Test Summary

Test Results

Expand All Collapse All
All times are UTC
2020-09-01 12:12:19 INFO
TEST-RUNNER
Test instance RerTORD3DGJ3ILj created
baseUrl
https://www.certification.openid.net/test/RerTORD3DGJ3ILj
variant
{
  "client_auth_type": "client_secret_basic",
  "response_type": "code",
  "request_type": "plain_http_request",
  "client_registration": "dynamic_client",
  "response_mode": "default"
}
alias

                                
description
test suite runner for openid-client
planId
7n4X1Ncvmepka
config
{
  "description": "test suite runner for openid-client",
  "waitTimeoutSeconds": 2
}
testName
oidcc-client-test-signing-key-rotation-just-before-signing
2020-09-01 12:12:19 SUCCESS
OIDCCGenerateServerConfiguration
Generated default server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/RerTORD3DGJ3ILj/",
  "authorization_endpoint": "https://www.certification.openid.net/test/RerTORD3DGJ3ILj/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/RerTORD3DGJ3ILj/token",
  "jwks_uri": "https://www.certification.openid.net/test/RerTORD3DGJ3ILj/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/RerTORD3DGJ3ILj/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/RerTORD3DGJ3ILj/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic",
    "client_secret_post",
    "client_secret_jwt",
    "private_key_jwt"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:12:19
SetTokenEndpointAuthMethodsSupportedToClientSecretBasicOnly
Changed token_endpoint_auth_methods_supported to client_secret_basic only in server configuration
server_configuration
{
  "issuer": "https://www.certification.openid.net/test/RerTORD3DGJ3ILj/",
  "authorization_endpoint": "https://www.certification.openid.net/test/RerTORD3DGJ3ILj/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/RerTORD3DGJ3ILj/token",
  "jwks_uri": "https://www.certification.openid.net/test/RerTORD3DGJ3ILj/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/RerTORD3DGJ3ILj/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/RerTORD3DGJ3ILj/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
2020-09-01 12:12:19
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "61t0fUfyBf8-4FTlYo_jfe-7W1LvmT1ZTEiSQERL7-nTQDR6e06R1whpNN3JlmtxWbabzsYC-H6knQ-7kPvx3EjE4c0B5MSGlDsRMVslWkBcISi78TYCz4YMGfsDqgue3j9TGQmY_CAUMGK6FKTGQ_LoFYkjMlGzmcF00QOtpP8",
      "kty": "RSA",
      "q": "pWvVQbTVExnfKIPg7MWqsLyKuFMEdbPReIdkpp5WcDx0Qg6aGKsUmDf1AmTP3BWoOplB7iMm9zseHS868oiFfZh_Zsq3b9d1TbL_ZzJdCacvTh2509Ql0EJey4sn_AwJps8zxICrXVnrlSZzVHdr2EQ9sXZHPowyfuiC-RSN9vM",
      "d": "CNdg8J8fLSFj3pBtewhnZmogJFnp0asfWW0bHzbK7JnmDKq3LmAwhP7J2GsaXGDzf4-INiA4rNc_1doIvQnyjTMDEtRDjDccpVtkxvCEmWkwTfiw2bCENLkbg0q3N7XB1CIkSRdtfYv8yP3wxEfSbTlf7-TyzQ7Be5CzWVBp7TMyGZVP5R84DSXUt09uCc2IbXiqaleeB4aLGjglTRq07tQ5zovACQvRaYKqktSoXL2FynoqB-m0NjscJyPQ3WmY5dR_05lpKR_cJ7WNOyCPNmQoEJygAaR9DfcSDpcNZajv5bW2Qqtx3JUvlGbMaqOgYNlzTuK1zVA1NYeV-is4uQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "d206ff71-7b85-4236-9325-6dbc6e2846a3",
      "qi": "GCEaKXjgjRtzyDbMOu7g3G-UF3Ouhp4jc4xVlbg06HXOO0f6cHNVes1Q6AeJV_bOKsiFGZA8X5w2mK64MU50FCHiPHos9nHNpIKwc1ald3_SvGh0G4B_TdXHco3ea05cXV5G1TNxnb4c1gGD9Eucdg8X1ld-okE8skQs8Wxeogo",
      "dp": "DLlB_-_exrI43PnZ-M0cmFdYgqRmLZuiczxNI8pNbKfwcr0jjfz-Z2id_2yqFEa0twvnOnN7_6EhFxidpEXqmmUYt7hUjOCPAf57fHaX-1wVXvmLx4uK9Vsi1li6pvu_1_YGcQkSyzaUwNTliG4sBcpg_6ENVRATrJFH1nDjd1M",
      "dq": "CELnZp2qWobbP0G-1PRWPvdbkjMLMPmnB3bzjuKvfHF4eOgTyBGbOLLquJDiVKJ8QVjwEv2Mb6JzMY_vSLeKuygHjNGo8Zv4DsZWvQel39qKoUMYybx5mvoFk_LCL3NGdB86_aBTbpkUC-HctqY0K5vU3O0ER9pmlzHzgI8HPAM",
      "n": "mBUVXfAhE0E-N2LGUDgRHyUgjYJc9w9A8abObyERS3G7XkEIAH7IlFADtZ2MqhU5aoAvrtyTn8bMViGARg9Ky0reqYwNeHOgnpMomypMumAQm2ny_YnewZmdqIgqFy3tlQdrUha_9vYT9Ft_rcwKjVuXzczYwrEE2_9jtpxe-6WZszm4KbyPg6zf78OUFjtq8bBdwtkSg0e0ENIu3UJtsOgBTla7zl5vnAXMH3lGhUIQe2c-_7jttJvIPRRY3bpLdmQ-Ytwv0wPlqemwHY3V7OCqDWS-m3XOlCaho0WVegybATJWG4Pyz0S4m3qZ_OMpSFZM3a_ULXRPEk1-JtOoDQ"
    },
    {
      "kty": "EC",
      "d": "GErhbfjXnDsqjY3dABR0Dq2sZ-VvaUcKgnJdy2O56mU",
      "use": "sig",
      "crv": "P-256",
      "kid": "ed80e4c3-5ded-49bc-ba5e-3b805ee3cb3a",
      "x": "ZA-ZzsGWb19ejiUAvUQbjJzrvaEJQbgUu3A3-8y_NNY",
      "y": "q9I-7SxtCRqY5BSUwJhSzViiF-IRMBy3hISoxz8WrvE"
    },
    {
      "kty": "EC",
      "d": "zUOnfpwjDD4hMTKUWg3T9XHvwit7p6g_TtFUOB17_bM",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "35f46816-30f2-467c-9869-7543df6f27ac",
      "x": "RhN9xl7XJlr-lEGSvajsGIh2GVAIskE101ElMXDW3k4",
      "y": "rpFORjTLBPnSnSZrRzOztgqHUbuz4qBrWnatp1S9U_Y"
    },
    {
      "kty": "OKP",
      "d": "M-RaOxv2ds3RkvY0Kque_KZQI8MAK_DPjEGEtLxnVdY",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "71af570f-c10d-4971-8c34-d5fa4dba9e0a",
      "x": "6vNep-kqERlZ7nAaxJuibPGc1fO0HofcPo7hV1IOnvg"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "9QjewPNh4UdxonHTIv8AxihKEOk0Y3zdGe_z24sikhP0ID7xx6Cb067PkmuLJQod0hziKuzD_JUMrK7jKwKniceFNcYxWu8S5QffEkmD6KeRLgDNgirMtDcgnT96M5iZuc1cs6fXIEFwibAh5-jyM6t6lIceYc8uk0b3Xh4fANk",
      "kty": "RSA",
      "q": "yMzWqxzacTTP9bhaKg-SL-OrUCiqc1i9Wrhq9b0-fPokQjLVX0FDK630nT0EfOLxSFaskBMmlpN0eFce-tiw4FOwlo5yrTugO05kkwHIlX5nYTfLgDYa_sBwaRHoYyvQzJMEEyNcPvvEfCobw0L1B0HQuwhfQaXymb-GKnem6NM",
