "y": "eg9NOYFhRl9RgFbWvZmmPtBEKSemxlKr1YjvR70Nwlg"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "1f9ee22c-6e55-4b73-8a60-8b95d91ccc87",
      "x": "4q8_Q-l6kx0iRlsBHLMrOZRE9yL0f3t_cuCGs2uug4o",
      "y": "YkanozTL8shTOUNn1Gdp6EqCzNIU9eL3efcm5SIFhRI"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "43968439-cf2a-43b3-9f8d-32b603238263",
      "x": "lNB2EnkZFCoLMhX7cn7qbxmP4gV8qrPsAKhWf3csws4",
      "y": "B0eI4GB-lpeGUaQefzsdau73zuetoQhpcXApIwp3-mc"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "b6a46890-70be-4329-8733-a682dc3e81fe",
      "x": "tnzeowZkAfs6bizmM5kyxrrwAIo5AEhePC29ci24bN4"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "9fabcb29-e54e-4bb4-a012-3e5ae381fb05",
      "alg": "RSA-OAEP",
      "n": "ytGl01Ygbo3xtTSYIKHdYAyn9L3jJLmkUGQoiIMopjYtLm-XSGIAMeUuSNrCI0cOQ-nrn8lHff4CYax0WNmwWHnIqP6GIUHeOJUlsWo2t64PLrjDsAty7F_B0aEa6UC8meNObnrdWNobOxngKrWolbLliJxDG53KTEyshVTSWYaFzXpyoSoHb3eteS5eBVQhcOEGbbODI17FyOlSGfwA6o9Bjkg-Z3ZDtHUi0ZQ3TJfhh1vYXPtt4OmCzQsFo_pn8UqYAClYuGNE8KpLHf0OORyvVk9BBJBZRzHk_pODfbJyjGLPjgFbmyhF18PucWMYRWCICD6D-XAw0KyOFjibKQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "85c1dcfb-1fa2-48d6-8259-b5afe951023e",
      "x": "UzEK-L905w4R4-V3emuZ3B4zasIIJt3NGZcS29i6r8I",
      "y": "wINhT9hryfFi-Ae2ysi0VNG2fsHmK3vx1FUQViCiT70",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2020-08-10 19:42:17 INCOMING
oidcc-client-test-idtoken-sig-rs256
Incoming HTTP request to test instance IokwKFHQjg6XVSd
incoming_headers
{
  "host": "www.certification.openid.net",
  "authorization": "Basic Y2xpZW50X3RiUmNwZ1NEamJMT2FSRTQwNjk1JTNBJTI5JTJBJTdDJTIxOnNlY3JldF9xeUVzVU1odUF3VkFsb3Z4Z21wakNid1VidmhUV2dpc0R4endqWk5jYlpWV3J1UHJKQjA4Mzk0MjUyNDQlMkMlMkYlNDAlMjIlMjY\u003d",
  "content-type": "application/x-www-form-urlencoded",
  "accept": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "255",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "grant_type": "authorization_code",
  "scope": "openid",
  "code": "KBUa2M2zgr",
  "client_id": "client_tbRcpgSDjbLOaRE40695:)*|!",
  "client_secret": "secret_qyEsUMhuAwVAlovxgmpjCbwUbvhTWgisDxzwjZNcbZVWruPrJB0839425244,/@\"\u0026",
  "redirect_uri": "https://morph-oidc-client.strid.ninja/auth/cb"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
grant_type=authorization_code&scope=openid&code=KBUa2M2zgr&client_id=client_tbRcpgSDjbLOaRE40695%3A%29*%7C%21&client_secret=secret_qyEsUMhuAwVAlovxgmpjCbwUbvhTWgisDxzwjZNcbZVWruPrJB0839425244%2C%2F%40%22%26&redirect_uri=https%3A%2F%2Fmorph-oidc-client.strid.ninja%2Fauth%2Fcb
Token endpoint
2020-08-10 19:42:17 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
client_tbRcpgSDjbLOaRE40695:)*|!