      "d": "hHOgE8QbHDRLNUStWng-SIYTdD5przjTdfofEMMGohkTwqYKcKbu8JlvuLvR0ttOWA3orOfurxKh-tCNXlrzIpsXgk3zrg_Ri3--T6dH-qcyTSEvkmbbUkuZlhneWcOR1rZ5uH9U0pKIgOlKp7YhXcEvAjCOPdLBWghh3NrA4_0ZJ64pDo8YUBvF9Dz-z-NlSshjrTImmvI_EA-M7_ypo3tuJQq1WvsCIgHAexF4l1azNNpWZslEx49y3ZsWDjkkiXtO9MkowI7Mrzz-JaXBQcq0PZ7Z8fRm1S6IeOOxSSqieMOJHHKP1xmVpkDgsI43Vlebsa6rV-HjS4cb4ZfAQQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "02a21d1c-51ba-4576-b4e0-fcbe129bb341",
      "qi": "VFKixe9YgppB7V_c_yQyAEqPuXI06zlMLilG8p8UcqAMyLo4ba7HewJAEzlwSCRlROtpKrcoDnLrTrgLzNA_XA1YEo8bvAlvJsIUhp6yOlGcxw4gUOzVtfYqJId6NPfgk4fyy4EM0tdL1GaD7mUJUs8VFzHcrtsoKygJrfgyPMM",
      "dp": "eomzC_8qpcRauYf-tHOd6Xrgf1CAWHhrAbuT0ejkovTDkxSnSNOy2cuEFo8diKpke1ziZeD9qeTH79uN00aCjk5u-ZNhvz3rzwl-ruCAzOpvmffgzgWlVUJ0Vu8Vp5Pa3KYsg9Odq43OP60LZ7SA2wIYTQq9UOCRRCmrLzAVBRE",
      "alg": "RSA-OAEP",
      "dq": "L9vCfl4OIlU4C5S4yLWVXhyhRCWtGnjYCLtTouZL8nWcFrsO5_kiDVMUrjVQ0IM2hstBrcUiuVjDtbruA1OKNK09tWSWKHvBoOD6T59pM1hBQ4aM1i4PGRC8ug4umRRkW53epsESx2AyYHWY0F0xEV26ZhmEupzWyZZAX_bMrUk",
      "n": "wDL-kXKmjpv8hGjDhsbkI6qi5TveEWG2fNLLzPPSOs_abe21iOJdOnnBY8IeDoos9O_iOUZ3EpObUVeWKBZox8ilC0ylTvG8i09MJ6n6EhacPbCr4ZBkFbbsq21JO0FXU40vz7ZvEBJKtEKK5mgexDnXzB8zTLVJvKA6ndRo7FaFp9wybtPzzHk5B3s-wVzTKlmKGBfcSDhFSMvP2goBBXaCU0PYCRMbMBPODl-hy2iKLliJtxD69aaALLMQE1fLl5H9H5Bn5tB-qvrT_h6ehc8lxWoBf7VNOE4xu7jZXMzmkwSfKVBq7NEnIqwrpPhwNiLlgP5V-ddZIdj4WAha2w"
    },
    {
      "kty": "EC",
      "d": "f91kXl-nfX9IpJbPKYvP_bgtHARnPLh9lCkson0E-HQ",
      "use": "enc",
      "crv": "P-256",
      "kid": "8af4e803-0a3a-4a54-b3da-8c965a7bc925",
      "x": "2eaxKWyzH6hvjtoY4JDO5_ZX2glqc0qfOgI0FaC2UMY",
      "y": "3qlilDmQMiKOivv4u2-8J0gq7rpMWQM37rxVyU9h6sQ",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "d206ff71-7b85-4236-9325-6dbc6e2846a3",
      "n": "mBUVXfAhE0E-N2LGUDgRHyUgjYJc9w9A8abObyERS3G7XkEIAH7IlFADtZ2MqhU5aoAvrtyTn8bMViGARg9Ky0reqYwNeHOgnpMomypMumAQm2ny_YnewZmdqIgqFy3tlQdrUha_9vYT9Ft_rcwKjVuXzczYwrEE2_9jtpxe-6WZszm4KbyPg6zf78OUFjtq8bBdwtkSg0e0ENIu3UJtsOgBTla7zl5vnAXMH3lGhUIQe2c-_7jttJvIPRRY3bpLdmQ-Ytwv0wPlqemwHY3V7OCqDWS-m3XOlCaho0WVegybATJWG4Pyz0S4m3qZ_OMpSFZM3a_ULXRPEk1-JtOoDQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "e396001c-ebc1-4ab6-a2d3-870eb3f52bb0",
      "n": "pWVGzwWYy-ibZNrv6NyzZ9QKq7j6mAH90JH8u0QEquGuj1vwOUpE1hAYXH26cXS98I2mHu9siMI4hdrYLldf2Ig7Iuz8O_FTslvg_ILFjQx1biEP-gt-WyyoT8JEF1zWs3fyZjUjBNsPVAVUW-eU9Z0tfmvDFG3_O9CAXFWgq6xV7sCg45p6Uer80GxBIfdf32KpPQl_9Mt3DSL7VtfXPtiBpM1WYMZ6n3ArwYpEAAYj0aGZqBKGICzKVXIOn258CIf97fJ53UklZm4mLkfsYwm0Yyrp_1cTOdC1cJRI9fu7nfBfM6_Vmg_UzULO6cB873fJOCpQ2mJor0f7X1iODQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "ed80e4c3-5ded-49bc-ba5e-3b805ee3cb3a",
      "x": "ZA-ZzsGWb19ejiUAvUQbjJzrvaEJQbgUu3A3-8y_NNY",
      "y": "q9I-7SxtCRqY5BSUwJhSzViiF-IRMBy3hISoxz8WrvE"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "a9bbc1ff-abf1-4fed-8c34-d8be6b00f241",
      "x": "tiQibVMpGttbouX9Fb0cWC5gnAY6KzsfAiK34rmtD0I",
      "y": "mB6MKOiNVGb8NJO1g5AUheO6e1qWrmNtkOSwwoPqNA0"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "35f46816-30f2-467c-9869-7543df6f27ac",
      "x": "RhN9xl7XJlr-lEGSvajsGIh2GVAIskE101ElMXDW3k4",
      "y": "rpFORjTLBPnSnSZrRzOztgqHUbuz4qBrWnatp1S9U_Y"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "71af570f-c10d-4971-8c34-d5fa4dba9e0a",
      "x": "6vNep-kqERlZ7nAaxJuibPGc1fO0HofcPo7hV1IOnvg"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "02a21d1c-51ba-4576-b4e0-fcbe129bb341",
      "alg": "RSA-OAEP",
      "n": "wDL-kXKmjpv8hGjDhsbkI6qi5TveEWG2fNLLzPPSOs_abe21iOJdOnnBY8IeDoos9O_iOUZ3EpObUVeWKBZox8ilC0ylTvG8i09MJ6n6EhacPbCr4ZBkFbbsq21JO0FXU40vz7ZvEBJKtEKK5mgexDnXzB8zTLVJvKA6ndRo7FaFp9wybtPzzHk5B3s-wVzTKlmKGBfcSDhFSMvP2goBBXaCU0PYCRMbMBPODl-hy2iKLliJtxD69aaALLMQE1fLl5H9H5Bn5tB-qvrT_h6ehc8lxWoBf7VNOE4xu7jZXMzmkwSfKVBq7NEnIqwrpPhwNiLlgP5V-ddZIdj4WAha2w"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "8af4e803-0a3a-4a54-b3da-8c965a7bc925",
      "x": "2eaxKWyzH6hvjtoY4JDO5_ZX2glqc0qfOgI0FaC2UMY",
      "y": "3qlilDmQMiKOivv4u2-8J0gq7rpMWQM37rxVyU9h6sQ",
      "alg": "ECDH-ES"
    }
  ]
}
2020-09-01 12:12:19 SUCCESS
ValidateServerJWKs
Valid server JWKs: keys are valid JSON, contain the required fields and are correctly encoded using unpadded base64url
2020-09-01 12:12:19 SUCCESS
CheckDistinctKeyIdValueInServerJWKs
Distinct 'kid' value in all keys of server_jwks
see
https://bitbucket.org/openid/connect/issues/1127
2020-09-01 12:12:19 SUCCESS
OIDCCLoadUserInfo
Added user information
user_info
{
  "sub": "user-subject-1234531",
  "name": "Demo T. User",
  "given_name": "Demo",
  "family_name": "User",
  "middle_name": "Theresa",
  "nickname": "Dee",
  "preferred_username": "d.tu",
  "gender": "female",
  "birthdate": "2000-02-03",
  "address": {
    "street_address": "100 Universal City Plaza",
    "locality": "Hollywood",
    "region": "CA",
    "postal_code": "91608",
    "country": "USA"
  },
  "zoneinfo": "America/Los_Angeles",
  "locale": "en-US",
  "phone_number": "+1 555 5550000",
  "phone_number_verified": false,
  "email": "user@example.com",
  "email_verified": false,
  "website": "https://openid.net/",
  "updated_at": "1580000000"
}
2020-09-01 12:12:19 SUCCESS
GetDynamicClientConfiguration
No client details on configuration, created an empty dynamic_client_registration_template object.
2020-09-01 12:12:19
oidcc-client-test-signing-key-rotation-just-before-signing
Setup Done
2020-09-01 12:12:22 INCOMING
oidcc-client-test-signing-key-rotation-just-before-signing
Incoming HTTP request to test instance RerTORD3DGJ3ILj
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
.well-known/openid-configuration
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Discovery endpoint
2020-09-01 12:12:22 OUTGOING
oidcc-client-test-signing-key-rotation-just-before-signing
Response to HTTP request to test instance RerTORD3DGJ3ILj
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "issuer": "https://www.certification.openid.net/test/RerTORD3DGJ3ILj/",
  "authorization_endpoint": "https://www.certification.openid.net/test/RerTORD3DGJ3ILj/authorize",
  "token_endpoint": "https://www.certification.openid.net/test/RerTORD3DGJ3ILj/token",
  "jwks_uri": "https://www.certification.openid.net/test/RerTORD3DGJ3ILj/jwks",
  "userinfo_endpoint": "https://www.certification.openid.net/test/RerTORD3DGJ3ILj/userinfo",
  "registration_endpoint": "https://www.certification.openid.net/test/RerTORD3DGJ3ILj/register",
  "scopes_supported": [
    "openid",
    "phone",
    "profile",
    "email",
    "address",
    "offline_access"
  ],
  "response_types_supported": [
    "code",
    "id_token code",
    "token code id_token",
    "id_token",
    "token id_token",
    "token code",
    "token"
  ],
  "response_modes_supported": [
    "query",
    "fragment",
    "form_post"
  ],
  "token_endpoint_auth_methods_supported": [
    "client_secret_basic"
  ],
  "token_endpoint_auth_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "grant_types_supported": [
    "authorization_code",
    "implicit"
  ],
  "claims_parameter_supported": true,
  "acr_values_supported": [
    "PASSWORD"
  ],
  "subject_types_supported": [
    "public",
    "pairwise"
  ],
  "claim_types_supported": [
    "normal",
    "aggregated",
    "distributed"
  ],
  "claims_supported": [
    "sub",
    "name",
    "given_name",
    "family_name",
    "middle_name",
    "nickname",
    "gender",
    "birthdate",
    "preferred_username",
    "profile",
    "website",
    "locale",
    "updated_at",
    "address",
    "zoneinfo",
    "phone_number",
    "phone_number_verified",
    "email",
    "email_verified"
  ],
  "id_token_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "id_token_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "id_token_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "request_object_signing_alg_values_supported": [
    "none",
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "request_object_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "request_object_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ],
  "userinfo_signing_alg_values_supported": [
    "RS256",
    "RS384",
    "RS512",
    "PS256",
    "PS384",
    "PS512",
    "ES256",
    "ES256K",
    "ES384",
    "ES512",
    "EdDSA"
  ],
  "userinfo_encryption_alg_values_supported": [
    "RSA1_5",
    "RSA-OAEP",
    "RSA-OAEP-256",
    "ECDH-ES",
    "ECDH-ES+A128KW",
    "ECDH-ES+A192KW",
    "ECDH-ES+A256KW",
    "A128KW",
    "A192KW",
    "A256KW",
    "A128GCMKW",
    "A192GCMKW",
    "A256GCMKW",
    "dir"
  ],
  "userinfo_encryption_enc_values_supported": [
    "A128CBC-HS256",
    "A192CBC-HS384",
    "A256CBC-HS512",
    "A128GCM",
    "A192GCM",
    "A256GCM"
  ]
}
outgoing_path
.well-known/openid-configuration
2020-09-01 12:12:22 INCOMING
oidcc-client-test-signing-key-rotation-just-before-signing
Incoming HTTP request to test instance RerTORD3DGJ3ILj
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/json",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "161",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
register
incoming_body_form_params
incoming_method
POST
incoming_body_json
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
incoming_query_string_params
{}
incoming_body
{"token_endpoint_auth_method":"client_secret_basic","response_types":["code"],"grant_types":["authorization_code"],"redirect_uris":["https://rp.example.com/cb"]}
Registration endpoint
2020-09-01 12:12:22 SUCCESS
OIDCCExtractDynamicRegistrationRequest
Extracted dynamic client registration request
request
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ]
}
2020-09-01 12:12:22 INFO
EnsureRegistrationRequestContainsAtLeastOneContact
This application requires that registration requests contain at least one contact.
2020-09-01 12:12:22 SUCCESS
ValidateClientGrantTypes
grant_types match response_types
grant_types
[
  "authorization_code"
]
response_types
[
  "code"
]
2020-09-01 12:12:22 SUCCESS
OIDCCValidateClientRedirectUris
Valid redirect_uri(s) provided in registration request
redirect_uris
[
  "https://rp.example.com/cb"
]
2020-09-01 12:12:22 SUCCESS
ValidateClientLogoUris
Client does not contain any logo_uri
2020-09-01 12:12:22 SUCCESS
ValidateClientUris
Client does not contain any client_uri
2020-09-01 12:12:22 SUCCESS
ValidateClientPolicyUris
Client does not contain any policy_uri
2020-09-01 12:12:22 SUCCESS
ValidateClientTosUris
Client does not contain any tos_uri
2020-09-01 12:12:22 SUCCESS
ValidateClientSubjectType
A subject_type was not provided
2020-09-01 12:12:22 INFO
ValidateIdTokenSignedResponseAlg
Skipped evaluation due to missing required element: client id_token_signed_response_alg
path
id_token_signed_response_alg
mapped
object
client
2020-09-01 12:12:22 SUCCESS
EnsureIdTokenEncryptedResponseAlgIsSetIfEncIsSet
id_token_encrypted_response_enc is not set
2020-09-01 12:12:22 INFO
ValidateUserinfoSignedResponseAlg
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:12:22 SUCCESS
EnsureUserinfoEncryptedResponseAlgIsSetIfEncIsSet
userinfo_encrypted_response_enc is not set
2020-09-01 12:12:22 INFO
ValidateRequestObjectSigningAlg