client_secret
secret_qyEsUMhuAwVAlovxgmpjCbwUbvhTWgisDxzwjZNcbZVWruPrJB0839425244,/@"&
method
client_secret_basic
2020-08-10 19:42:17 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2020-08-10 19:42:17 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
KBUa2M2zgr
2020-08-10 19:42:17 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://morph-oidc-client.strid.ninja/auth/cb
2020-08-10 19:42:17 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
NQEgzJPN1PSz4Z5P9yHve1Yz2GQX23jowq6zMzZurPfSH58tPl
2020-08-10 19:42:17 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
aa_jhLgUUM6uH_Nb0AP3Gg
2020-08-10 19:42:17 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/a/morph_oidc_client/
sub
user-subject-1234531
aud
client_tbRcpgSDjbLOaRE40695:)*|!
nonce
3bca8929-6142-4e3c-80aa-35f9fae4eaed
iat
1597088537
exp
1597088837
2020-08-10 19:42:17 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
aa_jhLgUUM6uH_Nb0AP3Gg
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/a/morph_oidc_client/",
  "sub": "user-subject-1234531",
  "aud": "client_tbRcpgSDjbLOaRE40695:)*|!",
  "nonce": "3bca8929-6142-4e3c-80aa-35f9fae4eaed",
  "iat": 1597088537,
  "exp": 1597088837,
  "at_hash": "aa_jhLgUUM6uH_Nb0AP3Gg"
}
2020-08-10 19:42:17 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiJkZDMzMjIxNC1hZTI1LTRkZjEtYmUyYS0wZmRjNmJkN2JlYjUiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiYWFfamhMZ1VVTTZ1SF9OYjBBUDNHZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X3RiUmNwZ1NEamJMT2FSRTQwNjk1OikqfCEiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvbW9ycGhfb2lkY19jbGllbnRcLyIsImV4cCI6MTU5NzA4ODgzNywibm9uY2UiOiIzYmNhODkyOS02MTQyLTRlM2MtODBhYS0zNWY5ZmFlNGVhZWQiLCJpYXQiOjE1OTcwODg1Mzd9.CAteLc_tR-G0okbhxqNbfOF5VVwu-MgcabRP0x3U3ElwvuNOtBeXymw1f8cLsD1v51unIS5mHhCiv3iYYwMSymY6R3Z7LY_7jMIngOUaus6DMEhpYykGhwl9Ikz2oTZlf2CLRhrebuu0XvB6Nzbn8x13neSPw24LpYFSzjNrCIYCasvj7lyAvUOrxFiLgQ-BdCg0diEt8zW5H3XWKP8CP5ueYLcvKpxvbJkE0XNfe5iSt1Htb3XQWV-eYmLAO-qNGWdigs3pkFH0WG9gJnj7tVY9KBnzAEi4wcOMZz9KRs9_miDLHMWf7NzrYi7YL3jklPiQqNKo9pU4vB8i9mNEJA
key
{"p":"_cuuXIbGsIeX_9PD8_yGkvdGxqwkqoIOxpSwubE5qBu_ZQCAkHYK0GVzmzRCgUlzKLVLAEvrD8q3AV-29gCi0hmDcsJrfdVMgWFemKQZl7kH_xwmxBn-zfaSG8nShYSdxNYxYuH2p_GN1rPyUfRuMhUsCQIp-ogb5I-60VojKP0","kty":"RSA","q":"wQdyYTQMwHnkG2K_UJQuhrB1MA1eyvGK0sX9uG_50WkR82orubF4LNmnqkm-bGJiEs5fZrNcp2lbM9-Nvsy9Zp2JB23saCszmFdVbUxCeeJthyXrbpfSb_uvlkuANaAAmyYkH7EiZ8og6WxLBx9Xr3NCVrDSq4mAidSVgrae03M","d":"VDxVh5YPgkFTZvKs3wlVBAIsRLSdt3MBnB_6wKKh3eYI8tD1fk_DXs15XLlf07U4huaGY4eQgl2haGISzOoVse0gRuSJxgZKWF2958bcP5WccSLhZUHA0VHF_d9F43dq6pxFpdgKisC74TnlnziiVrQ4670ZqFjDDSXy6fAekl2QmAb4DoLvX2IDKm3ZmrjtTu19IZ9EaBjPuADaAWfanBBqx7ecr2FeO_a_10Qwa_O8hHMDL4pqChU7AmoIDsBGxyQ0z5DXHvYpKTU6tUPJK8UERXV__b2aygEfgzPQwp4I4GfoWVVa8nKRlOOZLR-DY-lUD6oovptLmeqBbs9mgQ","e":"AQAB","use":"sig","kid":"dd332214-ae25-4df1-be2a-0fdc6bd7beb5","qi":"Es4_vqBuveVxqMcukHW_jIfuPEQruwSCor-5BuOG45UJJHzBaHrZWtNlfKXj7btMKrsmvHnD3iYJs7T_t27GfFcGPKyBxwESWUzkXKHfnyREWUgTQhK9UQ1ztp76vpLvyUBFTXtWO3h8csgzi8tkSrv7eN9YSciCJ5GSlwVDHaU","dp":"IMr0mJgBjEW46iFerGPwr4Sr7HfJtQ5hAl-sBhJUNNiA_nf2JLRb6VlyepdiEHqBGr1yF3O3x66VvuOzLE4gu6z4QxfD89pfrEf8hRSPCf-qfNgSWjxRpCM79cM6JG5iRFC4yOIRkNmxThCqOtSueGIr8m4JJon3sKyxouNWr7E","dq":"BY1OR-d0WnDnE7aSZCHu-KbIqBoqWNH7uTZCpvRpjhFkl8i8-zlUiI22GdrHJFzsDzhqXAzapGIOYn6SmCNRa0sqrtEFlLVxZXdVmLAx1Umi9tkrXWH2howJr9v6ExDIE65UKakxoSSaL7ySp-DJ59z70nyBgreQv-YiasEP7ms","n":"v13wapePw2ErGFVeAngDhqqG8oTrhOeoq9EQVXO9jjKbjYFsL8D5LAXk1ErwElxmMfhzYar8idn7OdGrgnUE7yD10A016AFH-YpZf_inCEBtGtRKeP_pc5loyD8TMT6-R1cucrQu4UoIiVnwCVsGzzcWSpiKV6BnIkxjh-g40Pmtsa-4qry0eDJwOxC4pL_2Xtl2OEZRBtB5joLfwzkeZhrQCm2SM_03uIxlkDaqzBm-o8ANSPMJBunJjETw8KmJALHaxcMoKlytGNArzNmR9VHi7PdpPu3_rqKdP_LIsFJfZ2XqhOED4CafQF_VUi6HZwkRHnRGcsPaECunornwpw"}
algorithm
RS256
2020-08-10 19:42:17 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-08-10 19:42:17 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
NQEgzJPN1PSz4Z5P9yHve1Yz2GQX23jowq6zMzZurPfSH58tPl
token_type
Bearer
id_token
eyJraWQiOiJkZDMzMjIxNC1hZTI1LTRkZjEtYmUyYS0wZmRjNmJkN2JlYjUiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiYWFfamhMZ1VVTTZ1SF9OYjBBUDNHZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X3RiUmNwZ1NEamJMT2FSRTQwNjk1OikqfCEiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvbW9ycGhfb2lkY19jbGllbnRcLyIsImV4cCI6MTU5NzA4ODgzNywibm9uY2UiOiIzYmNhODkyOS02MTQyLTRlM2MtODBhYS0zNWY5ZmFlNGVhZWQiLCJpYXQiOjE1OTcwODg1Mzd9.CAteLc_tR-G0okbhxqNbfOF5VVwu-MgcabRP0x3U3ElwvuNOtBeXymw1f8cLsD1v51unIS5mHhCiv3iYYwMSymY6R3Z7LY_7jMIngOUaus6DMEhpYykGhwl9Ikz2oTZlf2CLRhrebuu0XvB6Nzbn8x13neSPw24LpYFSzjNrCIYCasvj7lyAvUOrxFiLgQ-BdCg0diEt8zW5H3XWKP8CP5ueYLcvKpxvbJkE0XNfe5iSt1Htb3XQWV-eYmLAO-qNGWdigs3pkFH0WG9gJnj7tVY9KBnzAEi4wcOMZz9KRs9_miDLHMWf7NzrYi7YL3jklPiQqNKo9pU4vB8i9mNEJA
scope
openid profile email
2020-08-10 19:42:17 OUTGOING
oidcc-client-test-idtoken-sig-rs256
Response to HTTP request to test instance IokwKFHQjg6XVSd
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "NQEgzJPN1PSz4Z5P9yHve1Yz2GQX23jowq6zMzZurPfSH58tPl",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiJkZDMzMjIxNC1hZTI1LTRkZjEtYmUyYS0wZmRjNmJkN2JlYjUiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiYWFfamhMZ1VVTTZ1SF9OYjBBUDNHZyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X3RiUmNwZ1NEamJMT2FSRTQwNjk1OikqfCEiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvYVwvbW9ycGhfb2lkY19jbGllbnRcLyIsImV4cCI6MTU5NzA4ODgzNywibm9uY2UiOiIzYmNhODkyOS02MTQyLTRlM2MtODBhYS0zNWY5ZmFlNGVhZWQiLCJpYXQiOjE1OTcwODg1Mzd9.CAteLc_tR-G0okbhxqNbfOF5VVwu-MgcabRP0x3U3ElwvuNOtBeXymw1f8cLsD1v51unIS5mHhCiv3iYYwMSymY6R3Z7LY_7jMIngOUaus6DMEhpYykGhwl9Ikz2oTZlf2CLRhrebuu0XvB6Nzbn8x13neSPw24LpYFSzjNrCIYCasvj7lyAvUOrxFiLgQ-BdCg0diEt8zW5H3XWKP8CP5ueYLcvKpxvbJkE0XNfe5iSt1Htb3XQWV-eYmLAO-qNGWdigs3pkFH0WG9gJnj7tVY9KBnzAEi4wcOMZz9KRs9_miDLHMWf7NzrYi7YL3jklPiQqNKo9pU4vB8i9mNEJA",