Skipped evaluation due to missing required element: client request_object_signing_alg
path
request_object_signing_alg
mapped
object
client
2020-09-01 12:12:22 SUCCESS
EnsureRequestObjectEncryptionAlgIsSetIfEncIsSet
request_object_encryption_enc is not set
2020-09-01 12:12:22 INFO
ValidateTokenEndpointAuthSigningAlg
Skipped evaluation due to missing required element: client token_endpoint_auth_signing_alg
path
token_endpoint_auth_signing_alg
mapped
object
client
2020-09-01 12:12:22 SUCCESS
ValidateDefaultMaxAge
default_max_age is not set
2020-09-01 12:12:22 INFO
ValidateRequireAuthTime
Skipped evaluation due to missing required element: client require_auth_time
path
require_auth_time
mapped
object
client
2020-09-01 12:12:22 INFO
ValidateDefaultAcrValues
Skipped evaluation due to missing required element: client default_acr_values
path
default_acr_values
mapped
object
client
2020-09-01 12:12:22 INFO
ValidateInitiateLoginUri
Skipped evaluation due to missing required element: client initiate_login_uri
path
initiate_login_uri
mapped
object
client
2020-09-01 12:12:22 INFO
ValidateRequestUris
Skipped evaluation due to missing required element: client request_uris
path
request_uris
mapped
object
client
2020-09-01 12:12:22 SUCCESS
ValidateClientRegistrationRequestSectorIdentifierUri
A sector_identifier_uri was not provided
2020-09-01 12:12:22 SUCCESS
OIDCCRegisterClient
Registered client
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_fRHFGQWncWeOdsu17332}%){("
}
2020-09-01 12:12:22
OIDCCCreateClientSecretForDynamicClient
Set the secret for registered client
client_secret
secret_YzuyljoIZVsLIzpovkeMJhAiVHXZuCHyxwpBTNGudHesmCLdLh4735117963%=}}~
2020-09-01 12:12:22 SUCCESS
EnsureTokenEndPointAuthMethodIsClientSecretBasic
token_endpoint_auth_method is 'client_secret_basic' as expected
2020-09-01 12:12:22 SUCCESS
EnsureClientDoesNotHaveBothJwksAndJwksUri
Client does not have both jwks and jwks_uri set
client
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_fRHFGQWncWeOdsu17332}%){(",
  "client_secret": "secret_YzuyljoIZVsLIzpovkeMJhAiVHXZuCHyxwpBTNGudHesmCLdLh4735117963%\u003d}}~"
}
2020-09-01 12:12:22 INFO
FetchClientKeys
Skipped evaluation due to missing required element: client jwks_uri
path
jwks_uri
mapped
object
client
2020-09-01 12:12:22 SUCCESS
OIDCCExtractServerSigningAlg
Using the default algorithm for the first key in server jwks
signing_algorithm
RS256
2020-09-01 12:12:22
SetClientIdTokenSignedResponseAlgToServerSigningAlg
Set id_token_signed_response_alg for the registered client
id_token_signed_response_alg
RS256
2020-09-01 12:12:22 OUTGOING
oidcc-client-test-signing-key-rotation-just-before-signing
Response to HTTP request to test instance RerTORD3DGJ3ILj
outgoing_status_code
201
outgoing_headers
{}
outgoing_body
{
  "token_endpoint_auth_method": "client_secret_basic",
  "response_types": [
    "code"
  ],
  "grant_types": [
    "authorization_code"
  ],
  "redirect_uris": [
    "https://rp.example.com/cb"
  ],
  "client_id": "client_fRHFGQWncWeOdsu17332}%){(",
  "client_secret": "secret_YzuyljoIZVsLIzpovkeMJhAiVHXZuCHyxwpBTNGudHesmCLdLh4735117963%\u003d}}~",
  "id_token_signed_response_alg": "RS256"
}
outgoing_path
register
2020-09-01 12:12:24 INCOMING
oidcc-client-test-signing-key-rotation-just-before-signing
Incoming HTTP request to test instance RerTORD3DGJ3ILj
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2020-09-01 12:12:24 OUTGOING
oidcc-client-test-signing-key-rotation-just-before-signing
Response to HTTP request to test instance RerTORD3DGJ3ILj
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "d206ff71-7b85-4236-9325-6dbc6e2846a3",
      "n": "mBUVXfAhE0E-N2LGUDgRHyUgjYJc9w9A8abObyERS3G7XkEIAH7IlFADtZ2MqhU5aoAvrtyTn8bMViGARg9Ky0reqYwNeHOgnpMomypMumAQm2ny_YnewZmdqIgqFy3tlQdrUha_9vYT9Ft_rcwKjVuXzczYwrEE2_9jtpxe-6WZszm4KbyPg6zf78OUFjtq8bBdwtkSg0e0ENIu3UJtsOgBTla7zl5vnAXMH3lGhUIQe2c-_7jttJvIPRRY3bpLdmQ-Ytwv0wPlqemwHY3V7OCqDWS-m3XOlCaho0WVegybATJWG4Pyz0S4m3qZ_OMpSFZM3a_ULXRPEk1-JtOoDQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "e396001c-ebc1-4ab6-a2d3-870eb3f52bb0",
      "n": "pWVGzwWYy-ibZNrv6NyzZ9QKq7j6mAH90JH8u0QEquGuj1vwOUpE1hAYXH26cXS98I2mHu9siMI4hdrYLldf2Ig7Iuz8O_FTslvg_ILFjQx1biEP-gt-WyyoT8JEF1zWs3fyZjUjBNsPVAVUW-eU9Z0tfmvDFG3_O9CAXFWgq6xV7sCg45p6Uer80GxBIfdf32KpPQl_9Mt3DSL7VtfXPtiBpM1WYMZ6n3ArwYpEAAYj0aGZqBKGICzKVXIOn258CIf97fJ53UklZm4mLkfsYwm0Yyrp_1cTOdC1cJRI9fu7nfBfM6_Vmg_UzULO6cB873fJOCpQ2mJor0f7X1iODQ"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "ed80e4c3-5ded-49bc-ba5e-3b805ee3cb3a",
      "x": "ZA-ZzsGWb19ejiUAvUQbjJzrvaEJQbgUu3A3-8y_NNY",
      "y": "q9I-7SxtCRqY5BSUwJhSzViiF-IRMBy3hISoxz8WrvE"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "a9bbc1ff-abf1-4fed-8c34-d8be6b00f241",
      "x": "tiQibVMpGttbouX9Fb0cWC5gnAY6KzsfAiK34rmtD0I",
      "y": "mB6MKOiNVGb8NJO1g5AUheO6e1qWrmNtkOSwwoPqNA0"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "35f46816-30f2-467c-9869-7543df6f27ac",
      "x": "RhN9xl7XJlr-lEGSvajsGIh2GVAIskE101ElMXDW3k4",
      "y": "rpFORjTLBPnSnSZrRzOztgqHUbuz4qBrWnatp1S9U_Y"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "71af570f-c10d-4971-8c34-d5fa4dba9e0a",
      "x": "6vNep-kqERlZ7nAaxJuibPGc1fO0HofcPo7hV1IOnvg"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "02a21d1c-51ba-4576-b4e0-fcbe129bb341",
      "alg": "RSA-OAEP",
      "n": "wDL-kXKmjpv8hGjDhsbkI6qi5TveEWG2fNLLzPPSOs_abe21iOJdOnnBY8IeDoos9O_iOUZ3EpObUVeWKBZox8ilC0ylTvG8i09MJ6n6EhacPbCr4ZBkFbbsq21JO0FXU40vz7ZvEBJKtEKK5mgexDnXzB8zTLVJvKA6ndRo7FaFp9wybtPzzHk5B3s-wVzTKlmKGBfcSDhFSMvP2goBBXaCU0PYCRMbMBPODl-hy2iKLliJtxD69aaALLMQE1fLl5H9H5Bn5tB-qvrT_h6ehc8lxWoBf7VNOE4xu7jZXMzmkwSfKVBq7NEnIqwrpPhwNiLlgP5V-ddZIdj4WAha2w"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "8af4e803-0a3a-4a54-b3da-8c965a7bc925",
      "x": "2eaxKWyzH6hvjtoY4JDO5_ZX2glqc0qfOgI0FaC2UMY",
      "y": "3qlilDmQMiKOivv4u2-8J0gq7rpMWQM37rxVyU9h6sQ",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2020-09-01 12:12:24 INCOMING
oidcc-client-test-signing-key-rotation-just-before-signing
Incoming HTTP request to test instance RerTORD3DGJ3ILj
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "got/9.6.0 (https://github.com/sindresorhus/got)",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
authorize
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{
  "client_id": "client_fRHFGQWncWeOdsu17332}%){(",
  "scope": "openid",
  "response_type": "code",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "Tyh2YaUZj8Ofo0QvMLoxmKp9aSF9GVdI8LRod8TQPjE"
}
incoming_body
Authorization endpoint
2020-09-01 12:12:24 SUCCESS
EnsureRequestDoesNotContainRequestObject
Request does not contain a request parameter
2020-09-01 12:12:24 SUCCESS
OIDCCEnsureAuthorizationHttpRequestContainsOpenIDScope
Found 'openid' in scope http request parameter
actual
[
  "openid"
]
expected
openid
2020-09-01 12:12:24 SUCCESS
CreateEffectiveAuthorizationRequestParameters
Merged http request parameters with request object claims
effective_authorization_endpoint_request
{
  "client_id": "client_fRHFGQWncWeOdsu17332}%){(",
  "scope": "openid",
  "response_type": "code",
  "redirect_uri": "https://rp.example.com/cb",
  "state": "Tyh2YaUZj8Ofo0QvMLoxmKp9aSF9GVdI8LRod8TQPjE"
}
2020-09-01 12:12:24 SUCCESS
ExtractRequestedScopes
Requested scopes
scope
openid
2020-09-01 12:12:24 INFO
ExtractNonceFromAuthorizationRequest
Couldn't find 'nonce' in authorization endpoint parameters
2020-09-01 12:12:24 SUCCESS
EnsureResponseTypeIsCode
Response type is expected value
expected
code
2020-09-01 12:12:24 SUCCESS
EnsureMatchingClientId
Client ID matched
client_id
client_fRHFGQWncWeOdsu17332}%){(
2020-09-01 12:12:24 SUCCESS
EnsureValidRedirectUriForAuthorizationEndpointRequest
redirect_uri is one of the allowed redirect uris
actual
https://rp.example.com/cb
expected
[
  "https://rp.example.com/cb"
]
2020-09-01 12:12:24 SUCCESS
EnsureOpenIDInScopeRequest
Found 'openid' scope in request
actual
[
  "openid"
]
expected
openid
2020-09-01 12:12:24 SUCCESS
DisallowMaxAgeEqualsZeroAndPromptNone
The client did not send max_age=0 and prompt=none parameters as expected
2020-09-01 12:12:24 SUCCESS
CreateAuthorizationCode
Created authorization code
authorization_code
TcrPu6bXop
2020-09-01 12:12:24 SUCCESS
CalculateCHash
Successful c_hash encoding
c_hash
rtMybmiv6PuA3uJM41EP_Q
2020-09-01 12:12:24 SUCCESS
CreateAuthorizationEndpointResponseParams
Added authorization_endpoint_response_params to environment
params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "Tyh2YaUZj8Ofo0QvMLoxmKp9aSF9GVdI8LRod8TQPjE"
}
2020-09-01 12:12:24 SUCCESS
AddCodeToAuthorizationEndpointResponseParams
Added code to authorization endpoint response params
authorization_endpoint_response_params
{
  "redirect_uri": "https://rp.example.com/cb",
  "state": "Tyh2YaUZj8Ofo0QvMLoxmKp9aSF9GVdI8LRod8TQPjE",
  "code": "TcrPu6bXop"
}
2020-09-01 12:12:24
SendAuthorizationResponseWithResponseModeQuery
Redirecting back to client
uri
https://rp.example.com/cb?state=Tyh2YaUZj8Ofo0QvMLoxmKp9aSF9GVdI8LRod8TQPjE&code=TcrPu6bXop
2020-09-01 12:12:24 OUTGOING
oidcc-client-test-signing-key-rotation-just-before-signing
Response to HTTP request to test instance RerTORD3DGJ3ILj
outgoing
org.springframework.web.servlet.view.RedirectView: [RedirectView]; URL [https://rp.example.com/cb?state=Tyh2YaUZj8Ofo0QvMLoxmKp9aSF9GVdI8LRod8TQPjE&code=TcrPu6bXop]
outgoing_path
authorize
2020-09-01 12:12:25 INCOMING
oidcc-client-test-signing-key-rotation-just-before-signing
Incoming HTTP request to test instance RerTORD3DGJ3ILj
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "authorization": "Basic Y2xpZW50X2ZSSEZHUVduY1dlT2RzdTE3MzMyJTdEJTI1KSU3Qig6c2VjcmV0X1l6dXlsam9JWlZzTEl6cG92a2VNSmhBaVZIWFp1Q0h5eHdwQlROR3VkSGVzbUNMZExoNDczNTExNzk2MyUyNSUzRCU3RCU3RH4\u003d",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "content-type": "application/x-www-form-urlencoded",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "content-length": "92",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net",
  "connection": "close"
}
incoming_path
token
incoming_body_form_params
{
  "grant_type": "authorization_code",
  "code": "TcrPu6bXop",
  "redirect_uri": "https://rp.example.com/cb"
}
incoming_method
POST
incoming_body_json
incoming_query_string_params
{}
incoming_body
grant_type=authorization_code&code=TcrPu6bXop&redirect_uri=https%3A%2F%2Frp.example.com%2Fcb
Token endpoint
2020-09-01 12:12:25 SUCCESS
ExtractClientCredentialsFromBasicAuthorizationHeader
Extracted client authentication
client_id
client_fRHFGQWncWeOdsu17332}%){(
client_secret
secret_YzuyljoIZVsLIzpovkeMJhAiVHXZuCHyxwpBTNGudHesmCLdLh4735117963%=}}~
method
client_secret_basic
2020-09-01 12:12:25 SUCCESS
ValidateClientIdAndSecret
Client id and secret match
2020-09-01 12:12:25 SUCCESS
ValidateAuthorizationCode
Found authorization code
authorization_code
TcrPu6bXop
2020-09-01 12:12:25 SUCCESS
ValidateRedirectUriForTokenEndpointRequest
redirect_uri is the same as the one used in the authorization request
actual
https://rp.example.com/cb
2020-09-01 12:12:25 SUCCESS
GenerateBearerAccessToken
Generated access token
access_token
jsK3q2NFEmvWMaGgFEak9Bk7rmrdEqZ75rqRLqeHaztcv47Yps
2020-09-01 12:12:25 SUCCESS
CalculateAtHash
Successful at_hash encoding
at_hash
B31aeFkdWEB8tacEKHMyLw
2020-09-01 12:12:25 SUCCESS
GenerateIdTokenClaims
Created ID Token Claims
iss
https://www.certification.openid.net/test/RerTORD3DGJ3ILj/
sub
user-subject-1234531
aud
client_fRHFGQWncWeOdsu17332}%){(
iat
1598962345
exp
1598962645
2020-09-01 12:12:25 SUCCESS
AddAtHashToIdTokenClaims
Added at_hash to ID token claims
at_hash
B31aeFkdWEB8tacEKHMyLw