  "scope": "openid profile email"
}
outgoing_path
token
2020-08-10 19:42:17 INCOMING
oidcc-client-test-idtoken-sig-rs256
Incoming HTTP request to test instance IokwKFHQjg6XVSd
incoming_headers
{
  "host": "www.certification.openid.net",
  "authorization": "Bearer NQEgzJPN1PSz4Z5P9yHve1Yz2GQX23jowq6zMzZurPfSH58tPl",
  "accept": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES256-GCM-SHA384",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "0",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
userinfo
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Userinfo endpoint
2020-08-10 19:42:17 SUCCESS
OIDCCExtractBearerAccessTokenFromRequest
Found access token on incoming request
access_token
NQEgzJPN1PSz4Z5P9yHve1Yz2GQX23jowq6zMzZurPfSH58tPl
2020-08-10 19:42:17 SUCCESS
RequireBearerAccessToken
Found access token in request
actual
NQEgzJPN1PSz4Z5P9yHve1Yz2GQX23jowq6zMzZurPfSH58tPl
2020-08-10 19:42:17 SUCCESS
FilterUserInfoForScopes
User info endpoint output
sub
user-subject-1234531
website
https://openid.net/
zoneinfo
America/Los_Angeles
birthdate
2000-02-03
gender
female
preferred_username
d.tu
given_name
Demo
middle_name
Theresa
locale
en-US
updated_at
1580000000
name
Demo T. User
nickname
Dee
family_name
User
email
user@example.com
email_verified
false
2020-08-10 19:42:17
ClearAccessTokenFromRequest
Condition ran but did not log anything
2020-08-10 19:42:17 INFO
AddIssAndAudToUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-08-10 19:42:17 INFO
SignUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-08-10 19:42:17 INFO
EncryptUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_encrypted_response_alg
path
userinfo_encrypted_response_alg
mapped
object
client
2020-08-10 19:42:17 OUTGOING
oidcc-client-test-idtoken-sig-rs256
Response to HTTP request to test instance IokwKFHQjg6XVSd
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "sub": "user-subject-1234531",
  "website": "https://openid.net/",
  "zoneinfo": "America/Los_Angeles",
  "birthdate": "2000-02-03",
  "gender": "female",
  "preferred_username": "d.tu",
  "given_name": "Demo",
  "middle_name": "Theresa",
  "locale": "en-US",
  "updated_at": "1580000000",
  "name": "Demo T. User",
  "nickname": "Dee",
  "family_name": "User",
  "email": "user@example.com",
  "email_verified": false
}
outgoing_path
userinfo
2020-08-10 19:42:17 FINISHED
oidcc-client-test-idtoken-sig-rs256
Test has run to completion
testmodule_result
PASSED
2020-08-10 19:42:34
TEST-RUNNER
Alias has now been claimed by another test
alias
morph_oidc_client
new_test_id
8b0zTB3IK2tYprN
Test Results