id_token_claims
{
  "iss": "https://www.certification.openid.net/test/RerTORD3DGJ3ILj/",
  "sub": "user-subject-1234531",
  "aud": "client_fRHFGQWncWeOdsu17332}%){(",
  "iat": 1598962345,
  "exp": 1598962645,
  "at_hash": "B31aeFkdWEB8tacEKHMyLw"
}
2020-09-01 12:12:26
OIDCCGenerateServerJWKs
Generated server public private JWK sets
server_jwks
{
  "keys": [
    {
      "p": "1ghlC59ARiUrUNbjlIhIdOzVyHhLpTyOmFjMp0oxseWDkz3OoRqB1ahk-ImRe411GwCUr_d0Pou-nNt8rhcQz0tVtRirr8MnAhKpZlYDKfNlGNXVS3AOsNvw1tbX2FPhgbpm2IPRjIbq7Z6x_Bvx-NRks4mNEbuIDCLE62OO1DM",
      "kty": "RSA",
      "q": "odoTtGaO-t3G2PUgNUsqNK4sSHg3wXKrM4-f2MfN6vyG8o8PsXHRFMatC4NhJ6Ekk493uP_ZGtDoqZ1Jh1l_fTDQ1W9jUkCn6EYb3PGS3kyngyWjkX0OltzJo37QbXTU9nP9t8AxON21Ve_MJ4vMILPkc39cHza1yVCOKyBBsqs",
      "d": "IHfvQJKIVb5wiRstnaT9aTI572PFBRjKrRa6YEd3KSK7eNQZM7WyyxPzZGYkY3-aObO_O0ILb4DoH1EcoV2ioaPN8h3QLwWheR3jtPqZBfqz2ekgHtUWP4rCOnakhmUza_nTwvLYl0XjSeo-bGAX46UT8qAin3Uh7oAUNxOPTPMO6NEVP1tlgF_f8y9tlE128rZHEE5pm6iBzbtsDVpQd6kZB796rhDMpZ6wyYi8FkMSONCGKcYUYlMrIUv9ChiQRimPyXECunG4VO8XVUpOyjFkIx2WeSctp1XBbFP3u5aLC-M5jUhxJ1LwoLBrqgyPQefmAx8FvKLMEQlEGVsjJQ",
      "e": "AQAB",
      "use": "sig",
      "kid": "9ef2df82-7127-43fb-8b74-beaa355d4f44",
      "qi": "bLUqkFIXrgJuCKOOm970jLg9IFCDVran-2b19MlAK3oFdOb5yrpt1nKY5wru8-Amvq4BGf9rk4z3-l52Rt0L-Dc3X8qs49KqeaQLlGgXL491WRoW94d7iK2gau2koJkxngwTS0rhXQnqZp4FoBmTDXuoT7HZDTWjmjYLLpm_Yd0",
      "dp": "TGJwlWY_TQlk3RPj4pWErl37qfDspkrnZQ2D9EwxUhjkDT9op-xK29KePmjyR9LjMUDSz74TeWLsIxTd-U94C1MKgngMhcyy9jVsyX324RjhQqzF04dpZssHt9Sy8Zx2BZNdsvXQakOYQjd5s8zRXYmHat-zPdncouAhwRQl3Cs",
      "dq": "LksK4cmH0ddHPdz25mdmXgUHY38HK4yZzTiiVsXnbvPlwVEMAwvz6oZdDnL4gfZEWPRrIP4E4feo5IK5ej4uCefBg5rFhMw7emM7KvnpsS2pqAhG_aEQYDQsdFgcU4JcO1W31yvgqEw5xqe88_63Vw89I4_lEIR8gGVLFKi4Qds",
      "n": "h1GbK84y1H8mXTapvyauhcgUu_Y9IOX_WMvx2lvGxR07bjDnsO1mfnlCeeVICEUenGp8MuD_jZdQkonS8fzGzBc9pn1cAsO5U0LG42a97f11JKlof9lFipLnvyfJpHAZi7_7x6YxbWyk8Z4ImxcB9zEstz8zx4mixp0k9SuWUd3QLy6YuvtWXex0T4NSETsBhPPd1JW7FIVG-ItlVc9S8I480LwspC5-Pr25wNDNQ-nFKD6JAnEFTLEhyN9yq2BLrstbavJwh5WXLxGN6ZjNFMv3sdmwSGO8bHKp59Lk5UnP4zeSw8ZQoWZrwv7zbQI4LbUaQWcD-dIB_UTQEOY0EQ"
    },
    {
      "kty": "EC",
      "d": "Av7ZVvC8HcaqG7T9dsIl23s_RVxCK79zE_thcX1OUuU",
      "use": "sig",
      "crv": "P-256",
      "kid": "3e20625c-1ac1-4c6b-a6c8-2feff1306e50",
      "x": "xh2iKs8DToJa6Q8Siw9bu15hUdfpWULm7Yg0kQNJdFo",
      "y": "pQEH11ZLbrVn2lu1v27duU2CoHi_Frl7YrYDm8dl4MA"
    },
    {
      "kty": "EC",
      "d": "QEWoGAlNw9d_Q7owK4T3Ggd9duOqJSyPO-QIeS0aoto",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "916bc9eb-f770-4186-9e5d-df14ac0b59ea",
      "x": "LBIpd0XbtFIAv4OlZsHcahMID05Ce6rTc8LdvKQRGN8",
      "y": "blqI2iaUg8pIRCSyj6iJP8SxJGmfuWuuPjeHaUTcQic"
    },
    {
      "kty": "OKP",
      "d": "g86ivORoCZm9t2udocvyin0ZZbEqDbOxL6OiF__GtNE",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "5723aabd-7ed1-4363-a399-f2435a38b414",
      "x": "MiC4CkPNKbi9MUhj-m_3a-CYUkk1h810EKFYPw2xHSo"
    }
  ]
}
server_encryption_keys
{
  "keys": [
    {
      "p": "0ByG5hU1rKU36XCTZRxKrQKpbtWlObkjjqhqLRlWkNboAMqZ4VVyRT9IIo75AYtjC6tOn6UHzzBOZ9V8-74n707VMVKM_ClSquloSDHAhxJaQtQ42lEA8dWTEEVFe5P-cqGuqMaCHHRIjKCR76f0qxBm1iSurXHOXETaWSoNEME",
      "kty": "RSA",
      "q": "rynyK2KsmuARxtm4GxpF-i3uNlE_KCIvNRqyixaDzz-JOEe4zJ6cvxAS3skZDnZrebbBjGedPmawAweh_I6i1lw4__1uTMLjh_cIFeMHVHJs0AIirfweYo1pZuSxtwJqyFWrfGv-3YO9xQopVnGcdkyTi4skPFVv2ecqeoZMWKk",
      "d": "Usw68tVzN0pOT-GYyI12_rgIGgt10_unC73PJMRmgjvG-Ed-8WcAupnvqSVkGjNq63y1Lyj365A8ITB9HXXnzp-J9iZhwYjxKUsELW5lPUd5W-P23urLoPgmQR8pVb_DuVVqHWrcMgz4GAAfKXcCdW7VfxdgsQCHWXpJx6bU22cXDZGcg3e8ZoMUPN8L9bduAVYccH81Vz-Y3EHlxSEQ_Dm92AeEOl2-n6arNfXxdgYQwO4UtDpqer-O15YOEJ8hK0DSvY5GmSh9WCz3rhQZ4IRCDCPHgOAa9pM3WrfLWUovQKYU15s0nC0eM3qDlDp45ub7P3tVaE79jB6adoxKAQ",
      "e": "AQAB",
      "use": "enc",
      "kid": "1e6f34af-6829-45dd-8b83-88d97c44750e",
      "qi": "e8sD6SxudGq9kOJUUDJJ0b8qkDsACt5jjFAjcZSVVUTjSr4NatzsjLiof7AMYO2QJtf-l2ZZZEXR6T_CCtEOLQt5KYJhJlBgzjd0cY8B2Dq3fPoGXIdGgJT69A3oWHL5FxAcbTGSF765VsVJAzMSUBIl1TuI9yDhXF5xWipENyI",
      "dp": "dksA0t_TdqMjOOnonlyKhfUxYfLGzBzUfU51q9TvQ70keu6usUrkfUAPPLWQDLSyQ_vH4S7pVXfb2WGcfWwFPx3MSRDnWp4Sg1vRDthY224vKDWBa3cH1m7T_Tei2y-wPnBw2zaa1pmyc10CFvudM29LRQXs1GIQLppkkrI4YwE",
      "alg": "RSA-OAEP",
      "dq": "ka72XkUsP4d64YL0z33Tk5cd14lNWOjNkIJK2sl4CSfTzb5BIdYNkg8hUq-4qkGtc8afRVJsAplPbMWtYSuUnWqIcchrM2an7M51qBZxYzfj7kDIbSISd28bqdstP4PAIiy2er4rdDr822NvLBlDw1Q_JsEr-w4n__h2aP9Hgjk",
      "n": "jmWZpx_gfAXsK4EyZ9V8ZaYsZH9KV_KVoYnMHVdBGCBBDoi0XnCzaAEykraPsZXMECW7fV0-zzjg7PxXPRfL8_vkfqYNlUUxTe-T7M3UDJSsB0Ol3WMSquOcjm32SsBDdJIEYruyPUnrFj6XjbqvFecD-7TWoHj6kLOh4acLbcUJ9TXsUZYw9qmsNJPph0pOzO0OKfW4WmR3l-Tmgdgeb3I84QylmHB8thg919pvKNdmj6nQtuzAZS4_Dp_rDM_WB2ZmIZ1UN-xfQoJiTptswfVsob3YzMKl5ls_i7gacaJNga7lLhjgfYV_pEYRCjrwscAy2kBhjL75HsPxP65naQ"
    },
    {
      "kty": "EC",
      "d": "_7hR1kQ8ptrDwW09dNiXDsYeK9EJ7t7As_6t5pRgQfo",
      "use": "enc",
      "crv": "P-256",
      "kid": "77959933-bdad-41b6-ac93-fd3ecd19672f",
      "x": "wqTeEVCQl835Re6-FKHM4Ro7MPFiCpiZv1IMY1cPLjI",
      "y": "twxuNilJtfl2m6d-KS1RRjnGXERGl7aCTwVFacwQ5zc",
      "alg": "ECDH-ES"
    }
  ]
}
server_public_jwks
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "9ef2df82-7127-43fb-8b74-beaa355d4f44",
      "n": "h1GbK84y1H8mXTapvyauhcgUu_Y9IOX_WMvx2lvGxR07bjDnsO1mfnlCeeVICEUenGp8MuD_jZdQkonS8fzGzBc9pn1cAsO5U0LG42a97f11JKlof9lFipLnvyfJpHAZi7_7x6YxbWyk8Z4ImxcB9zEstz8zx4mixp0k9SuWUd3QLy6YuvtWXex0T4NSETsBhPPd1JW7FIVG-ItlVc9S8I480LwspC5-Pr25wNDNQ-nFKD6JAnEFTLEhyN9yq2BLrstbavJwh5WXLxGN6ZjNFMv3sdmwSGO8bHKp59Lk5UnP4zeSw8ZQoWZrwv7zbQI4LbUaQWcD-dIB_UTQEOY0EQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "7b059ab6-8647-4313-ba44-6e067e24066c",
      "n": "we6X7zJDjabXl8AKTJcy7i9r6MsjoQDCYC-bTJdhnPGucigR6TyJ_advYE5Q25e63eVVxYN-W_hfn-8zQcN9cQMtcwiAqjABYK0MQE5uNcCGOheM-LRAPHNV6408IL1IVKt-ja0gq560IcS05L-6eu14ti4r_o6k9FhnbfhQ78hNWPorv3_qVrZtMLVfjC5oMSeEiQzHl7kz7TX1BuTFWdFprc2UPAkwvJahJqA74dSAjIpDwmkLNw2gbdkQpJmESyVr1JITGf_k2xVCBA9Ib69rtGAB18CrYP4BUxFwm0NONFLHUL2D0qnLjE7KozsLHhBGpp0Adlj6sM6k-Y7t3Q"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "3e20625c-1ac1-4c6b-a6c8-2feff1306e50",
      "x": "xh2iKs8DToJa6Q8Siw9bu15hUdfpWULm7Yg0kQNJdFo",
      "y": "pQEH11ZLbrVn2lu1v27duU2CoHi_Frl7YrYDm8dl4MA"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "8ff6f2ce-af0d-4c70-9325-fc9a772fb263",
      "x": "EdRshxD4ywPisigDXcxvAfNp1OAjujSFOv2u19Agonw",
      "y": "40yXV4QODGbZlADXftol6PTuu8-FQD0ggkMh9y1a7iw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "916bc9eb-f770-4186-9e5d-df14ac0b59ea",
      "x": "LBIpd0XbtFIAv4OlZsHcahMID05Ce6rTc8LdvKQRGN8",
      "y": "blqI2iaUg8pIRCSyj6iJP8SxJGmfuWuuPjeHaUTcQic"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "5723aabd-7ed1-4363-a399-f2435a38b414",
      "x": "MiC4CkPNKbi9MUhj-m_3a-CYUkk1h810EKFYPw2xHSo"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "1e6f34af-6829-45dd-8b83-88d97c44750e",
      "alg": "RSA-OAEP",
      "n": "jmWZpx_gfAXsK4EyZ9V8ZaYsZH9KV_KVoYnMHVdBGCBBDoi0XnCzaAEykraPsZXMECW7fV0-zzjg7PxXPRfL8_vkfqYNlUUxTe-T7M3UDJSsB0Ol3WMSquOcjm32SsBDdJIEYruyPUnrFj6XjbqvFecD-7TWoHj6kLOh4acLbcUJ9TXsUZYw9qmsNJPph0pOzO0OKfW4WmR3l-Tmgdgeb3I84QylmHB8thg919pvKNdmj6nQtuzAZS4_Dp_rDM_WB2ZmIZ1UN-xfQoJiTptswfVsob3YzMKl5ls_i7gacaJNga7lLhjgfYV_pEYRCjrwscAy2kBhjL75HsPxP65naQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "77959933-bdad-41b6-ac93-fd3ecd19672f",
      "x": "wqTeEVCQl835Re6-FKHM4Ro7MPFiCpiZv1IMY1cPLjI",
      "y": "twxuNilJtfl2m6d-KS1RRjnGXERGl7aCTwVFacwQ5zc",
      "alg": "ECDH-ES"
    }
  ]
}
2020-09-01 12:12:26 SUCCESS
OIDCCSignIdToken
Signed the ID token
id_token
eyJraWQiOiI5ZWYyZGY4Mi03MTI3LTQzZmItOGI3NC1iZWFhMzU1ZDRmNDQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQjMxYWVGa2RXRUI4dGFjRUtITXlMdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X2ZSSEZHUVduY1dlT2RzdTE3MzMyfSUpeygiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvUmVyVE9SRDNER0ozSUxqXC8iLCJleHAiOjE1OTg5NjI2NDUsImlhdCI6MTU5ODk2MjM0NX0.hOVsVziKsnobXZKne2-DbWoU4yR7mqxqEqDc8yfd2PBUs9l0Q4eP5U7UecqjUrYHskMOoJFjaPn-Y-2L-byNu-ejTyAsTa6iOUs_mp76s0CDkWkrG9ufEWFC7Gvm9Q2PZglQnVk2EkwmE03KnF6RLmtoti4WQdIoIgsoHGxzgI6sEZQ2oIAzlh3qAyRsq3IjoNkTDYAkSaS4JVxunyGX-O4Lb-Ow9fbcjuZWNyT6-I2rY3HkFk14bWQ-WGR0hBXCBuflUvY90Epf09av3etx-ocJDSTTIDAUyUyvOB_uDRSxJVzzI9UFgHPFGloUBO7b6KQIvDYRtxSQ43NmqCiORw
key
{"p":"1ghlC59ARiUrUNbjlIhIdOzVyHhLpTyOmFjMp0oxseWDkz3OoRqB1ahk-ImRe411GwCUr_d0Pou-nNt8rhcQz0tVtRirr8MnAhKpZlYDKfNlGNXVS3AOsNvw1tbX2FPhgbpm2IPRjIbq7Z6x_Bvx-NRks4mNEbuIDCLE62OO1DM","kty":"RSA","q":"odoTtGaO-t3G2PUgNUsqNK4sSHg3wXKrM4-f2MfN6vyG8o8PsXHRFMatC4NhJ6Ekk493uP_ZGtDoqZ1Jh1l_fTDQ1W9jUkCn6EYb3PGS3kyngyWjkX0OltzJo37QbXTU9nP9t8AxON21Ve_MJ4vMILPkc39cHza1yVCOKyBBsqs","d":"IHfvQJKIVb5wiRstnaT9aTI572PFBRjKrRa6YEd3KSK7eNQZM7WyyxPzZGYkY3-aObO_O0ILb4DoH1EcoV2ioaPN8h3QLwWheR3jtPqZBfqz2ekgHtUWP4rCOnakhmUza_nTwvLYl0XjSeo-bGAX46UT8qAin3Uh7oAUNxOPTPMO6NEVP1tlgF_f8y9tlE128rZHEE5pm6iBzbtsDVpQd6kZB796rhDMpZ6wyYi8FkMSONCGKcYUYlMrIUv9ChiQRimPyXECunG4VO8XVUpOyjFkIx2WeSctp1XBbFP3u5aLC-M5jUhxJ1LwoLBrqgyPQefmAx8FvKLMEQlEGVsjJQ","e":"AQAB","use":"sig","kid":"9ef2df82-7127-43fb-8b74-beaa355d4f44","qi":"bLUqkFIXrgJuCKOOm970jLg9IFCDVran-2b19MlAK3oFdOb5yrpt1nKY5wru8-Amvq4BGf9rk4z3-l52Rt0L-Dc3X8qs49KqeaQLlGgXL491WRoW94d7iK2gau2koJkxngwTS0rhXQnqZp4FoBmTDXuoT7HZDTWjmjYLLpm_Yd0","dp":"TGJwlWY_TQlk3RPj4pWErl37qfDspkrnZQ2D9EwxUhjkDT9op-xK29KePmjyR9LjMUDSz74TeWLsIxTd-U94C1MKgngMhcyy9jVsyX324RjhQqzF04dpZssHt9Sy8Zx2BZNdsvXQakOYQjd5s8zRXYmHat-zPdncouAhwRQl3Cs","dq":"LksK4cmH0ddHPdz25mdmXgUHY38HK4yZzTiiVsXnbvPlwVEMAwvz6oZdDnL4gfZEWPRrIP4E4feo5IK5ej4uCefBg5rFhMw7emM7KvnpsS2pqAhG_aEQYDQsdFgcU4JcO1W31yvgqEw5xqe88_63Vw89I4_lEIR8gGVLFKi4Qds","n":"h1GbK84y1H8mXTapvyauhcgUu_Y9IOX_WMvx2lvGxR07bjDnsO1mfnlCeeVICEUenGp8MuD_jZdQkonS8fzGzBc9pn1cAsO5U0LG42a97f11JKlof9lFipLnvyfJpHAZi7_7x6YxbWyk8Z4ImxcB9zEstz8zx4mixp0k9SuWUd3QLy6YuvtWXex0T4NSETsBhPPd1JW7FIVG-ItlVc9S8I480LwspC5-Pr25wNDNQ-nFKD6JAnEFTLEhyN9yq2BLrstbavJwh5WXLxGN6ZjNFMv3sdmwSGO8bHKp59Lk5UnP4zeSw8ZQoWZrwv7zbQI4LbUaQWcD-dIB_UTQEOY0EQ"}
algorithm
RS256
2020-09-01 12:12:26 INFO
EncryptIdToken
Skipped evaluation due to missing required element: client id_token_encrypted_response_alg
path
id_token_encrypted_response_alg
mapped
object
client
2020-09-01 12:12:26 SUCCESS
CreateTokenEndpointResponse
Created token endpoint response
access_token
jsK3q2NFEmvWMaGgFEak9Bk7rmrdEqZ75rqRLqeHaztcv47Yps
token_type
Bearer
id_token
eyJraWQiOiI5ZWYyZGY4Mi03MTI3LTQzZmItOGI3NC1iZWFhMzU1ZDRmNDQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQjMxYWVGa2RXRUI4dGFjRUtITXlMdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X2ZSSEZHUVduY1dlT2RzdTE3MzMyfSUpeygiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvUmVyVE9SRDNER0ozSUxqXC8iLCJleHAiOjE1OTg5NjI2NDUsImlhdCI6MTU5ODk2MjM0NX0.hOVsVziKsnobXZKne2-DbWoU4yR7mqxqEqDc8yfd2PBUs9l0Q4eP5U7UecqjUrYHskMOoJFjaPn-Y-2L-byNu-ejTyAsTa6iOUs_mp76s0CDkWkrG9ufEWFC7Gvm9Q2PZglQnVk2EkwmE03KnF6RLmtoti4WQdIoIgsoHGxzgI6sEZQ2oIAzlh3qAyRsq3IjoNkTDYAkSaS4JVxunyGX-O4Lb-Ow9fbcjuZWNyT6-I2rY3HkFk14bWQ-WGR0hBXCBuflUvY90Epf09av3etx-ocJDSTTIDAUyUyvOB_uDRSxJVzzI9UFgHPFGloUBO7b6KQIvDYRtxSQ43NmqCiORw
scope
openid
2020-09-01 12:12:26 OUTGOING
oidcc-client-test-signing-key-rotation-just-before-signing
Response to HTTP request to test instance RerTORD3DGJ3ILj
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "access_token": "jsK3q2NFEmvWMaGgFEak9Bk7rmrdEqZ75rqRLqeHaztcv47Yps",
  "token_type": "Bearer",
  "id_token": "eyJraWQiOiI5ZWYyZGY4Mi03MTI3LTQzZmItOGI3NC1iZWFhMzU1ZDRmNDQiLCJhbGciOiJSUzI1NiJ9.eyJhdF9oYXNoIjoiQjMxYWVGa2RXRUI4dGFjRUtITXlMdyIsInN1YiI6InVzZXItc3ViamVjdC0xMjM0NTMxIiwiYXVkIjoiY2xpZW50X2ZSSEZHUVduY1dlT2RzdTE3MzMyfSUpeygiLCJpc3MiOiJodHRwczpcL1wvd3d3LmNlcnRpZmljYXRpb24ub3BlbmlkLm5ldFwvdGVzdFwvUmVyVE9SRDNER0ozSUxqXC8iLCJleHAiOjE1OTg5NjI2NDUsImlhdCI6MTU5ODk2MjM0NX0.hOVsVziKsnobXZKne2-DbWoU4yR7mqxqEqDc8yfd2PBUs9l0Q4eP5U7UecqjUrYHskMOoJFjaPn-Y-2L-byNu-ejTyAsTa6iOUs_mp76s0CDkWkrG9ufEWFC7Gvm9Q2PZglQnVk2EkwmE03KnF6RLmtoti4WQdIoIgsoHGxzgI6sEZQ2oIAzlh3qAyRsq3IjoNkTDYAkSaS4JVxunyGX-O4Lb-Ow9fbcjuZWNyT6-I2rY3HkFk14bWQ-WGR0hBXCBuflUvY90Epf09av3etx-ocJDSTTIDAUyUyvOB_uDRSxJVzzI9UFgHPFGloUBO7b6KQIvDYRtxSQ43NmqCiORw",
  "scope": "openid"
}
outgoing_path
token
2020-09-01 12:12:27 INCOMING
oidcc-client-test-signing-key-rotation-just-before-signing
Incoming HTTP request to test instance RerTORD3DGJ3ILj
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
jwks
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Jwks endpoint
2020-09-01 12:12:27 OUTGOING
oidcc-client-test-signing-key-rotation-just-before-signing
Response to HTTP request to test instance RerTORD3DGJ3ILj
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "keys": [
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "9ef2df82-7127-43fb-8b74-beaa355d4f44",
      "n": "h1GbK84y1H8mXTapvyauhcgUu_Y9IOX_WMvx2lvGxR07bjDnsO1mfnlCeeVICEUenGp8MuD_jZdQkonS8fzGzBc9pn1cAsO5U0LG42a97f11JKlof9lFipLnvyfJpHAZi7_7x6YxbWyk8Z4ImxcB9zEstz8zx4mixp0k9SuWUd3QLy6YuvtWXex0T4NSETsBhPPd1JW7FIVG-ItlVc9S8I480LwspC5-Pr25wNDNQ-nFKD6JAnEFTLEhyN9yq2BLrstbavJwh5WXLxGN6ZjNFMv3sdmwSGO8bHKp59Lk5UnP4zeSw8ZQoWZrwv7zbQI4LbUaQWcD-dIB_UTQEOY0EQ"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "sig",
      "kid": "7b059ab6-8647-4313-ba44-6e067e24066c",
      "n": "we6X7zJDjabXl8AKTJcy7i9r6MsjoQDCYC-bTJdhnPGucigR6TyJ_advYE5Q25e63eVVxYN-W_hfn-8zQcN9cQMtcwiAqjABYK0MQE5uNcCGOheM-LRAPHNV6408IL1IVKt-ja0gq560IcS05L-6eu14ti4r_o6k9FhnbfhQ78hNWPorv3_qVrZtMLVfjC5oMSeEiQzHl7kz7TX1BuTFWdFprc2UPAkwvJahJqA74dSAjIpDwmkLNw2gbdkQpJmESyVr1JITGf_k2xVCBA9Ib69rtGAB18CrYP4BUxFwm0NONFLHUL2D0qnLjE7KozsLHhBGpp0Adlj6sM6k-Y7t3Q"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "3e20625c-1ac1-4c6b-a6c8-2feff1306e50",
      "x": "xh2iKs8DToJa6Q8Siw9bu15hUdfpWULm7Yg0kQNJdFo",
      "y": "pQEH11ZLbrVn2lu1v27duU2CoHi_Frl7YrYDm8dl4MA"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "P-256",
      "kid": "8ff6f2ce-af0d-4c70-9325-fc9a772fb263",
      "x": "EdRshxD4ywPisigDXcxvAfNp1OAjujSFOv2u19Agonw",
      "y": "40yXV4QODGbZlADXftol6PTuu8-FQD0ggkMh9y1a7iw"
    },
    {
      "kty": "EC",
      "use": "sig",
      "crv": "secp256k1",
      "kid": "916bc9eb-f770-4186-9e5d-df14ac0b59ea",
      "x": "LBIpd0XbtFIAv4OlZsHcahMID05Ce6rTc8LdvKQRGN8",
      "y": "blqI2iaUg8pIRCSyj6iJP8SxJGmfuWuuPjeHaUTcQic"
    },
    {
      "kty": "OKP",
      "use": "sig",
      "crv": "Ed25519",
      "kid": "5723aabd-7ed1-4363-a399-f2435a38b414",
      "x": "MiC4CkPNKbi9MUhj-m_3a-CYUkk1h810EKFYPw2xHSo"
    },
    {
      "kty": "RSA",
      "e": "AQAB",
      "use": "enc",
      "kid": "1e6f34af-6829-45dd-8b83-88d97c44750e",
      "alg": "RSA-OAEP",
      "n": "jmWZpx_gfAXsK4EyZ9V8ZaYsZH9KV_KVoYnMHVdBGCBBDoi0XnCzaAEykraPsZXMECW7fV0-zzjg7PxXPRfL8_vkfqYNlUUxTe-T7M3UDJSsB0Ol3WMSquOcjm32SsBDdJIEYruyPUnrFj6XjbqvFecD-7TWoHj6kLOh4acLbcUJ9TXsUZYw9qmsNJPph0pOzO0OKfW4WmR3l-Tmgdgeb3I84QylmHB8thg919pvKNdmj6nQtuzAZS4_Dp_rDM_WB2ZmIZ1UN-xfQoJiTptswfVsob3YzMKl5ls_i7gacaJNga7lLhjgfYV_pEYRCjrwscAy2kBhjL75HsPxP65naQ"
    },
    {
      "kty": "EC",
      "use": "enc",
      "crv": "P-256",
      "kid": "77959933-bdad-41b6-ac93-fd3ecd19672f",
      "x": "wqTeEVCQl835Re6-FKHM4Ro7MPFiCpiZv1IMY1cPLjI",
      "y": "twxuNilJtfl2m6d-KS1RRjnGXERGl7aCTwVFacwQ5zc",
      "alg": "ECDH-ES"
    }
  ]
}
outgoing_path
jwks
2020-09-01 12:12:27 INCOMING
oidcc-client-test-signing-key-rotation-just-before-signing
Incoming HTTP request to test instance RerTORD3DGJ3ILj
incoming_headers
{
  "host": "www.certification.openid.net",
  "user-agent": "openid-client/3.15.9 (https://github.com/panva/node-openid-client)",
  "authorization": "Bearer jsK3q2NFEmvWMaGgFEak9Bk7rmrdEqZ75rqRLqeHaztcv47Yps",
  "accept": "application/json",
  "accept-encoding": "gzip, deflate",
  "x-ssl-cipher": "ECDHE-RSA-AES128-GCM-SHA256",
  "x-ssl-protocol": "TLSv1.2",
  "connection": "close",
  "x-forwarded-host": "www.certification.openid.net",
  "x-forwarded-server": "www.certification.openid.net"
}
incoming_path
userinfo
incoming_body_form_params
incoming_method
GET
incoming_body_json
incoming_query_string_params
{}
incoming_body
Userinfo endpoint
2020-09-01 12:12:27 SUCCESS
OIDCCExtractBearerAccessTokenFromRequest
Found access token on incoming request
access_token
jsK3q2NFEmvWMaGgFEak9Bk7rmrdEqZ75rqRLqeHaztcv47Yps
2020-09-01 12:12:27 SUCCESS
RequireBearerAccessToken
Found access token in request
actual
jsK3q2NFEmvWMaGgFEak9Bk7rmrdEqZ75rqRLqeHaztcv47Yps
2020-09-01 12:12:27 SUCCESS
FilterUserInfoForScopes
User info endpoint output
sub
user-subject-1234531
2020-09-01 12:12:27
ClearAccessTokenFromRequest
Condition ran but did not log anything
2020-09-01 12:12:27 INFO
AddIssAndAudToUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:12:27 INFO
SignUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_signed_response_alg
path
userinfo_signed_response_alg
mapped
object
client
2020-09-01 12:12:27 INFO
EncryptUserInfoResponse
Skipped evaluation due to missing required element: client userinfo_encrypted_response_alg
path
userinfo_encrypted_response_alg
mapped
object
client
2020-09-01 12:12:27 OUTGOING
oidcc-client-test-signing-key-rotation-just-before-signing
Response to HTTP request to test instance RerTORD3DGJ3ILj
outgoing_status_code
200
outgoing_headers
{}
outgoing_body
{
  "sub": "user-subject-1234531"
}
outgoing_path
userinfo
2020-09-01 12:12:27 FINISHED
oidcc-client-test-signing-key-rotation-just-before-signing
Test has run to completion
testmodule_result
PASSED
Test Results